Thursday, October 31, 2019

The Impact of the First World War Assignment Example | Topics and Well Written Essays - 6000 words

The Impact of the First World War - Assignment Example   The fear of a German uprising was no longer in the minds of the French as all the land that Germany was required to hand over was returned; the most important regions being Alsace and Lorraine. Germany's army was downsized to a maximum of 100,000 men; they were denied the use of tanks. The air force was disbanded and the navy was only allowed to staff and operate six ships; however, no submarines were allowed to remain operational. The land fifty kilometers east of the Rhine was pronounced a demilitarised zone, where no soldier with a weapon could enter. Overseas land previously owned by Germany was given to different European countries. The Saar, Danzig, and Memel were put under the control of the League of Nations. One of the more important outcomes was the "War Guilt Clause" that required Germany to take on full responsibility for starting the war. This was important as it would show the world France's reason for participation in the war was only to defend against the German attacks. This also meant that Germany would have to pay reparations to France for the physical damage caused during the war. Clemenceau was the most satisfied out of the three leaders with the humiliation of Germany, and France now found new power in the world. Wilson was very pleased because as a result of the Paris Peace Conference his vision of the League of Nations had become a reality. The League would make it possible to solve conflicts all over the world in a peaceful manner, displaying Wilson's desire for worldwide peace. He said as much: "To promote international co-operation and to achieve international peace and security." (Wilson) The cost of creating the League was losing his other 13 original ideology points to gain the global support that was necessary to start the League and make it a success. As the post-war world was in the struggle of finding peace, there were a lot of countries intrigued by the international organization that promised to bring world peace. Wilson was of a peace-loving nature and was clearly angered by the great number of restrictions that Germany had to agree to in the Treaty as well as all the reparations they had to make. The harsh conditions that were imposed on Germany embarrassed and shamed Wilson. Nevertheless, he was very satisfied with the start of the League of Nations. One fact to be noted is that reparations to the United States were not mandated in the Treaty. It is true that the losses of the United States were not on the same scale as Britain and France because of their late entrance into the war. Lloyd-George was perhaps the least satisfied with the final terms of the treaty because of Clemenceau's persistence to bankrupt the German economy.  Ã‚  

Tuesday, October 29, 2019

Examine the problems that unions have to face when work arrangements Essay

Examine the problems that unions have to face when work arrangements become more market-based and individualised. Discuss also the advantages for employers that - Essay Example ble in that trade unions and socialist parties became part of the new Labour party which pushed working class politics to national levels, with the trade union represented in the community through the political voice of the Labour Party (Savage and Miles 1987). However, in recent decades there has been a move towards de-industrialisation, with workplaces being increasingly pressured by downsizing and outsourcing, global competition and resulting changes in management. As pointed by Turok (2000), Britain as a whole lost 32% of its manufacturing jobs between 1981 and 1996. Public sector organizations in particular demonstrate a strong union presence and have traditionally been known as employee champions. However in the modern day environment, as reduced resources and outsourcing have resulted from more market based arrangements, the responsibility for the welfare of employees has shifted from the HR department the trade unions depended upon, to line managers. (Whittaker and Marchington 2003). In a market based, individualized framework, the role of trade unions has been increasingly sidelined, as white collar workers proliferate in a digital environment. Globalization and the age of the Internet has produced a surplus of white collar workers as opposed to the blue collar workers who were well represented by unions. Unions have played a significant role in the past through the organization of strikes to compel employers to provide better benefits and working conditions. Machin and Stewart (1984) undertook a study of performance measures of workers vis a vis financial performances during plant closures in 1984. Their findings showed that in the case of companies reporting a below average financial performance, closure of the plant due to strikes was likely to have occurred. Therefore a direct correlation may be said to have existed between employee productivity and union activity. With de-industrialization, some firms have also moved towards the introduction of

