Wednesday, July 31, 2019

Dental hygienist Essay

The passage I read is called â€Å"I have finally found what I wanted to be when I grew up.† It is a personal success story about Shelia S. Webster’s journey to becoming a registered nurse. This passage is very relatable to what I want to be when I grow up because I would like to become a Pediatric Nurse. Being a Pediatric Nurse means that you devote your knowledge and skills to caring for children from infancy to late teen years, and their families. In this passage Shelia writes about how much work and time it took for her to become a nurse. Shelia first started in the medical field as a labor and delivery staff nurse in 1993, but a few factors of this job quickly had Shelia second guessing her career (Webster). One factor that made her job less appealing was the stress of working in a high risk environment (Webster). The second factor was the late hours, between work and school she hardly had any time to herself (Webster). The third factor that made Shelia want to change her career was the restricting care she could provide in her facility (Webster). All of that stress was making her reach her breaking point (Webster). While still in school, her first step to her career was signing up for the legal nurse consulting seminar and before the semester was over she knew that nursing was the job for her (Webster). She was willing to do anything to get herself into the nursing program, to achieve this she became a claims analyst at a malpractice insurance carrier (Webster). She was determined to learn as much as she could at the insurance company and set up an independent LNC (Legal Nursing Consulting) practice in about two years (Webster). Her second step was to take a pilot test, and it was an eye opener for her (Webster). The pilot test is like a pre-test to help Shelia get an understanding of what the final exam will be like. Reality set in fast and she was determined to do the best she could on the final exam. When it was time for her to take the Legal Nursing Consulting exam she did not hesitate to show her strengths. She was prepared for the exam due to the practice she got from the pilot test, and was completely confident in herself (Webster). In 1998 she got her Legal Nursing Consulting license and said â€Å"I am very proud to have those initials in front of my last name for the rest of my life.† (Webster) There are a few reasons why Shelia’s story  relates to my life. When I started my junior year of high school I went to the career center for dental assisting. I was expecting to go to enroll into Columbus State Community College, get a major in Dental Hygiene, and then get my Dental Hygienist license in two years. However, after the last two years of being in the Dental Assisting program, like Shelia, I knew I did not want to be what I thought I wanted to be. I am going in a new direction, to major in nursing. One reason is, since I was young I always took extra concern for people’s wellbeing and would like to make a career out of it. I would also like to expand my nursing and become a Pediatrician. The second reason why Shelia’s story is relatable to mine is that I am great with little kids and I think that being a Pediatrician would be a good career for me. At 19 years old, looking for a place to start my career, I applied at the local daycare called â€Å"Bloom Latch Key.† It is a morning and afternoon program for grade school children to come to if they are too young to stay home by themselves to wait for the bus, or for the bus to drop them off at their houses. Finally, the third reason why Shelia’s story is relatable to my life is because I am getting a job as a child care provider to get my career started like Shelia worked as a labor and delivery staff member while going to school to become a nurse. While I am working for the Bloom Latch Key, I am furthering my communication skills with children and becoming more sociable with them by helping them with their homework and interacting with them on the playground. To become a Pediatric Nurse I will need an additional four to six years of schooling and take training classes throughout my career. For example; researchers find new diseases every day, so to keep the parents up to date with the proper knowledge nurses take additional classes to learn about the newly founded diseases. Once I become a Pediatric nurse I will be making about 48,000 dollars salary as a starter and work my way up to 68,000 dollars a year. Similar to Shelia, I am working very hard to achieve my goal in life, to become a Pediatric Nurse. I will do so by continuing my job at the Bloom Latch Key and building social skills with the children. I will also continue to work hard in school and do whatever it takes to become a Pediatric Nurse. Work Cited â€Å"Personal Success Stories – American Association of Legal Nurse Consultants (AALNC).† Personal Success Stories – American Association of Legal Nurse Consultants (AALNC). N.p., n.d. Web. 23 Sept. 2013.

Tuesday, July 30, 2019

Problems and Benefits of Privatization of Public Sector Organizations in China Essay

Privatization as an important role of economy , has great contribution for all over the world. So what is privatization? Privatization means transfer of assets of economic activity from public sector to private sector, it has been seen by many governments as a means of revitalizing inefficient industries and as an opportunity to raise revenues to ease budgetary problems; however, privatization in China is very complicated. When reform started in 1978, almost of the productive assets were state-owned in China. But reforms since then have not included privatization. Today, there is more than 70 per cent of Chinese productive wealth which belongs to Chinese government. During the first 20 years of reform, the government concentrated the country’s assets with a great purpose of development which helped to achieve the creation of infrastructure and expansion of industrial capacity. We can image, if the state assets had been privatized, it would become a big trouble for China to mobilize resources during the tremendous industrialization between 1980s and 1990s.That’s why the initial marketization-without-privatization approach has been successful. Also because of that, China has emerged a robust infrastructure and become an industrialized economy. However, this industry-first, government-investment-driven and export-oriented growth model which has been highly resource intensive has run its course. China has expanded export almost of the world, not only the developed countries, also Latin America, the Middle East and Africa. But this growth model is limiting the speed of export. China has to turn towards growth driven by domestic demand, not exports, and one led by service not industry to shift its economy. So what can help to stimulate the transformation? The answer is privatization. Privatization remains a thorny issue in a country where private property became a constitutional right only in 2004 and where the right to own productive assets remains unclear. Many vibrant, purely private companies have sprung up despite this uncertainty, but take care to stay out of the limelight. For example, the most famous Chinese private company is Legend Holdings Ltd, is Chinese investment holding company in IT, investment, and real estate formed by the Chinese Academy of Sciences- the best-known of which is the Lenovo Group in which Legend is the controlling shareholder. In 2006, the volume of its business was 4,033,096 million RMB. Another famous private company is Huawei which makes and sales telecommunication equipment. It is biggest supplier who provides the solution of telecommunication network. Until 2011, the whole company had 146,000 employees, and the annual sales volume was 203.9 billion RMB. Obviously the kinds of private companies become a main power to improve C hinese economy and increase national income. Proverbially, privatization can help to reduce the government financial and administrative burden. The best example is Legend Holdings Ltd. Legend Holdings Ltd was based on the Chinese Academy of Sciences. Chinese government only invested 200 thousands to organize the company. However, until now, the company has developed to an international holding company with the influence from all over the world. The Chinese government doesn’t manage the company directly but it controls a part of stock of the company. According to an analysis suggests that privatization of China’s state-owned enterprises is achieved with limited compromise on the social welfare responsibilities, and much of the improvement in the firm performance comes from the reduction in the agency cost at the management level. The state-owned enterprises generally have bloated management structure with excessive amount of managerial expenses. It is because the State Assets Agency has multiple objectives, and so long as the management meets those objectives it is neither motivated nor disciplined for profit maximization. On the contrary, private companies have their own management systems, they don’t have so much social welfare duties as state-owned enterprises. Rapid development of privatization also can help government to increase their financial income. According to the data suggests, in 2004, mainly to the private economy of small and medium-sized enterprises created 58.8 per cents of GDP, 68.3 per cents of exports and 48.2 per cents of revenue in China. Also we can see the data from Legend Holdings Ltd. Until 2003, this private company handed over to the national tax 5.45 billion RMB. As the state-owned enterprises, the government has to invest by themselves to get profit; however, as private company, government can get revenue without investing or management. Increasing efficiency and productivity in certain public sector is the third advantage of privatization in China. Some state-owned enterprises sale to specific purchasers through MBO(Management Buy-Outs). The managers cooperate with foreign companies which can help to import high technology equipment and improve the manufacturing technology. Obviously, this can increase the efficiency and productivity of company. The most famous example in China is Haier. Haier as a global electrical appliances brand, cooperate with 28 companies from difficult countries like America, Japan and Germany. As of 2008, Haier has surpassed rival Whirlpool as the world’s top refrigerator producer in terms of sales, according to Euromonitor, an independent business intelligence provider. Haier said it sold 12 million refrigerators worldwide last year, up 20% over the previous year. Its market share reached 6.3% globally. On the other hand, with the development of privatization in China, there are many problems which disturb the road of privatization. As I talked before, MBO is a kind of form of state-owned enterprises privatization. The government selling the state-owned enterprises to private organization or individual is another form. The biggest problem for this form is the individual will change the enterprise to family business. The Chinese Social Science Center had a research about Chinese private economy. The data showed 61.82 per cent companies admit that they are family business. Only 27.4 per cent of enterprises’ stock was controlled by family under 90 per cent. In China, family business enterprises’ average life is only 2.8 years. Why? Many bosses of private companies provide management job to their family. However, with the development of enterprise, importing the skills of manufacture and the experience of management become more and more important. Family members are not en ough for the development of business. The crisis of stock is another problem for privatization in China. A while back Huawei company was in trouble of old employees demanded the stock of enterprise. According to this event, we can notice there is more stock crisis in privatization of China. The owners of enterprises want to control the whole company; however, when the state-owned enterprises change to private enterprises, the distribution of stock is very confused. The lack of clear strategy of cooperation and the lack of coordination system make the partner scramble for stock, which can make the management layer into disarray. The developing of enterprise is seriously for entrepreneur. However, the growth of enterprise is not only expanding the company or increasing the number of employees, it appears in many aspects. Chinese entrepreneur always want to control their companies, this means they do not want to decrease their stock of the company. This phenomenon result to the lack of investment. For example, we can connect to family business. The lack of investment and management skills make the enterprises’ average life only 2.8 years. How to affect foreign investment and increase the capital is big challenge for Chinese entrepreneur because when the enterprises become private, the government cannot control or manage or invest to the companies directly. China’s privatization has developed more than 20 years, the private company increase the government financial income and develop Chinese economics. However the privatization in China is still not mature. A state-owned enterprise which changes to private enterprise has to face many problems. In general, the trend of Chinese privatization is optimistic. This also can help to develop the world economics.

