Monday, September 30, 2019

English Language and British English Essay

Language is a social-cultural-geographical phenomenon. There is a deep relationship between language, culture and society. When we study a language, we have to study its dialects, register, slang, taboo, idiolects, etc. We can find the role of language and culture in The Parent Trap movie. The movie tells us about the differences culture of 2 girls who live in London and California. They were separated when they are baby. It was because their parents divorce. One of the differences is on the way they speak and pronounce the words. There are some different vocabularies of American English and British English, but actually they have the same meaning. That’s way, if we learn a language, we have to learn the culture too, in order we can understand the meaning of certain expression or what they mean. There are some different expressions of American English and British English I found in The Parent Trap movie. It is based on word variation ( pronunciation, grammar, accent, spelling, and lexis and idioms ). They are some different expressions which i found in the movie. Split up – divorce, mum – mother, dad – father, totally – completely, I gave you a fright – you scared me, doin – doing, talking- talkin, daughter (ˈdÉ”Ë tÉ™(r) in British English and ˈdÉ”Ë tÉ™r in American English), you gave me a fright – you scared me, oh my god ( /É ¡Ã‰â€˜d/ in American English and /É ¡Ã‰â€™d/ in British english ). CHAPTER II DISCUSSION The Parent Trap is a 1998 movie. It was directed and co-written by Nancy Meyers, and produced and co-written by Charles Shyer. It stars Dennis Quaid and Natasha Richardson as a couple who divorce soon after marrying, and Lindsay Lohan in a dual role as their twin daughters. This movie is very interesting, because there are some events that make us want to know more about the movie. First thing that we can learn from the movie is the differences between American English and British English. There are some differences in English. 1. British English and American English have  different pronunciation of some words. The difference lies either in using different vowel sounds or by stressing the word in a different place. 2. Word choice is also one different aspect between British English and American English. 3. Spelling in British English and American English also different. There are a number of differences between British and American spelling. There are several areas in which British and American spelling are different. Words ending in –re ( centre-center ), words ending in –our ( colour-color ), and words ending in –ize or –ise ( recognize-recognise ), etc. 4. Lexis and idioms. American and British also have different expressions or sentences to mean the same thing. There are the analysis of The Parent Trap movie 1. Divorce vs Split up The first different expression that I found is divorce. Annie prefer said divorce to mean when a marriage is ended by an official or legal process. It means British English uses divorce to means that. But American English  prefer uses split up to divorce. You can see in the movie. Annie said ‘ †¦. but my parents divorced years ago’. And Hallie said ‘ †¦. she and my Dad split up when I was baby ‘. Those different expressions have the same meaning. They mean their parents were separated a years ago. 2. Mum vs Mom The second analysis is the different word they use as mom and mum. a mummy. a mum is related to mummy. A mom is related to mother. mom is a famous word but in America they call their mother â€Å"mom†. The O and U are what’s causing all this mess. So, the spelling is different. But the meaning is the same. You can see in the movie. Annie as using British English often say mum rather than mom as in her expression ‘ You’ve never seen your Mum’. But Hallie says Mom to mean a female parent as in her expression ‘ This. It’s a picture of my mom’. 3. Father vs Dad The word ‘father’ in British English means male parent. Actually, it is the same with the word ‘dad’ in America. They have the same purpose but in different word. There are the expressions that show this different word, but actually they have the same meaning. ‘That’s my Dad’ is Hallie’s expression. It shows that American English use the word ‘Dad’ to mean a male parent in their daily life. And I don’t have a father, actually ‘ is Annie’s expression. It shows that British English use the word ‘ Father ’ to mean a male parent in their daily life 4. Realise vs realize Verbs in British English that can be spelled with either † -ize † or â€Å"-ise† at the end are always spelled with -ize in American English. UK English uses an –s where American English often substitutes a -z. As in the Movie Annie said realise with –ise because of British English. Actually, they are true. The meaning is perceive (an idea or situation) mentally. 5. Recognise vs recognize It is also occured in the words recognise vs recognize. The meaning is the  same to show approval or appreciation of. But the problem is in the spelling in –ise and -ize. As I told you before. For the word recognise, it is used in British English. Because American English often uses a -z. 6. Talkin vs talking Actually talkin and talking are the same. The difference is in the spelling. British English prefer uses talking to talkin. The meaning is the same to articulate (words). This word is include register too. Register is a variety of language defined according to its use in a social situation. Talkin include formal technical. 7. Doin vs doing It also happens in the word doin and doing. The problem is the same. The difference in the spelling. The meaning is still same to perform or execute. American say that because of the habbit. They say doin very much without thinking. Doing is likely more formal than doing. 8. Daughter The difference of daughter in American English and British English is in pronunciation. The pronunciation of daughter in American English is {ˈdÉ”Ë tÉ™r}. But in British English is {ˈdÉ”Ë tÉ™(r)} . Actually the meaning is the same as one’s female child. 9. Oh, my god The definition of god is A being conceived as the perfect, omnipotent, omniscient originator and ruler of the universe, the principal object of faith and worship in monotheistic religions. The same thing happens in the expressions ‘oh, my god’. American english prefer say god with {/É ¡Ã‰â€˜d/ } to mean that. But British english says {/É ¡Ã‰â€™d/} rather than {/É ¡Ã‰â€˜d/}. Now, you can choose whether you like to say god {/É ¡Ã‰â€˜d/ } or god {/É ¡Ã‰â€™d/}. You can suit it with your environment. If your environment uses American English very  much, you can use god {/É ¡Ã‰â€˜d/ }. 10. You gave me a fright vs you scared me ‘You gave me a fright’ is the expression that mean someone become frightened. But this expression only used by British English. American English has different expression to mean someone become frightened. American English often uses ‘ You scared me ‘. This event shows that British English is not only different in pronounciation and spelling from American English, but also idioms is the other difference. Those British English and American English are right. The problem is only on the way they show the expressions in a sentence. 11. Lovely girl For British English the expression of ‘ lovely girl ‘ means a kind girl we know. She almost like a sister because her kind. This expressions is to show that we are happy having a good friend. Actually it is strange to American people to say ‘ lovely girl ‘. But Britain often say ‘ lovely girl’. 12. Completely vs totally The next expressions is completely vs totally. Completely is used in British English. the meaning is to a complete degree or to the full or entire extent. Totally is used in American English. the meaning is to a complete degree or to the full or entire extent. CHAPTER III CONCLUSION The conclusion is it doesn’t matter to use those different expressions as long as suitable with your environment. Actually, the meaning of those expressions are the same.

Sunday, September 29, 2019

HUnting laws

*Hunting Laws and Regulations* I've never really paid attention to who makes the laws for hunting to be honest I've only just followed thern The Colorado Parks and Wildlife Commission Is a citizen board, chosen by the Governor, which sets regulations and policies for Colorado's state parks and wildlife programs The Colorado Parks and Wildlife Is who enforces the laws that the commission makes, there job s to protect, preserve, enhance, and anage wildlife for the use of the people of this state.There are several types of hunting allowed In Colorado such as Archery, Rifles, Muzzle loading, shot gun. And lust about every type of mammal can be hunted In regulauon elk, mule deer, black bear, mcvuntaln lion, antelope, bighorn ; Desert Bighorn, moose, mountain goat and whitetail deer, bobcat, fox, coyote, and badger. There Is also birds such as Partridge, dove, grouse, quall, chucker, turkey, duck, geese, ptarmigan, snipe, and many other irds dont feel Ilke naming.GRANGER LAWS at  https:/ /donemyessay.com/ch-16-apush/I understand why some people are against hunting, I And some people only see the stereotype a think It's just a bunch ot banjo strlnglng rednecks going Rambo on Bambi's mom. But there are several laws and regulations keeping all hunting sate and even necessary to keep species size under control. have hunted all my lite. and lwe learned most ot my lite lessons sitting on the cold ground with a 30. 6 in my hands waiting tor an elk to pass by.So hunting is a part ot me. my family doesnt hunt to just kill an animal, every piece of meat we eat is either a cow from our pasture or elk we killed during hunting season. That is the meat we eat all year, so even though I know why we hunt and why it's not bad understand why some people think it might be barbaric. I'm also not saying that some people don't disrespect the right to hunt and kill anything they see, Just like ant-hunters think.

Saturday, September 28, 2019

“a Study of Bpo Industry with Reference to Employee Essay

The industry is very diverse, with several sub-segments, each displaying its own unique characteristics. The BPO players need to be excellent in every facet of operations as the market is highly competitive at every level and re-defining itself every day. It is basically a people-centric industry. The scenario however, is not as rosy as it looks, for this sector with enormous potential. Like any other industry during its growth phase, this industry is also going through its share of turbulence. There was the issue about people quitting the BPO jobs and the question arrived in my mind were: â€Å"Why do BPO executives job-hop so frequently? Is it just because of money or are there other reasons? and created an interest in my mind to find out the answers not only for the above questions but also for finding out the retention strategies that can be adopted by BPO’s. For the purpose of this project, the research work is limited to only 10 BPO’s in Mumbai and their 200 employees. It was very difficult to study the industry as a whole as the size of the industry is very large and it is very difficult to extract information about the attrition rates and reasons for he same and also the strategies adapted by different companies to retain its staff in limited time period given for completion of the project.