Sunday, October 27, 2019

Development Of A Web Based Payroll System Computer Science Essay

Development Of A Web Based Payroll System Computer Science Essay Saving time considered to be a leading topic in this modern world where people try to get their work done in a least amount of time. Therefore time spent on simple things in day to day life made easier as web-online has conquered that place. With that intension this payroll system has been developed to organizations where small branches involved. Developing such web based payroll system may facilitate the process of attendance to paying wages for employees. Not only those employees will be able to print their payslips online with no hassle but also they will be able to view their attendance details in their payslip which would be an added feature compared to other systems. To develop the above said web application a research took place in finding which tools has to be used, how the system work, how many users should be involved, how it benefits the company and employees and how the taxations work. Therefore for the payroll web application php, mysql and apache has been used correspondingly in programming, database and web server which comes in a package as wamp for windows. In supporting the above chosen wamp server umlet, dreamweaver, css styles, java script used correspond to drawing uml diagrams, php codings, interface designs and codings. Further in calculating taxes, current tax code and percentages of taxes been used according to current rate of HMRC revenue. Hence, the current system of payroll in organizations has also been observed in concluding the whole process of payroll with the taxations. Payroll system is generally available and could be accessed multiply. An iterative and incremental approach applied throughout developing the payroll system where a piece of coding is tested as it went along with the development. This was useful in finding particular errors affected towards the system and not only that it helped to correct them but also it helped to step forward and trying new functions towards the goal. As php codes takes a major role in this payroll system, validations of functionalities based on it has been quite tricky and useful towards improving knowledge of php and the system. Table of Contents Chapter 1. Introduction 4 Chapter 2. Aims Objectives 4 Chapter 3. Prior research 5 Chapter 4. Literature Review 8 Chapter 5. Software Requirements 10 Chapter 6. WAMP server 11 Chapter 7. Design of the payroll system 13 16 Chapter 8. System architecture 17 Chapter 9. Development of Payroll System 19 23 Problem Log 26 List of figures 27 References 28 Appendices 30 Introduction Payroll system is a web application based on client server and electronic payment technology, which is aimed at developing a system that manages the payment of monthly wages of employees in an organization. It is supported by a database consisting of its employees details and their attendance details. According to that end of each month the salary is paid to the corresponding bank account of the employee. It also considers employees income tax regulations and NI contributions. Hence it shall deduct the appropriate amount of deductions at their salary if they earn more than  £647 per month. Further a payslip could be generated taking the above in to account. The following technologies have been used in developing the above said application. WAMP server CSS Macromedia Dreamweaver Umlet Aims Objectives The proposed system would allow the user to do their work in prototype. Hence, it has many gains compared to a manual system. In manual systems a main problem seems to be is maintaining the number of records and finding a particular record. Further calculating the final pay after income tax and other deductions would consume a lot of time. But the proposed system is capable of calculating the deductions automatically. Some of the features of the proposed system are given below: Maintaining the Database for Admin, Employee, attendance etc.. Attendance report. Generate payslips. Prior research Fact gathering techniques were used for the following reasons, To identify the problem in a payroll system. To avoid repetition. To complete these tasks following techniques has been used, 1. Interviews a basic source of quality information. Allows gathering information from an existing system where an administrator or manager could be the user. It facilitates to discover areas of misunderstandings, indication of resistance to the proposed system. An interview could be a structured or an unstructured in this state. In a structured interview questions are standardized and in an unstructured interview questions are worded to suit the respondent that provide the information about the areas overlooked or not thought to be important. Comparison of the structured and unstructured interviewing are detailed as below. Advantages: Structured: Ensures uniform wording of questions to all respondents. Easy to administer and evaluate. Less interview training required. Result in shorter time. Unstructured: Questions can be worded to suit the respondent. May produce the information about the areas overlooked or not thought to be important. Disadvantages: Structured: Cost of preparation is high. Such high level of structure may not always be suitable. Some respondent may resist to such structure. Unstructured: Inefficient use of interviewer and respondent time. Results take a longer time. Extra time required for the collection of essential facts. The success of the interview depends on the skill of the interviewer and his/her preparation for the interview. Analysts must also be aware of the kinds of difficulties at some interview, and must know how to deal with the potential problems. Conducting interviews determines qualitative information such as, Activities involved in process of taking the attendance. Activities involved in the process of Payslip generation. Limitation of existing system. Problems faced by the user in the existing system. 2. Record Inspection Analysing facts from documents, examining information which has recorded about the system and users. Examining forms, files about an existing system. Such records may include, Written policy manuals. Rules and regulations. Standard operating procedures used in the Payroll and Attendance System Forms and documents. A good documentation system provides relationships and interaction between them. Further would give an idea of the structure activities, procedures and flow of data. But it would not show how each task performed or where the decision making power lies. To gather details about the payroll system several kinds of records and reports has been reviewed such as, Standard operating procedure Reports generated by an existing system. Document flow (input/output) of the Payroll and Attendance System. Process of Preparing the Payslip. Process of deducting the salary for tax and NI contributions. Types and format of database registers. 3. Observation could bring missed facts, duplicate work done unintentionally. Its not the quantity of time observed is important but the unusual angles of observation of the work content and methods would be more useful. Observation may focus on, Operational inefficiencies. Alternate routes and procedures. Interruptions in the normal flow of work. The usage of files and documents. Informal communication channels, etc. On site observation provides a close view of the working real system, objects, documents and occurrences of events. Literature Review Considering the research took place towards developing a new payroll system the limits of the current system seems to be affecting in many ways not only the admin staff, manager or company but also to the employees concerning their wages and payslips. Check-in attendance to paying wages the whole process seems to be dragging and time consuming of admin, manager and employees. The attendance check-in system which is currently in operation has to be a double work where firstly the attendance is checked by paper in a prepared sheet for it and then will be entered to the system later with times when the employees started work and ended work. Therefore the each of employee has to look for his/her name in the registry which is in a paper and sign in/out with time ahead his/her name on it and then the admin staff who enters them in the system has also got to find the names on page in the system to clock him/her in/out. This system seems to be a hassle for the admin where it could be done in one go. So the new system would take away that headache from admin where he/she could do it one click per staff. When an employee logs in just a click in front of his name would clock him in and the time of work started will be recorded automatically. Like wise the when the employee finishes work clocked out time will be recorded and the attendance counts towards his pay. In the above case another popular scenario could be when an employee begins work at a late time, admin has to deduct the pay hours or pay corresponding to that. But because the times of clock-in will be entered to the system automatically there wont be any need of altering the timings of employees. Therefore again it facilitates the work of admin staff. Moving on with the attendance to the wages of employees, some of the companies account departments are outsourced simultaneously some others got their own accountants. So in transferring wages to employee bank accounts and for tax deductions account departments are involved and the attendance checked by admin staff will be forwarded to the appropriate account department. Account department uses the national rate of taxes for employee earnings according to HM Revenue Customs and the relevant amount of taxes will be deducted depending on employees earning. Even in this scenario it is another point where human resources could be saved a s software applications could be used which would process the attendance to final pay after calculating taxes. Therefore it is another advantage to be seen in the new payroll system. Not only that, chances of making mistakes in entering the attendances or pay to the system could be avoided in the new payroll system. Hence, the new payroll system shall lead towards paying wages to the employees. After making payments to employees keeping records of paid amounts and record of due amounts also seem to be an additional point when comparing against the previous systems where paid records kept at account departments. Therefore possibilities of misconception have been avoided between employees and management by having these records as proof. Looking at the employee payslips in the previous system it had to be sent by a separate department to the employees by post. But in the new payroll system, payslips made available online to employees where there wont be any need to wait for payslips to arrive. Retail giant Tesco reveals in The one (june) as below, Driven by security and environmental issues, the move to online notification of pay is set to take place this summer, saving postage and paper on up to 4.7million payslips a year. Further rather than just being a payslip provided in the new payroll system it also has the feature of displaying the attendance according to which the salary is paid. And also it is available to print in addition to viewing. Plus an employee will be able to view and print the salary sheets of the previous months too which has been another outstanding step in the new system. Even though it could be a large page of salary sheet due to displaying all the attendances, it is concerned as fact of giving the accurate information stored to the employees and this would build up confidence and trust towards the company. Software Requirements Functional Requirements Admin: In this module admin is provided with many services such as Add new employee, Update employee details, Mark in/out attendance, Update salary Details, view/print salary slips, payment to employees. Employee: In this module employee is provided with the services such as View earnings, View deductions, View and print salary slip. Non-Functional Requirements System can endure even though many number of users requested the desired service. By incorporating a robust and proven database, reliable performance and integrity of data is ensured. There must be a power backup for server system. Ensure sensitive data is protected from unwanted access by users and implementing appropriate technology to strict user- access criteria. WAMP server WAMP is an open source collaborated web development kit which contains all the ingredients such as Apache, PHP and the MySQL database you need to develop and create web applications It also comes with an inbuilt phpMyAdmin page which allows you to easily manage your databases. Further it is a solution kit that will allow you to reproduce your production server. One important aspect of the WAMP server is that once it is installed and is in play, the manager has the freedom to install as many latest releases of Apache, MySql or PHP. Functionalities of the WAMP Functions are very easy and less complicated; they are straightforward and can be viewed by just a click which will enable you to : Manage Apache and MySQL services Switch online/offline (give access to everyone or only localhost) Install and switch Apache, MySQL and PHP releases Manage server settings Access logs Access settings files Create alias Why an open source has been used They are free Totally free and available to the general public. Software developers and programmers can use them in improving their existing software or create new programs. Doesnt require a license or sales fee. They are cross-platform and technology-neutral. Programs are usable virtually by everyone as ensured by the open source community. Open source programs are not dependant on any individual technology or style and they are technology-neutral. It shall meet the criteria as long as it runs on more than one operating system. They must not restrict other software gives software developers the maximum control and flexibility. They embrace diversity open source programs cannot discriminate against any person or group of persons. Looking more into features of the above used, Apache 2.2.6 As its main job it parses files requested by a browser and display results according to the code. It is powerful and could achieve any virtual task that required. Authentication/authorization make simpler certain authentication configurations. Caching considering production quality. Configurations made simpler and modularised. Proxying load balancing provided. Large file support support files larger than 2GB. PHP 5.2.5 Stands for Hypertext Pre-processor and is a server-side scripting language which allows a website to be keep alive. Controls memory consumption between requests. Improved speed of arrays. MySQL 5.0.45 MySQL is a structured query language server which has been designed to process complex queries and for heavy loads. It enables PHP and Apache to work together to access and display data in a browser. For maximum efficiency and speed it allows many tables to join together as a relational database. Cursors server-side cursors supported. Triggers triggers supported. Views updatable, named views supported. Design of the payroll system Payroll system is designed for a small organization/branch/department where there would be less employees compared to a large number of employees payroll system. Admin and employee are the two main users of the system. Considering the system as a whole, the following steps have been taken in process of functionality. Add new employee personal details of the new employee would be added with a pay rate per hour. Edit employee details capacity of updating employee details Delete employee delete an employee when an employee is no more with the organisation Clock in/out marking the attendance according to which an attendance report would be printed and be paid to the employee. Attendance report to view/print attendance report. Salary sheet 1st of every month employees will get paid according to the hours worked and the salary sheet would include worked hours, hourly pay, NI contributions, income tax and net salary. The salary sheet could be printed/viewed. Payment payment is made according to the net salary of the employee. A record would be kept on payment details date, time, employee id and amount. Class diagram below shows the structure of the system with its classes, attributes and the relationships between the classes. CLASS DIAGRAM glass Relate to the design of the system as said above there are two users who get access to the payroll such as admin and employee. Use case diagram below presents a graphical overview of the functionalities of the payroll system in terms of actors, goals and their dependencies between use cases. It shall show what system functions are performed by admin and employee. USE CASE DIAGRAM System architecture Payroll system is a web based application created using three tier architecture and an iterative, incremental approach to design used in the process of development. Figure 1. three blocks which represents the client-server architecture Client block a client side application which runs on an operating systems graphical user interface. Passes the challenges to the middleware block and it handles the non-local services. Client also runs a component of the distributed system management which could be a simple negotiator to an entire front end application on a managed station. Server block a server side application which runs on top of a shrink-wrapped server software package. Server side depends on the operating system to interface with the middleware block which brings the requests. Server also runs a distributed system management which could be a simple negotiator on a managed PC to an entire back end application. Middleware block runs both on the client and the server side of an application. Likewise the above middleware also has a distributed system management component. As Orfali et al(1999)states in contrast to using other form of distributed software client server architecture inherits the following characteristics, Service client is a consumer of service and the server is a provider of service. Therefore, client-server provides a clean division of function based service. Shared resources server could provide service to many clients same time and regulate access to shared resources. Asymmetrical protocols clients always initiate with a request for service and servers wait for requests from clients. Transparency of location Mix and match client/server is independent of hardware or operating system software platforms. Able to mix and match between platforms. Message based exchanges message is the delivery mechanism for service requests and replies. Clients and servers interact through message passing mechanism. Encapsulation of services without affecting the clients server can be upgraded as long as the published interface is not changed. Scalability client/server systems could be scaled horizontally or vertically. In horizontal scaling with a slight performance impact client workstations could be added or removed. In vertical scaling, across multiple servers processing loads are distributed or larger and faster machines are migrated. Integrity server code and server data are centrally managed which outcomes in cheaper maintenance and protecting data integrity. Same time clients stay independent and personal. Development of Payroll System As mentioned above admin and employee are the two users of the payroll system. Many users could be added in the database as admin users. Therefore added all admin users shall be privileged to perform admin tasks in fulfilling their needs. A login process for any user involves few components such as, Form of submitting the login information A validation to confirm the information has been submitted. A database query which compares the submitted information against the stored information. After successful login as an admin staff view of the homepage would look like below, Admin homepage Figure 2. home page of admin staff with quick access icon. As shown above using icons of the homepage or using the tabs on top, corresponding page could be accessed. Further in addition to the tabs an admin could change his/her password using the icon on the homepage which would also update the database according to it. Doing so would give a conformation saying that the update has been successfully completed. Employee page allows admin to add a new employee with employee personal details and also allows updating details of employee. The details of employee would be saved in the database and further an employee attendance details, payments made, payment balance could be viewed. If an employee doesnt exist anymore his/her details will be deleted and this will remove his/her details from the database too.   Figure 3. a page which opens to update details of an employee from employee page. Update employee information An employee who is entered to the system in the database will automatically be inserted in attendance check-in in the attendance page. Therefore when admin staff does the attendance check employee name will be selected from the arrow-down list and it will display below to view which employees has arrived to work. Simultaneously database will be updated in the check-out table with the check-in information of the employee who has been clocked-in. By the time when the corresponding employee finishes his/her work shift, admin would check-out from the drop-down list again. Doing so would remove the check-in information of the employee from the check-out table in database and the attendance information will be entered to the attendance report and the payslip adding to his/her worked hours towards the final pay. Attendance check-in/check-out Figure 4. attendance check-in and out for employees by admin. Therefore admin staffs are able to view an attendance report of an employee in the employee page where it is referred to an employee. Not only that, the details of attendance will also be displayed in the payslips where could printed from the salary sheet page. In the salary page an admin staff can select the employee name which ever she/he wants to print the payslip of. Further after selecting the employees name, again admin is capable of selecting which months payslip she/he wants to print.   Doing so would open a page and enables to print it according to which was selected by admin.   Considering the deductions of taxes which are income tax and NI contributions, when the pay is calculated end of each month automatically the above taxes would be deducted in a rate 15% for income tax and 9% for NI contributions. Therefore the final net pay would be calculated automatically as the salary for each employee. An important factor here involved in deductions is, inclusion of a tax code to the pay.   At a national rate of 647 which reveals that up to a pay of  £647 per month the above said tax would not be deducted and who ever earns above the rate of  £647 will have to pay the above mentioned taxes. Therefore the above said taxes will automatically be deducted when an employee earns above the tax code.   Regarding salary payments to the employees, net pay for each month will be paid end of that month to the employee. In the payments page this could be done and who ever needs to be paid can be selected from the drop down list. When a payment is made to an employee a record will be kept in the database in the payments and also the recent paid payments records will also be displayed below in the payments page. Further if theres a balance due to pay it will record and could be viewed in the employee details. Therefore any remaining payments could be checked straight away and can get rid of under paying, shortages and keeping balance payments to employees. And also because the employee gets payments according to his worked hours there is no fraud involved or alterations cannot be made. In such way this payment could be considered as secure method of paying salaries.   Payslip of an employee Figure 5. Payslip of an employee which records not only the NI contributions and income taxes but also the attendance of an employee. Apart from functions of  payment and attendance an admin also can change his/ her password from the homepage using change password icon for a given admin username.   Finally taking admin privileges as whole, admin takes the responsibility of adding new employee, updating employee details, deleting employee, the attendance system which is checkin-in and out of employees in order to record their attendance towards their wages and the payment system which includes paying wages and keeping records of them.   Payments page where salary paid Figure 6. Paying wages for employees by an admin staff. In the event of employee user functions each and every employee will have their own passwords assigned by the admin when each employee registers with the payroll system. Doing so will create separate users for employees to access their attendance report and in printing their payslips. Passwords for employee login could only be changed by an admin user in edit employee details. Matching login details with the payroll database would allow the user to access his/her profile which contents the attendance report and the salary sheet of employee. Figure 7. Homepage of an employee user. Not only the tabs displayed would allow accessing the corresponding page but also the shortcut icons in the homepage would allow doing so. In the attendance page an employee could view his/her attendance so far and will also be able to print it. Likewise in the salary sheet page by selecting the necessary month of salary sheet allows to view and print the corresponding salary sheet. Figure 8. months of the salary sheets given to choose from. Figure 9. salary sheet for a chosen month of an employee. Problem Log Error Date Explanation Solution 1.fatal error: function name must be a string 03-05-10 appropriate brackets not used Change the brackets style 2.notice undefined index php 03-05-10 Post method not defined properly $fname = $_POST[fname]; 3.parser error: 25-05-10 Retrieving method not defined properly per row while($row = mysql_fetch_array( $result )) 4. Notice: Use of undefined constant id assumed id 27-05-10 Undefined id with brackets Define id with brackets 5. Parse error: syntax error, unexpected $end 01-07-10 No ending, missing brackets Include appropriate brackets 6. logging out to a blank page 02-07-10 Should revert to log-in page Include a header 7. Parse error: syntax error, unexpected T_constant_encapsed_string 02-07-10 Using invalid symbol Use inverted comas appropriately 8. parser error 03-07-10 Unexpected ending Php headers and appropriate brackets List of figures Figure 1. three blocks which represents the client-server architecture 17 Figure 2. home page of admin staff with quick access icon. 19 Figure 3. a page which opens to update details of an employee from employee page. 20 Figure 4. attendance check-in and out for employees by admin. 21 Figure 5. Payslip of an employee which records not only the NI contributions and income taxes but also the attendance of an employee. 22 Figure 6. Paying wages for employees by an admin staff. 23 Figure 7. Homepage of an employee user. 23 Figure 8. months of the salary sheets given to choose from. 24 Figure 9. salary sheet for a chosen month of an employee. 25 Figure 10. Employee table in the payroll database 29

