Tuesday, December 24, 2019

A Comparative Study Of Classroom Teachers Perceptions...

Research Article Selected: A comparative study of classroom teachers’ perceptions towards inclusion. by K.H. Pritchard (2014). Summary of Article: Literature review The basis of this article is to evaluate the characteristics that impact teacher’s perceptions of inclusion in the classroom. There is a general consensus that the single most important predictor of successful inclusion is the attitude of the general education teacher (Golmic Hansen, 2012). The study surveyed both elementary and secondary teachers to determine if there was a difference in perception when it came to teaching students with special needs in their general education classroom. The study looked at several different factors including but not limited to teacher†¦show more content†¦The numerical data was then analyzed electronically using the SPSS database. Participants for this study were randomly chosen regular education teachers ranging from kindergarten through twelfth grade. Randomized participants received an electronic message with a link to complete a survey. The survey questions asked participants to agree/disagree/remain neutral on statements such as â€Å"students with disabilities cant be trusted with responsibilities in the classroom† or â€Å"students with disabilities should be educated in regular classrooms with nondisabled peers†. Participants answered the survey questions and turned it back into an generator called Survey Monkey which condensed the information of the survey as well as provided demographic information. That information was then put onto a spreadsheet so the researcher could adequately analyze the data. The researcher analyzed factors mentioned above such as gender, years of experience, and number of training hours concerning inclusion. This data was also compared to results from a study conducted 30 years earlier by Tallent (1986). Results: The main research question that Pritchard tried to answer was â€Å"What are the key identifiable characteristics that impact teachers perceptions towards inclusion?† Of the participants used, 44% were elementary (K-5) teachers and 56% were secondary teachers (6-12). Seventy-seven percent were female and 23% were male. There were

Monday, December 16, 2019

Midaq Alley as the Woman Free Essays

The women of the Middle East would continue to uphold their traditional image, even though in their heart of hearts many of them may be yearning for plain liberty.   The chief character of Naguib Mahfouz’s Midaq Alley (1992) is a woman by the name of Hamida, who must put up acts to stay true to her traditions, at the same time as she yearns for something beyond the ordinary.   Yet, her passage into a world where men and women must be considered equal is a narrow one. We will write a custom essay sample on Midaq Alley as the Woman or any similar topic only for you Order Now As a matter of fact, her life is the Midaq Alley, which â€Å"resembles a ‘trap,’ with walls on three sides, making darkness one of its pervasive features (Deeb).†Ã‚   What is more, there is a very narrow entrance and an equally narrow exit to the small alley – away from the big, outside world – that the Middle Eastern woman has come to represent in Mahfouz’s novel (Deeb). Yet, Hamida is not the kind to give up easily.   She sneers at her husbands-to-be simply because she wants something better than them, most definitely a life that is more prosperous, and outright superior, that is, the big, outside world.   She considers her husbands-to-be as nonentities because she thinks she can achieve well for herself without them.   At the same time, she is bounded by Middle Eastern customs and culture to choose one prospect and get married like ordinary girls (Mahfouz). Hamida admires the women who have escaped their marital bonds.   She is especially inspired by the factory girls she knows – who all happen to be Jewish.   She informs her mother about the same, â€Å"If you had seen the factory girls!   You should just see those Jewish girls who go to work.   They all go about in nice clothes.   Well, what is the point of life then if we can’t wear what we want? (Mahfouz)† According to Middle Eastern customs for women, Hamida must control her true desires before the cultural expectations that are attached to all women.   All the same, Mahfouz brings to the mind’s eye the picture of Middle Eastern women that are longing to free themselves from the bonds of patriarchy, and all the rules of society that are connected to the same.   Apparently, the Middle Eastern women would also like to free themselves from the difficult clothing they are forced to wear. Perhaps they would like breaks from such clothing.   While women such as Hamida may genuinely face a problem with restrictive customs, Mahfouz also describes the ‘proper’ girls that are not expected to show their desires anyway.   Boys of the Middle East, on the contrary, are allowed various other facilities, also according to the author.   Boys are permitted, among other things, access to sex, nightlife, and friendships outside the family (Mahfouz). When Hamida gets married to Abbas, she only does so to escape her mother’s home.   Escape seems to be her only wish.   She turns into a prostitute as soon as her husband leaves home for an indefinite period of time.   But, does she find her eventual escape route through this act?   It appears that while many Middle Eastern women may be searching for escape routes from traditions, once and for all, it was only Hamida who actually managed to escape.   Whether she had dreamt of reaching a brothel or not is not the point of Mahfouz’s tale. The fact remains that Hamida had no choice to live a liberated life as a Middle Eastern woman, except as a prostitute.   Most Middle Eastern women would shun the idea of prostitution altogether, calling it a major sin.   However, Hamida was so desperate to escape that she defied the common image of the Middle Eastern woman to truly escape her cultural constraints, once and for all.   Whether she also found happiness is not the concern of the author either.   Hamida’s liberation, on the other hand, is an important message of Midaq Alley (Mahfouz). Hamida was the kind who merely upheld the traditional image of the Middle Eastern woman, just as many other Middle Eastern women probably do.   At the same time, she was desperate enough to express her suppressed desires of liberation that she chose the career of prostitution so as to escape all associations with the patriarchal traditions.   Perhaps, therefore, Mahfouz’s writing is a warning for the extremely strict movements that reduce people to suppressed desperation, which eventually bursts into crimes and various other problems (Mahfouz). Works Cited Deeb, Marius. â€Å"Najib Mahfuz’s Midaq Alley: A Socio-Cultural Analysis.†   Bulletin (British Society for Middle Eastern Studies), Vol. 10, No. 2 (1983), pp. 121-130. Mahfouz, Naguib. Midaq Alley. Reprint edition. New York: Anchor, 1992.    How to cite Midaq Alley as the Woman, Essay examples