Friday, September 27, 2019

Proliferation Research Paper Example | Topics and Well Written Essays - 1000 words

Proliferation - Research Paper Example In the year 1993, the inspectors from IAEA were denied access to the North Korean sites. Specifically they were denied access to two sites, (Mozley 101). In the same year North Korea withdrew from NPT and made it harder for the IAEA to conduct its affairs, (Cronin 57). In 1994, the United States of America had bilateral negotiations with North Korea and agreed of a framework. This framework demanded that North Korea freezes its plutonium for ten years. It was also to allow IAEA inspector into its sites, (Smith 20). This was to confirm that it is as willing to freeze the plutonium. It turned out that both countries were never satisfied with the agreed framework, (Khan 133). The agreed framework collapsed later when the president of United States, George Bush, ascended to power in the year 2001. North Korea announced in the year 2009 that it had come up with nuclear weapons. It is estimated that North Korea posses a small cache of elementary and basic nuclear weapons. North Korea has a substantive arsenal of nuclear weapons, (Mozley 101). North korea has been part of NPT up to 2003. North korea withdrew from the treaty after blaming the united states for what it called betrayal, (Cronin 57). The treaty had a major assignment. It was also meant to normalize the relationship between North Korea and other countries. Eventually, this would help North Korea to have got some energy assistance from other countries. In the year 2006, the month of October, the government of North Korea, announced that it had conducted its first nuclear test, (Khan 133). The Japanese seismological authorities together with the United States geological survey confirmed there was an earthquake of a 4.3 magnitude. This tended to be consistent with claims that the nation of North Korea made, (Chinoy 90). In April, the year 2009, there were reports to the effect that North Korea had become a fully fledged nuclear power state, (Mozley 101). This opinion was shared by Mohamed Elbaradei, the gener al director of the IAEA. In the following month of May, 2009, North Korea did conduct another nuclear test, (Khan 133). This time around an earthquake of 4.7 magnitudes was detected. On may 25 2009, a test of nuclear weapon was conducted by North Korea. This time it was a second test. The location of the test was not revealed. This second test involved a nuclear weapon whose magnitude was the same as that of the atomic bombs dropped in Japan during the Second World War. North Korea did not stop at that. It went ahead to test two short-range missiles. This was reported by the South Korean news network, (Chinoy 90). In July 2011, a key person in Pakistan’s nuclear weapons program Abdul Khan, made allegations to the effect that north Korea had fully gained access to the Pakistan’ nuclear technology. This was in the late 1990s. This happened through bribing top Pakistan’s officials. However, the allegations were denied by Pakistan’s authorities, (Smith 20). M r. Khan said that he had assisted in transferring three million US dollars to senior military officers in Pakistan, (Chinoy 90). In the year 2012, a report by the United Nations council showed that between May 2011 and 2012 there was no violations reported with regard to the sanctions imposed to North Korea, (Cronin 57). This concerned with the dual technology involved in making ballistic missiles and nuclear weapons. Sanctions have had some success in stopping North Korea from

Thursday, September 26, 2019

Marine ecosystems Florida Keys Assignment Example | Topics and Well Written Essays - 500 words

Marine ecosystems Florida Keys - Assignment Example The environment specialist gave an insight on the importance of the environment as a habitat for other animals and for human health. The insight acted as guidance to how we treated the environment at the place for the next three weeks. The park had two laboratories. One dealt with research on marine plants while the other dealt with research on marine animals. In the plant laboratory, I learnt how to operate the modern microscopes. The lab technicians were very helpful in helping us identify the adaptation characteristics of the plants. I was able to see some of the biology facts that I had learnt theoretically. The technicians introduce us to marine crop improvement which was done through numerous tests. At that particular time, the technicians were doing research on improving the green algae plant. Their major aim was to reduce its growth period and increase its adaptation in being a habitat for certain small sea animals (Florida Keys National Marine Sanctuary retrieved from http://www.q2lschool.org/ecosystem/popeco/ecoscenario/drytort/index.html). I worked as an assistant lab technician which led me discovering the adaptation of the algae plant. The animal laboratory was very busy and with many technicians. They had many sea animal specimens which we dissected so as to understand their body features. We dissected different types of fish, and we were able to identify and compare various organs. To test on our understanding capabilities, we were given simple test to dissect crabs and remove certain organs. We were required to describe the adaptability of different features such as how the feet were adapted to movement in water. The project about the crab also required us to identify the different kinds of foods that crab feed on. From my research, I learnt that crabs are omnivorous and they feed on algae and small seas animals such as molluscs and worms. In the laboratory, what amazed me most was the diverse features of

Leadership is simply about 'getting the job done'. Discuss in relation Essay

Leadership is simply about 'getting the job done'. Discuss in relation to concepts and conflicts - Essay Example On average, a manager’s job would be to administer things as per the managerial continuity and integrity. This paper will examine the existing theoretical concepts in relation to leadership. Also, conflicts might arise in the case all the theories are applied in one go. The paper would examine the possible conflicts too. Key Concepts Introduction: The following discussion would cover the key concepts in relation to management and how a job should be executed. It also focuses on management and corporate strategy in relation to leadership. Discussion: If a job is to be done, it is not likely that one does it single-handedly in today’s complex socio-psychological environment. He or she would need a team, hence the formation of workgroups. In a workgroup, the goals must be shared, group values must be specified, decision must be based on consensus and evaluation must be constantly done. Moreover, in order to get the job done, some other ethical values like mutual trust, ded icated participation and respect for each other must be ushered (McGregor, Bennis and Schein, 1966). In doing the job, the leader must understand the relationship between behaviour and performance among his or her subordinates. Reinforcement Theory explicates the concept as such that a rewarded behaviour is more likely to be repeated while a behaviour that is punished is less likely to be repeated. The concept of reward and punishment is necessary and thus simply getting the job done may be insufficient (Keller, 1969). Figure - 1 Goal setting is also important because neither the leader nor his or her subordinates are supposed to know what to do if no goal is set at all (Brenda Devis, 1988). Again, according to Adam’s Equity Theory, the extent of equity that an individual would observe in relation to a work situation would proportionally affect his or her job performance and satisfaction (Kinicki, 2009). However, management in the real world cannot be completely based on theo ries only. To get the job done, the leader must handle general management and show skills in operational systems. A manager uses management tools to manage people and resources, while the leader is supposed to use the same tools innovatively. This is beyond simply completing the job. The fundamental questions like â€Å"What is management?† and â€Å"What is business?† should be explored with support from practical experiences. Techniques and tools like networks of critical path, cash flow and inventory control add more dimensions to decision making (Payne, Chelsom and Reavill, 2004). In getting the job done, the leader must not remain in the constraints of that job only. He or she must understand business failure or success is primarily dependent on how diverse areas of function in management can be combined to deliver and produce value to the different stakeholders. Corporate strategy in the form of functional integration is imperative in orchestration with the compl ex and dynamic corporate environment (Johnson, Scholes and Whittington, 2005) Summary: The key concepts in relation to leadership and ‘getting the job done’ are discussed. Stress has been put on: 1. Workgroup functionality 2. Reinforcement Th

Wednesday, September 25, 2019

The Centrality of Forgiveness Assignment Example | Topics and Well Written Essays - 250 words

The Centrality of Forgiveness - Assignment Example He further states that both the oppressed and the oppressor risk spending the rest of their lives in self-imposed imprisonment unless they let go of the past and embrace the hope that forgiveness brings. In essence, Gould refers to forgiveness as a form of healing for both the oppressor and the oppressed that holds a future with hope. In the article â€Å"Five forgiveness assessments recommended for conflict resolution Processes† Gould provides detailed guidelines towards holistic forgiveness. He explains that to be able to forgive they must be aware of their subconscious perception of forgiveness. Such holistic forgiveness is very effective in resolving conflicts. From the discourse outlined by Gould, there is the realization that different people have different expectation from the process of forgiveness. It is therefore important to reconcile these expectations and seek for a common ground that will be amicable for the conflicting parties as explained by Gould. Gould also outlines that it is important that the healing for the conflicting parties take a higher priority even before they are persuaded to forgive each other. In essence, forgiveness should be a deliberate move by both individual without any form of external pressure and it should be preceded by

Tuesday, September 24, 2019

Interpersonal Conflict in the Film Hitch Essay Example | Topics and Well Written Essays - 500 words

Interpersonal Conflict in the Film Hitch - Essay Example In most cases and situations that involve love, interpersonal conflict is inevitable. This usually results to an increased antagonism and misunderstanding between the characters. As observed in the movie, the escalation of emotional tensions resulted to a misunderstanding. The viewer would already know by then that Hitch was really trying to help his client Albert, a nice, socially awkward guy, to get closer to Allegra. On the other hand, Sara is insistent and believes that Hitch is just trying to get women laid by his own clients. It should also be taken as a factor that prior to Sara knowing that Hitch was a date-doctor, both of them were dating as well and were developing a serious relationship. The unmasking of Hitch’s reputation to Sara exacerbated things between them. The problem was that both Hitch and Sara never really saw things from each other’s perspective. Both of them knew and felt that they were correct in their own right. Sara, for the most part, initiall y did not want to understand Hitch’s side of the story. On Hitch’s part, he wanted to show that his methods of dating would work on him, as well as it did with his clients. When their confrontation came, they communicated based on their passion, and not much with their rationality or logic. As a solution to the conflict, both of them could have just agreed to meet privately instead of publicly. In this way, they could both disclose honestly and openly their side of the story and situations that involve love.

Monday, September 23, 2019

Financial Information Retrieval and Analysis of Hewlett-Packard Essay

Financial Information Retrieval and Analysis of Hewlett-Packard - Essay Example The company also offers multi-vendor customer services such as applications and business domains, technology consulting, as well as outsourcing and support service across the infrastructure. The company additionally offers IT management software, information management solutions, risk management solutions, security intelligence, application testing and delivery software, big data analytics, and a broad range of investment solutions to its customers. One of Hewlett-Packard’s main competitors in the industry is Toshiba Corporation.   Return on equity (ROE) indicates the amount of profit generated from the shareholders’ investment in Hewlett-Packard (HP). The ROE for the company was18.30% while the average return on equity for the industry was 17.50%, and that of Toshiba Corporation was 5.26%, all for the preceding year. These figures indicate that Hewlett Packard is more profitable than the other companies within the same industry. The company may be generating more profits from the shareholders’ investments in the company as compared to other companies in the same industry. The net profit margin for Hewlett-Packard is 4.68% while the industry average is 4.20%, and for Toshiba, it is 0.92% only. The profit margin for HP indicates that the company is more efficient in converting sales into profits as compared to most companies in the industry. The company’s EPS (2.62) is greater than both for the industry (0.96) and Toshiba (1.76). The EPS for HP is an indication of more favorable return on in vestments for Hewlett-Packard. The price-earnings (P/E) ratio for the company is 14.82 compared to the industry ratio which is 16.0 and for Toshiba which is 39.53. The P/E for HP is lower, thus indicating lower growth in terms of future earnings.  