Friday, October 25, 2019

The Mathematics of Bubbles in Beer :: Math Carbonation

Refraction Refraction is what happens to light when it passes from one medium to another. For example, things appear differently from the bottom of a swimming pool than on the top. Simplistically, refraction is the bending of light. The explanation for this phenomenon, however, can be described with light as rays and light as waves. No matter the case, it is important to remember that the speed of light is constant in every homogeneous medium, regardless of shape, size or form. The index of refraction Light travels ( in certain substances ) at a fraction of the velocity if it travelled in a vacuum. The index of refraction is the inverse of this fraction. Thus, this number is greater than or equal to 1. This index is also specific to light, so different light in different mediums have different indices. For example, here is a table of indices: Material Index Vacuum 1.00000 Air at STP 1.00029 Ice 1.31 Water at 20 C 1.33 Acetone 1.36 Ethyl alcohol 1.36 Sugar solution(30%) 1.38 Diamond 2.417 So let's observe the effect of refraction in terms of rays. A ray strikes the surface between substance I and substance R. The angle i between the incoming ray and the normal vector at the boundary is called the angle of incidence, and the angle r between the refracted ray and the normal vector on the opposite side is called the angle of refraction. This is related in the following law, called Snell's Law: ni sin i = nr sin r. For red light in air hitting water this gives sin r = sin i/1.33 Solving for Snell's Law for r gives the relation r = arcsin (sin i/n) Explicit Calculation In simple ray tracing, a ray originates at a point P at a directional vector v, which is of unit length. This is the set of all points P+tv where t is a non-negative scalar. When the ray hits the boundary between two different substances, it will refract, and begin a new ray. The Mathematics of Bubbles in Beer :: Math Carbonation Refraction Refraction is what happens to light when it passes from one medium to another. For example, things appear differently from the bottom of a swimming pool than on the top. Simplistically, refraction is the bending of light. The explanation for this phenomenon, however, can be described with light as rays and light as waves. No matter the case, it is important to remember that the speed of light is constant in every homogeneous medium, regardless of shape, size or form. The index of refraction Light travels ( in certain substances ) at a fraction of the velocity if it travelled in a vacuum. The index of refraction is the inverse of this fraction. Thus, this number is greater than or equal to 1. This index is also specific to light, so different light in different mediums have different indices. For example, here is a table of indices: Material Index Vacuum 1.00000 Air at STP 1.00029 Ice 1.31 Water at 20 C 1.33 Acetone 1.36 Ethyl alcohol 1.36 Sugar solution(30%) 1.38 Diamond 2.417 So let's observe the effect of refraction in terms of rays. A ray strikes the surface between substance I and substance R. The angle i between the incoming ray and the normal vector at the boundary is called the angle of incidence, and the angle r between the refracted ray and the normal vector on the opposite side is called the angle of refraction. This is related in the following law, called Snell's Law: ni sin i = nr sin r. For red light in air hitting water this gives sin r = sin i/1.33 Solving for Snell's Law for r gives the relation r = arcsin (sin i/n) Explicit Calculation In simple ray tracing, a ray originates at a point P at a directional vector v, which is of unit length. This is the set of all points P+tv where t is a non-negative scalar. When the ray hits the boundary between two different substances, it will refract, and begin a new ray.

