Saturday, August 31, 2019

Human: Atmosphere and Earth

Human have been damaging on the Earth for thousands of years. In fact, human activity has big influence on the Earth. Some people believe that the Earth is being damaged by human activity. In my opinion, I really believe that the human is damaging the Earth. There are three main ways to damages the Earth from human activity are deforestation , poisonous gases , and it makes pollute the environment. First, a human activity that damages the Earth is deforestation. Deforestation destroys a huge area of forest every year.The world forests could completely disappear in a hundred years by human activities. Furthermore , deforestation also cause the loss of plants and animals then lead some of them to extinction. This activity have made many negative effects to the environment and our the Earth.. Second, People living has produced a huge of poisonous gases. These gases are released by cars, factories , industrial , and etc. They cloud destroy ozone layer ,which could create a phenomenon cal led â€Å"the green house effect†.The green house effect cause the temperature of the Earth increases . As a result, the ice in the North and South thaw and cause the water level becomes higher. This is one of the worst effects of human activities that damage the Earth. Third, human activities have polluted the environment very much on the Earth. People have built many factories to develop modern industry. These factories have released many toxic materials into the rivers, the soil, and the sea. The industry have killed many of plants, animals, and fishes.This activities have damaged the Earth too much. In conclusion, the human activities have made many negative effects on the Earth. There are three ways that I show to damages the Earth by human activities ; deforestation could decrease many types of plants and animals , poisonous gases could destroy ozone layer and could create the green house effect , and human activities have polluted the environment by industries . People could make the Earth become a better place to live in the future by themselves. Human: Atmosphere and Earth Human have been damaging on the Earth for thousands of years. In fact, human activity has big influence on the Earth. Some people believe that the Earth is being damaged by human activity. In my opinion, I really believe that the human is damaging the Earth. There are three main ways to damages the Earth from human activity are deforestation , poisonous gases , and it makes pollute the environment. First, a human activity that damages the Earth is deforestation. Deforestation destroys a huge area of forest every year.The world forests could completely disappear in a hundred years by human activities. Furthermore , deforestation also cause the loss of plants and animals then lead some of them to extinction. This activity have made many negative effects to the environment and our the Earth.. Second, People living has produced a huge of poisonous gases. These gases are released by cars, factories , industrial , and etc. They cloud destroy ozone layer ,which could create a phenomenon cal led â€Å"the green house effect†.The green house effect cause the temperature of the Earth increases . As a result, the ice in the North and South thaw and cause the water level becomes higher. This is one of the worst effects of human activities that damage the Earth. Third, human activities have polluted the environment very much on the Earth. People have built many factories to develop modern industry. These factories have released many toxic materials into the rivers, the soil, and the sea. The industry have killed many of plants, animals, and fishes.This activities have damaged the Earth too much. In conclusion, the human activities have made many negative effects on the Earth. There are three ways that I show to damages the Earth by human activities ; deforestation could decrease many types of plants and animals , poisonous gases could destroy ozone layer and could create the green house effect , and human activities have polluted the environment by industries . People could make the Earth become a better place to live in the future by themselves.

Friday, August 30, 2019

Gender, Culture, and Globalization Essay

In the Western world, the cause of feminism enabled women to obtain higher education and participate in the economic sector as the equals of men. However, one question that continues to be of interest to modern scholars is: how far have women truly come globally? Not only in Western democracies, but in developing nations located in the Middle East, Southeast Asia, and Latin America. For example, in the Philippines, many women support their families by working abroad as domestics and health care providers, which allegedly fracture family dynamics of many Filipino homes. While migrant fathers supporting families is seen as par for the course, migrant mothers are blamed for the destruction of Filipino society in the media. â€Å"These reports tend to vilify migrant mothers, suggesting that their children face more profound problems than do those of migrant fathers† (Ehrenreich & Hochschild, 40). In the Middle East and North Africa, the economic opportunities of women are even more restricted. Many of the popular interpretations of Islam prohibit women from working altogether, but in Egypt, women are allowed to seek employment. However, it is usually restricted to the largely unskilled service sector considered to be below the dignity of men. â€Å"This is reflected in the very low rates of wage employment in the private sector, continued high unemployment rates for educated females, and a large gender wage gap in the private sector† (Doumato & Posusney, 121). In the United States, racism is still a potent force preventing the economic advancement of minority women, especially with the dismantling of affirmative action in many states. Still, those making the hiring decisions tend to be overwhelmingly white, and even though many claim to not carry racist/sexist sentiments, research has shown that they have made decisions deleterious to minority women because of stereotypes (Mutari & Figart, 183). Works Cited Doumato, Eleanor Abdella and Marsha Pripstein Posusney. Women and Globalization in the Arab Middle East: Gender, Economy and Society. Boulder, CO: Lynne Rienner Publishers, 2003 Ehrenreich, Barbara and Arlie Russell Hochschild. Global Woman: Nannies, Maids, and Sex Workers in the New Economy. New York: Metropolitan Books, 2003 Mutari, Ellen and Deborah M. Figart. Woman and the Economy: A Reader. Armonk, NY: M. E. Sharpe, Inc. , 2003