Sunday, September 22, 2019

Cellular Respiration Essay Example for Free

Cellular Respiration Essay Abstract The effect of nature of substrates on the rate of cellular respiration in yeast was determined by using the Smith fermentation tube method. Mixtures of 15ml distilled H2O, 10% yeast suspension and 15ml of the following solutions (all at 10% concentration):1- starch, 2 – lactose, 3 – sucrose, 4 – glucose, 5 – fructose, 6 – distilled water , were poured in six smith fermentation tubes. Cotton balls were plugged in the openings of the tubes and the tubes were kept upright and observed for 30 minutes. The mixture with the sucrose solution acquired the highest computed volume of gas evolved and the rate of CO2 evolution seconded by glucose and followed by fructose. This stated that the higher the amount of the CO2 evolved, the faster the rate of respiration. Mixtures with lactose, starch and dH2O solutions obtained zero result for the volume of gas evolved and rate of CO2 evolution. Thus, the nature of subtrate used slows down or fastens the rate of cellular respiration. Introduction Cellular respiration is defined as an enzyme mediated process in which organic compounds such as glucose is broken down into simpler products with the release of energy (Duka, Diaz and Villa, 2009). It is a series of metabolic processes and oxidation-reduction reactions. Oxidation of substrates, such as glucose, is a fundamental part of cellular respiration (Mader, 2009). As a catabolic process, it may or may not require the presence of oxygen. The process that requires oxygen is called aerobic respiration while the process that does not require the presence of oxygen is called anaerobic respiration. (Duka, et.al. 2007) Despite of its low yield of only two ATP (energy used by the cells to perform its duties), anaerobic respiration is essential because it continuously synthesizes ATP albeit oxygen is temporarily in short supply. Although anaerobic respiration synthesizes a low yield of ATP (which is the energy used by the cell enables it to perform its duties), it is essential because it is a way to produce ATP even though oxygen is temporarily in short supply. Though this process brings benefits usually, these are accompanied by drawbacks. One of these downsides is the formation of lactate in the muscles because of â€Å"oxygen debt†, causing it to â€Å"burn† and eventually fatigue, until pyruvate is reduced from lactate (Madur, 2009). Anaerobic respiration can be further divided into two types; namely, alcohol fermentation and lactic acid fermentation. In alcohol fermentation, pyruvate (product of glucose in glycolysis) is converted to 2 molecules of ethanol (C2H5OH) and 2 molecules of carbon dioxide (CO2) while in lactic acid fermentation, pyruvate is reduced directly into lactic acid (Campbell and Reece, 2008). A good example of organism which produces ethyl alcohol and carbon dioxide through the process of alcohol fermentation is yeast (Madur, 2009). As a unicellular fungus, yeast is also an example of a facultative anaerobe, which depicts an organism with [continues] Materials and Methods In determining the effect of the nature of substrates on rate of cellular respiration, smith fermentation tube method was done. In this method, six smith fermentation tubes were obtained. This special tube has a closed vertical arm which extends into a bulbous portion with tapered opening as seen in Figure 5b. 15 ml of the following solutions, all at 10% concentration, were poured to the respective tubes: 1- starch, 2 – lactose, 3 – sucrose, 4 – glucose, 5 – fructose, 6 – distilled water. 15 ml distilled water and 15 ml 10% yeast suspension was then added to each tube. The mixtures were shaked gently and assured to have no bubbles trapped at the closed end. If there were bubbles, it will be removed by covering the opening with the palm of one hand and tilting the tube horizontally. The openings of the tubes were plugged with cotton balls. The tubes were tied together at their vertical arms to keep them upright and were set aside where the will not b e disturbed. All CO2 evolved will be trapped in the vertical arm and the height of the area occupied by the CO2 evolved were measured every five minutes for thirty minutes. The volume of the gas evolved and the rate of CO2 evolution were computed. The rate of CO2 evolution was computed by the amount of CO2 evolved over time and the volume of the gas evolved was computed by the formula: Volume = pir2h whereas pi= 3.14 r= radius of the smith fermentation tube (cm) h= height of the area occupied by the CO2 evolved (cm) Computed results were tabulated. A graph of volume of CO2 evolved and time elapsed was then plotted and analyzed.