Thursday, October 24, 2019

Alber Bandura

This theory argues that learning occurs by interacting with other people and observing people's actions as well as the consequences of their attitudes and behavior. This essay explores Bandanna's Social Learning Theory as well as how it helps us understand learning in the context of the classroom. Bandeau â€Å"discussed human behavior wealth a framework of triadic reciprocally. † (Shuns, 2012, p. 119). Treadle reciprocally Is delved Into three components: the environment, cognition and behavior (Shuns, 201 2, p. 1 19). These factors are dependent on each other.The environment influences cognition, cognition influences behavior and behavior influences environment. However there is variation in which is the dominating factor. (Shuns, 2012, p. 120). In social learning theory: Learning is largely an information processing activity in which information about the structure of behavior and about environmental events is transformed into symbolic representations that serve as guides f or action. (Bandeau, 1986 as cited by Shuns, 2012, p. 121). According to Shuns (2012), the process of learning can be applied through inactive learning or vicariously.Inactive learning Is performing an action and reacting to the consequence of the action. Observing the reward and punishment resulting from the consequence of a person's actions are how people establish whether they should repeat the action in future or not. Learning vicariously occurs by observing other people's actions without having to experience it personally. If the action performed results in a negative consequence people will avoid performing this action in at a later time and vice versa. (Shuns, 2012, p. 121).For example, in a classroom if a child has not completed their homework ND does not receive punishment from the teacher the child will continue to not complete their homework. When other children observe this they too will not complete their homework because It does not result In a negative consequence. Mo deling â€Å"refers to behavioral, cognitive and affective changes deriving from observing one or more models† (Bandeau, 1978; Shuns, 1987, 1 998: Zimmerman, 1977 observing others and imitating their behavior. (Shuns, 2012).It can be categorized into three key functions, these are response facilitation, inhibition/distribution and observational learning (Bandeau, 1986 as cited by Shuns, 2012, p. 125) People often lack motivation and therefore do not perform skills and behaviors that they have learnt (Shuns, 2012, p. 126). Response facilitation refers to â€Å"modeled actions that serve as social prompts for observers to act accordingly' 126). Response facilitation motivates the person to perform certain behaviors if the observer observes that the model has received a positive outcome (Shuns,2012,p. 126).For example in a classroom if learners observe that a certain pupil is getting praised for answering questions , they too will imitate this behavior. Observational learning i s a core component of Bandanna's theory (Craig, 1992, p. 176) . Bandeau states that people attain knowledge in a more efficient method by observing others. He also states that once they attain knowledge â€Å"they can reproduce it almost immediately' . However , though observational occurs people can choose whether or not to repeat that behavior based on the consequences The behavior one imitates is referred to as a model.It is divided into three models, a live model, in which a person actually performs behavior, a verbal instructional model which would consist of descriptions y talking and a symbolic model which is behavior performed in the media (Craig, 1992, p. 176). Observational learning consists of four components. These are the attention processes, retention processes, reproduction process and motivation process (Craig, 1992,p. 177) In order to† imitate a model† we have to â€Å"pay attention† to it(Bandeau,1971 as cited by Craig 1992 , p. 77). A model has to appeal to a person and capture their interest because then it will enable them to pay full attention to it. If a model does not appeal to a person they will not pay attention and it will negatively affect their earning. For example in a classroom , if learners notice that getting high grades will give you a position of power in school such as becoming a class prefect , learners will pay attention in class so that they are able to achieve this.The second process is the retention process. This requires you to retain what you have previously learned in a cognitive way so that you have the ability to reproduce it when you want to imitate the model. (Shuns,20120,p. 128) â€Å"A modeled display can be stored as an image, in verbal form, or both â€Å"(Bandeau, 1977 as cited by Chunk ,p. 1 28). T is a challenging task to retain information about activities that cannot be adequately described in words therefore imagine coding is essential(Shuns,2012, p. 128).Through rehearsing and cod ing the information that was stored in our memory, there is a higher chance of recalling prior information than that of The third process is production. It involves â€Å"translating visual and symbolic conceptions of modeled events into overt behaviors† (Shuns, 2012, p. 128). This involves reproducing the observed behavior. In order to reproduce it one needs to practice in order to develop the required skills needed. For example in a classroom if A teacher does an example of a mathematic sum on the board; students would have to attempt it several times in order to master the skill of solving it.The last process is the motivation process. It â€Å"influences observational learning† because the motivation encourages a person to interact more with the previous three processes (Shuns, 2012, p. 128). Bandeau distinguishes between the acquisition and the performance of new responses Even though you have observed the model you have the choice whether or not you will imitate the model. Motivation plays a significant role in imitating a model. According to there are different types of reinforcements such as â€Å"direct reinforcement†.If a person realizes they would be rewarded by imitating a mode they will be more motivated to perform that same behavior. (Craig, 1992, p. 178). For example the classroom if a teacher rewards a child for performing their work by praising them and giving them a gold star , other children will observe this behavior and imitate what the child is doing so that they may also be rewarded. â€Å"People attend to a model in part because they believe they might face the same taxation themselves and they want to learn the necessary actions to succeed† (Shuns, 2012, p. 34). In a classroom situation , learners would pay attention and observe what the teacher is doing because they would want to attain the necessary knowledge and skills in order for them to be successful ,this serves as motivation(Shuns,2012,p. 134). Paren ts and teachers are generally considered â€Å"high- status† models(Shuns,2012,p. 135). Younger children will observe teachers as models and in a classroom situation if a teacher exhibits behavior that encourages learning o be a means of acquiring approval and skills , the children will imitate that behavior.If a teacher does the opposite, learners will be discouraged and will not be motivated to learn. (Shuns, 2012, p. 135). Goals, values and self-efficacy play a significant role in learning. (Shuns, 2012, p. 138). Len classrooms if learners and teachers have a common goal such as completing a section of work or if learners have individual goals such as scoring above a certain mark on a test, it enhances â€Å"learning and performance through their effects on perceptions of progress, self-efficacy, and self evaluations† (Bandeau, 1988, 1997; Locke & Lethal, 1990, 2002; Chunk, 1990 as cited by Shuns, 2012, p. 138). T serves as a basis for learners to regulate their wor k and measure themselves against an expected standard. As cited by Shuns, 2012, p. 145). Len a classroom a teacher has to identity students values. This is especially important when teaching students how to set goals for themselves and in promoting self-efficacy. If a learner has this ability they will be able to learn effectively. â€Å"Values can be assessed against external and internal standards† (Shuns, 2012, p. 145). Children may observe some of their peers gaining a retain reward for neat work or completing neat work can be valued because it is how they gain teacher's approval. Shuns, 2012, p. 145) â€Å"Self-efficacy refers to personal beliefs about one's capabilities to learn or perform actions at a designated level† (Bandeau, AAA, Bibb m 1986,1993,1997 as cited by Shuns,2012, p. 146)). Bandeau suggests that there are â€Å"four sources of knowledge† with regards to â€Å"self-efficacy appraisals†(Craig,1992,p. 184). The first is actual performan ce. Succeeding in tasks regularly increases your self-efficacy and vice versa. The second is vicarious experiences. This is when we believe that we can succeed at a task because we see someone who has similar capabilities succeeding at it.The third is verbal persuasion. In a classroom if a teacher praises a student and makes them believe that they are capable of performing a task that student will have a stronger sense of efficacy and will start to believe in what the teacher is saying. The last is physiological cues, wherein we interpret our bodies' reactions to situations as a judgment of our abilities. (Craig, 1992, p. 184). â€Å"The models in one's environment provide an important source of information for gauging self-efficacy. Parents and other influential adults (e. G. , teachers, coaches) are key models in children's social environments. (Bandeau, Barreling, Caper, and Pastorally, 1996 as cited by Chunk, 2012, p. 149). Parents and teachers serve as important influences in children's learning performance and self-efficacy. Students seek appraisal from teachers and if a teacher motivates their learners by praising them and helping them improve by using positive methods, the learners will perform better and they will be motivated to succeed. If a teacher uses negative methods such as punishing a child for not understanding how to complete a piece of work, the learners will view learning as negative and they will not learn effectively (Shuns, 2012, p. 49). Another example would understand the content, if a teacher does not understand the work and does not believe in their capability to teach the work the learners will observe this in a negative way and will not want to learn. This is known as â€Å"instructional self-efficacy'. If a teacher believes that they are capable of teaching the work effectively they will dedicate more time and effort towards planning and caching lessons in more advanced ways.According to Bandeau, teachers who are supported by a dministrators and who have a high teaching efficacy will be more apt at approaching work with motivation and commitment. (Shuns, 2012, p. 150). Social Learning Theory is effective in helping students set goals and motivating them to succeed. In my opinion this theory is extremely effective and it presents models for students that enable them to observe work so that they may perform them later after they have acquired the necessary skills.

Wednesday, October 23, 2019

Tower of terror

Darkness swooped over me as the doors to death became closer. The pool of blood in which I lay was sticky and viscous almost as if gluing me to the floor. I could no longer move! Panic, fear, loneliness, pain and anger simultaneously engulfed me in streams of thought I could no longer process. What happened? How did I get here? Then it all came rushing back. â€Å"Hey Alisha wait for me!† I turned around to see my best-friend gasping as she ran behind me shouting, sweaty, red and panting with her red curly hair, bouncing as much as ever. â€Å"Hi Tanya†, I muffled as I gave my best friend a big hug. Since I started going out with Max I had rarely spent time with her. The truth is I missed her, but was totally fascinated by the new boy in town, Max. I had met him a month ago and it seemed like we were dating for years, he was an easy-going down-to-earth kind of guy, intellectual and also carried himself with a hint of mysteriousness. Most strikingly were his Spanish/Italian looks, tanned skin, which always glowed, long brown hair and the most dreamy green eyes which almost all the girls in the school had fallen for. Although he looked like he had emerged right out of the 70's, he was cuter and smarter than most of the guys in Mill Valley. He was almost too good to be true but I was not complaining, although Tanya was! â€Å"Hello stranger, so you do remember me!† Tanya said with the slightest of sarcasm followed by a big smile. â€Å"I'm really sorry I†¦I. Tanya†¦you know†¦I†, I stuttered profusely, I did not know what to say, only but a month earlier I was hanging out with her, shopping, cinemas, sleep-overs, but now we had this distance, which although I wanted to, I could not fill. â€Å"Hey I know I'm not a good kisser like Max and not half as good-looking, but hey girl I miss ya†. â€Å"I know, I know, OK what do you say we go for some ice-cream now and catch up? It's on me!† I locked my arms into hers and gave a little tug. â€Å"Are you not meeting Max?† â€Å"Max who? No girl I'll ring him and let him know†. There it was my last meeting with Tanya, we talked and talked I told her about Max and she told me about her long days without me. She was truly a drama queen. We had already had three mango and kiwi sundaes, between us and were starting on the fourth. I had just realized how much I really had missed sitting, talking and laughing with Tanya, why had I never canceled on Max before? â€Å"Are you listening to me? Alisha, Alisha snap out of it?† Tanya was clicking her fingers in my face. I finally blinked and smiled, â€Å"Tanya I love ya gal† â€Å"Back at ya sweetie, anyway before you went in to you little day-dream I was telling you, why don't we have a sleep-over today, it'll be like old times, I bought that Brad Pitt flick, so we can just hang out what do you s†¦Ã¢â‚¬  Tanya stopped in mid-sentence her smile fading as she looked up and then at my puzzling face. â€Å"Sounds good†¦what's wrong? Tanya you†¦Ã¢â‚¬  â€Å"Hey babes, is this seat taken?† Max said as he slid into the seat beside me, taking my hand. â€Å"Hi Tanya, long time no see† â€Å"Hey†¦Hey Max† Tanya was always wary and almost frightened of Max, she gave a quick fake smile to him and then looked at me almost in defeat. â€Å"So what you girls been talking about? Not too much about me, I hope, anyway Aisha?† He turned to me, and instantly I was under the casts of his eyes, I wished I could hold him forever. â€Å"Hmm? Yeh?† I gulped, why did I always turn into a puddle of nerves whenever he looked at me? Why? And why was he here? I had told him I was spending the evening with Tanya, he had been disappointed but said he would live for a few hours without me! â€Å"Ok so you both wondering why I'm here, right? Alisha if you have forgotten I had something planned for you today in celebration of our one month anniversary, so I have come to kidnap you!† I looked at Max and then at Tanya, she was obviously gutted and tried to hide it as best as she could, although some tears had formed she blinked them away. â€Å"That's so sweet, Alisha, you have to go, don't worry we can do this some other time, and Max you have to stop taking her away from me† Although Tanya was half joking, her last comment was said with a bit of hurt. â€Å"I'm really sorry Tanya, I totally forgot, I promise we'll get together soon, I'll call you!† I winked at her as Max took my hand and we got up to leave. It was only after we walked out of the ice-cream parlor, I realised it was supposed to be me treating, and I had left her with the bill. I wave guilt passed me until I realised where we were walking towards. â€Å"Where†¦.where†¦where are we going?† I stammered as I saw the Trangriester Tower looming on front of me. â€Å"To your destiny honey, you'll see†, I held on to Max as tight as ever, not understanding what he meant, and felt alone and scared as the hairs on my neck stood up at the sight of the dark crooked tower. As we reached the big wooden door, I felt my hear skip a beat, what could be pleasant about this place? And what was this surprise? I knew if Tanya were here she would have took my hand and ran back to the safety of the lightened street of the town. The door creaked open just like in the movies when some stupid kids enter a haunted house. I screamed, startled, I saw a pale but very pretty girl with long straight blonde hair and big blue eyes staring right back at me. It only took a moment to realize it was my reflection in the mirror. â€Å"Max, Max where are you?† I shouted as I noticed that the warmth of his presence had left and I was standing alone in the landing of the tower. Almost as if in response, the big door slammed shut eliminating any light from outside except for the small circle windows near the stairs. I pulled the door again and again it was locked. I was beginning to wish I were with Tanya watching the Brad Pitt movie, where was Max. â€Å"Elizabeth†¦Elizabeth†¦Elizabeth† a coarse almost silent whisper was coming from upstairs, it sounded like Max, but why would he be whispering and who was Elizabeth? I walked up the stairs, which also creaked with every step I took. â€Å"R†¦Ra†¦Max this is not funny, come on lets get out of here†. I was going to kill him for this; this was just not my idea of a joke. Then out of nowhere a figure emerged in front of me. It was Max, yet his eyes were not the beautiful green that one would loose themselves in, but were almost a bloody red. â€Å"Elizabeth it's the 13th of August†¦. the day you left me, do you remember? You stole my life; you took everything and left me dying in this tower. You are a heartless witch you must die, my soul needs to rest†¦you must die† Max had an old knife which he directed right back at me. This must be a dream. What was happening? â€Å"I†¦I†¦Max†¦. I'm not Elizabeth what is wrong with you? It's me†¦what are you talking about?† â€Å"STOP LYING† Max shrieked, â€Å"Your blonde hair and blue eyes, I remember Elizabeth I remember†¦Ã¢â‚¬  and then suddenly I felt a surge of pain in my chest where he had stabbed me again and again and then he stopped. â€Å"You're not Elizabeth, I'm sorry†¦I have to find Elizabeth† then he walked away, my blue contacts had fallen out in the rush of the struggle, and now cold and scared I lay in the pool of my own blood dying, for what, I did not know. How could I have trusted him, confused and scared I lay there, I reached out to someone, but it was no one†¦No one!