Thursday, August 29, 2019

Experience in writing the critical analysis Essay

Experience in writing the critical analysis - Essay Example I rarely take statements the way they appear. I have been able to ask, why? In many occasions, this has become part of statement argument in my daily life. Literary analysis is crucial in writing process and I am so convinced that given any work on this, I will be able to handle with a lot of enthusiasm and care. I understand how the written word and language can be powerful. In this class, I am also able to get concepts and expression of ideas. The ideas go together with knowledge and thoughts. In addition, I do not have difficulty in proper sentence construction. My critical analysis essay is very complex in nature with many dimensional views. It gives me the rational knowledge to apply that helps me create a perfect way of logical thinking process. Through this, I am able to see things or expressions in more than one way. For instance, if I look at the most said English phrase â€Å"love is blind†, I am able to analyze it just to get the most appropriate meaning. Logically, what comes into my mind is the author of the phrase, William Shakespeare. Then I would understand that he is a very powerful person since his literary work is sold all over the world. There is a reason for quoting this phrase. It dawns on me that the author’s phrase is very simple, but it holds deep meaning and captures attention of many other scholars and writers. It has gained fame all over the world. ... I will not stress much on this, but let me go back to the subject of the topic. When I refocus on writing skills, understanding the powerful nature of particular statement is crucial. This helps where it can be used effectively in a given sentence construction. In exemplifying this, an analysis on environmental perspective, the writer Steinbeck stressed on embracing and cherishing the natural environment. He states in his book, â€Å"fingers of cloud† the most proper way of treating the environment. The title of his work is reflecting on creativity and one understands the environmental concept more deeply. In using one of his major characters, Gertie, who disregarded all her worldly duties and only embraced radiant mystery of tall mountains and bright skies, he is able to describe the hidden meaning of the title. At least now I am more effective in presenting my written work especially when it comes to research paper. Previously, I would always state what was learnt in class a nd my research findings just in a general way. This time round, I am able to formulate supportive and critical ideas from different sources. Description on my report writing has become a very easy and I can do my work effectively. The classes I had really helped me in writing better papers. In my learning process, I am able to understand and put together various ideas in a coherent and in a correct way, according to the requirements of my assignment. In demonstrating my position, when I look at the research that I have written, the description on the â€Å"Fingers of Cloud,† where it is presented that Steinbeck’s fiction is very interesting when he decided to lengthen the rift between the real and the metaphysical. In addition, different interesting skills I have learnt in writing show my

Wednesday, August 28, 2019

Recommendations to Ford Essay Example | Topics and Well Written Essays - 750 words

Recommendations to Ford - Essay Example The organization is a system and thus the processes within it are attentively looked into either in a symptomatic or systematic manner: the latter is likely to provide long lasting solutions. The Ford Company is a multinational automobile manufacturer (Ford 201). It derived its foundation on the need of its founder to provide a car for the ordinary American (Ford 201). Founded in 1903, the company has undergone major strides and setbacks to become one of the leading automotive companies within America and the whole world at large. The first model from Ford was the T-Model that sold almost fifteen million units before the end of production nineteen years later for a cost of $ 950 specifically moving the car industry from being a luxury item to a transportation means for the ordinary citizenry (Bak 200). Henry Ford not only targeted improving his model alone, but also improved the payments he made to all his workers and trimming down the working hours for his employees. This resulted t o the creation of a three shift working regimen and effectively improving mass manufacturing that allowed the revolution of the motor industry. He also came up with the strategy to ensure task specialization by his workers thus improving efficiency in the industry. This made it possible to manufacture affordable cars allowing most Americans to own an automobile resulting to groundbreaking changes in the transport sector that brought about construction of highways and inception of the industrial revolution with the outset of the agrarian revolution. Henry Ford effectively run the company with profit margins amounting to billions of dollars seeing his company go through the economic crisis in 1929 and later the biggest automobile strike in 1941. He then supported the government during World War 1 by supplying the government with submarine chasers, automobiles as well as liberty airplanes. This endeared his company dearly to the administration. Henry made it an obligation to pass