Dramatic Irony in Oedipus the King Essay

All throughout the play, Oedipus the King, Sophocles builds the entire story using dramatic irony. Despite Oedipus’s ignorance about who he is, Sophocles uses dramatic irony to let the readers know who Oedipus truly is and to hint at what all will take place throughout the entire story. Sophocles uses many different scenes throughout the play that portray dramatic irony. Although, the three most important are Oedipus’s curse towards himself, Oedipus’s insult to Tiresias, and the fortune-teller’s prophecy about Oedipus. The first act of dramatic irony is Oedipus’s curse towards himself. Out of anger, at not being able to find the murderer of Laius, Oedipus intends to curse the murderer. However, he is actually cursing himself. For instance, in scene one Oedipus says, â€Å"And this curse, too, against the one who did it, whether alone in secrecy, or with others: may he wear out his life unblest and evil!† (1,1,251) As these harsh words leave Oedipus’s mouth, he never once thinks he will be cursing himself; but the audience know that he indeed is placing the curse upon himself. This is an example of dramatic irony because the audience knows that Oedipus himself is the murderer that he is seeking to find; however, Oedipus, Creon, and Jocasta do not. Another example of dramatic irony is how Oedipus insults the old man, Tiresias. In anger, Oedipus says, â€Å"In truth, but not in you! You have no strength, blind in your eyes, your reason, and your eyes.† (1,1,375) These words anger Tiresias even more than he already is, so he replies to Oedipus, â€Å"Unhappy man! Those jeers you hurl at me before long all these men will hurl at you.† (1,1,377) All of Tiresias’ words come into existence. The dramatic irony in the statement Oedipus hurls at Tiresias results in Oedipus becoming blind himself. Not physically blind at first, but he could not see what his own true identity is at that moment. Also, after finding out who he truly is and as he looks down on Jocasta’s (Oedipus’s mother/wife) dead body, Oedipus plunges out his own eyes using the pins from Jocasta’s clothes so that he can see no more evil. The final example of dramatic irony is the fortune-teller’s prophecy. In the beginning of the play, Laius and Jocasta have to make an important decision about whether or not to kill their son in order to save Laius’s life. The fortune-teller has delivered a prophecy to the couple which said their son will grow up to kill his father and marry to his mother. Thus, they pierce his ankles together and give him to a shepherd who is ordered to kill the child. Instead of killing him, the shepherd gives him to another shepherd who takes Oedipus and gives him to King Polybus and Queen Merope from Corinth to raise. By doing this, the shepherd does not know he is actually helping the prophecy to come true. In addition, Oedipus grows up and is also given the same prophecy, so he flees from Corinth to find somewhere else to live. By doing this, Oedipus also helps the prophecy to come to past. Along the way to find his new home, Oedipus kills an old man in self-defense, who is later discovered to be Laius (his father). After taking over Laius’s thrown and marrying Laius’s wife (Jocasta/ Oedipus’s mother), Oedipus later finds out that the prophecy has come true. Not only has the prophecy come true, but Oedipus has played a huge part in helping it come to past. He finds that running from the prophecy has caused him to actually run into the life which the prophet has warned him about rather than saving him from the life which he despises and thinks he has escaped. The dramatic irony behind these events is, although Oedipus thinks he has defeated the prophecy, the prophecy is being fulfilled throughout the story without the knowledge of the main characters. Although Oedipus, along with most of the other characters, does not know what is actually going on during the play, the audience does. Because of Sophocles’ ability to use dramatic irony throughout the play, it gives the readers the ability to know everything that is going to happen before it actually takes place. Even though Sophocles uses many scenes to portray dramatic irony, the three most important are Oedipus’s curse, Oedipus’s insult, and the fortune-teller’s prophecy.

Monday, July 29, 2019

Challenges faced (Cultural, perceptional and religious perspective ) Research Paper

Challenges faced (Cultural, perceptional and religious perspective ) and acceptance of Islamic Finance in western (Non Islamic C - Research Paper Example Also discussed is the concern over Islamic finance allegedly supporting terrorism, and why some western countries equate Islamic finance with supporting terrorism. Some implications are highlighted and recommendations are then made based on the research as to how to deal with such issues and overcome the barriers to making Islamic finance more acceptable in Western countries. Although most Islamic banks are concentrated in Muslim countries, they are also to be found in many non-Muslim countries, especially in Europe and the U.S.). In addition, some conventional banks have also begun to offer Islamic financing schemes such as the HSBC Amanah division of HSBC Group established in 1998. Also, although several studies have been conducted on attitudes towards Islamic banking and the patronization of Islamic banks with reference to IFIs located in Muslim countries, some studies, albeit very few have also been conducted to gather the views and preferences of Western customers. A selection o f these IFIs located in Western countries is also the focus of attention and the few studies referred to above are mentioned. General perceptions of Islamic finance It proved to be difficult to ascertain the perceptions of Westerners towards Islamic finance due to a lack of studies in this area. Most studies have examined customers from Muslim and other developing countries. To give an example of one significant study, Erol & El-Bdour (1989) studied attitudes towards Islamic banking in Jordan. They used a nine-part question/statement instrument and showed that religious motivation was not such an important factor as a fast and efficient service, reputation and image, and confidentiality. Nonetheless, a general awareness of Islamic banks and their methods was evident. Sudin et al. (1994) conducted a more extensive study among both Muslims and non-Muslims in Malaysia. The three most important criteria for non-Muslims were firstly, friendliness of staff, secondly a fast and efficient s ervice, and thirdly the bank’s image and reputation. Another study on Malaysian customers showed that although most of them did not have a complete understanding of Islamic financial products, they did not differentiate between products from Islamic and conventional banks (Hamid & Nordin, 2001). In another study, Gerrard & Cunningham (1997) surveyed the attitude towards Islamic banking among Singaporeans where Muslims are in a minority. It was found that non-Muslims were generally lacking in awareness of Islamic banking. Furthermore, whereas Muslims were mainly motivated by religious reasons besides profitability, and had little interest in getting a high interest rate on savings, it was the opposite situation for non-Muslims. It is a similar situation in Turkey (Okumus, 2005). Even in non-Muslim countries like India where Muslims form a significant proportion of the country’s population, awareness of IFIs was low at the turn of the present century (Munawar & Llewellyn , 2002: 188). Less than half of the 720 persons interviewed knew that they even existed. This general finding of non-Muslims being more motivated by reasons other than religious ones could be the case in Western countries as well among non-Muslims that do use Islamic finance. However, during the past decade there has probably been an increasing awareness

Sunday, July 28, 2019

Captain John C. Holleran Coursework Example | Topics and Well Written Essays - 250 words

Captain John C. Holleran - Coursework Example He is the team leader, a coach, motivator, change agent and should provide a serene environment for effective service delivery. He should protect the assets of the firm through evaluation and control for instance utilizing budgets to bring the cost under control. When, the department reports anomalies, he is solely responsible. In the above case, retrenchment is imminent as the organization is large and this is what is driving costs higher than budgeted for. The paper will therefore respond to the above questions. The most vulnerable category of stakeholder will be the community or the society in general. This is because it will be deprived of the service rendered by the police officers retrenched. The community will also be exposed to indirect intangible cost of increased insecurity and increased crimes in the region. The living standards of the people will decrease due to decline in their income. Furthermore, captain is also likely to be affected through demotions redeployment or even redundancy. The employees will, lose their jobs, a decrease in purchasing power and some might suffer from psychological frustration due to stress. The department may have inadequate staff leading to poor quality service, straining of the small staff that could lead to fatigue. The creativity will drop significantly as the remaining vacant positions will not be filled with the right skill. It may spur up tension and mistrust among staff which in the long run will act negatively on the firm’s image, lowe r productivity. Lastly, society will be deprived of the vital service thus decreasing the social benefit enjoyed by the citizens. The society may be exposed to increase in crime rates which may destabilize it.(Pettinger,2002) According to Storey (1992), some of the resistance to effective change can either be behavioral or operational .These resistances include resisting to be redeployed, may resist the ‘new way’ and processes of

Saturday, July 27, 2019

Rhetorical analysis of President Clintons September 5, 2012 speech Essay

Rhetorical analysis of President Clintons September 5, 2012 speech - Essay Example A person to take the mantle from the outgoing president. The president states that he has one person in mind meaning that the man in power already has a chosen candidate that can bring in changes into the country. Rhetorically speaking, this satisfies the audience that the person to be nominated is a person with utmost leadership qualities. By stating that the man to be nominated â€Å"life has seen great adversity and a fair share of uncertainty,† Clinton shows that the person to be nominated is a person of great experience and is capable of tackling challenges affecting citizens as a whole. President Clinton goes on to state that the person to be nominated played a key role in creating millions of jobs and in addition saving many more jobs. Through that, it is evident that the nominee is a person with great potentiality in job creation (Clinton par. 1). By job creation, chances of people getting employed increases leading to a reduction in poverty and a general rise in the c ountry’s Gross Domestic Products. Clinton is also keen to talk about the fact that creation of jobs will be a booster to American children. According to this speech, the person to be nominated burns with America inside him. In rhetoric, President Clinton states that the man possesses vast dreams that tend to build the country’s economy and boost the diversity of the country to a larger extent. The President goes further to explain that the person to be nominated had a [good sense to marry Michelle Obama]. By so saying, the President implies that the nominee has a lot of creativity and innovativeness that will be essential in the running and propelling the country to greater heights. Additionally, the country needs such a person (Jones 45). In those regards, Obama contains the prowess to lead the Democratic Party. Through explaining on how negative talk

Friday, July 26, 2019

What are the key functions of the German Chancellor Essay - 1

What are the key functions of the German Chancellor - Essay Example This research will begin with the statement that Germany adopted the constitution (Basic law) on May 1949, which saw the reunification of Germany. The Basic law combines the lessons from German experience with the National Socialist State, the Weimar Republic and the intention of the Western powers. The Basic law provided the foundation for creating the Democratic and the Social Federal Republic. The Federal Republic of Germany has its name from Germans federal structure. The Federal Republic of Germany consists of sixteen states; each state has its own authority and powers. The Federal Republics constitution stipulates the responsibilities of the three separate arms of Germany government. The three branches are the legislature, executive, and the judiciary. The legislature consists of a bicameral parliament, the Bundesrat, and the Bundestag. The function of the executive circulates within the office of the president and the Chancellor. The federal constitution is the highest court i n Germany. It has the right to declare any acts of the federal state or the state legislatures unconstitutional. The court guards the Basic Law and consists of two panels, each panel consisting of eight judges. The Bundestag and the Bundesrat appoint an equal number of judges. The federal president is the head of the government and performs a ceremonial role. The president represents the country in international relations. The president concludes treaties, accredits and receives envoys. The federal president is not a member of the government, the legislature or the federal government.

Thursday, July 25, 2019

The Rise and Fall of LTCM Essay Example | Topics and Well Written Essays - 1000 words

The Rise and Fall of LTCM - Essay Example On the other hand, there are differences between hedge and mutual funds, whereby the hedge funds are managed more aggressively compared to the mutual funds, hence making it possible to take speculative positions in derivative securities like decisions to short sell stock. Moreover, this increases leverage and risk of the funds hence are making it possible for the funds to gain profits when the market is declining. On the other hand, mutual funds are not allowed to be involved in highly leveraged positions; hence, they are considered safer than the hedge funds. Main sources of LTCM initial success The main sources of success for LTCM were associated with a complex mathematical model that the company had established in order to benefit from fixed income arbitrage deals within the bonds of U.S.A, Japanese and European governments (Dunbar, 5). They applied the fundamental idea of the changes in the values of the long dated bonds issued a short time apart, which becomes similar. Neverthel ess, the bonds were approached at a different rate, and they were more traded bonds like the US Treasury bonds, whereby the long-term prices are approached more effectively, though they are less heavily traded and liquid. The other main of success factor was the financial transactions, which related to purchasing cheaper bonds, short selling them more expensive and liquid, hence generating profit from the difference in the value of the bonds. In fact, their capital grew, and they were willing to invest the capital somewhere; hence, they run out of outstanding bond-arbitrage bets leading to LTCM to apply strategies that were beyond their expertise (MacKenzie, 349). Nonetheless, their trading strategies were nonmarket directional, whereby they did not depend on the overall market interest rates or fluctuations of stock prices, since they had no convergence trades. Main reasons for LTCM collapse The success of the LTCM in the financial markets occurred within a short period, and this w as attributed to informational asymmetries by the fund managers, hence resulting to a downfall before the establishment of the East Asian financial crisis, in 1997. The downfall began with a reduction noted on the net returns in 1998 for the period between May that had 65% and June, 10.4%, resulting to a reduction of their capital by $461 million, in fact, when the Salomon Brothers withdrew from the arbitrage business in July 1998, the downfall was escalated. The losses were accentuated by crisis experienced in Russia during the month of August and September in 1998, when the bonds were defaulted in Russia by their government, leading to investors’ decision to sell European and Japanese bonds in order to purchase the treasury bonds in U.S.A due to their worries. Profits anticipated as the value of the bonds purchased in U.S.A resulted to losses due to convergence of bonds while their value diverged; consequently, the LTCM had incurred losses worth 1.85 billion dollars by the end of August. LTCM could no longer provide investors with annual returns of 40%; instead they were they went through a Flight–to-Liquidity, and in the beginning of September, their equity reduced from 2.3 billion dollars to 600 million dollars with no dwindling portfolio, and this resulted to a further increase in