Sunday, December 8, 2019

Hadoop and Cloud Computing in Genomics †Free Samples to Students

Question: Discuss about the Hadoop and Cloud Computing in Genomics. Answer: Introduction This assignment is the analysis on the big data applications threats and the mentioned ways which is taken by the company to minimize the threats of the big data. The given assignment discusses about an organization known as the European Union Agency for Network and Information Security (ENISA) which has been the network center and working in the Information technology field to study the threat which can compromise the security of any nation (Kimwele, 2014).. The ENISA also assists the European nation bodys members regarding the improving network and its securities of the Information technology field. The big data concept which is the collection of the wide data which is both complex and not understandable the main purpose of big data is to draw some meaningful pattern or the algorithm from these data which will help them to study and analyze how a customer is performing various activities like shopping and accounting transaction. The source of the big data can come from anywhere be it a bank or hospitals(Kitchin, 2014). The data entered in these organizations is the big data which is utilized by the company. Various companies have reported that the application of the big data has helped them in understanding their customers and take proper decision according to the situation. Thus the big data application is not going to rise in the coming days and used in all the sectors of the company for doing business. The big data has application in the government sector which includes the military and the intelligence system. Despite of all the advantage of the big data the article enlists varies limitation and drawbacks of using big data. Though the big data has huge application it also has privacy and security threat to the country and the company. There are various threats related to the big data some of them are: The usage of the big data has not only put the ordinary and common data at risk but also the private and the confidential data at the risk(Walker 2014). The high replication and the outsourcing of the big data are the new type of the ways which has resulted in breaching and the leakage of the data. The big data usage has posed the threat to the privacy of the people which has compromised the security of the data. At the time of creation of the link in the case of the big data the collection of the big data is the major cause of the penalization the extra creation of the link is the major cause of the leakage of the information and data. The stake holders in the big data such as the data owners or the data transformers or the data providers differ in their view about the usage and security of the data their idea may conflict which make it a difficult environment for them to operate and devise a proper security plan for the data which compromise the security of the data. Lastly in various sectors of the information and communication technology (ICT). Different professionals are trying to apply their own privacy and security laws which are best according to them but on the overall security of the data it significantly decreases(Halenar, 2012). The big data rising pattern is embracing the Security-by-default principle though it is still in the early stage it has proved to be quite beneficial and highly practical in compare to the cost and effort in the invested in the ad hoc solution at the later time. The given assignment later focuses that there has been the huge gap between the issues of the big data and the counter measures designed to tackle the problems of the big data(Kayworth Whitten, 2012). Analyzing the gap the assignment has enlisted some of its own counter measure which can solve the limitation of the big data. The assignment further raises a valid question regarding current trend of the countermeasures for adapting the existing solutions which can be used against the current trends of the countermeasures for adapting the solution which is against the traditional data threats. The current environment of the big data is currently focused on the amount of the big data. The countermeasures which is currently existing is has been devised to counter the scalabilities of the big data which does not fit the big data problems which results in the partial and ineffective approach to the protection of the big data(Chen Zhang, 2014). The given assignment enlists some of its own guidelines and the countermeasures for the next generation of the data. These are: Firstly it tells to stop following the existing approach to the traditional data and work in defining the major data problems. Secondly it tells to identify the gaps and find the required needs for the current practices and to work in planning the specific definition and the specific standardization activities. Thirdly it tells to invest in training and teaching the IT professionals about the big data and aware them about the correct measures of usage of the big data(ODriscoll, Daugelaite Sleator, 2013). Fourthly it tells to work in defining the correct tools and to measure the security and privacy for the for the protection of Big Data and it environments. Fifthly it tells to analyze and find the assets to the big data and accordingly select the solutions which have minimal risk and threats.The assignment enlists some of the major threats which have been listed below: Threat due to Information leakage/sharing due to human error Threat due to Leaks of data via Web applications (unsecure APIs) Threat due to inadequate design and planning or incorrect adaptation. Threat due to inception of the information. Threat: Violation of laws or regulations / Breach of legislation / Abuse of personal data Threat: Failures of business process Above all the enlisted major threats the threat due to Leaks of data via Web applications (unsecure APIs) can be listed as the significant threat above all major threat(Labrinidis Jagadish, 2012). All other threat is due to the negligence of the human activity or failure in protecting the data. These major threats can be controlled by employing the correct person but the second major threat is due to the but the breaching of the data due to Web applications (unsecure APIs) is the breach which can take place due to the software which do not have enough capability to protect the data. According to the assignment various user of the big data has claimed that the security is the least concern for them while using the big data. The new software component designed for the big data is generally with the service-level authorization, but there are few utilities which is available to protect the core features and application interfaces (APIs). The big data are designed on the web service mode ls. The application interfaces (APIs) has become main target for all the cyber attack like in the case of like the Open Web Application Security Project (OWASP) which comes in the list of top ten and there are few solutions which can be used to stop them. The security software vendor Computer Associate (CA) and various other related sources find out via report that the data breaches are due to not a secure application interfaces (APIs) the social networks which includes the yahoo ,face book and snap chat and also in various photo and video sharing apps(Crossler et al 2012). The given assignment also gives the example of the Semantic Web technologies through its injection of its SPARQL code. It says that the flaw in the big data security is common and in the newly available languages like RDQL and the SPARQL where both are read-only query languages. There utilization has introduces a new vulnerabilities in the big data which was already present in the flaw of old-style query language s. The misuse of the languages is well aware and is dangerous for the usage. The collection of these new languages has already given the tool to check the user and minimize the risk. There are other big data software products for an example Monod, Hive and Couched who also suffers from the traditional threats which includes the execution of the code and the remote SQL injection(Provost Fawcett, 2013). The assets targeted by these threats belong to group Data and asset type Storage Infrastructure models (such as Database management systems (DBS) and Semantic Web tools). The threat agent is a person or organization who has the capability and clear intention to plant threats related to certain application like the big data and use them to spread cyber terrorism. Therefore it is crucial for the user to be well aware about the threats and to stay away from them as far as possible. Some of the threat agents are: Corporations: the cooperation category comes under the company which is involved in the offensive tactics. The cooperation is considered to be the threat agents as this cooperation spreads the cyber terrorism to gain the competitive advantage in the market by attacking its rival companies(Singh Khaira, 2013).Depending upon the cooperations market power and its sector the corporations generally acquires significant capabilities which can range from the singe technology up to human engineering intelligence, especially in their area of expertise. Cyber criminals: the cyber criminals are the threat agent who spreads the virus online and hack and breach the organization data for the financial reason. They hack into the companies data and steal the private and the confidential data to demand the ransomed from the company to give back the data like the winery ransomwae attack in the year 2017. Cyber terrorist: The difference between the cyber criminals and the terrorist that their demand above the financial reason. They want to destabilize the countrys political, social and religious base and spread terror in the country. They operate at the international level and spread the hatred message online to provoke the people. Online social hackers (activists): The social hackers are the threat agents mainly target the children and girls and torture them mentally promoting the cyber bully machines (Al-Aqrabi et al 2012). Script kiddies: they are basically unskilled or incapable hackers who use the programme and scripts of the hackers to hack the computer system. Employees: This category of the threat agent includes the employees who works for the particular organization and have access to the data of the company. They can be the security guards or the data operation manager. Nation states: Nation state is the rising threat which has become prominent in the recent times. Threat agent due to the deployment of sophisticated attacks that are considered as cyber weapons through the capability of these malware The above described threat agents are responsible for all the cybercrimes in the nation. In order to be protected from these threat agents. People should disclose their private information like photo or any private information. The hackers utilize this information to target these people and mentally torture them for the money. Secondly the company needs to keep tab on their employees of their activities against and stealing of the data. The ETL is full form is extraction, transformation, and loading. It is defined as the stages from the data is extracted from the desired location to the data is transformed into the desired target and finally to the loading where the data is loaded to deliver to the desired destination(Ackermann, 2012). According to the target requirement and last phase is the loading phase it is the phase in which the data is loaded into its warehouse and ready for the delivery. For the better performance of the ETL various steps are enlisted: Loading the data incrementally: for the better and efficient access of the data. The data should be arranged into certain pattern which can be increasing or decreasing according to the user demands this will help in better management of the data and it will to find the record afterward as the user will remember the pattern. The partition of the large tables: For better and efficient access to the data the large data table are divide into the smaller table so that data of the table can be easily seen ad be accessed. It will also it will help in quicker and efficient access of the data. It will allow easier switching of the data and quick insertion, deletion and updating of the table. Cutting out the extra data: another way the data can be simplified by cutting and eliminating the unwanted data. The data table should be regularly analyzed and the extra data should be eliminated for efficient access to the data. Usage of the software: there is software available in the market which can be used to simplify the work of reducing the data. The software can be the hardtop. It uses the HDFS application which segments data into the small part and make them into simple cluster. The data which is duplicated through which the system maintains the integrity automatically. The given assignment discusses about an organization known as the European Union Agency for Network and Information Security (ENISA) which has been the network center and working in the Information technology field to study the threat which can compromise the security of any nation (Ackermann et al 2012). It enlists the securities which include the usage of the big data which are not only the original data but the confidential data which are at risk as with the high replication of the big data for the purpose of storage and the outsourcing of the big data these type of the technology are new ways of the breaching and the leakage of the data. Secondly the big data are posing threat to the privacy of the individual which has the impact on the data protection. The given assignment later focuses that there has been the huge gap between the issues of the big data and the counter measures designed to tackle the problems of the big data. Analyzing the gap the assignment has enlisted some of its own counter measure which can solve the limitation of the big data. The assignment further raises a valid question regarding current trend of the countermeasures for adapting the existing solutions which can be used against the current trends. The assignment also enlists 5 major threats related to the data mining. The assignment also enlists threat agent such as cooperation, people, cybercrime which spreads the online hacking. Thus it can be conclude that the organization is not happy with the current security of the big data and it also recommended various countermeasures from its own side what can be done to prevent the misuses of the big data. References Ackermann, T. (2012).IT security risk management: perceived IT security risks in the context of Cloud Computing. Springer Science Business Media. Ackermann, T., Widjaja, T., Benlian, A., Buxmann, P. (2012). Perceived IT security risks of cloud computing: Conceptualization and scale development. Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y. (2012, April). Investigation of IT security and compliance challenges in Security-as-a-Service for Cloud Computing. InObject/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on(pp. 124-129). IEEE. Amanpartap Singh, P. A. L. L., Khaira, J. S. (2013). A comparative review of extraction, transformation and loading tools.Database Systems Journal BOARD, 42. Boyd, D., Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon.Information, communication society,15(5), 662-679. Chen, C. P., Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data.Information Sciences,275, 314-347. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Halenar, R. (2012). Real Time ETL Improvement.International Journal of Computer Theory and Engineering,4(3), 405 John Walker, S. (2014). Big data: A revolution that will transform how we live, work, and think. Kayworth, T., Whitten, D. (2012). Effective information security requires a balance of social and technology factors. Kimwele, M. W. (2014). Information technology (IT) security in small and medium enterprises (SMEs). InInformation Systems for Small and Medium-sized Enterprises(pp. 47-64). Springer Berlin Heidelberg. Kitchin, R. (2014).The data revolution: Big data, open data, data infrastructures and their consequences. Sage. Labrinidis, A., Jagadish, H. V. (2012). Challenges and opportunities with big data.Proceedings of the VLDB Endowment,5(12), 2032-2033. Loske, A., Widjaja, T., Buxmann, P. (2013). Cloud Computing Providers Unrealistic Optimism regarding IT Security Risks: A Threat to Users?. McAfee, A., Brynjolfsson, E., Davenport, T. H. (2012). Big data: the management revolution.Harvard business review,90(10), 60-68. ODriscoll, A., Daugelaite, J., Sleator, R. D. (2013). Big data, Hadoop and cloud computing in genomics.Journal of biomedical informatics,46(5), 774-781. Provost, F., Fawcett, T. (2013). Data science and its relationship to big data and data-driven decision making.Big Data,1(1), 51-59. Rakes, T. R., Deane, J. K., Rees, L. P. (2012). IT security planning under uncertainty for high-impact events.Omega,40(1), 79-88. Tankard, C. (2012). Big data security.Network security,2012(7), 5-8. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media.

Saturday, November 30, 2019

Rape as a Tool of War in DRC

The Democratic Republic of Congo (DRC) has undergone a series of war over the past fifteen years. The first war that broke out in 1996 and ended in 1997, ousted long time ruler Mobutu Sese Seko and brought to power Laurent Kabila, a rebel leader supported by Rwanda and Burundi (HRW 35).Advertising We will write a custom essay sample on Rape as a Tool of War in DRC specifically for you for only $16.05 $11/page Learn More The second war from 1998-2003, started when Laurent Kabila disagreed with his initial backers, propelling Rwanda and Uganda to invade the east of the country. The war led to the death of approximately 5.4 million people. Sexual violence was widespread and sometimes systematic. Rival groups used it as a tool of war to deliberately terrorize civilians, to exert control over them or punish them for perceived collaboration with the enemy. Reports indicate that armed groups would abduct women including young girls and use them as sexual slaves (HRW 40). Many of the crimes committed amounted to crimes against humanity. In fact, women affirmed that the war was being fought on their bodies (HRW 43). Sexual violence continued in the Congo throughout the peace process and the national elections in 2006. In Eastern Congo, new armed groups emerged leading to continued perpetration of rape cases. Reports indicate that sexual violence against women continued in North Kivu in 2008 due to intense fighting between rival groups (HRW 44). Incidences of rape propagated by civilians have notably increased in the recent past. This is due to an increase of demobilized combatants who have reintegrated into society amid poor rehabilitation measures in society. The brutalization of society that has eroded protective social norms also contributes to these crimes (HRW 45). These atrocities against women have led to the crowning of Congo as the worst place on earth to be a woman. The Congolese national army (FARDC) is considered as the key perp etrators of sexual violence. The army came into place after the installation of the transitional government in June 2003 (HRW 56). This army brought soldiers from all the leading rebel groups as well as former government army together. The strategy aimed at creating harmony. Officer and commander groups were divided up between them. In addition, the transitional government introduced a new policy called mix-up in which new brigades were formed comprising of soldiers from main rival groups.Advertising Looking for essay on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More This policy targeted to break former chains of command and enhance the integration of former enemy combatants into new units. A rapid integration process that took place in 2009 saw estimated 12,000 combatants from rebel groups join the national army. The national army was estimated to have close to 60,000 soldiers after, the integration process. The national ar my encountered long standing problems that included indiscipline, pay, command and control and contributed further to the world scale abuses committed with impunity by the Congolese soldiers. Since they had been deployed throughout the country, the soldiers formed the largest perpetrators of rape cases. Since the army was characterized by gross misconduct, army officers could not stop sexual violence or punish undisciplined soldiers. The war in the Democratic Republic of Congo led to a serious economic crisis. First, the war caused massive destruction on the local infrastructure. This caused a reduction in the local production of the country. Secondly, the war brought to a halt the local banking industry. Entrepreneurs could not access funds to revive the local infrastructures and get their businesses running. Foreign investors and international lending institutions withdraw their support. The rebel leaders took control of trans-border commerce (Vlassenroot and Raeymaekers 56). The rebel leaders also led to the formation of informal tax payments systems. Business men who wanted to progress had to form friendly relationships with the rebel leaders who controlled the movement of goods. The businessmen had to pay pretax on custom duties to get favors from the military leaders. The situation derailed anyone who thought of running a business in the Congo. Consequently, manufacturers and traders had to deal with a steep increase in prices of imported household products. In addition, prices for local agricultural products rose. The war led to a shift from local production, to the importation of already made products from foreign countries. In conclusion, it can be noted that the war in the Democratic Republic of Congo significantly affected women. Fighting parties used the women as tools of war. Women were raped by soldiers of their rival groups in retaliation and held hostage in exchange for their husbands. The situation worsened further when rebel groups sprang up and propagated sexual violence against women. Women literally run away from soldiers and the armed bandits. The transitional government army that comprised of soldiers from chief rival groups had gross misconduct amongst its soldiers.Advertising We will write a custom essay sample on Rape as a Tool of War in DRC specifically for you for only $16.05 $11/page Learn More The army’s main intention was to create harmony amongst the rival groups. However, gross misconduct and poor coordination prevailed in the army. The women suffered extensive physical and psychological effects. Despite of the vast economic potential of the Democratic republic of Congo, the country has not realized its expected economical returns. The series of wars destabilized the country’s economy. Works Cited Human Rights Watch (HRW). Soldiers who Rape, Commanders who condone: Sexual Violence and Military Reform in the DRC. New York: HRW, 2009. Print. Vlassenroot, K. and Ra eymaekers, T. Conflict and Social Transformation in Eastern DRC. Massachussets: Academia Press, 2009 Print. This essay on Rape as a Tool of War in DRC was written and submitted by user Esmeralda Wilkinson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

A Bridge to Wiseman essays

A Bridge to Wiseman essays "A bridge to wisemans cove" is a lively and adventurers story of a young boys journey who is seeking for an answer. Carl is a person who is trying to find self- discovery and self-worth you see this in different ways throughout this novel. His journey is tuff and at the end when you think it is over he realizes his worst nightmare. At the start of the novel we see that Carl can be shy at times and doesnt handle some situations well. But he is a very bright person but is looking for love and attention. Carl realized straight away what was happening when he overheard a conversation that his sister Sarah had with their Aunt Beryl. He knew somehow that when Sarah said that they would only be there for a few weeks that she ment till their mother came back or she was going to leave them there while she enjoys the rest of her life. Carl changes a lot as he goes on to live with Harley at their Aunt Beryls home at Wattle beach. At the start when they hear about going to wattle beach they had mixed emotions. Them being that they were looking forward to going to the beach but didnt want to live with their auntie because she is very strict. Aunt Beryl tells call in order to live with her he would need to find a job. So Carl quits school and goes in search for a job to make money to live with their auntie. Carl realizes that the working life is tough especially at his age with the last name as Matt. There also werent many businesses that needed his help. He finally got a job and grows up into a young man. Carl becomes upset after finding out the reason that Matt is such a hated name. ...