Saturday, September 21, 2019

Concepts of Corporate Strategy | SWOT Analysis of Apple

Concepts of Corporate Strategy | SWOT Analysis of Apple Corporate Strategy Introduction â€Å"Marketing strategists term this a harvest strategy and consider it a no-brainer† (Hamel Prahalad, 1994:125). â€Å"Few current business concepts are more prone to oversimplification than the growth/share model, with its labelling of products or divisions or whole companies as ‘dogs’, ‘question marks’, ‘stars’ or ‘cash cows’† (Seeger, 1984:94). â€Å"An apparent disadvantage of the matrix was that it assumed that market share was reliable indicator of future profitability† (Calandro Lane, 2007:30). The above three quotations all criticise the BCG growth/share matrix and its practicality as a competitive tool. This paper discusses the advantages and limitations of the matrix and its application for Apple Inc. as a competitive tool. It concludes that the BCG matrix does have some advantages but is not appropriate for all businesses industries and should not be used as a sole analysis model. In the fast pace d competitive modern business world using just the BCG matrix for evaluating a company’s portfolio can have disastrous consequences. The paper is divided into five parts. Starting with an introduction, it moves on to the concepts of corporate strategy, portfolio analysis and the portfolio models. The third part discusses some of the advantages and limitations of the BCG matrix. The fourth deals with the implications of the BCG matrix when applied to Apple Inc. ending with the conclusion. Corporate Strategy, Portfolio Analysis and Portfolio Matrix Models â€Å"Always to be best, and to be distinguished above the rest†. This quote from Homer the 8th Century Greek Poet epitomizes the aim of all organizations. This is where strategy comes in. â€Å"Strategy is the direction and scope of an organisation over the long term, which achieves advantage in a changing environment through its configuration of resources and competences with the aim of fulfilling stakeholder expectations† (Johnson, Scholes Whittington, 2005:9). One of the ways of achieving this is through competitive strategy. According to Porter â€Å"competitive strategy involves positioning a business to maximize the value of the capabilities that distinguish it from its competitors† (1980: 47). To achieve this, careful analysis of the external and internal environment is required. PESTLE and Porter’s Five Forces Model can be used for external analysis. For internal analysis the most commonly used is the seven S framework as well as SWOT analysis, v alue chain, value chain (supply) analysis and portfolio analysis. The result is greater understanding of the environment in which the business operates. Organizations operate under three levels of strategy. Corporate-level strategy, business-level strategy and operational or functional strategy. Corporate strategies deal with the organization as a whole while business strategy â€Å"focuses on how to compete in a particular industry or product-market segment† (Hofer Schendel, 1978 cited in: Beard Dess, 1981:667). Operational strategy is how the organization accomplishes the strategies set out in the first two using its various resources. For an organization to be profitable it is important to have effective strategies on all levels but a successful corporate strategy is crucial to the success of business and operational strategy. The late 1960’s and early 1970’s saw many conglomerates diversifying into different fields. New divisions or (Strategic Business Units) were evolving. The problem management faced was of effectively managing all these diversified units. One strategy could not work for all SBUs as they all experience different competitor threats, market growth rates and market shares. This problem was solved by the creation of the portfolio analysis. â€Å"Portfolio strategy pertains to the mix of business units and product lines that fit together in a logical way to provide synergy and competitive advantage for the corporation† (Daft, 2008:249). The aim of the corporation is to have a balanced corporate portfolio, so that they can decide which activities or products to expand,introduce and which businesses to acquire or dispose off. Thus, â€Å"diversified company portfolios are the normal and natural business form for efficiently channelling investment into the most productive use† (Henderson, 1977:203). The most common form of evaluating the corporate portfolios is the portfolio matrix models. Igor Ansoff, developed his Product-Market Growth Matrix in the 1950’s. He believed that â€Å"just to retain its relative position, a business firm must go through continuous growth and change† (Ansoff, 1957:113). He used four possible combinations of market penetration, product development, market development and diversification and plotted them on a 22 model. McKinsey Co developed a matrix where the variables were market strength and competitive position. Bruce Henderson in the mid 70’s using the same matrix principle developed his BCG growth/share matrix model. It had the same 22 matrix but was based on relative market share and market growth and used cash flow and the experience curve as a criterion. Arthur D. Little developed another model which used the product life cycle. â€Å"These [latter] three matrices form the basis of the various portfolio models that have been widely used to structure the strategic planning process of the firm in the 1970’s† (Coate, 1983:47). Since then there have been many matrices developed e.g. the GE model which uses ROI for assessing an investment opportunity and Shell which used a similar refined matrix evaluating business prospects along with the competitive position of the company. However, the most commonly used matrix by organizations is still Henderson’s BCG Growth/Share Matrix. It has to be taken into consideration however that â€Å"it is important to see these models as aids to decision making, not a replacement for management choice† (Hooley, Saunders Piercy, 2004:64). BCG Matrix – Advantages and Limitations The BCG matrix plots SBUs by looking at the relationship between market growth and market share. Henderson divided the matrix into cash cows, stars, question marks and dogs and asserted that â€Å"only a diversified company with a well balanced portfolio can use its strengths to truly capitalize on its growth opportunities† (Henderson, 1970:37). To show the relative significance of the SBU, size is shown in circles which can be calculated either from assets employed or sale turnover. The growth/share matrix gained immense popularity among large organizations with many SBUs. They could now use the matrix and decide which units to nurture, invest or divest. Its main advantage was its attractive presentation and easy to remember terms. Using only two variables it was easy and quick to make as well as being versatile enough to be applied to different brands, products, customers and distribution channels. The matrix became popular with managers who preferred the idea of cash flow implications rather than profits which are more in the accounts domain. The PIMS database which was developed at the General Electric in the 60’s and further developed by the Management Science Institute at Harvard in the early 70’s also supported this view. Another reason for the BCGs popularity was fashion. â€Å"It is an idea that is well understood and liked by many mangers and therefore one that allows communication between headquarters and strategic business units (SBUs). It has become part of the common business vocabulary† (Hooley et al, 2004:71). Undoubtedly, the simplicity of the matrix was its major advantage but it had its limitations as well. One of the major problems of the BCG matrix were the claims made by the developers that â€Å"such a single chart with a projected position five years out is sufficient alone to tell a company’s profitability, debt capacity, growth potential, dividend potential and competitive strength† (BCG, 2008:3). According to them the matrix would provide the complete solution but this is an erroneous belief. It does not provide the perfect solution for evaluating a company’s portfolio. This is also affirmed by Hooley et al who say that â€Å"if it is used it should be audited carefully to ensure its validity rather than followed blindly† (2004:2). Furthermore, there is no set definition of what an SBU is or what the definition of a market is e.g. a product might be a leader in a local market niche but at the same time a small player in the global market. The matrix is also difficult to plot accurately using market share and market growth. Organizational strength cannot be measured by market share alone, it has to take into consideration other strengths e.g. financial strength, brand equity, exclusive distribution channels or unique product features etc. In the same way market growth is only one aspect of market attractiveness. Using the cash flow resources for evaluation can also be perceived as a flaw. â€Å"In times of high inflation, cash flow may indeed be the major constraint on a company’s action range, but other capabilities such as appropriate managerial talent, expertise, know how, skilled labor and organizational flexibility are also important† (Derkinderen Crum, 1984:132). Also, according to Henderson â€Å"we should kick the dogs, cloister the cows and throw our money at stars. Only the question mark category demands management thought† (Seeger, 1984:94). This assumption can be criticised as being over simplistic. Dogs, should not be divested off without thought. They can retain that important portion of market share keeping competitors at bay, and also an organization who has a dominant product may deliberately introduce a dog into its portfolio for the same purpose. Sometimes, â€Å"occasionally it is possible to restore a dog to viability by a creative business segmentation strategy, rationalizing and specializing the business into a small niche which it can dominate† (Hedley cited in Wit Meyer, 2004:322). The human aspects and behavioural implications of the matrix are also overlooked e.g. how managers of SBUs categorized as cash cows react when their hard earned cash is given to other SBUs, or of members within the organization whose brainchild is divested? This can affect the morale of management and may result in quick turnover of disgruntled staff which is not beneficial to the organization. The simplicity of the matrix where an advantage can also be harmful since competitors can easy identify the strategy being used and use it to their advantage. An example of this is the successful infiltration of the Japanese in the UK motorcycle industry. Another limitation as Coate says is that â€Å"independent strategies can’t be defined for all possible business units† (1983:52) i.e. a business unit producing multiple products cannot invest in one profitable product and ignore the others. Either they all get investment of all of them have to be divested. Despite the fact that the matrix’s limitations far outweigh its benefits, it is still frequently used by organizations and in certain situations can be used as an effective competitive tool as well. The important thing is that it should not be used as the sole analysis method for decision making. Even the Boston Consulting Group has in recent years admitted that market share by itself does not necessarily mean competitive strength. â€Å"In a series of articles in the Financial Times in November 1981, Michael Gould of the BCG maintained that it is valuable to be the market leader for branded goods with the advantage of price leadership and the ability to spread marketing and distribution costs over a high volume; but economies of scale may be achieved even by a firm that is not the largest producer in the industry (Johnson et al, 2005:90). It is though, fair to say that â€Å"the simplicity of the Box makes it operationally useful and its ease of understanding makes it a use ful operational tool provided its limitations are kept clearly in mind† (Hooley et al, 2004:87). Apple Inc. The BCG Matrix 1: Profile Strategy: Apple is a global company operating in the technology industry which designs, manufactures and markets personal computers, portable music players and mobile communication devices. It was established in 1977 as Apple Computer Inc. specialising in personal computers. Operating in the ever changing high growth market and extreme competition, Apple began losing its market share to its major competitors including IBM and Hewlett Packard as well as the entry of numerous other PC manufacturing companies determined to enter the highly profitable market. SWOT Analysis (fig 2) Strengths Weaknesses Strong brand image Robust financial performance Media content Declining research and development (RD) investment Opportunities Threats Smart Phones Booming MP3 player markets Growing personal computers and peripherals markets Intense competition Dependence on specific suppliers Patent infringement Apple was faced with a weakening Mac line, stiff competition and demand for better value by the shareholders. There was need for a drastic change in strategy and product diversification was chosen as a mean of entering other consumer electronic market segments. In the Swot Analysis (fig 2) carried out by DataMonitor, we can clearly see their opportunities in the smart phones and MP3 player markets. In January 2007, the company changed its name to Apple Inc. as they diversified into other products. Currently, Apple Inc. in its portfolio owns three SBUs. The first is the Mac range which comprises of desktop and notebook computers along with their accessories. Secondly, it offers music products and services which include ipod, itunes etc. The third SBU consist of the mobile communication devices i.e. iphone. 2. BCG Matrix and Apple’s Product Portfolio: In the current competitive industry using the BCG matrix offers some benefits for Apple but there are disadvantages too. The flexibility that the matrix offers i.e. it can be used for plotting product portfolio of a firm can be beneficial to Apple. To introduce new products and revamp current ones a company needs vast amounts for investment. Apple needed money for RD which is a major expenditure for companies operating in the technology industry. â€Å"The Company believes continual investment in research and development is critical to the development and enhancement of innovative products and technologies† (Apple Investor Relations, 2007:1). Between 2005 and 2007, Apple spent $535 million dollars on RD. Part of this money was obtained by withholding dividend payments for two years between 2006 and 2007. The rest was from divesting within the Mac range. Using the BCG matrix, the decision of which products to invest in and which to divest would have been pretty straigtforward. Market growth for technological products very rarely slows long enough for a product to be classified as a cash cow. Therefore, most of these products would be classified either as a star, question mark or dog. At the time when Apple changed its strategy it had a large number of computers in its product range which it needed to reduce. The whole of the Mac Range would have been plotted with a few top selling products as stars which would have been carrying the whole load of the company with its profits. A few question marks which had low market share but were still making a profit which was being again utilized internally, but had low chances of becoming a star and quite a large number of products and their associated accessories and software would have been plotted in the dogs quadrant. By divesting in the dogs, Apple would have undoubtedly lost some market share but in introducing new products their aim was to attain market share in other markets. Spending huge amounts on RD, Apple updated and introduced fewer but better computers like ibook and imac into its product line in direct competition with their competitors. At the same time as updating its product line for the Mac range the ipod range can also be plotted on the matrix. The ipod currently holds 77% of the global market share , but to keep up with the current high demand Apple almost every year introduces a new version with more features and divest the oldest version which by that time has moved to the dog quadrant. It also uses the same strategy for the iphone range. Even though iphone is a relative new offering from Apple, it is already facing competition and to maintain and increase its market share Apple keeps introducing newer versions. Therfore, even though the BCG matrix does offer Apple benefits for managing its product portfolio, it negates one of the main declarations of Hendrix that â€Å"only a diversified company with a well balanced portfolio can use its strengths to truly capitalize on its growth opportunities† (1970:37). For a well balanced portfolio, a company must have cash cows, however, with Apple and its products, the market growth rate never slows enough for a product to become a cash cow. Most of its products are in the star or question mark quadrants, and some are dogs which are then divested. Apple however sometimes does tend to retain some dogs, even though Henderson believed that â€Å"pets are not necessary† (1970:37), and should be divested off, Apple keeps some of its older versions of products because they retain a small share of the market which might be vital to the companies overall market share. 