Wednesday, July 24, 2019

Written Business Communication (Assignment #1A) Assignment

Written Business Communication ( #1A) - Assignment Example Moreover, after 3:30 p.m., swing-shift employees may park in any empty space except those marked Tandem, Handicapped, Van Pool, Car Pool, or Management. The day shift employees may loan their spaces to other employees upon making prior arrangements if they would not be using their parking spaces. One serious problem that has come to our attention is lack of registration (as evidenced by white stickers). Please be advised that any car that would be found with a sticker would be ticketed. The Employee Relations department has the prerogative to register the vehicles and the following dates have been set aside for this exercise in the cafeteria: October 1st and 2nd from 11:30 a.m. to 1:30 p.m. and from 3:00-5:00 p.m. we kindly ask you to treat this issue seriously in order to avoid any inconveniences. The purpose of the memo is to inform or remind the employees about the parking guidelines in the company. This is specifically meant to ensure that there is smooth movement of traffic as well as people in the organization. This also helps to minimise any inconvenience that may be caused by disorderly parking in the company. The reader positively responds if there is official communication such as written memos. I strongly believe that the readers abide by the company policies hence they are likely to follow the parking guidelines once they read the above email. The reader is likely to be reluctant at first by they will positively respond after realising that this is official communication. All employees are bound by official documents hence they should abide by all the contents presented to them. The strategy appropriate for this message/reader response should be group focused. The company should particularly address this message to the group rather than individuals. This will have a positive impact since there is likely to be collective

Proposal for my project Thesis Example | Topics and Well Written Essays - 500 words

For my project - Thesis Proposal Example Therefore, there is need to understand the implications of social media in marketing in order to make the right interventions that will result to a return on investment. There has been exponential growth in the use of social media by people of all ages. However, some age groups are more active in social media than others are. This has created a huge online traffic that can easily be targeted by businesses in need of selling their brands (Chou et al., 2009). While interpersonal communication has been tremendous through the social media, there is also a big opportunity for businesses to develop strategies that target different groups of people in order to market their products and services. Being a side activity by the social networks, social media marketing is relatively cheaper compared to other advertising strategies. Marketing through the social media serves as a better method of communicating to the customers since it happens at their own convenience. Social media has been applauded for its capability for brand positioning, hence attracting the potential customers. According to the social media marketing report of 2013, marketers have recognized exposure and increased traffic as top two benefits (Stelzner, 2013). There are a myriad of challenges that are encountered by marketers in an attempt to reach the market through the social media. Firstly, the followers in a social media platform are not necessarily customers, therefore there is need to convert them into customers. Another issue that comes up is the creation of online content that is capable of attracting the attention of the potential customers. The diversity in the social networks also presents difficulties in reaching to the customers. A marketer would like to use all the available networks so as to reach as many people as possible. However, this is cumbersome and tedious. A number of things can be done through

Tuesday, July 23, 2019

Personal statement for applying graduate school in MS in Information

For applying graduate school in MS in Information system - Personal Statement Example They have raised their kids with strong perseverance. Like them, I am also very hard working, and intend to train myself in various skills, like leadership, communication, management, and organization. I have always been a very good student getting positions and certificates. My teachers and professors always considered me a student worthy of reward. I feel that I have enough knowledge and passion to show that I have a craze about going ahead in the information systems, and contribute to the tech market. To maintain my interest, I keep myself updated with market requirements. I have always thought about bringing my knowledge into use that I gained during my college. I keep on reading related journals, books and magazines, and attend related seminars held in my vicinity. I feel that I possess those special skills needed to fulfill the requirements for this course. I have always come up fresh, innovative and unique ideas. I have learnt basic computer knowledge so as to equip myself wit h the latest technology that may help me in excelling in this course. For example, I am proficient in Microsoft Access, Excel, PowerPoint, HTML, CSS, Python and JES. This enthusiasm is what pulls me to take do MSIS. I would also like to discuss my educational background, experience and personal interests. I completed Bachelor of Science in Business from the Indiana University, Kelley School of Business, Bloomington, IN, in December 2013, with GPA 2.92/4.00. I took Finance as my major, and have remained a member of national society of collegiate scholars. I have also worked in the Food Service Department in Gresham Food Count-Bloomington, IN, in 2012. That was an overwhelming experience for me as I learnt how to be practical in life. I have also served as a tutor in Ouhai middle school, Wenzhou, Zhejiang in 2009. I have also a passion for sports. I have remained a great basketball player in Ouhai middle school basketball match from September 2009 to

Monday, July 22, 2019

Cold War Essay Example for Free

Cold War Essay The existing tensions between the United States and the Soviet Union proceeded to spike between 1945 and 1950. The disputes between these two countries pressured them to start a war. Of the post World War II goals that contributed to the Cold War, there were a prominent few, including the â€Å"Iron Curtain†, the Truman Doctrine, the Marshall Plan, and NATO. During the Cold War, competition for methods of weaponry skyrocketed. Some of said tactics were Satellite nations, the Space Race, and the buildup of arms. Originally, The United States and the Soviet Union formed a bond simply because of their mutual fear that the Nazis would gain control over Europe. After the war was over, restructuring of Europe commenced. When this began to happen, a power struggle between the Soviet Union and the United States developed. The tension continued to rise, but neither wished to go to war because of the whopping number of lives taken from World War II, therefore, the term â€Å"Cold War† makes sense. Winston Churchill gave his famous â€Å"Iron Curtain† speech on March 5th, 1946, which mainly focussed on changing the world’s view of Stalin and his dictatorship. Citizens were blind to Stalin’s cruel dictatorship, simply because they needed some kind of leader. Churchill stated in his speech that, the â€Å"Iron Curtain† separated West and Eastern Europe. The East European government adopted a communist system and fell under the control of the U.S.S.R. (Doc #1). This created tension, induced by ideology differences. President Truman made up a plan, in which he felt that there should be a policy of the United States to provide financial aid to countries who are trying to avoid domination from other countries. Truman gave $400 million in aid to Turkey and Greece (Doc. #2). This heightened pressure between the U.S. And other countries because of how strong the U.S. obviously was, compared to any other country. This was also a threat to other countries. Marshall, secretary of State, stated that the vast amount of political, economical, and social damage Europe were going through would not only effect the continent itself, but the world as a whole. He stated that this was a major concern, and the U.S. should do everything in its power to fix this torn continent. He stated that without the assistance, there would be ongoing hunger and poverty (Doc. #3). Marshall gave $13 billion to Europe to aid the damage. The Truman Doctrine, and the marshall Plan, were both attempts to maintain successful political, economical, and social stability throughout the world to prevent the post war downfall from occurring once again. Joseph Stalin, dictator of the Soviet Union, captured Berlin. This upset many countries and so, NATO was born. They believed that an attack on one country was an attack on them all. The arms race occurred as a result because the countries stated that armed forces would be used if necessary to protect a country who had to undergo an armed attack.