Tuesday, August 27, 2019

Ecotourism Essay Example | Topics and Well Written Essays - 2500 words

Ecotourism - Essay Example In addition, it will present two case studies of ecotourism. Ecotourism denotes a responsible form of tourism that promotes both environmental projects and the welfare of the people in the regions of interest (Baromey, 2008). It offers the tourism a great deal of pleasure and a connection with nature and people of different cultural diversities. Ecotourism seeks to create a unification front of environmental conservation, sustainable travel, and communities. Ecotourism operates within a variety of principles that act as guidelines in the venture. It seeks to minimize the impacts that come because of mass and uncontrolled tourism. It also focuses on creating an environmental and cultural awareness as well as respect. Ecotourism has the interests of the tourists as well and emphasizes strives to ensure that tourism derive a measure of satisfaction and have memories of good experiences. Moreover, ecotourism strives to provide the hosts with positive experiences. For ecotourism to prove effective, it must yield financial benefits towards all forms of conservation. The communities that surround tourist destination must derive benefits financially and a form of social empowerment. Ecotourism also focuses on highlighting the necessary sensitivity concerning a country’s social, political, and environmental climate (Buckley, 2004). According to Buckley (2009), ecotourism emerged in the 1980’s after a realization that majority of tourists preferred natural areas. Tourism trends were changing with increased visits to places that tourists interact and connect with nature. The debate and concerns about the environment gave ecotourism an enormous popularity enabling it to penetrate completely into the tourism industry. The term became very popular among tourism promoters. The growth of ecotourism progressed to maturity as many initial theories underwent the test of time and more realistic concepts adopted. The realistic concepts and definitions have come into p lace after evidence based on empirical data became available. Ecotourism has slowly become the most preferable form of tourism because of its sustainability. Sustainability in this context is in reference to its different aspects of promoting the environment, tourist experience, economic benefits and socio-cultural dimensions because of its sustainability, most tourist organizations on the national and international front advocate for ecotourism (Singh, 2010). Community-based approach is one of the strategies emphasize by some organizations. In this approach, the local communities inhabiting the natural areas considered a tourist destination often exercise a measure of control in the ecotourism project. They participate actively in the designing projects as well as the management. In addition, they receive a portion of the economic benefits. The level of contribution of different communities depends on the institutions in place. This implies that planning of a community-based ecotou rism requires an inclusion of initiatives within the community. Community-based have the potential of achieving several targets of ecotourism. From this approach, a community shifts to sustainable livelihood forms. In addition, the approach presents a community with the opportunity of direct contribution in conservation. Direct involvement of a community increases the benefits a community can derive from ecotourism and motivates the community to contribute more to conservation projects.

Monday, August 26, 2019

Business analysis assignment Essay Example | Topics and Well Written Essays - 1750 words

Business analysis assignment - Essay Example as the social aspects of CSR strategy and how PPR can streamline its operations in order to operate sustainably without causing much damage to the environment while remaining viable in manufacturing its luxury brands. It is undoubtedly true that every organisation operates in a physical environment with people from diverse cultural backgrounds and are likely to be affected directly or indirectly by the operations of such organisations. It has been noted that there is need to establish goodwill with the values and norms of any given society the organisation would be operating in as a way of promoting mutual understanding. Thus, CSR entails doing good things to the society in which it would be operating in. It has also been noted that CSR strategy driven by leadership development is very effective in that it will stimulate positive employee performance while at the same time cultivating a sense of trust among the members of the community it will be operating in. It has been recommended that Pinault’s PPR should streamline the operations of the organisation in such a way that the products retain their value and luster while at the same time striving to minimise the impacts of environmental degradation through its activities. This must be done in such a way that does not compromise on quality since luxury brands are meant for prestige. The concept of corporate social responsibility has become topical during the current period but there is no one agreed definition about the whole concept (Knights and Willmott (eds.) 2007). CSR has been defined as a function that transcends but includes making profits, creating jobs and producing goods and services (Oketch 2005 as cited in Smith 2003). On the other hand, (Strydom 2004 p.11) concurs that â€Å"Social responsibility is the concept that maintains that businesses are part of the larger society in which they exist and are accountable to the society for their operations.† In other words, there is need for the

Sunday, August 25, 2019

Challenges of Mid-level Management Essay Example | Topics and Well Written Essays - 1500 words