Friday, November 22, 2019

Creating and Using Resources in Visual Basic 6

Creating and Using Resources in Visual Basic 6 After Visual Basic students learn all about loops and conditional statements and subroutines and so forth, one of the next things that they often ask about is, How do I add a bitmap, a wav file, a custom cursor or some other special effect? One answer is resource files. When you add a file using Visual Studio resource files, theyre integrated directly into your Visual Basic project for maximum execution speed and minimum hassle packaging and deploying your application. Resource files are available in both VB 6 and VB.NET, but the way theyre used, like everything else, is quite a bit different between the two systems. Keep in mind that this isnt the only way to use files in a VB project, but it has real advantages. For example, you could include a bitmap in a PictureBox control or use the mciSendString Win32 API. MCI is a prefix that usually indicates a Multimedia Command String.   Creating a Resource File in VB 6 You can see the resources in a project in both VB 6 and VB.NET in the Project Explorer window (Solution Explorer in VB.NET - they had to make it just a little bit different). A new project wont have any since resources arent a default tool in VB 6. So lets add a simple resource to a project and see how that is done. Step one is to start VB 6 by selecting a Standard EXE project on the New tab in the startup dialog. Now select the Add-Ins option on the menu bar, and then the Add-In Manager... This will open the Add-In Manager dialog window. Scroll down the list and find VB 6 Resource Editor. You can just double-click it or you can put a check mark in the Loaded/Unloaded box to add this tool to your VB 6 environment. If you think youre going to use the Resource Editor a lot, then you can also place a check mark in the box Load on Startup and you wont have to go through this step again in the future. Click OK and the Resources Editor pops open. Youre ready to start adding resources to your project! Go to the menu bar and select Project then Add New Resource File or just right-click in the Resource Editor and select Open from the context menu that pops up. A window will open, prompting you for the name and location of a resource file. The default location will probably not be what you want, so navigate to your project folder and enter the name of your new resource file into the File name box. In this article, Ill use the name AboutVB.RES for this file. Youll have to confirm the creation of the file in a verification window, and the a AboutVB.RES file will be created and filled into the Resource Editor. VB6 Supports VB6 supports the following: A string table editor(Edit String Tables...)Custom cursors - CUR files(Add Cursor...)Custom icons - ICO files(Add Icon...)Custom bitmaps - BMP files(Add Bitmap...)Programmer defined resources(Add Custom Resource...) VB 6 provides a simple editor for strings but you have to have a file created in another tool for all of the other choices. For example, you could create a BMP file using the simple Windows Paint program. Each resource in the resource file is identified to VB 6 by an  Id  and a name in the Resource Editor. To make a resource available to your program, you add them in the Resource Editor and then use the Id and the resource Type to point to them in your program. Lets add four icons to the resource file and use them in the program. When you add a resource, the actual file itself is copied into your project. Visual Studio 6 provides a whole collection of icons in the folder... C:\Program Files\Microsoft Visual Studio\Common\Graphics\Icons To go with tradition, well select the Greek philosopher Aristotles four elements - Earth, Water, Air, and Fire - from the Elements subdirectory. When you add them, the Id is assigned by Visual Studio (101, 102, 103, and 104) automatically. To use the icons in a program, we use a VB 6 Load Resource function. There are several of these functions to choose from: LoadResPicture(index, format)  for bitmaps, icons, and cursors Use the VB predefined constants  vbResBitmap  for bitmaps,  vbResIcon  for icons, and  vbResCursor  for cursors for the format parameter. This function returns a picture that you can use directly.  LoadResData  (explained below) returns a string containing the actual bits in the file. Well see how to use that after we demonstrate icons. LoadResString(index)  for stringsLoadResData(index, format)  for anything up to 64K As noted earlier, this function returns a string with the actual bits in the resource. These are the values that can be used for format parameter here: 1 Cursor resource2 Bitmap resource3 Icon resource4 Menu resource5 Dialog box6 String resource7 Font directory resource8 Font resource9 Accelerator table10 User-defined resource12 Group cursor14 Group icon Since we have four icons in our AboutVB.RES resource file, lets use  LoadResPicture(index, format)  to assign these to the Picture property of a CommandButton in VB 6. I created an application with four  OptionButton  components labeled Earth, Water, Air and Fire and four Click events - one for each option. Then I added a  CommandButton  and changed the Style property to 1 – Graphical. This is necessary to be able to add a custom icon to the CommandButton. The code for each OptionButton (and the Form Load event - to initialize it) looks like this (with the Id and Caption changed accordingly for the other OptionButton Click events): Private Sub Option1_Click()   Ã‚  Ã‚  Command1.Picture _   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  LoadResPicture(101, vbResIcon)   Ã‚  Ã‚  Command1.Caption _   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Earth End Sub Custom Resources The big deal with custom resources is that you normally have to provide a way to process them in your program code. As Microsoft states it, this usually requires the use of Windows API calls. Thats what well do. The example well use is a fast way to load an array with a series of constant values. Remember that the resource file is included into your project, so if the values that you need to load change, youll have to use a more traditional approach such as a sequential file that you open and read. The Windows API well use is the  CopyMemory  API. CopyMemory copies block of memory to a different block of memory without regard to the data type that is stored there. This technique is well known to VB 6ers as an ultra fast way to copy data inside a program. This program is a bit more involved because first we have to create the a resource file containing a series of long values. I simply assigned values to an array: Dim longs(10) As Longlongs(1) 123456longs(2) 654321 ... and so forth. Then the values can be written to a file called  MyLongs.longs  using the VB 6 Put statement. Dim hFile As Long hFile FreeFile() Open _   Ã‚  Ã‚  C:\your file path\MyLongs.longs _   Ã‚  Ã‚  For Binary As #hFile Put #hFile, , longs Close #hFile Its a good idea to remember that the resource file doesnt change unless you delete the old one and add a new one. So, using this technique, you would have to update the program to change the values. To include the file MyLongs.longs into your program as a resource, add it to a resource file using the same steps described above, but click the  Add Custom Resource...  instead of Add Icon... Then select the MyLongs.longs file as the file to add. You also have to change the Type of the resource by right clicking that resource, selecting Properties, and changing the Type to longs. Note that this is the file type of your MyLongs.longs file. To use the resource file you have created to create a new array, first declare the Win32 CopyMemory API call: Private Declare Sub CopyMemory _   Ã‚  Ã‚  Lib kernel32 Alias _   Ã‚  Ã‚  RtlMoveMemory (Destination As Any, _   Ã‚  Ã‚  Source As Any, ByVal Length As Long) Then read the resource file: Dim bytes() As Byte bytes LoadResData(101, longs) Next, move the data from the bytes array to an array of long values. Allocate an array for the longs values using the integer value of the length of the string of bytes divided by 4 (that is, 4 bytes per long): ReDim longs(1 To (UBound(bytes)) \ 4) As Long CopyMemory longs(1), bytes(0), UBound(bytes) - 1 Now,  this may seem like a whole lot of trouble when you could just initialize the array in the Form Load event, but it does demonstrate how to use a custom resource. If you had a large set of constants that you needed to initialize the array with, it would run faster than any other method I can think of and you wouldnt have to have a separate file included with your application to do it.

Thursday, November 21, 2019

1) Unit of work for listening and speaking skills for ESL primary Essay

1) Unit of work for listening and speaking skills for ESL primary Enlish classroom. 2) An stating the rationale, theoretical principles, reflection for th - Essay Example Not all aspects of the text chat and face-to-face environments are similar. In text chat, it is possible for several participants to participate simultaneously. This unit is designed for the pupils of primary level around the age of 10 years. This unit contains some dialogues, narratives and some interesting and absorbing exercises for enhancing listening and speaking capabilities of pupils. The topic of unit is quite interesting. The unit revolves round the unlucky Friday 13th. It focuses on the superstitious aspect of western culture. The topic of unit not teaches language skills but it also introduces non-native pupils to the culture of the western society. The unit theme is quite absorbing and motivating. Pupils would automatically try to speak about the unfortunate incidents took place in the life Emily on that unlucky Friday. A lesson plan is a comprehensive and predetermined schedule of every activity of teacher in classroom for achieving optimal results. A lesson plan can be of many forms and types. It usually depends on time span, style of educator and type of subject to be taught. But the basic and main objective of any type of lesson plan is to provide teacher a pre-planned line of action for presenting materials and interacting with learners. The lesson plan should not be merely a action plan but it should provide a useful link between objectives of curriculum and material to be taught. Motivate students by telling them about the poor Emily who faced lot of hardships on unlucky Friday. Tell the students background of Friday 13th that is considered unlucky. Tell them how much hardships she faced on that particular day but how boldly she faced them. Encourage students to be bold if such situation may arise in their daily routine. It will create intimacy with the character. Tell the students the how important is listening for correct speaking. Tell them

Tuesday, November 19, 2019

Building Successful Relationships Essay Example | Topics and Well Written Essays - 1250 words

Building Successful Relationships - Essay Example What could probably be one of the most important relationships in a person’s life would be with a loved one who will reciprocate the love given. However, it should be noted that relationships do not just grow like weeds in the garden but are like flowers that have to be intentionally grown, needing love and care. Personally, I have learned important matters that need to be considered in having a relationship to make it beneficial to the parties involved. I once had a relationship in my earlier years that helped me realize my mistakes and that is helping and guiding me in the relationship that I currently have. Just a few years ago, I struggled in a relationship that I had with a girl that I met in school. She is pretty, cheerful and fun to be with and I liked her for being so loving and caring. She always wanted us to be together, spending time with each other and talking about anything only to pass the time together. However, being the outgoing person that I am, I always found it difficult to find time for her and this made her complain about my attitude. She said that I was to being inconsiderate of her need to be with me and our relationship to be nurtured. She doubted my feelings toward her because I seemed to be more indulged with my friends than with her. Although I tried to explain th at my shortcomings are not the measure of my love for her, I somehow failed to make it appear so to her and, we ended breaking up. The break up was difficult for me. I guess I really loved her so much that I was greatly affected when we had to part ways. I struggled emotionally and psychologically. There were times that I could not sleep well thinking of her. I tried to make things straight with my former girlfriend, asking for another chance for me to become a better partner to her, telling her that I have already learned my lessons. Nevertheless, that is perhaps the extent of understanding that she could give me. She asked me to stop wasting my time going after her. It took me time to finally overcome the grief I felt before I finally bounced back to normalizing my activities and making new friends. I could say that my current relationship is going smoothly because I have learned a lot from my mistakes from my past relationship. It is not that my relationship with my present girlf riend is perfect but at least, we are able to work out our differences and make our relationship work. I found out that truly, a relationship should be nurtured to make it grow. When I first had a relationship, communication was open and regular during the first few months but then, I stopped getting in touch with my former girlfriend on a regular basis because I thought I was already familiar with her and was very sure I knew her very well then. Now, I maintain communicating with my friend to avoid similar problems I had in the past. Whenever we are not able to see each other during the day, I always make it a point to call my girlfriend and ask how she is and how she spent her time. I think this makes our bond stronger because she sees that I am making efforts to show how concerned I am about her. Moreover, whenever I tell her how I spent my day, she stops worrying about me and understands how I spend my time so that whenever I am not able to make it for our dates or other planned activities together, she tries to be considerate and understands