Sunday, July 21, 2019

Theories on Stages of Sleep

Theories on Stages of Sleep Paul Stolt Jr In our textbook it says that, â€Å"REM sleep makes up the remaining 20 per cent of your sleep time. It is pronounced â€Å"rem† and stands for rapid eye movement sleep because your eyes move rapidly back and forth behind closed lids† (Plotnik Kouyoudmjian, 2014, p. 153). The brain waves that are present in REM sleep are beta waves, which is the same kind that are present when a person is awake. Also, during this stage, the body is alert, but the muscles are paralyzed, thus prohibiting movement during this time. The REM sleep stage is the one that the process of having dreams occurs in. According to our text, a person passes through the REM sleep stage about five or six times a night. The intervals in between these stages are approximately half an hour to an hour and a half long. Most people are in the REM sleep stage for about half an hour to forty-five minutes, before they enter the NREM, or Non REM, sleep stage. An individual’s heart rate and blood pressure a re typically higher in REM, indicating a more alert state in this stage than in the non REM stage. Creative thinking processes are more present during REM sleep, probably due to a lack of activity in the areas of the brain that are responsible for critical thinking. Students need REM sleep in order to transfer the knowledge that they have stored throughout the day in short term memory, into long term memory. This stage helps to promote the encoding process, which is responsible for the transfer. Once the information is encoded during the REM stage, it becomes easier to recall at a later time for tests and exams. There is an indication in the human body of the need for REM sleep, because if someone has not spent enough time in this stage the previous night, the body will compensate by spending more time in REM the following night. The Alpha stage occurs right before people drift off to sleep. During this stage, people start to feel tired and relaxed, often just lying in bed with their eyes closed, and random thoughts, such as activities of the previous day, or the plans that they may have the following day, present in their thoughts. According to the text book, â€Å"Alpha waves have a low amplitude and high frequency, (8 to 12 cycles per second)† (Plotnik Kouyoudmjian, 2014, p. 152). After the alpha stage, Non REM Sleep, or NREM for short, occurs. This stage is where most people spend 80 per cent of their time while sleeping. This type of sleep is divided into four stages, each stage being associated with unique brain wave patterns and biological responses (Plotnik Kouyoudmjian, 2014). In the first stage of Non REM sleep, there is a transition that occurs from being wide awake and alert, to drifting off to sleep. This stage usually lasts from about one to seven minutes long. The text says that this s tage is â€Å"marked by the presence of theta waves, which are lower in amplitude and lower in frequency (4 to 7 cycles per second) than alpha waves† (Plotnik Kouyoudmjian, 2014, p. 152). Next, the person passes through the second stage of sleep. In the second stage, there are rapidly occurring periods of what researchers call sleep spindles. In this stage, physiological processes such as breathing, a person’s body temperature, and their heart rate slowly decrease, and they become harder to wake up. This stage is what most researchers define as a person being asleep. Next, after about half an hour to forty five minutes of falling asleep, the individual enters stages three and four of Non REM sleep. Delta waves are present in stage three, and these are defined as â€Å"large, slow brain waves, meaning they have very high amplitude and very low frequency† (Plotnik Kouyoudmjian, 2014, p. 152). As the person moves on to stage four in Non REM sleep, they experience a significant increase in the presence of Delta waves. During this stage, biological processes such as heart rate, breathing, body temperature, and the flow of blood to the brain are dramatically decreased, and the body secretes a substance called GH, or growth hormone, which is responsible for controlling the metabolic rate in the body, physical growth in the body, and the development of the human brain. After this stage, the individual passes back through the second and third stages of Non REM, and enters into the dreaming, or REM, stage of sleep. The necessity of sleep for a living organism can be explained in two logical ways. The first is that the body repairs and restores itself while it is resting. In one theory, the human brain repairs and restores itself while sleeping. It has also been proven that chemicals that are harmful to our system are flushed out during the sleeping process. Some research has also suggested that the immune system is impaired because of sleep deprivation (National Institute of Neurological Disorders and Stroke, 2013). The second way that it can be explained is the Conservation theory. This theory suggests that the need to conserve energy at night for the human race promoted the need for sleep. In other words, since it was dark out, and there was little light to be able to see, that time was better spent resting instead of moving about. It would seem that as an individual goes throughout their lifetime, the need for sleep is greatest during the early years, and less as they get older. When an infant is born, the average time that they spend asleep is about seventeen hours a day, with half of that time spent in REM sleep. Then, when they get a little older, such as approximately around four years old, they sleep about ten hours a day, with about 25 to 30 per cent of that time spent in REM sleep. A little later, around the teenage years, the amount of sleep that is required is about 9 hours per night, with the trend being later bed times, and the teenagers waking up later during the day. A couple years later, at about nineteen to twenty years of age, the amount of sleep required by the adolescents is about seven to eight hours per night, with twenty per cent of that time spent in REM. As an adult reaches the golden years, the amount of sleep required is six and a half hours per night, with approximately twenty per cent being spent in REM sleep. The text defines the circadian rhythm as a â€Å"biological clock that is genetically programmed to regulate physiological responses within a time period of twenty-four hours (Plotnik Kouyoudmjian, 2014, p. 150). The circadian clock is genetically set for about 24 hours 18 minutes. The clock is reset by the retinal cells, which act like sensors that let in sunlight, and send signals to the brain, resetting it by eighteen minutes each day. However, there are quite a few problems associated with the circadian clock by individuals who work midnight shifts or have to fly frequently for their job, thereby getting a condition known as jet lag. First, let’s discuss individuals that work the midnight shift. These individuals go against the natural instinct of their circadian clocks, resulting in decreased performance of their cognitive and motor skills. Also, people who change shifts a lot, such as working swing shift, cause a lot of physical stress in their bodies and psychological stress in their minds. Secondly, people with jet lag often experience problems with feeling tired all the time, difficulty in being able to concentrate on a particular task, and reduced ability in their ability to use logical thinking, reasoning, or remembering. It takes people with jet lag about a day per hour of difference between time zones to recover. However, there is hope. Charles Czeisler developed a new treatment called light therapy in 1994. This treatment uses artificial light to combat fatigue in both people who work the midnight shift, and those with jet lag. Next I would like to talk about the effects that sleep deprivation has on individuals. People with sleep deprivation run the risk of having impaired immune systems, with the potential for increased infections and diseases. They also experience increased stress levels, elevated blood pressure, and an increased build-up of plaque in the arteries, with a severe potential for heart attack or stroke. Other problems they experience include the risk of obesity and diabetes, difficulty in recognizing words, and doing ordinary math problems. They are more susceptible to increased irritability, and increased difficulty in making logical and rational decisions. Terms and Concepts Perceptual Threshold -The perceptual threshold is the smallest thing that can be perceived, or recognized, by the human senses. Sensation A sensation is a relatively meaningless piece of information, that results when the brain processes electrical signals that come from the sense organs. Stimulus A stimulus is any change of energy in the environment, such as light waves, sound waves, mechanical pressure, or chemicals. Structuralists Structuralists are psychologists who believed that we add together thousands of sensations to form a perception. Gestalt Psychologists Gestalt psychologists are psychologists that believe that our brains follow general rules that specify how individual elements are to be organized into a meaningful pattern, or perception. Depth Perception Depth Perception is the ability of the eye and brain to add a third dimension called depth to all visual perceptions, even though the images being projected might only be two dimensional in nature. Consciousness Consciousness describes different levels of awareness of one’s thoughts and feelings. Biological Clock The biological clock is an internal timing device that is genetically set to regulate various physiological responses for different periods of time. Stages of Sleep Stages of sleep refer to the distinctive changes in the electrical activity of the brain, and accompanying physiological responses to the body that occur as someone passes through different phases of sleep. Hypnosis Hypnosis is a procedure in which a researcher, clinician, or hypnotist suggests that a person will experience changes in sensations, perceptions, thoughts, feelings, or behaviors. Stimulants Stimulants are chemical substances such as cocaine, amphetamines, caffeine, and nicotine that increase activity of the central nervous system and result in heightened alertness, arousal, euphoria, and decreased appetite. Opiates Opiates are chemical substances such as opium, morphine, and heroin that produce three predominant effects in the central nervous system: the reduction of pain, opiate euphoria, a pleasurable state between waking and sleeping; and constipation. Hallucinogens Hallucinogens are drugs that affect someone’s mind or behavior and have the ability to produce changes in perception, thought, emotion, and awareness. Classical Conditioning Classical Conditioning is a kind of learning in which a neutral stimulus acquires the ability to produce a response that was originally produced by a different stimulus. Operant Conditioning Operant Conditioning is a kind of learning in which the consequences that follow some behavior increase or decrease the likelihood of that behavior’s occurrence in the future. Cognitive Learning Cognitive Learning is a kind of learning that involves mental processes, such as attention and memory, may be learned through observation or imitation; and may not involve any external rewards or require the person to perform any observable behaviors. Generalization Generalization is the tendency for a stimulus that is similar to the original conditioned stimulus to elicit a response that is similar to the conditioned response. Discrimination Discrimination occurs when an organism learns to make a particular response to some stimuli but not to others. Extinction Extinction is a procedure in which a conditioned stimulus is repeatedly presented without the unconditioned stimulus, and, as a result, the conditioned stimulus no longer elicits the conditioned response Thorndike Thorndike was an American psychologist who lived during the 1800’s and formulated the law of effect, which stated that if some random actions are followed by a pleasurable consequence, such actions are strengthened and will likely occur in the future. Skinner Skinner was a psychologist who developed a theory known as the operant response during the 1930’s, which says that â€Å"An operant response is a response that can be modified by its consequences and is a meaningful unit of ongoing behavior that can be easily measured† (Plotnik Kouyoudmjian, 2014, p. 214). Reinforcers Reinforcers are â€Å"consequences that occur after a desired behavior and increase the chances that the behavior will occur again† (Plotnik Kouyoudmjian, 2014, p. 218). Punishment A punishment is a stimulus that â€Å"stops or decreases the occurrence of a behavior† (Plotnik Kouyoudmjian, 2014, p. 219). Schedules of Reinforcement Schedules of Reinforcement are programs or rules that determine how and when the occurrence of a response will be followed by a reinforcer (Plotnik Kouyoudmjian, 2014, p. 220). Spontaneous Recovery Spontaneous Recovery refers to either a temporary recovery in the rate of responding in operant conditioning, or the temporary occurrence of the conditioned response in the presence of the conditioned stimulus in classical conditioning (Plotnik Kouyoudmjian, 2014, p. 222). Behavior Modification â€Å"is a treatment or therapy that changes or modifies problems or undesirable behaviors by using principles of learning based on operant conditioning, classical conditioning, and social cognitive learning† (Plotnik Kouyoudmjian, 2014, p. 232). References National Institute of Neurological Disorders and Stroke. (2013, December 5). Brain Basics: Understanding Sleep. Retrieved January 20, 2014, from National Institute of Neurological Disorders and Stroke: www.ninds.nih.gov Plotnik, R., Kouyoudmjian, H. (2014). Introduction to Psychology. Belmont, CA, USA: Wadsworth Publishing. Retrieved January 13, 2014

Flow in Pipe Network Analysed Using Hardy Cross Method

Flow in Pipe Network Analysed Using Hardy Cross Method Table of Contents 1.0 Introduction 2.0 Procedure for Hardy Cross method: 3.0 Flow in Pipe Network analysed using Hardy Cross method 4.0 Advantages 5.0 Conclusion 6.0 References 1.0 Introduction Piping networks have quite a wide range of practical applications, from water and gas distribution systems to air conditioning installations. Although simple problems, such as for instance, a single branch connecting two reservoirs, may be solved analytically, more complex network problems need an iterative approach, recurring to a digital computer. The most popular method for solving this type of problems is the Hardy-Cross method. The Hardy Cross method is an iterative method for determining the flow in pipe network systems where the input and output flows are known, but the flow inside the network is unknown. Also, the pipe length, diameter, roughness and other key characteristics should be known. Before the method was introduced, solving complex pipe systems for distribution was extremely difficult due to the nonlinear relationship between head loss and flow. Water distribution system models have become very important and practical tool for civil engineers. Models are often used to optimize the design of new distribution systems or analyze major extensions or modifications to existing distribution systems. The introduction of the Hardy Cross method for analyzing pipe flow networks revolutionized  municipal water supply design (Pdhengineer.com, 2014). The Hardy Cross method is normally used as the pipe network analysis by most engineers. Computer models help engineers to solve difficult situations, namely: What is the maximum fire flow at a given point in the system? How long can that fire flow be provided for? What size pipe installation would be necessary between two points in a system to increase the pressure at one of the points to the minimum pressure required? If a subdivision or commercial development is built, will adequate pressures and flows exist? If not, what length and size of water mains must be upgraded by the developer to allow for the proposed construction? 2.0 Procedure for Hardy Cross method: This method is applicable to closed-loop pipe networks. The outflows from the system are assumed to occur at the nodes, where a node is the end of each pipe. This assumption would therefore result uniform flow in the pipelines distribution systems. The Hardy-Cross analysis is based on the principles that At each junction, the total inflow must be equal to total outflow. Head balance criterion: algebraic sum of the head losses around any closed-loop is zero. For a given pipe system, with known junction outflows, the Hardy-Cross method is an iterative procedure based on initially estimated flows in pipes. Estimated pipe flows are corrected with iteration until head losses in the clockwise direction and in the anticlockwise direction are equal within each loop. A trial distribution is madearbitrarily but in such a way that continuity equation is satisfied at each juction. With the assumed value of Q, the head loss in each pipe is calculated according to the equation Where : head loss r : head loss per unit flow n : flow exponent The net headloss around each loop is calculated. If the net head loss due to assumed values of Q round the loop is zero, then the assumed values of Q in that loop are correct. If this is not the case, then the assumed values of Q are corrected by including a correction à ¯Ã‚ Ã¢â‚¬Å¾Q for the flows till the circuit is balanced. The correction factor à ¯Ã‚ Ã¢â‚¬Å¾Q is obtained by For turbulent flow, the value of n=2 and hence the correction factor becomes If the value of à ¯Ã‚ Ã¢â‚¬Å¾Q is positive, then it is added to the flow in the clockwise direction and subtracted from the flows in the anticlockwise direction. After the correction have been applied to each pipe in a loop and to all loops, a second trial calculation is made for all loops. This procedure is repeated till à ¯Ã‚ Ã¢â‚¬Å¾Q becomes negligible. 3.0 Flow in Pipe Network analysed using Hardy Cross method 4.0 Advantages The Hardy Cross method is useful because it relies on only simple math, circumventing the need to solve a system of equations. Without the Hardy Cross methods, engineers would have to solve complex systems of equations with variable exponents that cannot easily be solved by hand. The Hardy Cross method iteratively corrects for the mistakes in the initial guess used to solve the problem. Subsequent mistakes in calculation are also iteratively corrected. If the method is followed correctly, the proper flow in each pipe can still be found if small mathematical errors are consistently made in the process. This method is based on the successive addition of flow-rate corrections in each branch, in order to achieve satisfaction of energy conservation along every path in the network. The easiness of building a new network or modifying an existing one allows the engineer to readily observe how small changes in the network configuration may produce interesting results such as a flow reversal in a certain branch. 5.0 Conclusion Distribution system is a network of pipelines that distribute water to the consumers. They are designed to adequately satisfy the water requirement for a combination of domestic, commercial, industrial and fire fighting purposes. In any pipe network, the algebraic sum of pressure drops around a closed loop must be zero (there can be no discontinuity in pressure) as well as the flow entering a junction must be equal to the flow leaving that junction; i.e. the law of continuity must be satisfied (Nptel.ac.in, 2014). A good distribution system should provide adequate water pressure at the consumers taps for a specific rate of flow. The pressures should not only be great enough to adequately meet fire fighting needs, but should also not be excessive due to pressure leakages which is cost-effective. However, in tall buildings, booster pumps are required to elevate the water to upper floors. Moreover, distribution system of purified water should be completely water-tight and the purity of distributed water should be maintained. Maintenance of the distribution system should be easy and economical. Even, during breakdown periods of pipeline, water should remain available. If a particular pipe length is under repair and has been shut down, the water to the population living in the down-stream side of this pipeline should be available from other pipeline. The distribution pipes systems should not be placed under highways, carriage ways as they will obstruct any traffic flow, but should be laid under foo t paths. Figure 1: Pipe network for Municipal water distribution systems in cities (Scribd.com, 2014) 6.0 References Gupta, R.K., 2005. A Text Book of Fluid Mechanics and Hydraulic Machines. 9th ed. New Delhi: Laxmi Publications. Nptel.ac.in, (2014).Objectives template. [Online] Available at: http://nptel.ac.in/courses/Webcourse-contents/IIT-KANPUR/FLUID-MECHANICS/lecture-36/36-3_pipe_soln_hardy.htm [Accessed on 27 March 2014]. Nptel.ac.in, (2014).Water Supply Network Design. [Online] Available at: http://nptel.ac.in/courses/Webcourse-contents/IIT KANPUR/wasteWater/Lecture%2015.htm [Accessed on 27 March 2014]. Pdhengineer.com, (2014).The Hardy Cross Method and its Successors in Water Distribution PDHengineer Course EN-2034. [Online] Available at: http://www.pdhengineer.com/catalog/index.php?route=product/productproduct_id=1320 [Accessed on 31 March 2014]. Scribd.com, (2014).Pipe Network Analysis using Hardy Cross method. [Online] Available at: http://www.scribd.com/doc/42173408/Pipe-Network-Analysis-using-Hardy-Cross-method [Accessed on 29 March 2014]. https://estudogeral.sib.uc.pt/bitstream/10316/8169/1/obra.pdf) http://en.wikipedia.org/wiki/Hardy_Cross_method