3. BCG Matrix and Apple’s SBU Portfolio: However using the BCG matrix with Apple’s corporate portfolio poses quite a few problems. First of all the developers claims that â€Å"such a single chart with a projected position five years out is sufficient alone to tell a company’s profitability, debt capacity, growth potential, dividend potential and competitive strength† (BCG, 2008:3), cannot be applied to Apple Inc. Apple operates in a fast changing environment where the introduction of one product can radically change the competitive strength and market share of a company. An example is Dell Computers who in 2007 lost its market leader title to HP. Within one year HPs market share increased dramatically to 17.6% while Dells managed only 13.9%. Apple comes third with a global market share of 2.6%, but that can change rapidly. Also for Apples iphone the current market share is only 6.5% compared to Blackberry which holds 41% and Palm at 9%, but the iphone is relatively new. It was introduced in July 2007 a nd immediately took over 28% market share of the US smart phone industry showing competitive strength of the product. Apple with iphone is challenging the market leaders and its market share is increasing every quarter. Therefore, a five year forecast cannot be accurate for analysing its future position. Also, however, if we plot the Mac computer range using market share and market growth rates, it would be positioned in the question mark quadrant. But that would make analysis difficult since two products of the mac range i.e. the ibook and imac are stars but as a SBU plotted in question marks. To manage all the products together would be difficult since some products require investment and some do not, according to the matrix you plan a unit strategy not an individual one. Once again Henderson’s criteria of having a balanced portfolio for success would not be applicable in the SBU matrix either. Currently, Apple’s ipod business unit is a market leader with majority market share and high market growth and would be plotted as a star, and the iphone and mac ranges would be placed in the question mark quadrant. It does not have any cash cows or dogs. A successful organization has to have cash cows from where cash flow is diverted into stars and question marks. The ipod sales at present is generating enough cashflow, not only to sustain itself but the other SBUs as well. If we blindly believe Henderson’s assumption then logically Apple should be in dire trouble whereas it is actually increasing its market share and cash flow with all three units. Another drawback of using the BCG matrix would be giving its competitors easier understanding of its strategy. With the company’s annual reports and market shares available publically, if competitors like HP and Blackberry know that Apple is using the BCG matrix as the sole analysis method they can easily construct a matrix for Apple and figure out its future strategies. Therefore, even though the BCG matrix could be useful to Apple Inc. for analysing its products strength and could be used as a decision tool, it would not be useful for future decision concerning its SBUs. It has to be admitted though that the BCG in its simplicity maybe can be more effective in another industry. It can be used as an internal analysis method but using it as the sole decisions making analysis method could be hazardous for the company. This is further confirmed by Seeger who says that â€Å"no management model can safely substitute for analysis and common sense† (1984:97). Apple would benefit using the SID techniques, risk analysis e.g. the monte carlo risk analysis model as well as personal experience and judgement before making any future decisions for its strategic business units. Conclusion We have thus seen how as a competitive tool the BCG matrix has its advantages and disadvantages. The main advantage being its simplicity and ease of plotting, â€Å"but elegance and simplicity in a theory’s presentation cannot guarantee sanity in its use† (Seeger, 1984:93). At the same time the matrix has its disadvantages in not having clear boundaries of what a market is and the criterion for market share and growth and the effect of external factors on it. To gain a competitive advantage a company aims towards â€Å"making an outlay of cash now in the expectation of extra cash coming in the future† (Dixon, 1994:21). For that they need to be in a competitive position and know which units to invest in and which to divest. BCG matrix makes this decision easier for managers but it has to be utilized in a carefully evaluated way. The matrix does give an indication of SBUs performance in the current market but it is not a model that should be followed without use of other methods of analysis and use of judgment by managers. This can be summarized in the words of Porter who affirms this by saying that â€Å"the growth/share matrix can be one component of a competitor analysis when combined with other kinds of analysis† (Porter, 1980:364) or Hooley et al who say that â€Å"it is clearly inadequate as a complete solution, but is of undisputed value as a starting point in many analyse† (2004:72). Therefore, not begrudging BCG matrix the benefits it offers mangers; it is defective as a sole analysis model for competitive strategy and still needs careful evaluation before any decision can be finalized. Bibliography Ansoff, H. I. (1957) Strategies for Diversification. Harvard Business Review, 35(5):113-124, Online available at: http://web.ebscohost.com/ehost/detail?vid=4hid=106sid=2bad248a-b6cb-4c13-81c2-74db4080bfda%40sessionmgr102 (Accessed 15th June 2008) BCG: The Boston Consulting Group, (2008). The Experience Curve Reviewed. IV. The Growth Share Matrix or The Product Portfolio. Online available at: http://www.bcg.com/publications/files/Experience_Curve_IV_Growth_Share_Matrix_1973.pdf (Accessed 12th July 2008) Beard, D. W. Dess, G.G. (1981) Corporate-Level Strategy, Business-Level Strategy, and Firm Performance. The Academy of Management Journal, 24(4):663-688, Online available at: http://www.jstor.org/stable/256169?Search=yesterm=corporate-levelterm=performanceterm=firmterm=strategyterm=business-levellist=hidesearchUri=%2Faction%2FdoBasicSearch%3FQuery%3DCorporate-Level%2BStrategy%252C%2BBusiness-Level%2BStrategy%252C%2Band%2BFirm%2BPerformance%26dc%3DAll%2BDisciplinesitem=1ttl=194returnArticleService=showArticle (Accessed 22nd May 2008) Calandro Jr, J Lane, S. (2007) Special Section: Winning in your industry: new tools and strategies. A new competitive analysis tool: the relative profitability and growth matrix. Strategy and Leadership, 35(2):30-38, Online Available at: http://www.emeraldinsight.com/Insight/viewContentItem.do?contentType=ArticlecontentId=1596528 (Accessed 2nd May 2008) Coate, M.B. (1983) Pitfalls in Portfolio Planning. Long Range Planning, 16(3): 47-56, Online available at : http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V6K-45PMPYS-14_user=10_coverDate=06%2F30%2F1983_alid=760368145_rdoc=3_fmt=high_orig=search_cdi=5817_sort=d_docanchor=view=c_ct=3_acct=C000050221_version=1_urlVersion=0_userid=10md5=f8879374940c70491a7e8906d1bc6068 (Accessed 24th June, 2008) Daft, R. L. (2008) New Era of Management, 2nd ed. Mason: Thomson Higher Education. Derkinderen, F. G. J. Crum, R. L. (1984) Pitfalls in Using Portfolio Techniques – Assessing Risk and Potential. Long Range Planning, 17(2): 129-136. Online available at: http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V6K-45K4GRJ-9P_user=6649953_coverDate=04%2F30%2F1984_alid=760368145_rdoc=2_fmt=high_orig=search_cdi=5817_sort=d_docanchor=view=c_ct=3_acct=C000010181_version=1_urlVersion=0_userid=6649953md5=4eb70387aca6a81b0bed14dab76607ae (Accessed 24th June, 2008) Dixon, R. (1994) Investment Appraisal. CIMA, rev.ed. London: Kogan Page Hamel, G. Prahalad, C. K. (1994) Competing for the Future. Harvard Business Review. 72(4): 122-128, Online Available at: http://web.ebscohost.com/ehost/detail?vid=5hid=107sid=728905ba-dc97-471c-a829-b8c61346578f%40sessionmgr108 (Accessed 23rd April 2008) Henderson, B.D. (1970). The Product Portfolio. Reprinted in Stern, C.W. (ed.) and Stalk, G. (ed.) (1998). Perspectives on Strategy From The Boston Consulting Group, pp. 35-37, John Wiley and Sons, New York. Henderson, B.D. (1977) The Corporate Portfolio. Reprinted in Stern, C.W.  and Stalk, G. (eds.) (1998). Perspectives on Strategy From The Boston Consulting Group, pp. 203-205, New York: John Wiley and Sons Hooley, G. Saunders, J. Piercy, N. (2004) Marketing Strategy and Competitive Positioning. 3rd Ed. Essex: Prentice Hall. Apple Investor Relations, (2007) Apple Inc. 10-K Annual Report. Available from http://phx.corporate-ir.net/phoenix.zhtml?c=107357p=irol-reports (Accessed 17th May 2008) Johnson, G. Scholes, K Whittington, R. (2005) Exploring Corporate Strategy. 7th Ed. London : Prentice Hall. Porter, M. E. (1980) Competitive Strategy. New York : The Free Press. Thompson Jr, A.A, Strickland III, A.J. Gamble, J. E. (2007) Crafting and Executing Strategy. 15th Ed. New York : McGraw-Hill Irwin. Wit, B.D. Meyer, R. (2004) STRATEGY-Process, Content, Context. 3rd Ed. London : Thompson Learning. XML Database: An Introduction and Analysis XML Database: An Introduction and Analysis XML, mnemonic of eXtensible Markup Language is one of the most extensively used data format and is used as a standard for exchange of data over the internet. As large amount of data is represented as XML documents, techniques like RDMS have to be used to store and query these XML documents. There are two well known approaches for parsing an XML document to convert into relational DBMS: SAX and DOM parsing. In this research, both these methods are studied and then the performance is compared. Some alternative ways of data structuring and tagging from tables of RDBMS as a hierarchical XML document has been studied. As a final result, the best alternative which will provide with the best and effective performance for capturing and querying XML data using RDBMS can be found out. When a large amount of data is to be loaded into an XML document, it becomes important to execute the request query and save the process at XML document. One way is to use XML native data base system. This has two weaknesses 1. eXtended Markup Language resident database system is not ample to save data and it cannot contain the complicated query at relational DBMS. 2. It is impossible for the users to access XML documents and data that are stored in a relational DBMS. To overcome the above mentioned weaknesses, querying and storing XML data techniques using RDBMS are used. The steps for this approach are- 1. Data or an XML document is saved by making relational table design. 2. XML data is divided by separating them into columns in the presented table. 3. SQL Queries are used to get access to the XML document format obtained in RDBMS dta format. To transfer data from XML to data base, the strategy is to use C# as middleware. This research can be done by parsing technique with the help of SAX parser or by using XML Tree Class. To do the vice versa, the present format of XML document from relational SQL SERVER 2008 database supported by C# script, used as middleware; is converted with the help of tagging and structure. All alternatives (outside engine) done by tagging and structuring process implies that a part of the task was done outside the relational database engine. For comparing the XML document and RDBMS from the point of speed in loading the process in the browser following tasks were performed:- Searching of the data in the XML document is done with the help of DATA binding technique. Presentation of the XML data from RDBMS is done by searching data from XML document which was saved into SQL database, than with the help of DOM Tree method the result of the query is saved as a XML Document Database problems in XML They are hard to update. We cannot implement the constraints. Its difficult to optimize the xml database. Hard to maintain the consistency Data Storage and Data Transmission: These two are different concepts. In data storage we store data and while storing it we need to check the validity of the data. In Data Transmission we simple transfer the data from one system to the other. XML are generally used for the Data Transmission purpose. COMPARISON Relational Database XML Database META DATA Definition CREATE TABLE DEFINE XML SCHEMA Persistence of DATA INSERT,UPDATE CREATE XML DOCUMENT QUERY SELECT XPath ,XQuery 1.2 BENEFITS AND LIMITATIONS OF DIFFERENT DATABASE TECHNOLOGIES: Speed is the major advantage of creating database with objects. In OODBMS (Object oriented Database Management System) data is stored as objects but not in the form relational rows and columns such as in relational DBMS that is why OODBMS is faster than relational DBMS. OODBMS is more applicable than relational DBMS (RDBMS) for some tasks. This is because OODBMS performs many operations using navigational interfaces where as RDBMS uses declarative interfaces. OODBMS follows pointers to implement navigational access to data in an efficient manner. One disadvantage of RDBMS s is we need relational mapping layer to map the entire model for application objects to the database object model, whereas in OODBMS there is no need to match those layers. In RDBMS due to this mapping there may be an impedance mismatch and there is no such problem in OODBMS and it also increases the performance. OODBMS has some drawbacks like:- As it is said above OODBMS uses pointers to implement navigational access to data this is one of the drawback as in general purpose queries this will lead to delay the output and also becomes complicated than relational One more drawback is that there is no mathematical foundation for OODBMS, unlike RDBMS. This makes OODBMS weaker than RDBMS in supporting queries. The difference between data-base centric thinking and oop is in the way it views the world. The first one views the world through a viewpoint which is declarative and attribute-driven. The latter one views through a viewpoint which is behavioural. This is one of the major differences between databases and OOP. Many consider database technology as a failure. Hence attempt are being made in research and industrially to closely integrate database functionality into object programming languages. 1.3 DIFFERENT APPROACHES FOR THE DATABASE DESGIGN Different approaches for the database design includes data model approach design approach and so on. Starting with the data model approach: For effective project implementation database design is most important aspect thats why should be completed within given time line to give economical approach in project developing phase. Data model construction and updating on change of data deign in necessary as every application will need data storage. It is one of the most crucial parts of an application for developer and user as well. The different normal forms are:- 1st Normal Form Similar group should be stored in different table and tables should be provided by primary key to identify columns. 2nd Normal Form To protect data redundancy foreign key must be introduced. 3rd Normal Form Primary key plays a prominent role making every column in the table related. This makes every column a dependent of the primary key of the table. Those fields not satisfying above property should be stored in a new table with a new key. 4th Normal Form: Independent relationship should be removed from the relation database. 