Saturday, November 16, 2019

Criminal Justice Essay Example for Free

Criminal Justice Essay Herbert Packer a professor from Stanford University came up with two models of how the criminal justice system works. The two models that Herbert Packer had came up with is the crime control model and due process model.The crime control model is based on conservative values such as aggressive arrest, prosecution and conviction of criminals and makes the system more efficient and safer for people. The due process control is basically protecting an individual’s rights whether they’re accused and to protect the innocent people from conviction. According to the article , neither models should be used because both the crime control and due process model have both significant strengths and weaknesses. For example, one weakness of a due process model is it only protects the accused individual rights and not the victim. Also the articles claims that â€Å"both appear to have potential pitfalls and dangers that could threaten both safety and security and the individual freedoms that have made the United States a beacon of stability and freedom throughout the world†. The article also states that crime control model is too harsh while the due process model is just soft on the accused individuals. While the crime control model is aggressive arrest and it could be trouble if the police officers arrest the innocent by accident and during the aggressive arrest it may hurt the victims also.This shows that neither models should be used due to all the reasons above. Herbert Packer feels that both methods should be combined to prevent weaknesses in the model while gaining more strengths and less dangers to the society. Also Herbert Packer feels that if the models were combined, it’ll be the best strategy to deal with crimes days in the future. With the criminal control model being harsh and the due process being more soft on the accused, they would make a great team which adjusting the levels to just right not too harsh or too easy. These reasons above states why Herbert Packer feels that both models or methods should be combined. Based on all the facts given to me, I would prefer the crime control model because crime control model could actually prevent more crimes while the due process model would increase the amount of crimes a year. Also the crime control model enforces the law while the due process model doesn’t. I would prefer the crime control model also because it’s better to be safe than sorry and increases the social order in that certain area. Since the due process model is too easy on the criminal, there may be a chance that the individual would commit another crime and in society it is important to maintain social order or there would be chaos.I also think that if the crime control model is including traffic stops ,wiretapping and surveillance , it’ll still protect the victim and the criminal somehow. The crime control model is necessary to make a free society. With the crime control model, the criminal justice system should be more efficient than ever. The crime control model increases the police powers which make the criminal afraid of committing any more crimes. This is shows why I prefer the crime control model over the due process model. Herbert Packer a professor from Stanford University came up with two models of how the criminal justice system works. The two models that Herbert Packer had came up with is the crime control model and due process model. In conclusion, there are many strengths and weaknesses among the models but still the crime control method is more important in order to prevent crimes from increasing.

Thursday, November 14, 2019

Miguel de Cervantes y Sigmund Freud :: Spanish Essays

â€Å"Teorà ­a Freudiano ofrece lo à ºnico modelo de leer que puede afirmar a causar un texto a hablar mà ¡s que sabe.†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  --Peter Hulme La historia del psicoanà ¡lisis es muy compleja y llena de preguntas y controversia, y nadie està ¡ completamente seguro quien es el fundador principal porque muchas de las ideas llegaron al mismo tiempo. Sigmund Freud recibe mucho del crà ©dito por el comienzo y la implementacià ³n del psicoanà ¡lisis, pero siempre hay la posibilidad que sus ideas llegaron de un origen que no era completamente suyo. Considerando esto, muchas de las ideas que expresa Freud està ¡n evidentes en la literatura que llegà ³ antes de su fama. Las dos partes de Don Quijote, por ejemplo, fueron realizadas en 1614, mà ¡s de doscientos aà ±os antes del nacimiento de Freud. Entonces, hay una posibilidad de que Cervantes contribuyà ³ a unas de las teorà ­as y pensamientos de Freud.   Ã‚  Ã‚  Ã‚  Ã‚  Sabemos por seguro que Freud leyà ³ el Don Quijote de Cervantes y que lo le fascinà ³. Hay algunas partes distintas de la historia a cuales se puede relacionar los ensayos de Freud. Aquà ­ centrarà © en unas de sus teorà ­as mà ¡s conocidas, y estas son: el inconsciente (incluyendo los sueà ±os) y la sublimacià ³n. Estos tres temas, aunque està ¡n presentados separados, tienen muchà ­simo en comà ºn. A causa de eso, a veces la discusià ³n parecerà ¡ un poquito mezclado. â€Å"Hay mà ¡s personas que creen en los milagros de la Virgen Bendecida que creen en la existencia del inconsciente.†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  --Sigmund Freud   Ã‚  Ã‚  Ã‚  Ã‚  El inconsciente (o el subconsciente) refiere al aspecto o aspectos de la mente sobre que no estamos directamente conscientes . Por la mayorà ­a, la parte mà ¡s importante del inconsciente es los sueà ±os. Siempre estamos fascinados con nuestros sueà ±os y queremos saber lo que significan. Los sueà ±os no incluyen solo lo que pasa cuando dormimos, pero tambià ©n los pensamientos durante el dà ­a que nos separan de nuestro ambiente o, a algunas personas, nuestras confusiones entre lo real y lo imaginario.   Ã‚  Ã‚  Ã‚  Ã‚  La à ºltima interpretacià ³n es lo mà ¡s obvia cuando consideramos las aventuras de Don Quijote. Parece que à ©l nunca para de confundirse de lo real y lo imaginario. Cada de sus aventuras contiene un aspecto casi loco: molinos de viento como gigantes, rebaà ±os de ovejas como ejà ©rcitos, y los galeotes como caballeros oprimidos. Sin embargo, todavà ­a hay una referencia grandà ­simo en Don Quijote a los sueà ±os. â€Å"Los sueà ±os mà ¡s profundos son los que parecen mà ¡s locos†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  --Sigmund Freud Durante la segunda parte de la historia, Don Quijote viaje a la Cueva de Montesinos.

Monday, November 11, 2019

Football Accident

Period 5 11/1/12 Unthinkable When I look at my life, and I think about the hardest things for me to overcome, I would have to say, the ultimate being, telling my mother and father that I would be sitting out of football my senior year of high school. Most would say how could this possibly be something that you would find challenging, but then you don’t know my mother and father. I started playing sports, football, in particular, at the age of 7. I was kind of a chunky little kid, even had a funny gait when I ran, but you couldn’t tell that if you talked to my parents. To my mom and dad, I was a superstar.I started playing flag football through the YMCA program, and then moved up to Pop Warner. Here’s the crazy part. My mom or dad came to every practice, and every game, rain or shine. I think I was the only kid that knew one of my parents would be on the sidelines, whether at practice or a game. Now to be honest, those were tough years for me, as most times, my pa rents would be watching me sitting on the bench, because I did not get to play very often. During those years, I put on a brave face and never let my parents know how embarrassed I was and how I felt I let them down.The crazy part was, when my parents met with other player’s parents, they talked about me like I was the star of the team, never made me feel bad for not playing in a game. Again, come rain or shine, they were always there for me. Those were tough years for me. Every coach found a reason why I just wasn’t ready to be a starting player. Then something really incredible happened during my 7th grade year. This didn’t start off incredible, in fact, it was quite humiliating. Everyone that wanted to try out for the 7th grade football team met after school one day.Here were all the players and parents that I had been playing with for the last six years, and as the kid that sat on the bench most of the time, you can imagine, I was the odd man out. All these parents bragging about their own kids, the great plays, the touchdowns, but there stood my mom and dad, proud as ever. They were with their superstar. As the three of us stood there together, my father later told me that it was one of the most intimidating days he’d had in a long time, looking at the parents of the kids that got to play. My mother told me to do the best I could do, and my day would come.My dad always said because he wasn’t a coach or assistant coach on these teams, I didn’t get a fair chance, but in my heart, I just didn’t think I was a great player. Good, yes, but not great. Tryouts came and went, and once again, I assumed I would be a bench warmer. As I said earlier, this turned out to be an incredible year, and something happened that I never expected. Now that I look back, I still have to ask myself, â€Å"Did that really happen? †   Ã‚   All of the kids I played football with throughout the years were, of course, picked for the starting positions.Some of these very kids have made headlines in the last couple of years, but let’s get back to me. One cold dark evening, my Hedrick team was playing the Talent Bulldogs and one of the kids that normally played the wide receiver position was sick that day. The coach asked me to step in and give it a try. I can’t describe the butterflies in my stomach. My hands and knees shook and my heart began to race. I finally was given a chance and I was terrified. Well, guess what? Not only did I catch the ball and run it in for an 80 touchdown yard touchdown, but I did this game and game again.After gaining the starting wide receiver position, I gained the starting linebacker position and proved my dominance once again on the field. At the end of the season, I was voted Most Valuable Player for both offense and defense for not only junior varsity but for varsity as well. Now, with that said, you can only imagine my parents. Their son going from a bench play er to the number one player on both teams. My parents would run down the sidelines, whooping it up as I ran the ball. They finally had the superstar they’d been waiting for. Over the next few years, my playing improved, and I had moved to high school ball.Playing varsity for north as a freshman, and just like before, my parents did not miss a practice or game, even if it meant driving a few hundred miles. My parents and especially my dad kept waiting for my next big break, my time to shine. Then in my junior year, I found myself transferred to a new school, tried out and actually made the Varsity football team. My parents were so proud of me, and I was proud of myself. I don’t know who was more excited, me or my parents. My parents were on Cloud Nine, talking about nothing but football and Friday Night Lights.It was an exciting time of my life. The coach tried me out at Outside Linebacker, because of my speed, strength, and my ability to get around the offensive line. Then the unthinkable happened at practice. I was sent in on a blitz, and hit the offensive lineman with my shoulder. It felt like my arm had been ripped from its socket as I writhed on the ground in pain. The trainers ran over and rushed me to the hospital. I never would have guessed in a million years what a fateful day that would be. My shoulder was completely out of its socket, the tendons and ligaments torn.The most important year of my life had just been stripped away from me. Not only was surgery required, but months of physical therapy. My orthopedic doctor told me I could no longer play football without risking irreparable damage. I never told my parents this, and the doctor never told them. I kept that dream of Friday night lights in my parent’s hearts until I should have been signing up for football camp. This is when I had to tell them what the doctor said, and there would be no football in my life, no letter, no photos, and no glory. To me, this was the hardest da y of my life.On this day, I knew I was breaking my parent’s hearts. Everything they had looked forward to for my senior year of football was gone. I played the game, but they had lived the sport. Something died this day, maybe just a dream of mine, but it seemed so much more. Like a part of me was left on the field that sad day that I suffered my injury. To this day I day dream of the achievements I could have over came if I had no suffered that injury. Maybe one day when I have kids I will be able to live my football career through my future son†¦ but until that day comes I’m stuck watching in the stands