Saturday, July 20, 2019

Reintroduction of the Lynx Does More Harm Than Good :: Argumentative Persuasive Topics

Reintroduction of the Lynx Does More Harm Than Good   Ã‚  Ã‚  Ã‚  Ã‚  There I was, standing face to face with the bobtailed lynx. It was looking right at me and licking its chops with delight. It seemed as if the beast was thinking "Lunch" on this cold, gray December day, but I wasn't worried about being attacked. The reason for this was the fact that this was a domestic lynx that just happened to be on the other side of a stout metal cage, so there was no chance of the lynx getting a hold of me.   Ã‚  Ã‚  Ã‚  Ã‚  At one time, the lynx lived all the way along the Continental Divide clear up into Canada. Now, after being gone from Colorado for 25 years, the animal has been reintroduced into the lower tip of the lynx's historic habitat, the San Juan Mountains (Rogers). So far, out of 33 lynx that are being tracked, all of them are roaming in 276 square kilometers of the southwestern portion of Colorado that runs from the New Mexico border up to the I-70 corridor and from Monarch Pass over to Taylor Mesa (Shenk). In an attempt to find out how the animals, which look like bobcats with black tufts on their ears and huge paws, act in nature, scientists are tracking them with radio collars and airplanes (Lloyd).   Ã‚  Ã‚  Ã‚  Ã‚  Now, just a couple of years later, the Colorado Division of Wildlife is planning to release over 180 more lynx into the Colorado wilderness within the next five years. However, out of nearly 100 Canadian Lynx that have already been released so far, about half of them have died and none of them have reproduced. With the type of results that the process has received so far, the agencies involved in the reintroduction process should stop reintroducing the lynx into Colorado. Instead, they should try to find a way different way that will get results that save the species. The government agencies that are involved in reintroducing the lynx argue that it should be done in order to save an endangered species. In this argument they bring out three strong points for trying to save the lynx: every animal should have the opportunity to exist, many people feel happy when they see the animals they share the land with and all living things are part of a complex ecosystem ("Wild life Commission . . ."). However, they aren't sure how to reintroduce the lynx so that they don't all die.

Friday, July 19, 2019

Secularism Essay -- essays research papers

Secularism The world today is filled with a variety of religions. Different religions cause conflict because of the dissimilar beliefs as with secularism. Secularism is the indifference to or rejection or exclusion of religion and religious considerations according to the dictionary. The religious civilization acknowledges secularism as any movement in society directed away from the otherworldliness to life on earth. No matter which way it is defined the main point is that God is excluded from all human affairs. There is no God in secularism. It is just the world and nothing else. If there is some form of a God, then it is perceived to be too far for our understanding. Modern cultures have changed a lot in the world in which we stand, but secularism can be found everywhere in the past, the present, and it will be there in the future.   Ã‚  Ã‚  Ã‚  Ã‚  Secularism has been around for over five hundred years and the process of science and psychology is slowly picking up speed along with development. Science and psychology play a big role in how we view things including our religious beliefs and our views of God. God created this beautiful world around us, and he watches over us and speaks to us. Unfortunately, science has become very popular and scientists are constantly searching for the â€Å"truth†. God created the world and put Adam on it with Eve, yet science will state that the Big Bang created the world and constantly search for inconsistency in everything from Jesus to the Bible. Science is distorting our view of the modern world. This has become a big problem because it seems as though secularism has become a political movement, instead of a philosophy or religious belief. It is more serious because our view of the world has changed as well as our view of God and what he did and didn’t do. T he scientific move towards the world develops into a problem because it is now a philosophy or ideology that contradicts the truth of morality and faith. The beliefs and claims of secularism is â€Å"a form of opinion which concerns itself only with questions, the issues of which can be tested by the experience of this life. More explicitly, secularism is that which seeks the development of the physical, moral, and intellectual nature of man to the highest possible point, as the immediate duty of life – which selects as its methods of procedure the promotion o... ...ses down and down and became more secularized then ever. It is hard to try to separate or compare a religion to secularism. Islam can be interpreted harshly or liberally. If Islam was very open-minded then there would be no problem with it being secular. The Qur’an can actually be quoted as having strong supports for secularism. However, one must remember that it only supports liberal secularism not atheistic secularism. Liberal secularism does not believe in atheism; furthermore, it only promotes pluralism. There is no doubt that today in modern society there is a big emphasis on human rights and the freedom of the conscience. Secularism can be viewed as good or bad. One thing is certain, and that is that many people fear secularism will take over. Instead of everyone being conservative they will have a secular view. It is much easier for society to understand secularism. Civilization wants to be free and they want the right to have their own beliefs. No one is going to agree with everyone and no one is going to have or follow the same God or beliefs. Unfortunately, religion will be what separates and divides us as individuals and as a nation.   Ã‚  Ã‚  Ã‚  Ã‚  