Tuesday, October 22, 2019

John Pitner as an Extremist essays

John Pitner as an Extremist essays Political and religious extremism has been present for probably the same amount of time as religion and politics themselves and has recently become the focus of a lot of studies, research, and more of the extremists themselves than the phenomena, investigation. Just as appealing, it would seem, is a racist ideology that is so often an affiliate in the meaning system that extremists so deeply believe in. John Pitner, the focus of Lone Patriot by Jane Kramer, was an extremist who, along with his followers and the people whom he followed after, would have been proud to die in a resistance of the New World Order, who truly believed in his cause. From a cultural perspective, John was not abnormal, nor was his meaning system so far-fetched that it would immediately alarm you. He was not big on discrimination, as defined in 1998 in a compilation by sociologist Ken Wilson as the non-equal treatment of a person/s based solely on their membership in a social category, but he somehow maintained a rather ethnocentric view of the world. He didnt object to homosexuals, blacks, Jews, Indians or women. G. Myrdal, who wrote The American Dilemma in 1944, pointed out a typically formatted theory on the treatment of Americans. The first of two components is labeled preachment vs. practice, a concept in which everyone is treated equally and fairly, demonstrated by John Pitner saying in one of his pitches that the Washington State Militia welcomed all races, religions, sexes, and things of that nature. This is where the second part of Myrdals theory engages: ideals vs. reality. This is the part that recognizes that in reality people do not practice equal and fair treatment of each other; this is the part where John Pitner later describes a black man who showed up at a militia meeting to Kramer as an attempt to infiltrate by a black individual. The ideals spoken of as essential and unquestionable, which seem so bas...

Monday, October 21, 2019

Celebrate Marriage With These Love Quotes

Celebrate Marriage With These Love Quotes You dont need a marriage to legitimize your relationship. Marriages are sacred vows and hence should be undertaken only when two people in love are willing to enter into a lifetime commitment. Without love, there cannot be a happy marriage. After years of commitment and togetherness, boredom can set in. Only love can help bind the couple and keep them happy forever. Here are some marriage love quotes to help rekindle the passion of love in marriage. Love Quotes for Rekindling Your Marriage Georg C. LichtenbergLove is blind, but marriage restores its sight. Groucho MarxSome people claim that marriage interferes with romance. Theres no doubt about it. Anytime you have a romance, your wife is bound to interfere. Harriet MartineauAny one must see at a glance that if men and women marry those whom they do not love, they must love those whom they do not marry. Mark TwainLove seems the swiftest, but it is the slowest of all growths. No man or woman really knows what perfect love is until they have been married a quarter of a century. Tom MullenHappy marriages begin when we marry the ones we love, and they blossom when we love the ones we marry. David BissonetteI recently read that love is entirely a matter of chemistry. That must be why my wife treats me like toxic waste. Benjamin FranklinWhere there is marriage without love, there will be love without marriage. James GrahamLove is blind and marriage is the institution for the blind. George Bernard ShawIt is most unwise for people in love to marry. Pauline ThomasonLove is blind marriage is the eye-opener. Tom MullenHappy marriages begin when we marry the ones we love, and they blossom when we love the ones we marry. Ellen KeyLove is moral even without legal marriage, but marriage is immoral without love. Will DurantThe love we have in our youth is superficial compared to the love that an old man has for his old wife. Pearl S. BuckA good marriage is one, which allows for change and growth in the individuals and in the way they express their love. Nathaniel HawthorneWhat a happy and holy fashion it is that those who love one another should rest on the same pillow. Michel de MontaigneIf there is such a thing as a good marriage, it is because it resembles friendship rather than love. MoliereLove is often the fruit of marriage. Mignon McLaughlinAfter the chills and fever of love, how nice is the 98.6Â º of marriage! Langdon MitchellMarriage is three parts love and seven parts forgiveness of sins. Mignon McLaughlinLove requires a willingness to die; marriage, a willingness to live.

Saturday, October 19, 2019

African American Heritage Paper Essay Example for Free (#2)