Saturday, November 9, 2019

Leading and managing changes Essay

1.1Background The David Jones is iconic department store in Australian retail industry, but the net profit of David Jones has been decreasing because of the rapid retail environmental changes, unhealthy cultures, and global online attack. The problems of declining net profit in David Jones are creating make it essential to apply the most suitable change management for company. 1.2Aim The aim of this report is not only applying the change management theory, model, and style for David Jones and David Jones’ CEO, Paul Zahra, but also supporting the arguments through case studies in order to find practical solution. 1.3Scope This report presents the view that a positive model, modular transformation and incremental change are the most suitable change management theory that can be implemented for David Jones. Also, a coercive style of management is a suitable style of management for David Jones’ CEO, Paul Zahra. The findings and analysis of performance for each theory, model, and style are justified by a critical comparison of the change management theories, models, styles and practical problem solution cases. Moreover, the improvements for David Jones’ restructure are discussed. 2.0 MODEL OF PLANNED CHANGE FOR DAVID JONES 2.1 David Jones issues David Jones is the oldest department store in Australia and was established in 1838. Until 2010, David Jones worked successfully in the Australian market, especially from 2007 to 2010. During that time, the net profit of David Jones increased from $109.5 million to $156.5 million, but the significant growth in the net profit dropped slowly from $156.5 million to $101.1 million by 2012. The slow decrease in the net profit of David Jones is caused by unhealthy organisational culture, global online retail attacks and retail environmental changes. In order to reconfirm David Jones’s importance in the Australian retail and consumer market, the best planned change model has to be chosen for David Jones. 2.2 Comparison of  planned change models for David Jones Cummings and Worley (2009) summarise the differences of three major models of planned change. The first one is Lewin’s change and action research model, which are more focused on fixing problems than concentrating on what the organisation does well and gaining those strengths. Also, Lewin’s change model, a three-stage model, claims that adaption of these forces maintain the status quo, which leads to efficient strategy for change (Waddell, Cummings & Worley 2007). The three-stage of Lewin’s change model is shown in figure 1(A). Moreover, the action research model is a cyclical process, which is determined by eight steps that fix problems using frequent research (Cummings & Worley 2009). Eight steps of action research are shown in figure 1(B). On the other side, a positive model focuses on positive dynamics in an organisation that improves the extraordinary results (Waddell, Cummings & Worley 2014, p. 39). This model is described by in five steps, which is shown in figure 1(C).   Figure 1: The comparison of planned change models (Cummings & Worley 2009, p.25) 2.3 Positive model for David Jones According to David Jones case study, the positive model of planned change is the best suitable one for David Jones because: †¢ it is proved that in order to survive with today’s uncertainty and huge competitive business environment, organisations need to focus on more business environmental changes than fixing the organisational problems (Waddell, Cummings & Worley 2014, p. 39) †¢Cristian-Liviu (2013, p. 1690) notes that the resistance for change causes the failure of strategic implementation because employees try to maintain their culture. Also, Ruxandra and Camelia (2013, p. 127) noted that resistance to change may create lots of problems during the change process such as activity drawl, activity slow-down, delays in launching and change process, and delayed and inefficient performance. †¢Sandra and Tracy (2012) indicate that bad news in business leads to poor financial outcomes, and external and internal crisis. †¢ it is supported by case studies that the linkage between inability of identifying of retail environmental changes and Zahra’s new rescue plan for David Jones failed because after the new rescue plan of Zahra, net profit and share price continued to decrease. Moreover, the case study said that ‘it may be a good five years before strategy can be assessed properly’ (Waddell Waddell, Cummings & Worley 2014). On the other hand, Lewin’s change model or action research model is not suitable for David Jones case because of focusing on more problems in the organisation than concentrating on retail environmental changes. The result of implementation of Lewin’s change model or action research model would be led to the strategic failure. The possibility of positive model of planned change for David Jones makes it necessary for the company to use positive model. 3. THE CURRENT RESTRUCTURE OF DAVID JONES 3.1 Current business restructure analysis Even though this report agrees with the current restructure and rescue plan of David Jones, which were divided main three parts including eleven subparts that are renovating store policies, focusing its core strengths, and transferring from traditional business to technologically oriented business, I want to add two main parts that are sustainable training and focused marketing strategy. 3.2 Recommended changes for David Jones In order to achieve optimum results, David Jones should consider the following choices. †¢Sustainable training: The rapid changes in business environment are needed and required to learn every innovations for business organisations in order to dominate their current market. It is proved that in the today’s interconnected world, the success of organisations and teams depends on how much they can use and operate new information and communication technologies that changes business environment (Ancona, Bresman & Caldwell 2009). Also, Blanchard (2009) notes that coaching for their employees lead to successful organisation within the unpredictable changes, but the new rescue plan has no any special training and coaching for their employees. It is a big disadvantage of new rescue plan that has been causing the decreasing net profit of David Jones and failure of strategic implementation. Moreover, it is supported by case study that although David Jones had excellent customer service in the fast, but it has decreased over the years. †¢Focused marketing strategy: Another disadvantage of new rescue plan is unfocused marketing strategy. According  to case study, new strategic plan did not include any focused marketing plans, which target customers and profitable markets. Also, David Jones could not identify changing customer behaviours and profitable buyers. It is supported that new economic order has changed the buyer’s market, which is that a twenty-four percent of buyers in Australian population has balanced fifty-four percent of discretionary spending, but David Jones has been concentrating on fifty percent of buyers, who are only twenty-four percent of discretionary spending in Australian population. The combination of lack of marketing strategy and non-target sales activities cause the inefficient strategy implementation. In addition, Nemcova & and Dvorak (2011) state that the strategic management of electronic commerce is concentrating essentially on customers, but David Jones focuses on more result s than concentrating on customers. The possibility of sustainable training and marketing strategy supporting strategic implementation of David Jones makes it necessary for the David Jones to add sustainable training and marketing strategy for their strategic plan. 4. SCALE OF CHANGE FOR DAVID JONES 4.1 Comparison of scale change During the unpredictable changing business environment, the scale of change helps to organisation in order to achieve optimum result how much change the organisations. This process is divided by from fine-tuning organisational development to corporate transformation (Waddell, Cummings & Worley 2014, p. 52). †¢Fine-tuning: This changing process is performed at divisional or departmental level as matching between organisation’s structure, strategy, people and activities. †¢Incremental change: Change process that in order to match changing environment, corporate business structures, strategies and management process are always adapted. †¢Modular transformation: Modular change concentrating on more changing and redesigning one or more division than changing whole organisation. †¢Corporate transformation: Corporate transformation brings about whole organisational transformation. 4.2 Suitable scale of change for David Jones For David Jones, the most suitable of scale of changes are modular transformation and incremental change the reason why: †¢ in the case study, although new strategy of David Jones was implemented in order to match  between retail environmental change and strategic performance, it faced failure because of performing too late. Firstly, in order to dominate online and retail market, David Jones has to use the modular transformation that renovates some divisions including information technology, marketing and strategy and human resource. By renovating the inability of divisions, it reduces the risk of failure of strategic implementations because Poblador (2014) notes that the failure of organisational strategy is sometimes caused by unexpected responses from the organisation itself, especially its employees behaviours that indicates corporation culture. It is showed that using corporate transformation is more risky for David Jones than using modular transformation. After that modular transformation process would be finished and are matched business environment changes, David Jones should be applied to use incremental change process in order to maintain and dominate its retail market. Also, it is supported that the maintenance of changing environmental situations are accomplished by keeping incremental changes (Poblador 2014, p.143). †¢fine-tunning is not suitable for David Jones because between 1960s and 1970s fine-tuning was implemented successfully in organisation, but today’s uncertainty business environment is needed by different change process (Waddell, Cummings & Worley 2014). Also, case study said that even though unhealthy organisational culture have been causing for losing net profit of David, main reason for David Jones is retail environmental change especially online trade, new economic order and technological revolution. On the other side, the decrease of net profit in David Jones was caused by online trade, new economic order, technological revolution and unhealthy organisational culture, and majority of profit in David Jones is earned by traditional department stores, it is not necessary to make whole organisational change in order to match retail environmental changes. It is proved that Ford Plastics was implemented in an organisation-wide change in order to match its external environmental change, but it faced the failure soon (Graetz et al. 2002, p.32). All the evidence shows that the modular transformation change and incremental change are the most suitable change process for David Jones. 5. APPROPRIATE STYLE OF MANAGEMENT FOR DAVID JONES’ CEO PAUL ZAHRA 5.1 Comparison of style of management The style of management is described by Australian researchers Doug Stace and Dexter Dunphy. The main idea of the style of management is that unpredictable business environment is required and demanded the rapid changes for organisation to achieve their strategic goal. Using style of management for organisation, which is described by from collaborative to coercive, makes it easier to be employed (Waddell, Cummings & Worley 2014). †¢Collaborative: Employees are involved in making significant decisions about organisational future and change performance. †¢Consultative: According to consultation, employees bring about organisational change, but for goal setting, they involved limited participation. The goal setting is done by expertise or responsibility. †¢Directive: Main form of significant decisions about organisational future and change performance are made by managerial authority and direction. †¢Coercive: One of forcing authorities, which are outside parties, managers and executives imposes to change on key group in the organisation. 5.2 The most suitable style of management for Paul Zahra For David Jones’ CEO Paul Zahra, the most affordable style of management is coercive because: †¢the long term performance results of sixty teams are estimated that empowering team leader leads to higher work performance for teams over time than a directive team leaders because of higher level of team coordination, empowerment, learning, and mental model development (Natalia, Matthew & Henry 2013). †¢collaborative and consultative are not suitable for David Jones because Phil (2012) estates that the most efficient change management for overpowering companies were brought by the combination of concentrated clear vision of change and sponsorship from the top. Also, it is supported that the commitment of top management for change creates energy for action within the organisation, which leads to a successful vision (Graetz et al. 2002). †¢according to Jaroslav (2013), the directive style leads to lower capacity for the average bank sales clerks, which is proved by banking sector in Slovakia. It is showed like David Jones current situation the reason why net profit of David Jones has been decreasing, which proves that the directive style is not suitable for David Jones. †¢ case study said that not only the board of David Jones has been supporting Zahra’s vision of change, but also the rapid changes in retail business  environment are needed to manage quickly because the business environment changes and competitors do not wait David Jones. To sum up, the possibility of coercive management style to be used successfully in rapid changes business environment makes it necessary for the David Jones’ CEO Paul Zahra to use coercive management style. 6.0 Conclusion It can be seen that the most affordable suitable planned change model for David Jones is Positive model, and scale of change is modular transformation with incremental change. Moreover, the best suitable style of management for David Jones’ CEO Paul Zahra is coercive. Furthermore, even thought this paper agrees with the restructure of David Jones, sustainable training and focused marketing strategy would be added for David Jones’ rescue plan. In conclusion, the combination of Positive change model, modular transformation with incremental change, coercive style of management, sustainable training, and focused marketing strategy will support David Jones’ strategy achievement. Also, the improvements for David Jones’ restructure are discussed.

Thursday, November 7, 2019

Buffy - Social Formation essays

Buffy - Social Formation essays When researching a film series such as Buffy, it is noticeable that the majority of symbolism is often overshadowed by a prominent distraction, such as a fight scene or an instance of romance. By analysing the formation of a society in a film series, we can gain a profound understanding of how power and status is constructed, as well as a decent idea of how characters are likely to respond to certain situations. Three distinct areas that influence the social formation of Buffy include - Buffy presents its viewers with an unrealistic representation of the real world, where supernatural occurrences are the norm. It presents a world where women are a physical force to reckon with and where all men seem to turn ugly at night time. However, despite its differences with the real world, Buffy contains contemporary issues, which are evident in societies everywhere. Issues include relationships and love interests, conflict and violence, power structures and the occasional moral lesson thrown in here and there. Traditionally the TV warrior figure in modern society is one that can be stereotypically associated to characters such as Conan the Barbarian or Hercules, who against all odds manage to cream hoards of ugly evil beings without a hair going out of place. Buffy opposes this tradition, which sees the dominant force in maintaining good over evil as female. Unlike other TV series with dominant females (such as Xena the Warrior Princess), Buffy has an unmuscular physique. Buffys appearance can be closely related to the cliched blonde bimbo who always gets captured at the start of a movie only to be united with her knight in shining armour as they trot off into the sunset on horseback. It is this attribute that makes her so appealing to her viewers, as they see a character, who appears to be harmless, defend herself and restore normality. It is ironic to see that the heroine is independent and...