Thursday, July 18, 2019

Fundamentals of Computer

entExamination Paper: Fundamentals of Computer IIBM Institute of Business Management Semester-I Examination Paper MM. 100 Fundamentals of Computer Section A: Objective Type (20 marks) ********************************************************** Multiple Choices: 1. b. 2 types 2. b. 1 or more input signals to produce output 3. d. Both (a) & (c) 4. b. Non-volatile 5. c. Direct-access storage device 6. c. Multiple object program files of any software 7. a. Are geographically distributed 8. b. Way in which the network’s nodes are linked together 9. a. World wide web 10. . General purpose electronic equipment for homes Fill in the Blanks: 1. Multimedia applications are multimedia presentation, foreign language learning, multimedia Kiosk and †¦multimedia books, e books, digital library, video games, animation films & virtual shops†¦ 2. Computer audio deals with synthesizing, recording and †¦Palying audio†¦Ã¢â‚¬ ¦ with a computer. 3. Collating sequence is ordering o f symbols in an †¦encoding†¦. standard. 4. Binary coded decimal is a †¦6-Bit†¦ Code. 5. The logic gates are interconnected to form gating or logic networks known as †¦combinational†¦.. ogic circuits. 6. †¦CPU†¦. is the brain of a computer system. 7. The term †¦software†¦. refers to a collection of programs. 8. Program errors are known as †¦bugs†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. Documentation†¦. is the process of collecting, organizing storing and maintaining a complete historical record of programs. 10. File organization†¦ deals with physical organization of records of a file for convenience of their storage and retrieval. Section B: Short Questions (20 marks) 1. What is data processing? Data processing is a series of actions on input that converts the input into useful output.In data processing, input is data and output is the useful information. In consists of three sub activities: Capturing input data, manipulating it and pro ducing output information. People, procedure and devices are required to produce the output from the input data. 2. What is a file management system? File management system is a set of programs which help the users to organize, create, delete, update and manipulate their files. Its common features are as described below. a. Transaction file: It stores the input data until the application uses it during next processing cycle. b.Master file: It contains all current data relevant to an application. c. Output file: some applications use multiple programs. One program takes the output of another program as input; hence the former program stores the output as an output file. d. Report file: It is a copy of report, generated by application in computer accessible form. e. Backup file: It is a copy of file crated by user or system to avoid loss of data due to corruption or deletion of original file. 3. What is a computer network? Computer network is a group of computers which are linked to e ach other via internet.The computers on network can communicate with each other and can share information. Four basic service provided by internet to its users are electronic mail, file transfer protocol, telnet and use net news. The common network types are personal area networks (PANs), local area networks (LANs), metropolitan area network (MANs), campus area networks (CANs) and wide area network (WANs). 4. What is a secondary storage? The additional memory needed in all computers to overcome the limitations of primary storage (Limited capacity and Volatile) is called secondary storage. t is nonvolatile and has lower cost per bit stored. It operates generally at slower speed than primary storage. Computer system uses it primarily to store large volume of data on permanent basis. Commonly used storage devices are hard disk, CD ROM, DVD, memory card and Pen drive. Section C: Long Questions (20 marks) 1. Explain the printing mechanism of laser printer. Mechanism of Laser Printers: Tr ansfer of Data The very first step in laser printing is the transfer of data from a computer to the memory of the image processor of a printer. Writing DataNow, once the data is transferred to the printer's memory, it is written to the printer's drum with the help of a laser. The drum will keep rotating and the moment it rotates past the laser, it sweeps off the printer's surface neutralizing some spots to about -100v. These spots are the areas where the toner remains stuck to the drum and further gets transferred to the paper. Inserting the Paper and Pickup Process of the Toner Once the writing process is over, you need to add papers to the printer. Keep the papers into the printer's paper tray.The feed rollers inside the printer pull the paper inside and the registration rollers hold it till its release. As the drum keeps on rotating, the toner settles down in an area which is at a charge of about -100v and remains attached to the drum till the paper comes in. Transfer of the Tone r to the Paper Now, the complete toned image is created on the drum. The moment you apply the paper to the printer, the toner transfer process starts. The transfer corona applies a charge of about +600v to the paper and when the paper passes through the drum, the toner which is at a charge of about -100v gets transferred to the paper.Further, the paper passes through a static charge eliminator that decreases the positive charge in the paper, with the help of its negative charge. Fusing The process of fusion takes place in order to secure the printout by melting the minute plastic fragments present on the toner's surface, so as to fix them to the paper fibers. Laser printers are handy when it comes to fast, bulk and quality printing. But high prices and some health risks such as respiratory disorders due to the release of some harmful sub-micrometer particles are some of the disadvantages associated with laser printing.However, this kind of printer still remains the first choice for most of the organizations when it comes to printing. 2. Explain the importance of system software for a computer system. System Software is a set of programs that manage the resources of a compute system. System Software is a collection of system programs that perform a variety of functions. * File Editing * Resource Accounting * I/O Management * Storage, Memory Management access management. System Software can be broadly classified into three types as: System control programs: It Controls the execution of programs, anage the storage & processing resources of the computer & perform other management & monitoring function. The most important of these programs is the operating system. Other examples are database management systems (DBMS) & communication monitors. System support programs: It provide routine service functions to the other computer programs & computer users: E. g. Utilities, libraries, performance monitors & job accounting. System development programs assists in the creat ion of application programs. E. g. , language translators such as BASIC interpreter & application generators.Application Software: It performs specific tasks for the computer user. Application software is a program which program written for, or, by, a user to perform a particular job. Languages already available for microcomputers include Clout, Q & A and Savvy ret rival. The use of natural language touches on expert systems, computerized collections of the knowledge of many human experts in a given field, and artificial intelligence, independently smart computer systems – two topics that are receiving much attention and development and will continue to do so in the future. 1.Operating System Software Storage Manager Process Manager File – System Manager I/O Control System Communication Manager 2. Standard System Software Language Processor Loaders Software Tools 3. Application Software Sort/Merge Package Payroll/Accounting Package DBMS General-purpose application soft ware such as electronic spreadsheet has a wide variety of applications. Specific – purpose application s/w such as payroll & sales analysis is used for the application for which it is designed. Section D: Applied Theory (40 marks) 1. What is a computer virus? How does a typical virus works?When a computer system suffers from virus infection, how it is cured? Defenition: Computer virus is a small software programs that are designed by human to spread from one computer to another and to interfere with normal computer operations. Work of Typical virus: The A computer virus is most often defined as â€Å"a malicious code of computer programming†. What this means is that a computer virus is just another software, written with not so very noble intentions. A computer virus is designed to install, propagate and cause damage to computer files and data without the knowledge and/or express permission of the user.A computer virus can only survive, attack and propagate in computer memory. Computer memory is usually the RAM (and all different variations of it) and disk storage (hard, floppy and everything in between). Besides this you will not find computer viruses in your monitor, keyboard and certainly not in your own blood stream! The first step in any virus attack is always the invasion. This is when the virus actually enters the computer system from an outside source. Much of the effort in preventing a virus attack lies in understanding what these virus entry points are and how best to monitor and block out any possible intrusion.All viruses enter the computer system through two main entry points: the disk network adapter card is most likely your computer network and/or modem card connected to the local Intranet and/or the Internet. Virus enters through the network card most likely disguised in the form of attachments in e-mails. These attachments are often program files and office documents containing macros. Besides this, certain webpages that we visit on the Internet may also contain harmful programming codes that might transfer virus or virus-like codes into our system.To guard our systems against virus intrusion from these sources, many good anti-virus programs allows users to completely scan all files read form disk drives or downloaded from the Intranet/Internet. How do virus infections occur? The act of infection often begins with a harmless looking action such as opening a file (like a video game or a Word document) that one often gets in e-mail attachments or while accessing any disk in a disk drive. These actions inadvertently activate the virus lurking in these files and disks. The virus then installs itself into the computer’s memory. Computer system suffering from virus infection:After entering the computer memory, a virus often immediately sets out to multiply and spread duplicate copies of itself across the main data storage device (most often the hard disk drive). It does this by copying itself into as many files it can find on the disk drive. Later when users transfers or copies these files to their friends and colleagues, the virus gain entry into ever increasing number of systems. If the virus has found its way to this level of the user’s computer, the user runs a high risk of permanent damage to data and hardware. But such a level of infection only happens to two types of users.The first are those who do not employ any kind of anti-virus measures (or if they do, it obviously isn’t doing a good job). The second are those who do have good anti-virus programs installed and running but did not bother updating their software with the latest virus data files. As a result newer viruses can actually use the anti-virus programs to infect an even greater number of files. So we can see here that having good anti-virus software isn’t enough. One must constantly keep it updated (preferably on a monthly basis). If a virus were to just spread itself, users might not have much to worry about.But the worst is yet to come. Many viruses contain what is called a payload. This is the destructive sequence that is activated on a certain trigger. The trigger may be the arrival of a particular date or an action done by the user. The effect of the payload can be anything as benign as some harmless message appearing on screen to as frightening as the destruction of the disk drive’s boot record – making it completely unusable and in most cases completely irreparable. Indeed it is the later that causes permanent lose of data and hardware and which is responsible for the virus’ notorious reputation.If a virus is capable of unleashing its payload on the user’s system, this indicates a serious breach of security on part of the user. It’s time for the user to learn from the experience and never let computer virus have a second chance. How do I know if my computer has been infected? After you open and run an infected program or attachmen t on your computer, you might not realize that you've introduced a virus until you notice something isn't quite right. Here are a few indicators that your computer  might  be infected: * Your computer runs more slowly than normal * Your computer stops responding or freezes often Your computer crashes and restarts every few minutes * Your computer restarts on its own and then fails to run normally * Applications on your computer don't work correctly * Disks or disk drives are inaccessible * You can't print correctly * You see unusual error messages * You see distorted menus and dialog boxes How to Cure: Remove a virus manually: Sometimes a virus must be removed manually. This can become a technical process that you should only undertake if you have experience with the  Windows  registry and know how to view and delete system and program files in  Windows.First, identify the virus by name by running your antivirus program. If you don't have an antivirus program or if your pr ogram doesn't detect the virus, you might still be able to identify it by looking for clues about how it behaves. Write down the words in any messages it displays or, if you received the virus in email, write down the subject line or name of the file attached to the message. Then search an antivirus vendor's website for references to what you wrote down to try to find the name of the virus and instructions for how to remove it. Recovery and prevention:After the virus is removed, you might need to reinstall some software or restore lost information. Doing regular backups on your files can help you avoid data loss if your computer becomes infected again. If you haven't kept backups in the past, we recommend that you start now. 3. Write short notes on: (a) The OSI model (b) Internetworking tools (c) Distributed computing systems (a) The OSI model The Open System Interconnection, model defines a networking framework to implement protocols in seven layers. This article explains the 7 Lay ers of the OSI Model.The  OSI, or  Open  System  Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. a. Application Layer This layer supports  application  and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data  syntax  are identified.Everything at this layer is application-specific. This layer provides application services for  file transfers,  e-mail, and other  network  software  services. Telnet  and  FTP  are applications that exist entirely in the application level. Tiered application architectures are part of this layer. b. Presentation Layer This layer provides independence from differences in data representation (e. g. ,  encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept.This layer formats and encrypts data to be sent across a  network, providing freedom from compatibility problems. It is sometimes called the syntax layer. c. Session Layer This layer establishes, manages and terminates connections between  applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. d. Transport Layer This layer provides transparent transfer of data between end systems, or  hosts, and is responsible for end-to-end error recovery and  flow control.It ensures complete data transfer. e. Network Layer This layer provides  switching  and  routing  technologies, creating logical paths, known as  virtual circuits, for transmitting data from  node  to node. Routing and forwarding are functions of this layer, as well as  addressing,  internetworking, error handling, congestion  control and packet sequencing. f. Data Link Layer At this layer, data packets are  encoded  and decoded into bits. It furnishes  transmission protocol  knowledge and management and handles errors in the physical layer, flow control and frame synchronization.The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the  Logical Link Control  (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. g. Physical Layer 1 This layer conveys the bit stream – electrical impulse, light or radio signal through the  network  at the electrical and mechanical level. It provides the  hardware  means of sending and rece iving data on a carrier, including defining cables, cards and physical aspects. b) Internetworking tools The art and science of connecting individual  local-area networks (LANs)  to create  wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely complex because it generally involves connecting networks that use different  protocols. Internetworking is accomplished ith  routers,  bridges, and  gateways. Routers: It is a  device  that forwards data  packets  along  networks. A router is connected to at least two networks, commonly two  LANs  or  WANs  or a LAN and its  ISP  network. Routers are located at  gateways, the places where two or more networks connect.Routers use  headers  and forwarding tables to determine the best path for forwarding the packets, and they use  protocols  such as  ICMP  to communicate with each other and configure the best route between any two hosts. Bridges : It is a  device  that connects two  local-area networks (LANs), or two segments of the same LAN that use the same  protocol, such as  Ethernet  or  Token-Ring. Gateways: It is a  node  on a  network  that serves as an entrance to another network. In enterprises, the gateway is the computer that  routes  the traffic from a workstation  to the outside network that is serving the Web pages.In homes, the gateway is the  ISP  that connects the user to the internet. In enterprises, the gateway node often acts as a  proxy server  and a  firewall. The gateway is also associated with both a  router, which use  headers  and forwarding tables to determine where  packets  are sent, and a  switch, which provides the actual path for the packet in and out of the gateway. A computer system located on earth that switches data signals and voice signals between satellites and  terrestrial  networks. An earlier term for  router, though now obsol ete in this sense as  router  is commonly used. c) Distributed computing systems A distributed computer system consists of multiple software components that are on multiple computers, but run as a single system. The computers that are in a distributed system can be physically close together and connected by a local network, or they can be geographically distant and connected by a wide area network. A distributed system can consist of any number of possible configurations, such as mainframes, personal computers, workstations, minicomputers, and so on. The goal of distributed computing is to make such a network work as a single computer.Distributed systems offer many benefits over centralized systems, including the following: Scalability The system can easily be expanded by adding more machines as needed. Redundancy Several machines can provide the same services, so if one is unavailable, work does not stop. Additionally, because many smaller machines can be used, this redundancy does not need to be prohibitively expensive. Distributed computing systems can run on hardware that is provided by many vendors, and can use a variety of standards-based software components. Such systems are independent of the underlying software.They can run on various operating systems, and can use various communications protocols. Some hardware might use UNIX(R)  as the operating system, while other hardware might use Windows operating systems. For inter machine communications, this hardware can use SNA or TCP/IP on Ethernet or Token Ring. This system contains two local area networks (LANs) that are connected to each other. One LAN consists of UNIX workstations from several different manufacturers; the other LAN consists primarily of PCs that are running several different PC operating systems.One of the LANs is also connected to a mainframe by way of an SNA connection. The client/server model A common way of organizing software to run on distributed systems is to separate funct ions into two parts: clients and servers. A  client  is a program that uses services that other programs provide. The programs that provide the services are called  servers. The client makes a request for a service, and a server performs that service. Server functions often require some resource management, in which a server synchronizes and manages access to the resource, and responds to client requests with either data or status information.Client programs typically handle user interactions and often request data or initiate some data modification on behalf of a user. For example, a client can provide a form onto which a user (a person working at a data entry terminal, for example) can enter orders for a product. The client sends this order information to the server, which checks the product database and performs tasks that are needed for billing and shipping. Typically, multiple clients use a single server. For example, dozens or hundreds of clients can interact with a few servers that control database access.The client is isolated from the need to know anything about the actual resource manager. If you change the database that you are using, the server possibly needs to be modified, but the client does not need to be modified. Because usually fewer copies exist of the server than of the client, and because the servers are often in locations that are easier to update (for example, on central machines instead of on PCs that are running on users' desks), the update procedure is also simplified. Also, this approach provides additional security. Only the servers, not the clients, need access to the data that the resource manager controls.Clients can also access several different servers, and the servers themselves can act as clients to other servers. Exactly how the functions are distributed across servers is an application design decision. For example, a single server could provide all the services that a client needs, or the client could access multiple servers to perform different requests. The application designer must consider items such as scalability, location, and security. For example, are the clients and servers local or is the application distributed over a wide geographic area? Do the servers need to be on machines that are physically secure?Such design decisions are outside the scope of this introduction. Some servers are part of an application and are referred to as  application servers. Other servers are not part of a specific application. Instead, any application can use them. For example, the CICS Structured File Server (SFS) provides record-oriented file access for applications. Three-tiered client/server architecture A common design of client/server systems uses three tiers: 1. A client that interacts with the user 2. An application server that contains the business logic of the application 3. A resource manager that stores data.