African American Heritage Paper Essay African (466) , Heritage (34) , American heritage (6) company About StudyMoose Contact Careers Help Center Donate a Paper Legal Terms & Conditions Privacy Policy Complaints ? This paper explores the African American heritage and also identifies the significance of nurses being culturally aware, sensitive and competent when caring for people of African American heritage. Although these terms mentioned above are used interchangeably, they have different meanings. Cultural awareness is appreciating the external or material part of the culture, such as the music, arts, and physical characteristics, and dress. Cultural sensitivity is the personal attitudes toward the culture, such as not saying things that is offensive to someone from a different ethnic or cultural background (Purnell,2013, p. Cultural competence is putting it all together; by using your knowledge to provide culturally congruent care and to be able to work effectively with people in cross- cultural situations. African Americans are the second largest ethnocultural groups in the United States; however, it is one of the most misunderstood cultures. This culture is so unique because they have mixed their cultures from their different homes of origin in Africa, along with American culture. This paper overviews the history, communications, family roles, workforce issues, biocultural ecology, high-risk behaviors, pregnancy and childbearing practices, spirituality, health care practices, nutrition, and death rituals in the African American culture. It is important that nurses see themselves as becoming culturally competent when caring for African Americans, and this involves incorporating cultural desire, cultural awareness, cultural knowledge, cultural skill, and cultural encounter with the people of African American heritage (Campinha-Bacote, 2009). 2 A NURSING METHOD TO AFRICAN AMERICAN HERITAGE One of the largest minority groups in the United States, African Americans culture includes the various cultural traditions of different African ethnic groups. â€Å"Data from the U. S. Department of Commerce, Bureau of the Census (2001) reveals that there are approximately 34,333,000 African Americans residing in the United States, representing 12. 1% of the total population† (Campinha-Bacote, 2009). They were forcibly imported into the United States as slaves from 1619 to 1860 (Purnell, 2013, p. 21). During slavery, they incorporated their culture from their homes of origin, and as a result, their culture included several cultural traditions of African ethnic groups. Many African Americans live in poverty due to discrimination and lack of proper education. Most families of African American heritage value education, but they still struggle to have equal representation in the workplace, and are more likely to work in a hazardous environment, resulting in job related diseases and illness. Due to the lower-level positions and the difficulty in achieving higher opportunities in the workplace, some African Americans continue to feel discouraged. Nurses need to address discrimination and also issues that create ethnic or racial tension in the workplace. English is the language spoken by African Americans, however, people of lower socio economical status communicate in an informal language known as African American English (AAE) (Purnell, 2013, p. 22). According to Campinha-Bacote (2009), the major problem that AAE speakers face is prejudice. Most people believe that AAE is inferior to Standard American English. As a result, African Americans who speak AAE are sometimes misinterpreted as being uneducated. Nurses should be aware not to stereotype African Americans as only speaking AAE, and also not to stereotype them as uneducated based on the way they communicate. African Americans are expressive when 3. A NURSING METHOD TO AFRICAN AMERICAN HERITAGE communicating and often use body languages to convey their feelings. Their expressive language and body movement can be misconstrued as anger or provocation. Nurses need to be familiar with these characteristics and not misinterpret them. As a nurse, when interacting with African Americans for the first time, be sure to address them formally, until given permission to use other names, such as their first name. The African-American family has evolved over the last two decades and still continues to evolve. A person that is brought up in a traditional nuclear family is more likely to continue that tradition. Whereas, a person that is brought up in a single parent home is more likely to continue that same tradition. Although these situations are more likely, they are not always so. To provide the most competent care, the best thing for the nurse to do would be to ask the patient in a non-judgmental way about family dynamics and also ask them what they would feel the most comfortable with when it comes to decision making for their care. The nurse should then accept this decision. Being knowledgeable about this cultural group’s family values and beliefs are crucial for providing care for the African American patient (Revell & McGhee, 2012). A high percentage of African American households are matriarchal and fall below poverty level. With that being said, it is wise for nurses to make a point of including women when discussing health care issues. Nurses also should take note when dealing with homosexual individuals in this ethnic group, not to break confidence by sharing their lifestyles with others. This information can jeopardize and cause conflicts within the family and ruin relationships. Romantic relationships of the same-sex are not totally acceptable within this culture. 4 A NURSING METHOD TO AFRICAN AMERICAN HERITAGE As in many culture, social status is important in African American community. African Americans are often met with negative atmosphere and prejudice attitudes based on their cultural background and skin color. Assumptions are made based on AAE spoken by some as an indication of unintelligence and the lack of education. These assumptions sometimes affect employment opportunities and job promotions. Nurses should be cautious not to fall into the stereotyping African Americans based on these characteristics. African American skin color ranges from light to very dark due to the combination of a gene pool of more than 100 racial strains (Purnell, 2013, p. 25). When assessing for cyanosis in dark-skinned African Americans, be sure to pay attention to the oral mucosa or conjunctiva. When assessing for pallor, note the absence of the underlying red tones that give the skin it’s glow. Lastly, when observing for jaundice, be sure to look at the sclera of the eyes, the soles of the feet, and the palms of the hands for any yellow discoloration (25). Health care is a luxury that low socioeconomic African Americans may not be able to afford. Meeting their daily needs takes priority over what they believe to be minor health issues. Consequently, diseases that could be treatable might end up being a life- threatening situation. African Americans are family orientated, because of this; some tend to initially seek medical attention from family members rather than going to a health care professional. Health care professionals need to be aware of this and work toward teaching and distributing health information via church and community centers. Most African American women are against abortion due to religious, cultural, and moral beliefs. As a result, there is a delay in making a decision until it becomes too late. 5 A NURSING METHOD TO AFRICAN AMERICAN HERITAGE Family support is crucial for pregnant African American women. Gichia (2000) studied and found out that African American women look for role models such as older female relatives, or if they have none, they look for someone who seemed like a mother to them, such as a neighbor. These role models can provide the pregnant woman and new mother with needed support. According to Abbyad & Robertson (2011), nurses caring for pregnant African American women need to be informed about the variety of ways in which childbirth preparation can occur, as in any other group of pregnant women. Moreover, nurses need to consider the ways in which their attitudes and behaviors send unwelcoming messages to African American women seeking prenatal care or childbirth classes. These attitudes can discourage the African American woman in seeking further care. â€Å"Culturally competent care for the childbearing African American woman includes addressing all components of care including the use of complementary and alternative medicine† (Revell, 2012). The childbirth nurse that is providing culturally competent care should be aware that the perceived norm is different for every family. African Americans are spiritual and are usually affiliated with some religious order. Historically, the church has played a major role in the life of African American culture. The church is a place where they can meet on common grounds. Faith and prayer is one of the most important attributes of Christian African Americans. They believe that God has the power to heal them, and he also has the power not to. They believe that whatever happens to them is according to God’s will. Food is very valuable in the African American culture. It symbolizes health and wealth. It is derived from African descent. When food is offered to someone, it means that the person is valued; and by offering food, they are given you something that is 6 A NURSING METHOD TO AFRICAN AMERICAN HERITAGE valuable to them. When it comes to nutrition, some African American diets are high in cholesterol and fats. According to James (2004), â€Å"African Americans will need information on basic nutrition topics such as serving sizes and reading food labels†. Nurses that work in African American communities should be involved in programs that promote healthy food choices. These programs can specifically be developed for churches, neighborhood grocery stores, and local restaurants. â€Å"Health disparities among the African-American population include life expectancy, heart disease, hypertension, infant morality and morbidity rates, cancer, sickle cell diseases, HIV/AIDS, violence, type 2 diabetes mellitus, and asthma† (Campinha-Bacote, 2009). Unfortunately, they have the tendency to see a health care professional only when absolutely necessary. â€Å" Health is viewed as harmony with nature, whereas illness is seen as a disruption in this harmonic state due to demons† (Purnell,2013, p. 33). Recognize and support your patient cultural behaviors and believes to promote healthy interactions. In addition, always provide factual information about health practices that may not be understood due to their cultural believes and cultural differences. In conclusion, it is recommended that nurses familiarize themselves with cultural specific information in order to provide cultural competent care in African American community. Nurses should consider the following question: â€Å"In caring for African- American patients, have I asked myself the right questions. † It is important for nurses to be aware of their biases and prejudices toward African Americans. In addition, they should possess the needed skills to conduct a cultural assessment while possessing knowledge of this cultural group (Campinha-Bacote, 2009). Lastly, nurses should always 7 A NURSING METHOD TO AFRICAN AMERICAN HERITAGE have the desire to become culturally competent not just with African American patients, but any patient that has been placed in their charge. 8 A NURSING METHOD TO AFRICAN AMERICAN HERITAGE Resources Abbyad, C. , & Robertson, T. (2011). African American Women’s Preparation for Childbirth From the Perspective of African American Health-Care Providers. Journal Of Perinatal Education, 20(1), 45-53. doi:10. 1891/1058-1243. 20. 1. 45 Campinha-Bacote, J. (2009). Culture and diversity issues. A culturally competent model of care for African Americans. Urologic Nursing, 29(1), 49-54. Gichia, J. E, (2000), Mothers and others: African-American women’s preparation for motherhood. The American Journal of Maternal Child Nursing, 25(2), 86-91, James, D. (2004). Factors influencing food choices, dietary intake, and nutrition-related attitudes among African Americans: application of a culturally sensitive model. Ethnicity & Health, 9(4), 349-367. Purnell, L. D. (2009). People of African American Heritage. Guide to culturally competent health care (2nd ed. , p. 21-35). Philadelphia: F. A. Davis Co. Revell, M. A. , & McGhee, M. N. (2012). Evolution of the African American Family. International Journal Of Childbirth Education, 27(4), 44-48. Revell, M. A. (2012). Use of Complementary and Alternative Medicine in the African American Culture. International Journal Of Childbirth Education, 27(3), 55-59. African American Heritage Paper. (2016, Dec 19).

Friday, October 18, 2019

Exploring Lascaux Caves Assignment Example | Topics and Well Written Essays - 500 words

Exploring Lascaux Caves - Assignment Example Other pigments were derived from animal bone and vegetable sources. With these components, developing a color palette from these materials seems to be a difficult undertaking. In addition, to be regarded as an artist during this time one had to either be self-trained or apprenticed from a painter in the tribe. The art depicted in the cave is primarily about the fauna that early man knew, for this reason, the sole purpose of painting was for ritualistic sake. In terms of societal status, others would adore a painter due to their expertise and their ability to decorate caves and other ritualistic locations (McCully 19). As stated earlier, the Lascaux was painted during the Palaeolithic time during the emergence of the modern man, Homo sapiens. The Lascaux cave is located near the French village of Montignac and was discovered in 1940 by a group of boys who were hiking the woods (McCully 3). The Palaeolithic period dates back to 40,000 to 14,000 B.C., existing in this timeline, early humans only worried about basic needs, food and shelter. Life seems to have been simple then and painters, in my opinion, were celebrated because they were able to add richness to the then simple life. The painters made rituals, around communal fires, more enticing with enhanced experience due to the paintings. The main materials used in these descriptive wall paintings are already listed above and include pigments from clay ochre, animal bone, vegetable among other natural sources. According to McCully, the technique utilized in developing the drawings and engravings was through the spraying of pulverized color pigment s from the listed materials (15). The pigments were fitted inside a tube, created from bone, wood or plant materials. This technique was successful due to the painting lasting a long time and it was effective across all surfaces throughout the Lascaux cave comprised of subterranean complex. The paintings in the cave are

The Lizard Lick Fine Paper Mill Essay Example | Topics and Well Written Essays - 3250 words

The Lizard Lick Fine Paper Mill - Essay Example Its prominence can be gauged from the fact that this was the single place where executives wanted to be posted for furthering their career in the group. Â  Similar is the case of George Golden, Plant Manager, who was posted here three years ago, to be groomed for an eminent position in the group headquarters as the career-ending spell. He is known for his hard-driving force and capability of setting high standards in every division and for his ability to lobby in the highest echelons for the benefit of the company. Â  LLF commenced business on D-Day; the day of the Allied invasion of Europe and ever since has been a model of productive competence. It is the sole provider of jobs for seventy-five miles around and the area has seen a transformation since its inception. Until a few years ago it had a daily routine production of high-quality paper of 700 tonnes. The Return on Assets (ROA) was an astounding 32%. It produces fine paper, as distinguished from Kraft paper by its white color, smoothness and fiber content that is used for stationery, photocopying, and printing. It is packed in large rolls of 1000 pounds each and shipped in Box-cars from the adjacent rail-yard. Unfortunately, the production has fallen to 550 tonnes per day and there are complains from 50% of customers on quality. Â  The mill itself consists of various machinery used in the four processes required for producing paper. Starting from Pulping, proceeding to Liquoring and then to the continuous-process machine, the size of ten football fields, to produce huge sheets of paper that are rolled into 1000 pounders at the last stage.