Tuesday, November 5, 2019

What Is an Unsubsidized Loan Definition and Explanation

What Is an Unsubsidized Loan Definition and Explanation SAT / ACT Prep Online Guides and Tips You have a general idea of what it means to take out a loan, but calling a loan "unsubsidized" makes it sound a bit suspicious. What is an unsubsidized loan, and how are they different from subsidized loans? Are they good options if you're considering taking on student debt? Here's the unsubsidized loan definition: a Direct Unsubsidized loan is one type of financial aid provided by the US federal government, or more specifically, the US Department of Education. You can also receive Direct Subsidized loans as part of your financial aid package. In this post, I'll discuss why these loans exist, before talking in more detail about how loans usually work. With this information, you'll be able to get a full understanding of the details of Direct Unsubsidized loans and whether they may be a good option for you. A Brief History of Federal Student Loans In the 1950s, the US government started taking seriousmeasures to encourage the pursuit of post-secondary education. The Department of Education started offering government-backed loans under the National Defense Education Act, or NDEA - as more people pursue college educations, these loan programs have expanded. As of 2012, almost 70% of students graduating from 4-year colleges have taken out some amount of student loans. Because federal loans are government-backed (that is, you're essentially borrowing and repaying taxpayer money to fund your education), interest rates tend to be better than those of private loans. We'll go more into why interest rates are important in the next section. What Does It Mean to Take Out a Loan? The decision to take out a loan is a very personal one, but you should know there's nothing inherently bad about being in student debt. Here, I'll address the logistics of taking on student debt. I hope that with this information, you'll be able to make educated decisions about taking out loans. (If you are already familiar with this information, just jump to the next section). The way that loans work is pretty standard, no matter where you're getting the loan from. You borrow a sum of money, or principal, from some lender - usually a bank (in the case of Direct Unsubsidized loans, the lender is the federal government). You also agree to particular loan terms, including interest rates and length of repayment. When you make loan payments, which usually happens on a monthly basis, you pay back a portion of the principal plus extra money: the interest, or a percentage of the principal that's accrued (accumulated).The longer you take to pay back the loan, the more interest accrues. The bigger your principal, the more interest accrues. You can think about interest as a charge or a fee that you pay to your lender. Interest is how lenders make money on loans. It usually starts accruing as soon as the loan is disbursed (when the money is given out, or provided to you. Sometimes, the interest that has accrued on your loan is added to your principle. When new interest accrues, it will be on this new, larger principle.This is called capitalization - when this happens, you start paying interest on more than your original loan amount, which means more interest. Loans can be really helpful when it comes to paying for school, but as you may have guessed, people generally don't love being in student debt. When thinking about how much student debt you can afford, it may be helpful to consider the amount of debt you plan on taking out in relation to your expected earnings post-graduation. The more questions you have answered about taking out student loans, the more likely you are to make a decision that's right for you. Direct Unsubsidized Loan Details There are some standardized limits, restrictions, and repayment terms for all students who take out Direct Unsubsidized loans. They don't have some of the perks of Direct Subsidized loans, but they do offer more flexibility. First, there are limits to how much money you can take out in subsidized loans. These annual maximums depend on your year in school: Year Dependent Students Independent Students 1st Year Undergrad Annual Limit $5,500 $9,500 2nd Year Undergrad Annual Limit $6,500 $10,500 3rd Year Undergrad Beyond Annual Limit $7,500 $12,500 Graduate/Professional Student Annual Limit Not applicable $20,500 Total Loan Lifetime Max (includes subsidized loan amounts) $31,000 $57,500 for undergrads $138,500 for grad/professional students (includes any federal loans received for undergrad study) A few notes on these maximums: The vast majority of undergraduate students are classified as dependent. You can read more about dependent/independent classifications here These loan maximums include any money you take out in Direct Subsidized loans. For example, if I take $3,500 in subsidized loans my freshman year as a dependent student, I could take out a maximum of $2,000 in unsubsidized loans that year. These maximums do not include any private loans, or loans that your parents may take out. Unlike Direct Subsidized loans, there's no maximum eligibility window or period for Direct Unsubsidized loans. Interest rates are generally pretty competitive, and are standardized (so, personal credit history doesn't affect interest rates).Rates are slightly higher for graduate/professional students than they are for undergraduates. For 2015-2016, the interest rate is 4.29% for undergraduates, 5.84% for graduate/professional students. Finally, repayment plans (including details about the amount you owe every month, and the amount of time you have to pay back your loans) can be customized, and will depend on variables such as your principle balance and your income.Standard repayment plans set up monthly payments so that you pay off your principle + interest in 120 months, or 10 years. How Are Unsubsidized Loans Different From Subsidized Loans? If you've looked into private loans to help pay for school, you probably recognize that Direct Unsubsidized loan terms are pretty good. Subsidized loans are a bit of a different animal, in that they offer certain perks that you won't find elsewhere.I'll use an example here to demonstrate the long-term financial outcomes of a subsidized vs. unsubsidized loan. Say I take outa $3,500 loan to pay for school my freshman year, at an interest rate of 4.29%. The chart below outlines different outcomes based on loan type if I don't make any payments while still in school. UNSUBSIDIZED SUBSIDIZED Amount Borrowed $3,500 $3,500 Interest Rate 4.29% 4.29% Interest Accrued During School (4 years) $640 $0 Balance Owed at Graduation $4,140 $3,500 Time to Payoff at $50/month (Interest accrues for both subsidized and unsubsidized loans during this period) 99 months 81 months Total Amount Paid $4,950 $4,050 Standard repayment plans for federal student loans set a timeline of 120 months until payoff, but the minimum monthly payments are $50.In this example, it would take me much less time (81 months vs. 99 months) and much less money ($4,050 vs. $4,950) to pay back a subsidized loan vs an unsubsidized loan. Many students have some combination of subsidized and unsubsidized loans. If you decide to take out federal student loans, you should max out your Direct Subsidized loan eligibility before taking out any Direct Unsubsidized loans. Who's Eligible for Direct Unsubsidized Loans? If you're looking for aid to bridge the gap between what you have and what you need to pay for college, unsubsidized loans are good options if you meet all the eligibility requirements. Eligibility requirements are not as strict for Direct Unsubsidized loans as they are for Direct Subsidized loans. They're open to both undergraduate and graduate students, and you don't need to demonstrate financial need to be eligible. You do, however, need to meet all federal financial aid requirements. The following charts list these requirements. You must do all of the following: Have ahigh school diploma, GED, or approved homeschool education Be enrolled or accepted to enroll in aneligible degree/certificate program You can check with your school/program’s financial aid office if you want to confirm eligibility Be registered withSelective Service, if you are male and between 18-25 years old If applicable, you canregister on the SS website Have a validSocial Security Number(unless you’re from the Marshall Islands, Federal States of Micronesia, or the Republic of Palau) Sign statements on the FAFSAstating that (1) you’re not in default, and do not owe refund money, on a federal student loan, and (2) you’ll only use federal aid money to help pay for your education Access the FAFSA Maintain â€Å"satisfactory† progress in school If you’re concerned about your academic performance, or have questions about what is considered â€Å"satisfactory,† set up a meeting with your dean or other school administrator. In addition to the requirements listed in the chart above,you must be able to check one of the following options: Be aUS citizenorUS national Have agreen card Have anarrival-departure record Havebattered immigrant status Have aT-Visa How Do You Apply for a Direct Unsubsidized Loan? All things considered, eligibility requirements aren't too stringent for unsubsidized loans. The next step after meeting requirements would be to actually apply for this great financial aid resource. You can apply for all types of federal financial aid, including Direct Subsidized loans, by submitting a Free Application for Federal Student Aid, or FAFSA. The federal submission deadline to receive aid for the 2015-2016 academic year is June 30, 2016. You can find detailed instructions on submitting a FAFSAhere. What's Next? You can get an estimate of your federal aid eligibility, including the amount you could take out in Direct Subsidized loans, by following steps listed in ourPell Grant Calculator guide. Want more information on federal aid that youdon'thave to pay back? Learn more abouthow to get a Pell Grant, and check out our guide onPell eligibility requirements. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:

Saturday, November 2, 2019

Annunciation of Mary A Significant Image in the Christian Theology Essay

Annunciation of Mary A Significant Image in the Christian Theology - Essay Example This article will discuss in detail  the image of Annunciation of Mary, starting from the story as given in "Protoevangelium of James" and moving on to later time periods. This writing will take a look at this particular picture of Mary as it gradually develops through the ages and represents her gradual rise in the minds and beliefs of Christian theology. It will also focus on the aspect of representing the perpetual virginity of Mary through this image of ‘Annunciation of Mary’ to allay the fears in the minds of the orthodox creed. Early Christian literature that is of the imaginative type and tells us stories of a religious nature are known as the apocryphal gospels. These were first written in the second century and a certain variation of these apocryphal scriptures are known as ‘proto-gospels’ which give us the first pictures of Mary, right from her birth. One of these proto-gospels, known as the â€Å"Protevangelium of James†, is supposedly written by James, son of Joseph, from his first marriage, and dates even prior to that of Luke’s gospel. Here in James gospel, we get a beautiful picture of Mary’s Annunciation with the archangel Gabriel, described by Knight, as, â€Å"And she took the pitcher, and went out to fill it with water. And, behold, a voice saying:  Hail, you who have received  grace; the  Lord is with you;  blessed  are you among  women! And she looked around, on the right hand and on the left, to see whence this voice came. And she went away, tre mbling, to her house, and put down the pitcher; and taking the purple, she sat down on her seat, and drew it out. And, behold, an  angel  of the  Lord  stood before her, saying:  Fear  not,  Mary; for you have found  grace  before the  Lord  of all, and you shall conceive, according to His word. And she hearing, reasoned with herself, saying: Shall I conceive by the  Lord, the living  God?

Thursday, October 31, 2019

Summary Essay Example | Topics and Well Written Essays - 250 words - 86

Summary - Essay Example Participants were sampled from three regions: Bakony, Tolna and Baranya, and the capital region and 150 participants were selected from each group and questionnaires administered. The sample was representative. The study identified ethnic identity matrix for noting varieties of german orientations, established differences between members of the ethnic group and recommends sensitivity to communication in marketing to different ethnic groups and sub groups. Care is however necessary, especially when marketing to the German minority, because of their sensitivity that establishes contingencies such as â€Å"inadvertent stereotypes, biology and genetics, and ethnocentric bias† (Sas and Kozma, 2009, p. 96). Implementing mainstream marketing with the target population identified one theical issue that is unavailability Germans’ preferred foods. The study concludes that ethical marketing is a viable strategy in Hungary (Sas and Kozma,

Tuesday, October 29, 2019

Differences between Christian Beliefs and Buddhist Beliefs Research Paper

Differences between Christian Beliefs and Buddhist Beliefs - Research Paper Example This paper illustrates that in Christianity, the Ten Commandments is a list of rules imposed on Christians for the proper conduct of their lives. The goal of Christianity is to go to heaven after death. Thus, one must follow the Ten Commandments and God will allow them into heaven. In contrast, the Noble Eightfold Path of Buddhism is a set of suggestions for a more satisfactory life. The goal of Buddhism is to achieve Enlightenment, or nirvana, through one’s own efforts as there is no higher power than one’s self. Beliefs of Christianity and Buddhism As an organized religion, Christianity, when practiced by an individual, can be the only religion that is recognized. This is due to the belief that all other religions are false and practicing them would be sinful. Also, Christianity, more specifically Catholicism, contains only three central figures - the Father (God), the Son (Jesus Christ), and the Holy Spirit. It is considered to be a sin to believe in or worship any o ther idol. According to Christian law, it is impossible to believe in God and to believe in other deities. Buddhism, as a way of life, has no contradiction in following more than one religion; there are many people that practice both Buddhism and another religion, even Christianity. There are also no creator gods or deities to worship. Siddhartha Gautama, also known as the Buddha, is the founder of the Buddhist path and philosophy, but he is regarded more as a mentor or a leader rather than a god. Therefore, there has never been a purpose to worship him, nor did he ever desire it or request it from others. Christianity is organized based on hierarchical structure within the Church and specific days of observance. Christianity consists of numerous people of importance, such as the Pope, Deacons, bishops, monks, priests, ministers, youth ministers, and Sunday School teachers. Each person plays an important role in the running of the Church and in the teaching and spreading of the Chri stian message. Certain days of importance and holidays are observed, like Sundays, which is reserved for church, and other days that celebrate occasions in the life of Jesus, like birth (Christmas) and his resurrection (Easter). Buddhism, however, has no priestly hierarchy, though practitioners are able to become monks. These monks are similar to the monks of Catholicism, though they do not share the same religious duties. As previously stated, Siddhartha Gautama is recognized as the founder of Buddhism, but he is little more than a fellow practitioner of old. In regard to days of observance, Buddhism does not deem one day holier than another. Instead, practitioners are encouraged to celebrate every day that they are alive. Some people do observe the birth of the Buddha, but it is not considered to be a sacred holiday. Salvation is another vast difference between the two religions. In Christianity, salvation is achieved through faith, a relationship with Jesus Christ, and daily repe ntance of sin.