Qualitative vs. Quantitative Methods

Discuss the main differences mingled with soft and three-figure burn upes to info accrual and summary in centering query. Your f atomic number 18 should subscribe to reference to the philosophic assumptions which defend these method acting actingological go upes. Introduction Whenever a conclusion is do to undertake a charm of query a method for conducting the theme is required. In scientific investigate the proficiencys typically utilise for data accrual and synopsis be those which allow the paygrade of data to render a pre run intod possibility (Zikmund, 2000).An exercising of this is a laboratory- ground experiment where the detective ordure be in estimable control of all the variables come tod and sack in that locationfore be sure that whatever change in the phenomena under probe is a direct result of an set and controlled stimulus. In trade question until now, which is ordinarily reliant on some opinion of human model, it has been prop osed that such(prenominal) a uniform, rigid court is not appropriate in that respect is never a single, perfect explore design that is the best for all selling inquiry projects, or even a peculiar(prenominal) type of merchandising interrogation occupation. (Malhotra and Birks, 2000 p. 70) The aim of this assignment is to critically measure out the quantifiable and soft approaches to explore, busy(prenominal)ally way on the trade sentiment. To do this, precondition is depressionly inclined to the basic differences surrounded by the soft and valued approaches, pick outing the awaitingly oppose theoretical personas from which they accept originated. Subsequently the festering of the market discipline is examined with a specific snap on how and why assorted look for methods nurse been employed in the sketch. Attention is knave 1 of 1 iven to the need for market to address both(prenominal) the issue of verifying exist hypotheses, and the essent ial to conk out brisk possibleness. As at that family searchs to be no intellectionl look into method for use in trade it would seem that what is important is universe critically aware of the strengths and weaknesses of the approaches available. Finally, then, the notion of pluralism, or methodological triangulation, is explored as such an approach is a great deal used to exploit the strengths and minimise weaknesses in look for design by dint of the combine of dickens or more search methods, often from opposing theoretical images. radical differences surrounded by decimal and soft seek qualitative search trick be defined as the collection, analysis and recital of data that clearnot be sumfully quantified, that is, summarised in the form of numbers. (Parasuraman et al, 2004 p. 195) Whereas numerical research go off be defined as the collection of data that involves larger, more re incloseative respondent samples and the numerical calculation of result s. (Parasuraman et al, 2004 p. 195)Historically it has been trusted that lore found disciplines such as mathematics and physics are especially suit to quantitative research methods. Such methods are considered to be objective and lead to numerical, living outcomes, which can be verified with repetition and foster foot raceing (Zikmund, 2000) in impudent(prenominal) words the fellowship is foreign to the knower (Milliken, 2001), and thitherfore is available be found by whoever conducts the needed research (Cunningham, 1999).This view of natural skill can be considered to fill inwardly the incontr all everyplacetible paradigm, where a paradigm can be thought of as theoretical poser for looking at a positioning and a primer upon which phenomena can be analysed and interpreted varlet 2 of 2 (Gill and Johnson, 2002). Kuhn (1970) supports the need for paradigms on the basis that they bewilder disciplines together, and without them there would be no well-grounded po sition from which to undertake research. Deshpande (1983) suggests that the acceptance of a special(prenominal) theoretical aradigm is typically followed by a choice of a specific set of research methods that appear to fit within it. This is perhaps exemplified by the material use of laboratory experiments in double-dyed(a) scientific disciplines. Within the amicable intelligences still there has been a long-standing debate surround which philosophical standpoint, or paradigm, it is appropriate for research methods to be take ind from (Milliken, 2001). Cohen et al (2000) consider there to be two major, apparently contradictory, views relating to how research should be conducted within social science.The first aligns social science with natural science and therefore implies that research in the athletic topic of view should be directed towards the search for frequent laws which regulate idiosyncratic social behaviour. The plump for wayes on the human element of social science research, with comprehension of the notion that pot are not inanimate objects and therefore cannot be treated as such. reorient social science with natural science arguably implies that data collection and analysis is best performed from a convinced(p)ic standpoint.As research methods favoured by positivists tend towards those reliant on quantification (Gill and Johnson, 2002), it would follow that in forethought research the focus should be on quantitative research methods. seek conducted from the positivist viewpoint is usually considered to be reductionist in nature, and is often termed hypothetico-deductive, as it aims to derive a result in analogy to a predefined hypothesis (Zikmund, 2000).Conversely, an approach to research which embraces human individuality and places emphasis on how people perceive and give meaning to their own foliate 3 of 3 socially created world, can be considered constructivist (Hunt, 1994), and phenomenological (Gill and Johnson, 2002). The focus from this standpoint is therefore on understanding, interpret and building sy al-Qaida preferably than objectively assaying, deducing and verifying an existing hypothesis. Such an approach can be considered inducive in nature and therefore favours the adoption of qualitative research methods. ollows the nigh telling and primordial distinction between the paradigms is on the symmetry of hitch versus discoveryquantitative methods wipe out been give awayed most directly for the task of verifying or confirming theories andqualitative methods were purposely developed for the task of discovering or generating theories. (Reichardt and Cook, 1979 cited in Deshpande, 1983 p. 105) This can be explained further as At the extreme of the inductive spectrum lies the concept of grounded possibleness developed by Glaser and Strauss (1967).Here the researcher builds theory found entirely on the data obtained in a particular canvass without the influence of predetermined know ledge or conceive hypotheses. fetching deduction to the extreme hypotheses can only ever be tested, airlift the question of how it is possible to obtain a hypothesis in the first place. This presents a number of dilemmas with regard to research in the field of steering, including whether it is more appropriate to test existing hypotheses or to develop revolutionary theory.The theory-testing versus theory- times debate is particularly momentous in the field of merchandising as, payable to the congeneric youth of the discipline, marketers are faced with the dispute of both obtaining and maintaining respect and credibility for the drop dead that has been beare so far (Bartels, 1983) and proceed to generate theory needed to develop a coherent, holistic body of knowledge which will clear up sellings existing theory visual modality (Gummesson, 2002 p. 349). Page 4 of 4 evolution of research in the field of market The discipline of merchandising, which came some as a depa rture from economics not long after 1900, originally had no personal identity of its own. at that place was no predetermined simulation for its ontogeny, nor any genuinely expectation of what it should, or could, come (Bartels, 1983). The way the discipline started to develop however led to a touch that it had meritorious scientific character (Bartels, 1983 p. 34), which later influenced ideas nearly the way in which plausible research in the field should be conducted.Consequently approaches to research in selling have historically been dominated by deductive processes (Hyde, 2000). Milliken (2001) supports this with the observation that within the merchandising literature there has been little trouble paying(a) to qualitative research. If market was universally authentic to be akin to a pure science then this whitethorn be an acceptable particular. It has been suggested however that, rather than being a science, market is very an art which belongs both to the worl d of commercial enterprise and the school of humanities ( entrance halliday, 1999).It was agate lined by Deshpande (1983) that in the early 1980s there were only four major textbooks relations with the metatheoretical issues in merchandise, and it can therefore be understood that self conscious reproach on theory construction in marketing is of fairly modern origin. (p. 104). ray (1982), supported by Deshpande (1983), considers that the dominant philosophical approach applied in marketing is that of logical empiricism. Such a positivist approach forces a search for causation and the assumption of determinism (Hunt, 1994 p. 7), which directs those conducting marketing research towards hypotheticodeductive methods for the verification of existing theories rather than development of mod ones. Page 5 of 5 Goulding (1999) suggests that the popularity of the positivist paradigm may be run through to the more transparent rules which it projects with regard to the basis of hyp otheses and their testing, resulting in a clearer picture of what is veritable to be known and what remains extraterrestrial or untested.As marketing is a relatively young discipline, quantitative methods have therefore been regularly favoured over qualitative methods in an attempt to establish credibility and respectability (Bartels, 1983). Bass (1993) unreservedly supports quantitative research and the scientific view of marketing, on the basis of the need to make customary laws and principles which can be widely applied. To accent his position further Bass (1993) repeatedly refers to the discipline as not as marketing but as marketing science.Despite this apparent discrimination of qualitative research, for establishing integrity and credence, it has been suggested that marketing as a discipline has failed to develop a coherent theoretical foundation due to the contradictory selection and use of methods within the framework of logical empiricism (Leone and Schultz, 1980). criticises how qualitative research is implemented. Gummesson (2001) in addition He questions whether or not it is ppropriate to make a lift from a renderive answer addicted by a person, perhaps in the form of a questionnaire response, to hard occurrences about the population being studied, and furthermore if a model being selected for use in marketing research can be an appropriate proxy for the particular blank space being studied. Gummesson (2001) instead advocates an interactive approach to research in marketing establish on a humanistic, hermeneutic and phenomenological paradigm. (p. 40). Deshpande (1983) is in agreement with this and proposes that, rather that the incorrectly utilise quantitative research methods, the shortfall in theory development in the field may lie in the inappropriate adoption of a quantitative paradigm where a qualitative one would be more appropriate If we ignore the qualitative paradigm, we also by definition obviate the principal systematic m eans of theory generation. (Deshpande, 1983 p. 106) Page 6 of 6The sureness of logical empiricism in marketing has therefore been seen as potentially hurtful to the discipline, because the successful development of an appropriate holistic and sound body of theory is necessary for the credibility of the field in both management and academe (Bartels, 1983). Hunt (1994) however observes that scholars in the field of marketing, particularly those reviewing paper for publication in academic journals, may themselves be responsible for the wishing of theory generation by being over critical when reviewing the work of those who attempt to make an original contribution.According to Gummesson (2001) this behaviour reinforces the imprint that to build a publications record, and a unspoilt reputation, marketers are being encouraged to test existing theory using quantitative