Personal and professional healthcare commuinication paper Essay

Personal and professional healthcare commuinication paper - Essay Example on is relevant in health professional-patient relations, individuals’ search for, exposure to and use of health information, individuals’ adherence to clinical treatments and recommendations, the construction of public health campaigns and messages, risk communication, the education of people about how to gain access to the health care systems and the development of telehealth applications. Communication between health care professionals and patients is a requirement both for exchange of information and for content accompanying the information such as body language and facial expressions. Health care communication is the exchange or imparting of information between a health care professional and a patient so as to make the receiver understand and provide feedback and eventually act on that information (Ferrell & Coyle, 2006, pp. 542-568). Health care professionals play an important role in communicating with patients because they are always in close contact. A relationship between the health care professionals and the patient will be improved by communication and developing effective communication skills is an important factor and a priority for every health care professional. Patients are the main educational concern in basic health care education. However, this education equips health care professionals on how to contribute uniquely to promoting health in the working population. The health care professionals are usually the first point of contact with patients because of the usual direct access. When a health care professional shows that they are approachable and ready to help patients who need advice, the patients consciously make time to talk to the health care professionals. Listening is a vital tool for health care professionals, as they are usually is a common ground between management and staff when discussing the social well-being, health and quality of patients. Health care professionals may be asked questions by patients on topics that go beyond

Thursday, October 17, 2019

INTERNATIONAL TRADE STRATEGY AND TECHNIQUES - FINAL CASE STUDY

INTERNATIONAL TRADE STRATEGY AND TECHNIQUES - FINAL - Case Study Example The new company concentrates on the manufacturing and marketing of polymers at 20,000 tons/year. The total investment for the ventures is 12 million Euros. The sections of financing are 4 million EUR by equity financing, Export credit obtained from COFACE up to 6 million EUR and other debt financing of about 2 million EUR. The favorable and the risk factors which would be faced by owing to its joint venture with Vietchem are elaborated in the report. Question 1 Vietnam Vietnam is a developing economy which is planned with a market well connected to the other parts of the world. The economy of Vietnam has shifted their concentration from centralized planned economy to socialist market economy that employs both indicative and directive planning. After the shift, the economy has rapidly grown. The Vietnamese population has been estimated to be 87 million. This estimation includes 3 million who lives in Hanoi and in Hochiminville; the estimated number has been 9 millions. About 11 millio n of the population are working in the industry or engaged in industry related works. The unemployment rate has been 2.3%. The GDP value amounts to $300 billion with a growth rate of 5.9%. The FDI inflows have amounted to $7.4 billion. The average tariff rate of trade has been 5.7% that includes some of the non-tariff barriers which had limited the gains of trade (The Heritage Foundation, â€Å"Vietnam†). Though there have been serious efforts from the FDI but it has been hindered by the government regulations by imposing various restrictions. With the evolving capital markets of Vietnam, the financial sector has also expanded (â€Å"China struggles with the way forward on reform†). Vietnamese Market Although the Vietnamese market has shown a rapid growth, it is still extremely price sensitive. Thus if the JV has to take place, Synthenia has to face this issue. Vietnamese market is a monopoly market with only a single producer of polymers i.e. Polyviet Company Limited. The company is based in Japan and sells 80% of its end products in the Vietnamese market. The company produces polymers and their main customers are the seekers of textile glues and formulators of buildings. Thus, the JV is looking for a reliable polymer supplier with a very good Research and Development department so that the products are adequately tested (â€Å"Investing in Vietnam – A risk worth taking?†). The favorable and unfavorable factors that Synthenia will probably run into while doing business in Vietnam are elaborated in the next section. Favorable factors for investment in Vietnam For establishing an investment plan in Vietnam the chemical giant group, Synthenia will have many advantages few of which are elaborated below. Synthenia has spread its existence in the Asian market. The Asian agents and the distributors have helped the company to develop their business in Asia. So with its expansion in Vietnam, it will provide a wider Asian market for the comp any. The country had a growth rate of 4.9% in 2009 which has increased to 5.9% in 2012 and has stabilized at that point. Thus

Finance - Valid Contract Assignment Example | Topics and Well Written Essays - 750 words

Finance - Valid Contract - Assignment Example Before a contract becomes legally binding, there are some essentials that must be satisfied otherwise referred to as elements of a contract. Elements of a valid contract are: 1. Offer and acceptance In a contract, there are two parties: the offeror and the offerree. The offeror makes an offer that has to be accepted by the offered without alteration of the terms i.e. the offer must be accepted precisely (Burnett, 2010). The promise by one party to do or not to do something if the party accepts to do or not do something in return is referred to as an offer. Where the offered gives new terms in order to accept the contact, then this will be referred to as a counter offer. Both an offer and acceptance must be communicated (Burnett, 2010). Advertisement, preliminary negotiations or opinions does not constitute an offer but are considered an action to treat. 2. Intention to create a legal relation An agreement in itself does not constitute a contract unless the parties to the contract int end to be legally bound in their agreement hence an agreement between minors does not constitute a contract (Liuzzo, 2010). Proof of creating a legal binding agreement is therefore mandatory. 3. Consideration Consideration is the price paid in return of the promise of another party. The consideration must have value not necessarily money. An interest, a right, or benefit to the party making a promise. Furthermore, the consideration must not be something that is illegal e.g. committing a crime, as a price is not considered as a consideration. It should be noted that the adequacy or inadequacy of the consideration does not affect the validity of the contract (Burnett, 2010). One only needs to prove that there was consideration in the formation of the contract. 4. Capacity to contract Not everybody can enter into a contract because of legal limitation. Minors, people with mental impairment, prisoners and bankrupt individuals or corporation therefore lack the legal capacity to enter int o a valid contract. This is because the parties might lack the ability to understand fully the implication of the contracts (Liuzzo, 2010). Contracts with minors are also invalid because they might be compromised. However, contracts with minors are enforceable where the contact is of the supply of necessities e.g. supply of cloth, medicine, and food in some cases. 5. Consent willingly attained In entering a valid contract, the parties must have made the decision freely and willingly without any interference or coercion. A proof that either parties consent was not freely obtained will make the contract void. The factors that may affect proper consent include mistakes, duress, undue influence, or false statements. Mistakes will make contracts not binding if it relates to the very basis of the agreements e.g. mistake in signing of the agreement. False statements may be fraudulent, innocent, or negligent. Negligent and fraudulent false statements would normally result in rendering the c ontract void and therefore unenforceable. Undue influence on the other hand entails where one party takes advantage of the weaknesses of the other party to enter into a contract hence impairing voluntary consent to contract e.g. the contract between a teacher and student may be unduly influences. For duress, there must be some element of threat to a party hence making him/her contract unwillingly. 6. Legality of a contract In

Wednesday, October 16, 2019

Personal and professional healthcare commuinication paper Essay

Personal and professional healthcare commuinication paper - Essay Example on is relevant in health professional-patient relations, individuals’ search for, exposure to and use of health information, individuals’ adherence to clinical treatments and recommendations, the construction of public health campaigns and messages, risk communication, the education of people about how to gain access to the health care systems and the development of telehealth applications. Communication between health care professionals and patients is a requirement both for exchange of information and for content accompanying the information such as body language and facial expressions. Health care communication is the exchange or imparting of information between a health care professional and a patient so as to make the receiver understand and provide feedback and eventually act on that information (Ferrell & Coyle, 2006, pp. 542-568). Health care professionals play an important role in communicating with patients because they are always in close contact. A relationship between the health care professionals and the patient will be improved by communication and developing effective communication skills is an important factor and a priority for every health care professional. Patients are the main educational concern in basic health care education. However, this education equips health care professionals on how to contribute uniquely to promoting health in the working population. The health care professionals are usually the first point of contact with patients because of the usual direct access. When a health care professional shows that they are approachable and ready to help patients who need advice, the patients consciously make time to talk to the health care professionals. Listening is a vital tool for health care professionals, as they are usually is a common ground between management and staff when discussing the social well-being, health and quality of patients. Health care professionals may be asked questions by patients on topics that go beyond

Finance - Valid Contract Assignment Example | Topics and Well Written Essays - 750 words

Finance - Valid Contract - Assignment Example Before a contract becomes legally binding, there are some essentials that must be satisfied otherwise referred to as elements of a contract. Elements of a valid contract are: 1. Offer and acceptance In a contract, there are two parties: the offeror and the offerree. The offeror makes an offer that has to be accepted by the offered without alteration of the terms i.e. the offer must be accepted precisely (Burnett, 2010). The promise by one party to do or not to do something if the party accepts to do or not do something in return is referred to as an offer. Where the offered gives new terms in order to accept the contact, then this will be referred to as a counter offer. Both an offer and acceptance must be communicated (Burnett, 2010). Advertisement, preliminary negotiations or opinions does not constitute an offer but are considered an action to treat. 2. Intention to create a legal relation An agreement in itself does not constitute a contract unless the parties to the contract int end to be legally bound in their agreement hence an agreement between minors does not constitute a contract (Liuzzo, 2010). Proof of creating a legal binding agreement is therefore mandatory. 3. Consideration Consideration is the price paid in return of the promise of another party. The consideration must have value not necessarily money. An interest, a right, or benefit to the party making a promise. Furthermore, the consideration must not be something that is illegal e.g. committing a crime, as a price is not considered as a consideration. It should be noted that the adequacy or inadequacy of the consideration does not affect the validity of the contract (Burnett, 2010). One only needs to prove that there was consideration in the formation of the contract. 4. Capacity to contract Not everybody can enter into a contract because of legal limitation. Minors, people with mental impairment, prisoners and bankrupt individuals or corporation therefore lack the legal capacity to enter int o a valid contract. This is because the parties might lack the ability to understand fully the implication of the contracts (Liuzzo, 2010). Contracts with minors are also invalid because they might be compromised. However, contracts with minors are enforceable where the contact is of the supply of necessities e.g. supply of cloth, medicine, and food in some cases. 5. Consent willingly attained In entering a valid contract, the parties must have made the decision freely and willingly without any interference or coercion. A proof that either parties consent was not freely obtained will make the contract void. The factors that may affect proper consent include mistakes, duress, undue influence, or false statements. Mistakes will make contracts not binding if it relates to the very basis of the agreements e.g. mistake in signing of the agreement. False statements may be fraudulent, innocent, or negligent. Negligent and fraudulent false statements would normally result in rendering the c ontract void and therefore unenforceable. Undue influence on the other hand entails where one party takes advantage of the weaknesses of the other party to enter into a contract hence impairing voluntary consent to contract e.g. the contract between a teacher and student may be unduly influences. For duress, there must be some element of threat to a party hence making him/her contract unwillingly. 6. Legality of a contract In