Sunday, October 27, 2019

Computing And It In Workplace Information Technology Essay

Computing And It In Workplace Information Technology Essay This documentation has been written and compiled as a representation of our group assignment that has been completes as part of an assessment of the Computer and Information Technology in Workplace (CITW) module. Where by our group has chosen Malayan Banking Berhad (Maybank) as the organization which with a group of three individuals, the three individual topics that we have selected based on the chapters that we have learned to be compared with Maybank are security, enterprise computing and ethical legal issues. Malayan banking Berhad online banking, Maybank2u.com, is the scenario to be discussed on how the computers and information technology are valuable to it. With this current scenario, in a group, we also able to learn on the functions and process, its advantages and disadvantages and the impact towards the organization upon implementing its online banking system. Introduction Maybank is the largest banking and financial group in Malaysia and has been leading the banking industry for over three and a half decades. Malayan Banking Berhad or Maybank was incorporated in Malaysia on 31 May 1960 and commenced operations on 12 September 1960. On 17 February 1962, Maybank was listed on the then Kuala Lumpur Stock Exchange (now known as Bursa Malaysia). Maybank is today among the largest companies by market capitalization on Bursa Malaysia. Maybank vision is to be a regional financial service leader and their mission is humanizing financial services from the heart of ASEAN. Maybank has also won many awards and recognition over the past few years. Maybank is the leading provider of financial services, meeting the different needs of their targeted customers through an efficient and integrated Group. Maybank is Malaysias largest financial services group with total assets exceeding RM350 billion. The Group has an extensive global network of 1,750 offices in 14 countries namely Malaysia, Singapore, Indonesia, Philippines, Brunei Darussalam, Vietnam, Cambodia, China, United Kingdom, U.S.A., Bahrain, Papua New Guinea, Pakistan and Uzbekistan. The first overseas branch is open in Brunei. Maybank offers a comprehensive range of financial services and products ranging from commercial banking, investment banking, Islamic banking, cards issuance, offshore banking, leasing and hire purchase, insurance, factoring, trustee services, asset management, stock broking, nominee services, venture capital and Internet banking. The online banking such as Maybank2U brings a lot of advantages of their customers. Today, the Maybank Group has over 40,000 employees who serve over 18 million customers worldwide, with 9.5 million customers in Malaysia alone. Maybank has been consistently ranked among Malaysias most valuable brands. It is also ranked first among Malaysian banks by Brand Finance in its Global 500 survey and 134th among the top 1,000 banks in the world by The Banker Magazine. Maybank (Online Banking Maybank2U) A current scenario Maybank2U Online Banking Our group has chosen a current scenario which is online banking via internet through maybank2u.com.my website. Technology have improve become better as they help the human to do thing easier, flexible and fast without physically appear in the place. Maybank have come up with these online banking services Now days lot of people prefer to do their bill payment transaction money online banking via online by just click on the website using their input device such as mouse and keyboards which is easier and easier rather than go to the bank queue up in the counter to do billings or transaction. Besides that, most people also own a laptop or smart phone which they can connect internet easily since most of the restaurant or place have WIF connection. It is easier, faster and save more time by doing it via Maybank2u.com rather than physically appears in the bank itself. Maybank2U online banking helps lots of people as it is user friendly and many banking services provided in it. Function of online banking in Maybank2u (M2U) Bills and Statement Customers can pay, view, save and print their bills, credit card and bank statement via online in their M2U account. Besides that, they can also can view, save and print their advices and notices via online rather than receive printed copies. It makes customer easy to manage their bills, bank statement and advice online without any charges. Life and Leisure It helps their customers to get enjoy sweet music by downloading n certain Maybank support website, order their favorite food such as in Pizza Hut, buy tickets such as movie tickets via this Maybank2u.com website. Maybank2u.com Merchant Programme It is a program that lets all the merchants sell their product and collect payment from their customers via online M2U or in the merchants website which Maybank have supported. They can pay their bills online by debating their Maybank savings or by using Maybank credit card. Online banking for business customers Business customers will get some additional services such as cheque service using M2U. They can view stop cheque, cheque status, and request for cheque book via online. They can also view their account summary and transactions history. They can transfer their funds in own accounts, registered third party, registered interbank GIRO, enquire, cancel future transfer and also pay over 500 bills and make future payments. Transfer funds Transfer fund between two accounts can be done in Maybank online banking. For specific transactions, Transactions Authorized Code (TAC) it must be necessary because it gives extra cover of security to protect you against unauthorized access to your account. For TAC we can request 24 hours a day and 7 days a week at maybank2u.com.my or by phone. Advantages of Using Online Banking via Maybank2U.com (M2U) Flexibility We can pay, view, save and print our bills, credit card and bank statement, advices and notices via online in our M2U account anytime and anywhere with the present of internet connection and electronic device that can connect internet such as smart phone and notebook. It is fast and more convenient ways to settle our bills rather then we got to bank. View accounts summary We can check and view your account balance is the maybank2u.com (M2U). We can daily check our account summary by selecting our accounts at Account and banking page in M2U. It makes us easier to view our account anytime. Paperless Paperless are use in online banking. Paperless banking is environmentally friendly, and the support of go green. Users can save all their information, bills statement or others in their hardware or save in their e-mail. They did not need to waste money to buy files to keep all their document and then need of space to keep all those files. It will also be difficult if we wanted to find some bill it takes more time also. Free There are no charges or any fee for this M2U online statement service or use the M2U online banking services. Disadvantages of Using Online Banking via maybank2u.com (M2U) Start-up may take time In order to register for your banks online program, you will probably have to provide ID and sign a form at a bank branch. If you and your spouse wish to view and manage your assets together online, one of you may have to sign a durable power of attorney before the bank will display all of your holdings together Privacy and Security Issue Even though, M2U website are well protected their customer or user information or privacy there are still information being steal or hack by the hacker or computer theft. It is not very secure since the information is passing through the network. The customers or user of M2U will have the probability of losing their privacy. Phishing Phishing activities by irresponsible may occur which the hacker will send e-mail ask to enter your information and then they easily hack into your account. Many customer of M2U or user will be cheat easily because they will thought that the phishing website are the real website. It is not easy for some users of M2U to detect that it is phishing website or the real website since might not know more about security in a website. Complicated when data being hack When someone account are being hack the person have to make do a lot of prevention such as make in order to be safe such as making police report, call to the bank to stop the account and others. It wastes a lot of time if any bad incident had occurred. Technical breakdowns Sometimes M2U website will be down due to some maintenance users have to wait for the website to on back as usually. It might takes a long time from them to recovery back their website if any major issues happen such as then server problem and others. If user in emergency to transfer money or doing some payment via online M2U during website go down , user still have to go to the branch to do it since waiting for the website recover might takes a long time. Impact of the Technology Since the launch of Malayan Banking Berhad Internet Banking (Maybank2u.com), it has impact the organization mostly in good factors. Maybank2u.com (M2U) has an active user with a year-on-year growth which remains as the leader in internet banking. Many customers finds attractive with this product due to its ability to pay for any online purchases, payment of monthly utility bills, electronic billing and online statements. With these functions, the customer can easily made the payment from their home with wasting their time on queuing and travelling just to settle the payment for that particular time. By providing this functions, the bank has taken the step to be as an agent where the payment from the customer for the bills to be paid. Another impact to the organization is by achieving more than RM6 million for non-audited cost saving by eliminating the needs of printing and mailing account statement for customer. Previously M2U user will only have to enter their username and password in order for them to enter the secure site, but for security purposes, M2U has expand its security by making the user to choose any pictures from the listing and create a phrase for the picture selected. Upon login, user only required to enter their username, if user found that the picture and phrase shown is not as per user selection, it is suggested not to continue but if everything is matched, user is safe to proceed. The features, layout structure and content must be updated from time to time. It must be straight forward and user friendly so that it will be a peace of mind for the user when they use this product. Individual Topic Ethical and Legal Issues This refers to the rules and standards that should be followed and standardize to everyone. Malayan Banking Berhad (Maybank) has their own ethical and legal issues. When compare to the slides, all the sub-topic is used but they actually have other that not cover in the slides such as the ethical and legal issues for banking industries. Unauthorized Access Use Maybank, as a custodian of public funds, has a responsibility to safeguard its integrity and credibility. It is on this understanding that the organization sets out clearly the code of ethics and conduct for its staff. The code stipulates the sound principles that will guide all Maybank staff in discharging their duties. It sets out the standards of good banking practice. Malayan Banking Berhad (Maybank) having many branches mainly covering the Asian countries. With the banking system connects to a particular server, each staff is holding their own unique identification and password. This will enable the staff to use any company computers in any branches. The banking software that the staff should be using will be enabled by the IT Department people. By this, not all staff has the access to all the banking software or system throughout the bank. Every computer in the organization is monitored. The group whom in-charge in monitoring the use of the organization computer will be able to see who are the particular users that login to the system and the location of the user. For any unusual event during the monitoring, it will be triggered and person who at that time was monitoring will be aware of the situation. This is one of the protections against the hackers. Other than access control and monitoring, each members of staff login into the organization network will be audited. Some higher personnel are allowed to access the organizations network from outside the organizations area. Hardware Theft Vandalism It is the act of stealing or defecting any computer equipment. Every personnel in the organization are in-charge of looking after the companys property especially that was given to them to perform their task. All equipments belong to Maybank has its own tagging number which able to track of the items and equipment. Software Theft It is the act of stealing software or illegally duplicating of software for distribution. In this organization, all the software are legally purchased and only be enable to the user upon request or instruction given to the IT Department. The software own by the organization is kept only by this department. Any duplication made, can only be made by the personnel under this department. Any software that are installed to any Maybanks computer will have the license agreement that the user need to agree during installation without any other safeguard due to the product activation was done earlier by the IT personnel. For normal software, the organization will purchased for multiple user and in some cases, the organizations will have to purchase only for single user. This will depends on the quantity of user whom will be using the software. Most of the software license is only valid for one year maximum this is to ensure that any illegal copy made will only valid for one year. Information Theft To safeguard against the information theft is by encryption. Encryption is the process of converting readable to unreadable. Maybank prevent from information theft not only by encryption but by having a password to decrypt the information. This password is between the person who encrypt it and the person who will decrypt it. IT Code of Conduct It is the written guideline that helps to determine whether computer action is ethical. People might think that this code of conduct will only give and apply by the people who are working under IT Department. In Malayan Banking Berhad (Maybank), this code of conduct is included in their organizations code of conduct. This means that it will not only apply to people who are working under IT Department. Information Privacy In any banking industries, it is difficult to control especially the customer information privacy. Not only due to the leak of information by the staff but it also because of the information is stored online. Maybank only required their staff and customer to fill in their particulars in the forms provided which are necessary. This is to ensure that their necessary information is only for the use of within the organization. The computer that connects to the organizations network will automatically clear the history of cache and cookies upon either shutting down or logout from the computer. Most of the machine in the organization are blocked from other website and forward email, there are still some unwanted email that might be unblock due to internal issues. In the organizations code of conduct also mention that the staff