methods rather than generate theory through qualitative investigation. This, it has been suggested, has resulted in there being no development in familiar management marketing theory over recent decades, leaving marketing as an array of disjointed theories and ideas founded on arguably obsolete principles Gummesson (2001).The lack of credibility given to qualitative research techniques in marketing from the academic perspective does however appear somewhat ironic given that such methods are widely adopted in marketing research in diligence (Deshpande, 1983). Although it may appear that qualitative marketing research is a relatively recent revelation, Deshpande (1983) argues that this is not the lesson. He observes that there was portentous interest in the topic in the 1950s and 1960s.In the early 1980s, Fern (1982) suggested that the motive one specific qualitative technique, focus groups, had failed to gain prominence was a lack of empirical testing, which would allow the theory development necessary to acquire credibility. In other words a qualitative technique struggled to generate reco gnition because it could not replete the positivistic evaluation criteria needed to do so. This is perhaps indicative of the historical agency of positivism in marketing academia in determining what can be accepted as credible Page 7 of 7 nd what cannot, unheeding of whether or not techniques are accepted in the commercial environment. Malhotra and Peterson (2001) suggest that for marketing to move forward in the twenty-first century it is necessary to bridge the paste between the academic and commercial positions. on that point is evidence of increasing acceptance of qualitative methods in marketing research, especially in managing research as the marketplace evolves. For example Kozinetz (2002) developed netnography as a technique for gaining insight into online communities based on a combining of the principles of ethnography and focus groups. quantifiable techniques it would appear still have their place in marketing research too, disrespect the reprovals levelled at the m. The SERVQUAL questionnaire for example, originally developed by Parasuraman et al (1988), relies on the collection of data which can be statistically manipulated to determine levels of service timber. Notwithstanding the substantial criticism it has received (see Buttle, 1996), it is still being used in marketing research at once (see e. g. DeMoranville and Bienstock, 2003).What it would consequently appear important to credit is that both quantitative and qualitative methods have their place in marketing research neither is sufficient on its own, and there is potentially for significant advances to be made if marketing researchers acknowledge this (Deshpande, 1983). Triangulation and methodological pluralism There is a place in marketing research for both qualitative and quantitative research. There is also a significant risk that overly staunch advocates of a single paradigm will fall by the wayside the woodland of their research by valuing the methodological choice above t he aim of the particularPage 8 of 8 claim (Bartels, 1983). From a marketing research perspective the importance therefore lies in recognition of the relative advantages and disadvantages of both the qualitative and quantitative research and the understanding of the strengths and weakness of particular methods. Cahill (1996) supports this with the recognition that qualitative and quantitative techniques can be complementary, and Milliken (2001) suggests that the reality of a real research situation demands compromise between the seemingly opposed philosophical standpoints on which the methods are based.Combining qualitative and quantitative methods presents the researcher with an opportunity to compensate for the weakness in each approach. (Deshpande, 1983), and within the field of marketing there appears to be a significant move towards combining qualitative and quantitative research methods (Milliken, 2001). Perry (1998) emphasises the benefit of brass study methodological analys is in marketing and suggests that there is no need to consider induction and deduction to be in re gaming exclusive when selecting a research method.He emphasises that realism is the most appropriate paradigm from which to undertake marketing research as it allows the building of impudently theory whilst incorporating existing knowledge. Strength in method combination does not necessarily have to embarrass qualitative and quantitative approaches. Hall and Rist (1999) present a marketing study based on the triangulation of purely qualitative research methods including focus groups, observation and document examination.They argue that doing this eliminates the risks of relying on a single method and therefore enhances research quality and strengthens the credibility of qualitative techniques. Page 9 of 9 Methodological pluralism, whilst appearing to offer expiation between opposing theoretical paradigms in relation to research method choice, does itself asseverate debate and crit icism. Gill and Johnson (2002) for example note that embracing realism can be seen as accepting positivism at the cost of phenomenology as it may involve the operationalization and measurement of social reality (stimuli) and bodily process (response) (p. 170). Consequently, combining research methods can itself become part of the argument rather than a solution. Conclusion The decision of whether to adopt qualitative or quantitative methods in management research historically appears to be based on the philosophical assumptions upheld by the individual researcher or the discipline in which he or she is working.A paradigmatic dichotomy between positivism and phenomenology (or constructivism) would seem to have resulted in a situation where, in some instances, the research methodology choice is deemed more significant than the subject of the particular study. marketing is a relatively young discipline within the field of management and, as such, is faced with the gainsay of obtaini ng and maintaining credibility.To do this it has been proposed that it needs to both test existing theory and generate new theory, however the processes required to achieve these two goals can be seem to stem from diametrically opposed paradigms theory-testing being achievable through deductive methods and theory generation relying on an inductive approach. This incommensurability has however been challenged with the financial statement that what is important is selecting an appropriate methodology for a particular study, rather than fitting aPage 10 of 10 study to a method. Methodological triangulation has been suggested as a means of achieving this, with a move towards a paradigm of realism where the relative advantages and disadvantages of a number of research methods can be embraced. Whilst at face value this approach may appear to offer a compromise offering the best applicative solution to the methodological choice dispute, it also introduces criticism of its own which, in turn fuels the debate further.The general aim of this discussion, to consider the differences between qualitative and quantitative research methods, has itself been conducted from an ostensibly positivistic standpoint. In fact any discussion, comparison or sagacity of research methods is arguably starting from a predetermined premise that an objective evaluation is being undertaken (Gill and Johnson, 2002), and can therefore be seen to be embracing positivist ideals.Taking into account the amount of attention that has been paid to philosophical approaches to management research the ambiguities that are apparent the ongoing search for the most suitable and appropriate means for conducting studies and the want to establish and maintain credibility, it would seem unconvincing that end to the debate regarding research methods in management is in sight same(p) the earth being round, thus abstracted a natural end, the journey in Methodologyland has no end. You search over again and a gain and again, just as the term says re-search, re-search, re-search. (Gummesson, 2001 p. 29) Page 11 of 11 References Bartels, R. (1983), Is marketing defaulting its responsibilities? , daybook of marketing, 47(4), pp. 32-35 Bass, F. M. (1993), The future of research in marketing grocery storeing knowledge, journal of marketing Research, 30(1), pp. 1-6 Buttle, F. (1996), SERVQUAL review, critique, research agenda, European journal of Marketing, 30(1), pp. 8-32 Cahill, D. J. (1996), When to use qualitative methods a new approach, Marketing science & Planning, 14(6), pp. 16-20 Cohen, L. , Manion, L. and Morr, K. 2000), Research Methods in Education, 5th Edition, Routledge capital of the United Kingdom Cunningham, A. C. (1999), description confessions of a reflective practitioner conflux the challenges of marketings destruction, European journal of Marketing, 33(7/8), pp. 685-697 DeMoranville, C. W. and Bienstock, C. C. (2003), Question order effect in measuring service qual ity, International diary of research in Marketing, 20(3), pp. 217-231 Deshpande, R. (1983), Paradigms Lost On theory and method in research in marketing, Journal of Marketing, 47(4), pp. 101-110 Fern, E. F. 1982), The use of focus groups for idea generation the effects of group size, acquaintanceship, and moderator on response quantity and quality, Journal of Marketing Research, 19(1), pp. 1-13 Gill, J. and Johnson, P. (2002), Research Methods For Mangers, 3rd Edition, London SAGE Publications Ltd Glaser, B. G. and Strauss, A. L. (1967), The Discovery of Grounded Theory Strategies for Qualitative Research, Aldine Publishing Company Chicago Goulding, C. (1999), Consumer research, interpretive paradigms and methodological ambiguities, European Journal of Marketing, 33(9/10), pp. 59-873 Gummesson, E. (2001), atomic number 18 current research approaches in marketing leading us astray? , Marketing Theory, 1(1), pp. 27-48 Gummesson, E. (2002), Practical value of adequate marketing manag ement theory, European Journal of Marketing, 36(3), pp. 325-349 Hall, A. L. and Rist, R. C. (1999), Integrating multiple qualitative research methods (or avoiding the precariousness of a one-legged stool), Psychology & Marketing, 16(4), pp. 291304 Page 12 of 12 Halliday, S. 1999), I dont know much about art, but I know what I like resonance, relevance and illumination as assessment criteria for marketing research and learning, Marketing Intelligence & Planning, 17(7), pp. 345-362 Hunt, S. D. (1994), On rethinking marketing Our discipline, our practice, our methods, European Journal of Marketing, 28(3), pp. 13-25 Hyde, K. F. (2000), Recognising deductive processes in qualitative research, Qualitative Market Research, 3(2), pp. 82-90 Kozinets, R. V. (2002), The field behind the screen utilise Netnography for marketing research in online communities, Journal of Marketing Research, 39(1), pp. 1-72 Kuhn, T. S. (1970), The Structure of Scientific Revolutions, second Edition, Chicago Univ ersity of Chicago Press Leone, R. P. and Schultz, R. L. (1980), A study of marketing generalizations, Journal of Marketing, 44(1), pp. 10-18 Malhotra, N. K. and Birks, D. F. (2000), Marketing Research An Applied Approach, 3rd European Edition, Harlow, England Financial Times Prentice Hall Malhotra, N. K. and Peterson, M. (2001), Marketing research in the new millennium emerging issues and trends, Marketing Intelligence & Planning, 19(4), pp. 16-235 Milliken, J. (2001), Qualitative research and marketing management, Management Decision, 39(1), pp. 71-77 Parasuraman, A. , Grewal, D. and Krishnan, R. (2004), Maketing Research, Boston, ground forces Houghton Mifflin Company Parasuraman, A. , Zeithaml, V. A. and Berry, L. L. (1988), SERVQUAL A multiple-item scale for measuring consumers perceptions of service quality, Journal of Retailing, 64(1), pp. 12-40 Perry, C. (1998), Process of a case study methodology for postgraduate research in marketing, 32(9/10), pp. 785-802 Peter, J. P. 198 2), Current issues in the philosophy of science Implications for marketing theory a panel discussion, in Marketing Theory Philosophy of Science Perspectives, Bush, R. F. and Hunt, S. D. (eds. ), Chicago, American Marketing, pp. 11-16 Reichardt, C. S. and Cook, T. D. (1979), Beyond qualitative versus quantitative methods, in Qualitative and Quantitative Methods in Evaluation Research, Cook, T. D and Reichardt, (eds. ) Beverley Hills, CA quick of scent Zikmund, W. G. (2000), Business Research Methods, 6th Edition, Orlando, USA The Dryden Press, Harcourt College Publishers Page 13 of 13