5th Normal Form Many to many relationships can be related logically thats why its also known as Exists in never-never land. Followed by the data model approach is the design approach which is explained as below: 2nd and 3rd form designs should be used for large application having enhancement scope. Scalability should be kept in mind during designing phase of application. Third form can ask you to make host of tables with less number of entity which reduces data replication across tables. While talking to a fellow developer i came to know that they used 3rd form as they were quite sure that it would not create dependency problem for their application as they used comma to differentiate primary values in a defined field of a table. Classes that can be used as data object which contain properties, actually a description and quality of entity element and these properties are introduced by getter and setter, should be designed at the time of creating class diagram for an application. Both object and property shows real life entity. For creating the database tables we need following constraints and relationships to be there in that table so that final database developed will be more effective and understandable. These are explained in the Constrains section under the database design part with the help of query tools. LO2 DEsign and implementation: 2.1 Requirement: This assignment is to understand the database design concepts, implement the database designed and execute the queries to obtain the required result with the help of SQL Server database. It also helps in developing Client side application to modify, update and view the results through C#. Net. Deeveedeezee, the online DVD shop records the customer details, DVD details which includes title, genres, Studio, classification, actors, directors and other information. It provides the users to rate a DVD using star scaling ranging from 1 to 5 and also allows them to create their own wish list. Our objective is to understand how the database of this DEEVEEDEEZEE is maintained, practically implementing it with the help of SQL Server and develop an client end application that interacts with SQL Server and provides the user the authority to view and add details. The WindowsFormApplication1 is the project tile and the client application can be run by opening the solution in MS Visual studio and Debugging the Code. It can be done by clicking on Build->Start Debugging. Function: Deeveedeezee.com as mentioned above provides the online customers various details about the DVDs, their reviews, ratings, synopsis and also allows them to create their own wish list. To maintain such a database, it has to be well designed and effectively handled by the administrator or the team of database continuously monitoring and assessing the required information. Every user is provided with unique user-id and password with which they can login and access the required information about the DVDs. They can even provide their comments, reviews and ratings as well which are again recorded under their user-id and are provided when ever required or asked for. Also deeveedeezee handling such large information from the website requires an Administrator or a team working on databases so that it is well managed and maintained. Thus every administrator and the team member again have got their own user-ids and passwords so that they can login into the databases and do their assigned tasks. These discussed details are presumed to be handled and the rest of the discussion focuses on the database designing, implementation and development of a client application which interacts with SQL server to provide them the easier access to add and view data from the database. Thus the backend database has got various data rules, definitions and constraints to be handled. Recording distinct information and accessed by different types of users, database has got different tables and views with appropriate fields and attributes. The database design diagram shown below shows the clear picture of how the database is designed, the various tables it maintains, attributes it holds and their properties. DATABASE DESIGN DIAGRAM ERD The diagram shown below depicts the various tables and its attributes. This design is modified and improved further with the help of Entity Relationship Diagram. The Entity Relationship diagram of the report is as below. The rectangle boxes are considered as entities The ovals are treated as attributes. Rhombus represents relationship between the entities. The diagram represents all entities, attributes and also the relations between the entities. It is a graphical representation of the relations. The ER diagram is a good means of understanding the relationships between the entities and attributes. In the below diagram, different users can be uniquely determined by its attributes like userId, email, firstName etc. User entity is related to DVD by Reviews. The ratings given to the movie by viewers are recorded through Ratings. Comments are the reviews of viewers. DVD on the other hand can be uniquely determined by its attributes like dvdId, title, studio etc. Role connects DVD and People. Role can be various tasks of people like actors, producer, and director. People have attributes of peopleId and peopleName. dvdDetails dvdId title retailPrice releaseDate runningTime synopsis genres studio users userId initials firstName surname dateOfBirth address email mobileNo telephoneNo password timestamp studio Fig: Database Design Add view Users Add roles id peopleId dvdId role wishlist id email userId wishlist Customers view dvdClassification id dvdId classification description people peopleId peopleFirstName review reviewId userId email dvdId review rating timestamp Entity Relationship Diagram (ERD) peopleName peopleId people Role dvdId title retailPrice releaseDate runningTime synopsis genres studio DVD RatingComment Review userId dateOfBirth surName firstName initials User telephoneNo mobileNo email address password 2.2 4.3 DOCUMENTATION AND Implementation OF THE DATABASE: Database Implementation and Datatype Usage The designed database discussed with the help of database design diagram and entity relationship diagram are implemented in SQL with the help of MS visual studio. All the attribute and tablenames are in used as per the conventions like using camel case, singular table name and so on. The output tables, conents nd query results are recorded with the help of screenshots and are shown as below: Table1: user table Comments: The details of the users like firstName,email, DOB, address, contact details are recoderd. In this table Primary key contraint,Not Null constraints are present. Datatypes of each attribute as per the given data rules are being implemented as shown above. Table2: dvdDetail table Comments: It stores the all details of DVD like running time ,release date,title and creates an unique dvd id. In this table Primary key contraint,Not Null constraints are present Datatypes of each attribute as per the given data rules are being implemented as shown above. Table3: review table Comments: It stores the reviews and the rating i.e No. Of stars given to the DVD by the user. It has not null contraints ,check constraints which checks that the rating field have value greater than 0 and less than 5,foreign key contrains.email is the foreign key which is refrencing to the primary key of the users table. userId and dvdId the combination of these two is used as a primary key. Table4: people table Comment : It stores the name of the people involved in the movie or DVD and gives a unique id to each of them that is peopleId. Table5: role table Comment: It stores the role of the each people involved in the movie like director,producer,actor etc. It has a foreign key dvdId which refrences to the dvdDetails dvdId.id is the primary key which is a identity with a seed 1. Table6: wishlist table Comment: It stores the wishlist of each user in comma seprated form. In this table id is the identity with seed 1 and userId is the primary key and email is the foreign key. Table7: dvdClassification table Comment: It stores the classification of the dvd with a little description about the dvd. dvdId is the foreign key and id primary key and also a identity with seed 1. Constraints NOT NULL Constraint: This is a constraint which restricts the user from entering the null value or leaving it blank. The user needs to provide the details for that field. It becomes necessary for the user to enter. Fig: NOT NULL CONSTRAINT In the given example id,email,userId fields can not be left empty. User need to provide these details otherwise it will through error.wishlist can be left empty. Query for this constraint CREATE TABLE wishList ( id int NOT NULL, email varchar(100) NOT NULL , userId int , wishList varchar(MAX) NOT NULL) Primary key constraints: This constraint is used to uniquely identify the row in the table. This field is not repeated in any of the other row. Primary key of one table can be used as the reference or foreign key of the other table. Fig: PRIMARY KEY Constraint In the above example userId is the primary key. All the rows in this table will have different userId. Fig: Showing the implication of Primary Key constraint In the above figure it is clealy shown that the userId is different for different rows. Unique constraint: This is the constraint used for uniquely identifying a particular column. All the values in a particular column are different. Fig: UNIQUE CONSTAINT In the above figure userId field has a unique constraint.It is a identity with a seed of 1.Every time a new row is inserted is automatically increments the value of the userId which ensures that in userId column no value is repeated. Fig: Showing the implication of Unique constraint In the above figure in userId column no value is repeated . userId has a unique constraint. Foreign key constraint: This constraint ensures that the database has a refrential integrity. Foreign key is works on the refrence of the primary key of some other table. Query: CREATE TABLE wishList (id int , userId int PRIMARY KEY, email varchar (100) references users(email) wishList varchar(MAX) ); Fig: Foreign Key Constraints In the above figure email is the foreign key which refrences the email i.e the primary key of the users table. Check constraint: This constraint makes sure that all values in a column satisfy certain specific criteria. Query: CREATE TABLE review ( reviewId int NOT NULL, userId int NOT NULL, dvdId int NOT NULL, review varchar(200) NOT NULL, rating float CHECK (rating0) timestamp timestamp) This check constraint helps in validation of ensuring the star rating to be between 0 and 5. Or CREATE TABLE dvdDetail ( dvdId int NOT NULL primary key identity(1,1), retailPrice int NOT NULL, title varchar NOT NULL, synopsis varchar NOT NULL, runningTime int CHECK (runningTime>10 AND rating genres varchar NOT NULL studio varchar NOT NULL) This check constraint ensures that the running time to be between 10 and 5000. LO3 Use of Manipulation and Query tools 3.1 Benefits of Manipulation and Query Tools in Database Manipulation and Query tools in database include those commands and statements that on execution would help in data manipulation. SQL maintains certain standards which includes DML or Data Manipulation Language. The major SQL commands that include in this DML are INSERT, UPDATE, ALTER and so on. These tools or query commands help in modification of tha data and constant updates that have to be made. SQL Server 2008 offers a very good platform that provides access to database and also it provides the query window for executing various commands that include in the Data Manipulation Language. They are very much useful in making it easier for the user to modify the data and update some information. A fine picture of these tools and their functioning can be understood in the sections below: 3.2 Implementation Query tools: Query for viewing all DVDs belonging to the Romantic Comedy genre in order of price. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = Romantic Comedy) ORDER BY retailPrice The query when executed would result into the table as shown below: Table: Result of the query Query for viewing all DVDs belonging to the Universal Pictures UK studio. Table:Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (studio = Universal Pictures UK Studio) Table: Result of the query Query for viewing all DVDs in which Johnny Depp or De Caprio have acted. Table: Initial data in dvdDetails table Query:- SELECT dvdDetails.dvdId, dvdDetails.title, dvdDetails.retailPrice, dvdDetails.releaseDate, dvdDetails.runningTime, dvdDetails.synopsis, dvdDetails.genres, dvdDetails.studio, choose.dvdId AS Expr1 FROM dvdDetails INNER JOIN (SELECT DISTINCT [NATURAL].dvdId FROM roles AS [NATURAL] INNER JOIN people ON people.peopleId = [NATURAL].peopleId WHERE (people.peopleFirstName = Shahrukh) OR (people.peopleFirstName = Amir khan)) AS choose ON choose.dvdId = dvdDetails.dvdId Table: Result of the query View all the DVDs which Steven Spielberg has directed. Table:Initial data in dvdDetails table Query:- SELECT dvdDetails.dvdId, dvdDetails.title, dvdDetails.retailPrice, dvdDetails.releaseDate, dvdDetails.runningTime, dvdDetails.synopsis, dvdDetails.genres, dvdDetails.studio, choose.dvdId AS Expr1 FROM dvdDetails INNER JOIN (SELECT DISTINCT [NATURAL].dvdId FROM roles AS [NATURAL] INNER JOIN people ON people.peopleId = [NATURAL].peopleId WHERE ([NATURAL].role = Director) OR (people.peopleFirstName = Farah Khan)) AS choose ON choose.dvdId = dvdDetails.dvdId Table: Result of the query View of all the DVDs suitable for a Valentines Gift. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = Romantic) Table: Result of the query View of all the DVDs suitable for children (under 10s) to watch. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = under 10) Table: Result of the query DVDs on the wishlist for a specified customer Table:Initial data in wishlist table Query:- SELECT wishList FROM wishlist WHERE (userId = 1) Table: Result of the query DVDs in order of release date Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails ORDER BY releaseDate Table: Result of the query DVDs belonging to a specified studio in order. Table:Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails ORDER BY studio Table:Result of the query To add a sample DVD. Table: Initial data in dvdDetails table Query:- INSERT INTO dvdDetails (retailPrice, releaseDate, genres, studio, runningTime, title) VALUES (99, CONVERT(DATETIME, 1990-05-02 00:00:00, 102), under10, Coke Studio, 1100, Tom) Table: Result of the query Table:Data in dvdDetails table after executing query An update query to change the review star rating assigned by a customer to a DVD. Table: Initial data in review table Query:- UPDATE review SET rating = 3.5 WHERE (userId = 1) Table:Result of the query Table:Data in review table after executing query 3.3 EVALUATION OF QUERY TOOLS: Queries can be simple and complex. For the complex queries we make the stored procedures, views and trigger which we can use later in our code and for the simple query we can directly embed in the code. Stored procedures contain more than one query and the stored procedure is pre compiled method for accessing the data from the database. Queries including select, insert, update etc are written in the procedures. After committing the query if any error occurs then we roll back and ignore the result of that query. If the correct relationship is present between the tables than only we can get the correct result from the data LO4 Use, documenting and implementing of Relational Database Management System 4.1 4.2 TESTING OF THE RELATIONAL DATABASE AND ITs IMPLEMENTATION Queries in the section 3.2 produce the result correctly i.e. the output of different queries are correct and as we know that queries will give the correct output only when the relation between the tables are correct i.e. the relational database is correctly made. Queries in the view section and the also in the client application desired view produce a correct result which shows that the implementation of the relational database is correct. Client Application: Microsoft Visual Studio has been used for developing the client application in C#.NET. Our main objective was to provide the user with the facility to add and view the data from the database so that proper updating can be done and relevant information can be provided to the user through the online website of deeveedeezee.com. The prerequisites for this application are: MS Visual Studio installed in the computer system with C#.NET and SQL server. The MDF file or the database has to be loaded into the application through MS Studio by Data-> Add new datasources-> Database. Once the database is loaded, the SqlConnection string path has to be modified to the path where the database is located. Every user of this client application is provided with unique username and password through which he can log in into the application. The application only highlights the required and mentioned features in the assignment of VIEW and ADD. The figure below represents the Client Application as it looks after logging in successfully. afterlogin client app.JPG Fig: Client Application The user allowed viewing and adding the data, on clicking the respective buttons would be directed to the forms as shown below: view and add.jpg Fig: View and Add forms One can view the details of DVDs, Reviews posted by the customers through online website, Ratings provided by them, their wish lists and the user data. One can add up details to be displayed about DVD to the customer, roles played by various actors, actress and other working staff for that particular product, rating as per the reviews and rating awarded by the customers and also new users data. The following sets of figures describe how the data and various details are added to through the client application into the database: add dvddetails.JPG Fig: Add dvdDetails On clicking the submit button, in the coding section the query to insert the details of DVD which includes dvd Name or title, Price, Genres, Date of Release of the DVD, Studio and synopsis is executed and the table of dvdDetails is updated as shown above in the query section. add ratings.JPG Fig: Add DVD Ratings Viewing the details of review and rating provided by the customers through online, the user of this client application can rate the dvd accordingly. He has to identify the dvd ID and based on the information he has got he can provide the rating on a scale of 1 to 5. As explained above similarly on clicking the submit button, the query gets exected in the back and the table of concerned gets updated as shown above in the query section. add roles1.JPG Fig: Add Role Details This helps in providing the customer regarding the cast details of the product. add users.JPG Fig: Add Users Details This helps in validating the user by adding them into the database. Similarly viewing would allow the user with the following output: Fig: View of dvdDetails dvdDetails includes title, price, date of relase and such other features that described the dvd. dvdID is uniquely and automatically generated and is considered as the primary key. From the data available in this table dvds can be classified based on their genre and studio as per requirement. Fig: View of Roles This table helps in updating the online site with the roles played by various persons involved in making this product. The persons can be identified by their unique ids. Fig: View of Wishlist As provided online by the customers their wishlist gets updated in the database ad can be viewed for knowing required information about the user and his preferences for future use. Fig: View of Users data Users or customers using deeveedeezee.com online and th staff using this application, all the details are provided in this table from which one can know about their personal details and contact information to be used for various purposes. Fig: View of Reviews Based on the data provided in the reviews by online viewers, the users of this application can add the modified rating based on data collected from many sources. 2.3 Application of a range of database tools to enhance user interface In all the above view forms, GRIDVIEW t