is restricted to view other website that not related to their task given. Although there are sites which are not blocked, there will still be a monitoring from other department on the site that the personnel visit. The organizations also equipped their machine with auto spam program which will delete most of the spam that detected by this program. Content Filtering This is a process of restricting access to certain material. This system has been mention in the above topic that this organization is using it. This is to block the websites which are listed to be blocked. It will be based on the Internet Content Rating Association (ICRA). Another software that was used is to set what the user can only browse to. Some user in the organizations only allowed browsing through their intranet sites. Other user can browse through the internet but either with or without limitation is depends on their positions level and task. Security Issues Computer security is a protection of information and property from theft, natural disaster or corruption, while allowing the information or property to remain accessible to all the users. Security issues are the ways on how the information is protected or being hacked. Similarity of the security issues in Maybank The similarities of security issue in the security slide with Maybank such as the security method use are the same. Secure Sockets Layers (SSL) Malayan Banking Berhad (Maybank) has used the Secure Sockets Layers (SSL) in all their websites which same as in the security slide module. SSL is web addresses beginning with https indicate secure connections in the website. We can see the Maybank web address begins with https when their user uses the Maybank website to login. They use SSL to ensure data integrity and data confidentiality. All the data that passes between client and Internet server will be encrypted by using 128 bits SSL protocol from VeriSign Certificate Authority. SSL is a secure way of transferring information or data between two computers through the Internet using encryption methods which it will encrypted all the data and the information become human unreadable or cant understand the data and information. The encryption method that Maybank use is end to end encryption which is adopted within the banks computer networks and resources. Digital Certificate Malayan Banking Berhad (Maybank) has Digital Certificate in all their websites which same as in the security slide module. Maybank website and its other website such as Maybank2u.com all are WebTrust certified. WebTrust is one of the Certificate Authority (CA) program. It is an independent corporation that monitors and tests all the facilities to assure that Maybank maintain the highest and most current standards in Internet information security and exchange. This proves that Maybank compliance with leading international security standards and the commitment to maintaining a secure environment in all Maybank websites in which the confidentiality, authentication,  integrity, and  nonrepudiation  are vitally important. Firewall Malayan Banking Berhad (Maybank) has used Firewall System in all their computers which same as in the security slide module. Firewall system is used in all Mayabank websites for system security and to monitor the measures for online users to do their transaction in Maybank website. Besides that, it is to detect, prevent and protect the networks from unauthorized access while permitting legitimate communications to pass on Maybank network systems. Maybank also recommend their user to have a firewall installed in their computer. This is because of safety in terms of their personal information such as their password from being hack by other people or by hacker. Antivirus Malayan Banking Berhad (Maybank) has used Antivirus Program in all their computers which same as in the security slide module. Antivirus is software that used to identify removes and protect against malware or malicious attack such as computer viruses, worms, Trojan horse, adware, and spyware. It is also used to reduce the risk of loss information, repair expense, cost and time taken. Maybank recommended its customer to purchase automatic upgrades your virus protection. Besides that, they also recommended not to open any attachment from unknown people via e-mail. Maybank has also used antivirus program in its entire company computer. Disaster Recovery Plan Malayan Banking Berhad (Maybank) has applied Disaster Recovery Plan in its company which same as in the security slide module. Disaster Recovery Plan is the emergency plan to be taken right after disaster occurs at the particular place. In conjunction, Maybank disaster recovery plan takes a long time to recover and they have found some alternative solution in order to recovery the data faster when natural disaster occurs. Differences of the security issues in Maybank The difference of security issue in the security slide with Maybank such as the security method use is the different to protect their property. Results-Driven Computing (RDC) framework Malayan Banking Berhad (Maybank) has applied Results-Driven Computing (RDC) framework in its company for backup purpose which different from the security slide module. RDC is a data centre which can store a huge number of data in it. Maybank combine RDC and disaster recovery plan to get fast delivery of data, better and cheaper computing across the mid-range, grid and mainframe environment. Besides that, Maybank wanted to full fill it requirement for world class disaster recovery. They have set up a different data centre to store the entire fully replicate banks critical data across the entire platform. They ran both method of backup simultaneously. Username and Password Malayan Banking Berhad (Maybank) has use username and password to login or access the system which different from the security slide module. In Maybank website its company has use password and username in order to prevent unauthorized access to its company financial services. It is one of the security issues in Maybank to protect the customer information and privacy. Username can be in alphanumeric and alphabetical where else password must be and alphanumeric. The username must be between 6 to 16 characters and the password must between 8 to 12 characters. All the password and username are case sensitive. Closed Circuit Television (CCTV) Malayan Banking Berhad (Maybank) has use Closed Circuit Television (CCTV) in all its company and branches which different from the security slide module. CCTV is place in the many places in the building such as in every Maybank counter, Asynchronous Transfer Mode (ATM) machine, and other places. It is to protect and detect in case any crime or bad incident happen such as robbing, snatching and others all will be recorded as prove by using CCTV. It is also will be tightly being monitor if required. Fire alarm and Intruder Alarm Systems Malayan Banking Berhad (Maybank) has use Fire alarm and Intruder Alarm Systems in all its company and branches which is different from the security slide module. Fire alarm helps Maybank in case of be caught by fire it will alert all the people in that particular building. Intruder alarm system is help to alert people around the particular place if any incident happens such as robbing and quickly informs police and to alert the customer and staff to beware. It is important to have fire alarm and intruder alarm system in a company. Enterprise Computing Enterprise computing is a large organization such as Maybank that requires special computing solutions because if its size and use of computers in networks that encompass variety of operating systems, protocol, and network architectures. Similarities of Enterprise Computing with Maybank. The below are some similarities of the enterprise computing in the slide that apply in Maybank. Enterprises. Maybank is well organized as shown in the hierarchy below that show the similarities of enterprises. Figure Organization Chart of Maybank Four Management Activities. The four management activities are the similarities in Maybank. The four management activities are planning, organizing, leading and controlling. Planning is setting the objectives and strategies tactics by the executive management such as Tan Sri Dato Megat Zaharuddin Megat Mohd Nor, Chairman of Maybank. Next is the organizing that concerns more on the people and the management structure by the middle management. Leading is important in Maybank. This is because communication between customers is important to prevent misunderstood and those leader such as the supervisor will have to give proper instruction to their subordinates and motivate them to maintain the best service provided by Maybank to their customers. Controlling and monitoring have to be done every time to make sure good performance , take measurement on any matter and take corrective action to improve the quality and services provided by Maybank. Functional Unit. The similarities of Maybank company with the slide note is they have functional unit. Maybank have divided to several department for example Maybank do have human resources(HR), customers service department to help their customer if there is any enquiry. Maybank also have several centers and divisions as well such as the financial services, insurance takaful, enterprise transformation global wholesale banking, group Islamic banking corporate affairs and communication and also customer feedback management. Online Banking. Besides that, online banking is one of the similarities. Maybank provided online banking to their customer. As the trend nowadays most of the people use technology and internet to do all their things via internet, Maybank has provide the online banking services so that their customer do not need to go to the Maybank to pay their bill. In addition, the customers can also view their bank account and statements online without going to the Maybank or the ATM machine. This can save the customer times as they do not need to queue at the counter to pay their bill or bank in their money into their account. Transaction Processing System (TPS). Maybank also do use Transaction Processing System (TPS) in their system. This Transaction Processing System captures and processes data from day to day transactions. TPS is use in ATM machine, credit card and also in Touch n Go. Customers can easily pay their things using their credit card rather than bringing a lot of cash with them which is dangerous. Customer Relationship Management (CRM). Customer Relationship Management (CRM) manages information about customers, interactions with customers, past purchases and interest. Maybank uses CRM to attract more customers to use their bank services as it is crucial in the financial services industry where competition is intense. At Maybank, CRM is treated as a core function, reflecting their customer-centric business approach. Maybank have invested in an Analytical Customer Relationship Management (aCRM) system to transform the business fully and drive business by leveraging on the strategic use of information about our customers. Portal. Besides that, the similarities is Maybank do also provide portal for their customers. Portal is collection of links, content and services presented on Webpage. Maybank had Launches Countrys First Internet Financial Portal in the year of 2000. This service enables customers to conduct a host of financial services via internet. These include opening of account, balance enquiry, funds transfers, cheque status enquiry, stop payment of cheque, bill payment, online stock investment, insurance application and renewal, online shopping and electronic procurement (B2B). In addition, Maybank also have eProcurement Portal to acquire goods and services efficiently and effectively for both internal and external customers. It is design to enable Maybank and its suppliers to reduce transaction and handling costs, and to automated timely information exchange. Data Warehouse. Data warehouse is a huge database that stores data required to analyse historical and current transaction. In 13 August 2002, Maybank has sign agreement with Oracle for data warehouse to provide business intelligence for business needs and also to improve high value customer relationship and services. With better and quicker access to required information, their staff will be empowered with better decision making in their relationship with the customers. Web Services. Web services are also one of the similarities. The conversion to online processing and payment will revolutionise the business-to-business (B2B) receivable management processes eliminating many of the issues associated with manual processing of invoices and payments. With online processing, those who enrol in the programme will gain operational efficiency as invoicing and payments are all electronically processed. Online access will also increase productivity and financial management for customers. Maybank will continue to assist businesses to transform their B2B processes particularly for receivables and payments. Maybank will continue to collaborate with our partner American Express to offer innovative global B2B corporate solutions to promote cashless transactions particularly to the small-medium enterprises (SMEs). With more business adopting cashless payment solutions this will increase the volume of online payments Virtual Private Network (VPN). Virtual Private Network (VPN) provides secure connection for user connecting to company network server using internet. Telekom Malaysia (TM) had provided IP VPN services for Maybank to replace their analogue network which serves their off-bank ATM machine. This service allows their customers to make use of internet communications in a private and highly secured environment and improved system availability and response time. Differences The below are some differences of the enterprise computing in the slide that apply in Maybank. Enterprise Hardware. Maybank use Mobius Viewdirect Total Content Management to store their critical information rather than using the enterprise storage medium such as CD-ROM server or DVD-ROM server. Recommendations/Proposals Maybank2U online banking should increase more on their security to prevent other people to hack their customer account. Maybank2u online banking can ask more verification of their customer before doing any online banking using the Maybank2U website. They can improve their question and answer (QA) in their website. They should provide more questions, answer and the solution on how to use their website and how to handle the problem if they faced some problem while using Maybank website. They also can show few examples or some tutorial on how to register as a member and how to use the Maybank website or the services provided in their website. It will attract more and more user or customer to use the online banking system. They can also try to filter the phishing website which acts like Maybank website. To save its customer and users from being hack any lost their privacy. Conclusion Based from what we have learned and our researched, not all of what we have studied is applied directly in the working world. With the technology in the banking industries now, it makes our life easy. Back then, it is impossible if we say that money can be transfer from wherever we are but now with the help of technology, not only we able to transfer funds but we also able to make a purchase from other area or country without us bein