Tuesday, October 15, 2019

Reasons Why Corporate Acquisitions Occur and Fail Essay Example for Free

Reasons Why Corporate Acquisitions Occur and Fail Essay There are a number of reasons why a firm purchases another company. Mullins (2001) stated several of these reasons, one of which includes the most apparent and important reason—to increase profit and maximize its shareholder’s wealth. Elimination of competition is another reason to acquire a firm. Some companies acquire their competitors to reduce competition and improve its position in the market. However, acquisition for this purpose is against the law according to the antitrust acts. As a result, the acquiring firms emphasize in its press release that the acquisition is not anti-competitive but a way to better serve the customers. If the U. S. regulatory agencies, however, construe that the acquisition could be anti-competitive, the acquisition may be blocked. Company growth is also one of the reasons why acquisitions occur. Acquisition is also an approach used when the acquiring firm has excess cash which can be used for investments. To reduce corporate risk, firms also purchase another company which could result in improved earnings and sales stability. For instance, a clothing company specializes in swimwear while another clothing firm designs winter clothes. Thus, purchasing the swimwear company to gain profit during summer and spring is a good strategy to eliminate the sales instability of the winter clothing company caused by the changes in season. This example could also be used to illustrate another reason why acquisitions occur—to enter another market. The target firm’s experience and resources, including its employees’ expertise and business relationships, are readily available for the acquiring firm to take advantage of. Thus, rather than start a swimwear collection of its own, it would be much easier for the winter clothing company to acquire the swimwear company. A company’s resources could also be the target of the acquiring firm. These resources may be tangible (e. g. , plant and equipment), intangible (e. g. , trade secrets and patents), or talents of the target firm’s employees. Another reason cited for acquiring a firm is synergy, which is a term used to describe efficiency gained from doing more than one thing. For example, it is a good strategy for a meat processing company to acquire a leather goods manufacturer as they require the same raw material. Finally, acquisition occurs when the owners of a family-owned business wish to retire or leave the business and the next generation is not interested to continue the business (Mullins, 2001). In an interview conducted by Barnett (2004) for her article, Benoit shared another reason why acquisitions occur. He stated that acquisition allows the acquiring firms to get new clients. The escalating stock prices and reasonable interest rates were also considered as reasons for the increase in the number of acquisition deals (Flanagan, et al. , 2004). Even with these good reasons, many corporate acquisitions fail. A survey conducted by the KMPG reported that 83 percent of the acquisitions fell short of the forecasted plans (Lear, 2000). Additionally, in the book of Galpin and Herndon (The Complete Guide for Merging and Acquisitions, 2000), studies showed that only 23 percent of all acquisitions earn their cost of capital. In addition, the stock prices of acquiring companies rise only 30 percent of the time after an announcement of the acquisition deal. 70 percent of the cases observed also revealed that synergies projected for acquisition deals are unattained. â€Å"People† problems and cultural issues were also noted as the most cited reasons in failed integration (cited in Flanagan, et al. , 2004). Barnet (2004) and Lear (2000) agree with Galpin and Herndon’s findings which cite the clash of cultures of the two firms being combined could be a reason for acquisition failure if the integration is not facilitated well. Acquisitions fail when acquiring firms do not carefully consider and analyze the culture of the two firms being combined and their compatibility in areas like personality, work styles, integrity, and trust Barnett, 2004). References Barnett, S. (October 1, 2004). Mergers: its a culture issue; Most of the time, the reason behind the merger/acquisition is to reach new clients. The National Public Accountant. Retrieved October 27, 2007 from http://www. allbusiness. com/management/583960-1. html Flanagan, D. , et al. (2004). Merger and acquisition opportunities: due diligence activities offer internal auditors numerous opportunities to help ensure the success of proposed company integrations. Internal Auditor, August 2004, 55–59 Lear, R. W. (April 1, 2000). The artic1es of acquisition. The Chief Executive. Retrieved October 27, 2007 from http://findarticles. com/p/articles/mi_m4070/is_2000_April/ai_63609542/ print Mullins, G. E. (2001). Mergers and acquisitions: boon or bane? Central Wisconsin Economic Research Bureau. Special Report, Second Quarter. Retrieved October 27, 2007 from http://www. uwsp. edu/business/CWERB/2ndQtr01/SpecialReportQtr2_01. htm

Monday, October 14, 2019

Full Explanation Of Network Diagram

Full Explanation Of Network Diagram Network architecture is the plan of a connections network. It is a structure for the design of a networks physical mechanism and their functional association and design, its operational values and events, as well as data formats use in its function. In telecommunication, the plan of network architecture may also consist of a detailed report of products and services deliver via a communications network, as well as detail rate and billing structure under which services are compensated. Reference http://www. Wikipedia.com/architecture Network architecture diagram Figure-network architecture Full explanation of network diagram We designed in this company basic network architecture and we followed millstone for network architecture and all necessary information include now I describe in this architecture such as- Workstation Workstation is a design for professionally work in office. The company is an energy company this companys customer uploads reading their payment in this company website but before times their payment report and upload file attack. But in the new network architecture security is very strong so workstation all work confidently is possible and it is saved from attack. Reference Own opinion Router Routers allow connectivity to one or more computers help generate a network. For home user, these are mostly useful for captivating a single broadband internet account and distribution it to at least two or more computers. Standard routers necessitate the internet connection from a standalone modem, but modem-routers are ever-increasing in popularity, which can be plugged into any broadband-enabled phone line, reducing cable clutter, and only taking up one power socket. The rules for handle traffic are an essential component of internet security. A home/office router may have rules preventive how computers outside the network can connect to computers inside the network, as well as prevent private network traffic from spill into the outside world. Many home routers include additional security features they scan and filter all traffic that passes through them, frequently through an integrated firewall in the hardware. Some may carry out other useful roles such as acting as a print server. Reference http//www.misco.com//router Switches A switch is sometimes call an intelligent hub, A switch does the similar as a hub, in that it connect devices to allocate them to take action as a single segment. However, it does not automatically send traffic to each other port. Every time a frame of data comes into the switch, it saves the physical address (MAC address) and the port it came from in its MAC address table. It then checks the purpose MAC address in the table, and if it recognizes it sends the frame to the suitable port. If it is not in the table, or the address is a broadcast address then it does the similar as a hub and sends the frame through every port except the originate port. Reference http//www.misco.com//switches Hubs A hub is a device for connector multiple Ethernet devices typically PCs to form a single segment a portion of a network that is divided from other parts of the network. It has multiple ports throughout which devices are linked, and when it receive data it sends it out again through every port except for the one it came in through. A hub replace the cable, make sure that traffic is seen by each computer on the network, and enables the network to be connect in the form of a star before a bus using the familiar twisted pair Ethernet cable. Reference http//www.misco.com//hubs Firewall A firewall is an element of a computer system or network that is designed to block unauthorized access even as permit authorizes communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criterion. Firewalls can be implementing in any hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, in particular intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specific security criterion Reference http //www. Wikipedia.com//firewall Demilitarized zone (DMZ) In computer security, a DMZ, or else demilitarized zone are a physical or logical subnet work that contain and expose an organization external service to a larger untreated network, typically the Internet. The term is usually referred to as a DMZ by information technology professional. It is now and then referred to as a perimeter network. The function of a DMZ is to add an further layer of security to an organization local area network (LAN); an external foe only has access to equipment in the DMZ, before any other part of the network. Diagram of a typical network employing DMZ using a three-legged firewall Reference http //www. Wikipedia.com//DMZ Honey pot In computer terminology, a honey pot is a lock in set to detect, redirect, or in some manner counter attempt at unauthorized use of information systems. Usually it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (UN) protected, and monitored, and which seem to contain information or a resource of value to attacker. Reference http //www. Wikipedia.com//honey pot Virtual private network (VPN) A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization network. It aims to avoid a luxurious system of own or lease lines that can be used by only one organization. It encapsulate data transfer between two or more networked devices which are not on the same private network so as to be the transferred data private from other devices on one or more dominant local or wide area networks. There are many diverse classifications, implementations, and uses for VPNs. Reference http //www. Wikipedia.com/VPN HIDS agent installed Server agent use middle organization and multiple agents which are provide safety public and private among network hosts. It is advantage local installation on every host. HIDS agent server performs all log analysis then the agent connected to it. Active response are initiate from the server, but can be executed on an agent or all agents simultaneously Reference Own opinion Internal NIDS sensor Internal NIDS sensor is inserting into a network section so that the traffic that it is monitor must pass through the sensor. One way to achieve an Internal NIDS sensor is to combine NIDS sensor logic with another network device, such as a firewall or a LAN switch. This approach has the advantage that no additional separate hardware devices are needed; all that is required is NIDS sensor software. An alternative is a stand-alone internal NIDS sensor. The primary motivation for the use of inline sensors is to enable them to block an attack when one is detect. In this case the device is performing both intrusion detection and intrusion prevention functions. Reference http//www.blunet.net.cn.com External NIDS sensor External NIDS sensor monitors a copy of network traffic; the real traffic does not pass through the device. From the point of view of traffic flow. The sensors connect to the network transmission medium, such as a fiber optic cable, by a direct physical tap. The taps provide the sensor with a copy of all network traffic being carried by the medium. The network interface card (NIC) for this tap usually does not have an IP address configured for it. All traffic into this NIC is just collected with no protocol interface with the network. Reference http//www.blunet.net.cn.com Server and database server The network architecture main important part is server in this server use for this company. Company internal or external all important information will save in server and the server client all request respond and work station all employee in this company all details handle in this network architecture by server. Database server is very important for this company because the company provides their customer upload and reading and makes payment. customer details save database server for future. Reference Own opinion IDS manager Integrated delivery systems (IDS) very need for this company manages process text arrangement Manager writes to handle IDS sensors in a distributed situation. This is done by having the capability to receive the text arrangement files and allow you to change them with an easy to use Graphical interface. With the additional capacity to merge new rule sets, manage preprocessors, arrange output module and steadily copy system to sensors, IDS Manager Makes managing Snort easy for most security professionals.