Friday, September 20, 2019

Examining The Cultural Reason Behind Tattooing And Piercings Media Essay

Examining The Cultural Reason Behind Tattooing And Piercings Media Essay Why is it that more and more people are tattooing and/or piercing themselves? Is there a cultural reason behind this reality? Each time that we walk we see someone with a tattoo and or a piercing(s). The reality is that tattoos and/or piercing(s) have become increasingly popular not just in the United States but all over the world. I admit that I have a tattoo and three piercings. I also admit that I decided to get a tattoo as soon as I turned eighteen like most teenagers do. People have so many reasons as to why they have a tattoo or as to why they want to get a tattoo in the near future. Most of the time we receive images and messages through the media about tattoos and piercings and therefore they may influence us. Some people believe that tattoos are a form of expression and art while others think of tattoos as attractive or taboo. Through the media, adolescents see over 5,000 attractiveness messages per year. This means that most adolescents are being pressure by the media to lo ok unique and different by tattooing/piercing themselves. Not just the media influences a society into tattoos and/or piercing but the culture that they live in. Cultural influences play a huge role on how people act, dress, speak, and even on the way they think. Tattoos and piercing have created their own culture in which people have adapted and continued Despite the fact that some people consider tattoos and/or piercing taboo, people will still continue to tattoo and pierce themselves because it is a cultural practice done for centuries and therefore it will continue for centuries. Tattooing and piercing are two of the oldest practices in the world. They have ancient roots that start as early as 15,000 years ago. According to Jane Caplan, Physical evidence for the practice survives from the late fourth millennium BC in Europe and from about 2000BC in Egypt, and tattooing can be found virtually all parts of the world at the same time (1). Tattoos in many cultures like in the Maroni culture have used tattoos for centuries and considered it as sacred art. The Maroni culture like so many cultures all the world have many purposes as to why they decide to mark themselves forever. Many cultures believed that a tattoo was powerful enough to cure anyone from any illness. Some people also believed that tattooing themselves would help them express their personal and religious believes. Body piercing has been dated as early as 1500 B.C.E. Body piercings like tattoos is consider as a way to express ones one individuality. Similar to tattoos, a person can decided to get pier ce everywhere in the body. There is no rule as to where you can get a tattoo and/or body piercing or how big or small it can be. Tattoos and body piercing have been spread out all around the world and even to the most remote places and cultures. In the essay The Decorated Body by Frances Borel, Borel states, Human nakedness, according to the social custom, is unacceptable, unbearable, and dangerous. From the moment of birth, society takes charge, managing, dressing, forming, and deforming the child-sometimes even with a certain degree of violence. Aside from the most elementary caretaking concerns-the very diversity of which shows how subjective the motivation isan unfathomably deep and universal tendency pushes families, clans, and tribes to rapidly modify a persons physical appearance. (40) There is no rule as to where you can get a tattoo and/or body piercing or how big or small it can be. If we take a closer approach specifically to the culture of tattoos in the United States, we can see how culture has played a huge role in the popularity of tattoos and body piercings. Pretty can be defined in various way and it is defined differently in many cultures. In India, having a ring in your neck is considered beautiful. In China, having small feet done by a process of shrinking feet called foot binding is considered beautiful. In the United States, tattoos to some people are considered beautiful. Tattoos became to be known in the early 1700s. A man named Captain Cook went on a trip to the South Pacific Islands and found fascinating the fact that most people were marked with some distinctive designs. He later brought a young girl with him to the United States and Americans were astounded. Tattoos were at first had made because there was not a specific tool for making tattoos. A man named Martin Hilderbrandt became the first professional tattoo artist in the United States. Hilderbrandt like many tattoo artist had no tool for making efficient and faster tattoos. It was not until 1891 that the first electric needled was used. A man named Samuel OReilly create d and patented the first electric needled. He opened the first tattoo shop in New York City. After the first shop opened in New York City, many Americans decided to become tattoo artists themselves and even opened their own tattoo shops. The number of tattoo artists and shops increased rapidly in the United States. Some Americans believed that if they tattooed their entire body, they would express their individuality. Men and women decided to exhibit themselves and some went on traveling shows or went to work on the circus. Some couples would tattoo their whole body and display themselves on public. I personally would not decide to cover my entire body in tattoos and/or body piercings. Beside the fact that tattoos and body piercings are expensive, they are also painful. I decided to get a shooting star tattoo because beside the fact that I love stars I wanted to get a design that was unique. One of my close friends designed by tattoo and therefore it made my tattoo original and unique. I did not know why I decided to get a tattoo. However since tattoos and body piercings were so new in America, many did not accept them. While many Americans were fascinated with tattoos and body piercing, others viewed them a taboo. Some people did not have any taste with tattoos and/or body piercings. Tattoos become so popular in so little time that it was hard for people to accept them. Tattoos were not considered art or a way of individualism. Tattoos were not considered as a way of expression. Many believed that it was morally wrong to tattoo and/or body pierce the entire body. However tattoos and body piercings never went out of style and continued to be popular not just in the United States but all over the world. After World War Two (WWII), many Americans decided to get a tattoo(s) to show their courage and bravery in the war. Tattoos and body piercings become a style and a fashion. Tattoos and body piercings became a trend and it is still a trend even to this day. They are both widely accepted like they were in many different culture all around the world. Different forms of tattoo art have been practiced by many different cultures of the world, over the centuries.Tattooing is one of the oldest practices in the United States. Tattoos have become part of our everyday life and we cannot stop it. Andres Martin, author of the essay On Teenagers and Tattoos states, Tattoos and piercing have become a part of our everyday landscape (24). Tattoos and body piercings in America are everyday things. Tattoos are not very easily removed and at the same time the procedure is very expensive and painful. But do people decide to get tattoos and/or piercings? According to Jane Caplan, Tattooing is one of many forms of irreversible body alteration, including scarification, cicatrization, piercing and branding, and it is the probable the oldest and most widespread of these (1). Work Cited Borel, France. The Decorated Body. Aims of Argument Text and Reader. 6th ed. New York: McGraw-Hill College, 2010. 40-42. Print. Caplan, Jane. Written on the Body: the Tattoo in European and American History. Princeton, New Jersey: Princeton UP, 2000. Print. Martin, Andres. On Teenagers and Tattoos. Aims of Argument Text and Reader. 6th ed. New York: McGraw-Hill College, 2010. 24-28. Print. Rubin, Arnold. Marks of Civilization: Artistic Transformations of the Human Body. Los Angeles, Calif.: Museum of Cultural History, University of California, 1988. Print.

Thursday, September 19, 2019

Iwo Jima Speech :: American History

Iwo Jima Speech DETAILED OUTLINE INTRODUCATION: 1. GAIN ATTENTION: (30sec PowerPoint Presentation) Good Morning Marines. My name is and your next period of instruction will be on the Island Iwo Jima 2. OVERVIEW: The purpose of this period of instruction is to give you a better understanding of the historical importance of Iwo Jima and the Flag raising that took place there. 3. INTRODUCE LEARNING OBJECTIVES:   Ã‚  Ã‚  Ã‚  Ã‚  A.TERMINAL LEARNING OBJECTIVES: Upon completion of this period of instruction you will understand the historical importance of the island Iwo Jima and identify the names of the six Flag Raisers.   Ã‚  Ã‚  Ã‚  Ã‚  B.ENABLING LEARNING OBJECTIVES: Upon completion of this class you will be able 1. To fully understand the historical importance of the Island of Iwo Jima 2. You will be able to identify the names of the six Flag Raisers 4. METHOD/MEDIA: This period of instruction will be taught by the lecture method with the aid of PowerPoint Presentation and handouts 5. EVALUATION: You will not be tested on this material, so please hold your questions until the end. TRANSITION: Now that you are aware of the course syllabus, allow me to move into the historical importance of the island Iwo Jima. 6. BODY: 1. HISTORICAL IMPORTANCE: Iwo Jima was Japanese home soil only 650 miles from Tokyo. No foreign army in Japan's 5000 year history had fought on Japanese soil. To the US, Iwo Jima was important because of its location, midway between Japan and American bomber bases in the Marianas. Iwo Jima with its three airfields was an ideal location for fighter-escort stations and as a safe haven for damaged bombers. TRANSITION: There are six men that standout from the rest, these men are known as the Flag Raisers. 1.  Ã‚  Ã‚  Ã‚  Ã‚  THE FLAG RAISING: Mount Suribachi is a 550 foot volcanic cone at the island’s southern tip. It dominates both possible-landing beaches, from this point Japanese gunners have every inch of the beaches covered. Every marine on the island was in range of Japanese guns. 2.  Ã‚  Ã‚  Ã‚  Ã‚  THE FLAG RAISERS: There were six flag raisers from the 28th Regiment, 5th Division. a.  Ã‚  Ã‚  Ã‚  Ã‚  Sgt. Mike Strank was the Marine who led the other five safely to the top of Mount Suribachi. He also gave the order to find a pole and attach the flag and â€Å"put’er up!† Sgt. Strank died on March 1, 1945. b.  Ã‚  Ã‚  Ã‚  Ã‚  Cpl. Harlon Block was Sgt. Strank’s second in command. He took over the leadership of his unit when Sgt. Strank was killed. Cpl. Block also died on March 1, 1945.

Wednesday, September 18, 2019

Robotics in Education Essay -- Essays Papers

Robotics in Education Robotics plays a critical role in the development and maintenance of the world today. The industrial age of machinery has been transformed into an age of automation combining mechanical, electrical, and computer engineering into the research and development of robotics technology. Practically everything automated today relies upon a robot of sort; automobile engines, personal computers, space exploration, assembly lines, and mining, to name a few. But each robotics advancement has a purpose, not just to function in it’s programming, but also to serve as a step in a stairway of progress. Without something to improve upon, how can progress be made? Anyway it’s looked at, the technology-dependent world today relies on the advancement in robotics as technology controls so much of the world already. Robotics is a research-based field, seeded in education. Education consists of two main parts today: general education, and advanced education. General education includes the basics in math, science, history, language, etc. This form of education is usually learned by a person throughout their K-12 education, and into much of college as well. Advanced education is comprised of more specific field-relative information, and is worked on by upper-level and graduate-level college students. The vast majority of robotics researchers did not receive any engineering training until they reached college, as robotics fits into the advanced education category. But skills such as critical thinking, creativity, and basic engineering skills are not difficult to master and could in fact be incorporated into general education without a problem. These skills are not in the curriculum because most people have not needed... ...s knowledge. Information for the beginner is given throughout the book, but it is still useful for the advanced. Current projects and status’ of the world of robotics are explained in detail. A book intended to inform a research-type person of summed knowledge. Not much relevance to the teaching or learning of robotics as a method. - Baum, Dave. Dave Baum’s Definitive Guide to Lego Mindstorms. Emeryville, Calif. : New York : Apress, 2000. This e-book is a comprehensive overview of the LEGOÂ ® Mindstorms robotics set. Most of the book is used on explaining the various parts to the set. Included are ideas and reasoning behind specifics of the set related to childhood development. Projects and useful ways of using the blocks are listed. Also included is info on how the blocks help develop specific engineering-based skills at such a young age.

Tuesday, September 17, 2019

Explore the Social and Political Factors

Explore the social and political factors that led to the formation of the national curriculum. The 1944 Education Act, put in place by the conservative president of the broad of education, R. A. Butler stated that there should be education for all, from primary all the way up to secondary education. That the duty of the local education authority should be one as to develop the spiritual, moral, mental and physical development of the community, that of school. However, during this time the only key requirements set out within the national curriculum based on what should be taught was for all schools to teach religious education.The national curriculum was not a guide for teacher to know what to teach, but rather the curriculum was largely determined by the teachers themselves, based on work topics commercially available within textbooks. Pupils were taught based on what was available rather than what was necessary to have a strong academic understanding. The curriculum for older pupil s tended to be based on examination syllabuses chosen by their teachers, again availability outweighing basic needs.There was limited influence from professional teaching bodies to introduce central direction of the curriculum allowing teachers to continue teaching an array of subjects and topics limited to resources of their textbooks. With such concern over falling standards of the education system within the UK, the early 1960s saw the Conservative minister of Education, David Eccles introduced a curriculum study group within the Department of education and Science. This group was then replace with the school council by Eccles successor Sir Edward Boyle in 1964 to look and develop the curriculum and education.The school council was formed with central and local government and teachers in order to oppose the accusation that the study group was self-ruled when governed by Eccles. The school council looked at new ways of teaching and assessing of subjects in order to create a consis tency. In the 1970s, concern rose again from the public, that the UK school system was not being well served. Under Shirley Williams as Labour Secretary of state, the Department of Education and Science and Her Majesty’s inspectors published papers on the curriculum issues, criticising both primary and econdary schools for their lack of balance in their curriculum and not accounting for changes occurring in society. In 1979 the Conservative Secretaries of State, Mark Carlisle, indicated that there should be a national consensus on a desirable framework for the curriculum following on from the Circular 14/77 report and review. This report led to Carlisle overseeing the abolition of the School Council and replacing it with the Curriculum and Development Committee and the Secondary Examinations council.Under Sir Keith Joseph as Secretary of State, 1985 saw the Better Schools White Paper recommended a proceeding with a nationally- agreed curriculum. In 1987 the Department of Educ ation and Science, under Kenneth Baker, issued a document that set out the foundation for a national curriculum. The document identified four key points: stability and consistency within the curriculum; a broad and balanced curriculum; support schools accountability and pupil attainment and aiding public understanding of the work of the schools.Following this, the 1988 Education Reform Act, passed by parliament set out the framework for the National Curriculum. Parliament’s key point in this development and centralisation of the curriculum was as follows: to promote the spiritual, moral, cultural and physical development of pupils which echoed the 1944 Education Act and to prepare pupils for the opportunities of adult life. The development of the National curriculum was overseen by two new advisory bodies, the National Curriculum council and the school Examination and Assessment Council.They sought expertise from a wide variety of educational backgrounds that drew on evidence and expertise throughout the education system emerging with a detailed framework for subject context which schools should be required to follow. The curriculum would be structured around Key Stages and be subject based, all subjects would be studied from age 5 up to age 16, covering the core subjects of English, Mathematics and science and foundation subjects of art, history, physical education, geography and music. Modern foreign languages would be taught from age 11.The syllabus would be set out in a Programme of study which would map out each subject at each Key Stage and include a scale of attainment levels to guide teacher’s assessment. Life and skills subjects were to be integrated within school teaching, including religious education and personal, social and health education. Testing within the National Curriculum was also implemented. These were drawn up by the Task Group on Assessment and Testing (TGAT). The TGAT sought to use a range of assessments that could be de livered and marked by teachers.Teacher’s assessments would be accompanied by national-administered standardised tests, known as key Stage Tests. These test results would then be published in performance tables to exhibit pupil’s levels of attainments. In 1989 the national curriculum was introduced into primary schools and was then rolled out across secondary throughout the 1990s. In 1991 key stage testing had began and by 1993 the inspection of schools was transferred over to Non-Ministerial Department of State from Her Majesty Inspectors and local authority inspection teams. The new inspection team was a independent body, the Office for Standards in Education (Ofsted).