Challenges of Mid-level Management - Essay Example Professionalism is required in the health care sector, as with any other field present in modern time. The code of ethics that run every business should be transferred to fields in the health care environment (Jonsen, Siegler & Winslade, 1998). This is to prevent the rise in cases of breach in contract between clients and their care givers. This paper will examine challenges that mid-level management faces when it comes to ethics in the health care environment. Management in many organizations have a daunting task of checking on what their employees do at every turn. However, they should be at the front trying to ensure that the ethical codes in the working environment are followed (Jonsen, Siegler & Winslade, 1998). In doing so, their subordinates will be keen on continuing the trend, making the working place an ethical environment. Furthermore, it will be possible to have a truthful and honest nature among professionals in the field involved (Ransom, Maulik & Nash, 2005). It is imp erative for management to balance between the organization’s needs and their clients’. Failure to do this may imply that there is lack of ethical standards in the organization, leading to a lack of faith in the system (Wheatley, 2006). All decisions made by administrators must be weighed carefully. This is to provide a lasting positive impact on the organization’s revenue, its staff, and patients. This is a tough duty, but one that must be carried to completion, without fail (Wheatley, 2006). One of the core issues that affect health care administrators is the conflict of interest. Here, administrators are brought or weighed down by the fact that; their relationship with financial institutions may force them to make decisions that do not cater to their patients’ desires and wants (Ransom, Maulik & Nash, 2005). This is often seen with the insurance policies that cover patients once they are in for severe cases that warrant medical attention (Jonsen, Siegle r & Winslade, 1998). It is also a common occurrence to see physicians and professional doctors getting into pacts with these financial institutions, which coerce them into getting capital for their institution through patients (Wheatley, 2006). This is sometimes seen through continuous tests and procedures that are unnecessary, and prove costly to the individuals involved. It is up to the health care administrators to restrain and warn physicians from entering into pacts with these financial institutions (Jonsen, Siegler & Winslade, 1998). This is with a rise in the ethical dilemmas the administration is being put through, and the challenge that faces mid-level management in the health care field, in the 21st century (Wheatley, 2006). Another frightening task that comes up is the need to provide appropriate medical care, over the cost of management. Nowadays, it has become common practice for parties in the health care sector to react to the changing economic climate (Fletcher et al . 1997). The weak economy, for example, has a number of non-profit organizations turning uninsured patients away, or even refusing to aid in organ transplant (Morrison, 2011). These financial pressures that emerge daily are restricting the provision of health care services to all, and the non-adherence to the ethical obligations that bind every physician in the field. Systematic policies need to be implemented in hospitals. This is to prevent organizations from taking advantage of individuals who are

Saturday, August 24, 2019

Juvenile courts Essay Example | Topics and Well Written Essays - 500 words

Juvenile courts - Essay Example hat, by creating a separate court system for juvenile offenders, these young offenders will not be punished in a way that will have effect on their current behavior. While he agrees that young offenders do not require the harsher punishments seen within the regular court system, he believes that treatment will still be dismal if the two courts were separated. In regards to changing the current state of the juvenile court into involving social welfare to the offenders, Feld is against this because, in previous attempts, there were odds between how the offenders were treated and punished. As nothing was being done as it should have been, Feld believes that there is simply no point in having a juvenile court. Feld would like to abolish the juvenile courts altogether because he has not seen anything to suggest that they are doing any good. He thinks that there is nothing wrong with juveniles being tried in the typical court, just as long as they are given proper punishments that reflect how young they are (as well as the crime that they committed). The "cushions" that Feld recommends for juveniles being adjudicated in adult courts involve the young offenders avoiding punishments that are meant for adult offenders; this is a fear that he has with keeping them in the typical court, yet he believes things could be worse if there were separate courts. These "cushions" include the creation of waivers for specific offenses - these waivers would allow offenders to go free without imprisonment or a lengthy punishment, but perhaps community service or something similar to that effect. Another "cushion" allows that young offenders will have a maximum punishment, so that they are never given the sam e punishment as their adult counterparts. These "cushions" can prove to be helpful as they do take into consideration that young offenders do not deserve the same punishments as people older than them, and those that might have committed more serious offenses. They can prove to be

Herodotus Assignment Example | Topics and Well Written Essays - 250 words

Herodotus - Assignment Example The ancient Greeks were active seafarers seeking opportunity to find new independent cities to trade with at the coast across Mediterranean Sea. These new cities act as their trading station. In these stations Greek goods such as pottery ( 2009.529), bronze, silver, gold vessels olive oil, wine and textiles were exchange for luxury items and toxic raw materials that were in turn worked by Greek craftsmen. They established trading enclaves within existing local communities. The port town of Naukratis (1972.118.142) served as a commercial headquarters for Greek traders in Egypt. A well established maritime trade routes around the Mediterranean basin enable foreigners to travel to Greece. After the military campaign of Alexandra the great (336_323 B.C.), more extensive trade routes were opened across Asia and extending towards Afghanistan and Indus River Valley ( History 101, lecture 4). The population of the Greeks and their interaction with other societies greatly increased due to trading activity they were involved in. They also had no wring emphasis they only had oral forms of interaction. Since early Greeks had no political administration and institution, local communities were dominated by â€Å"big man† (History 102, lecture 4). The big man was not a king or official or someone with inherited position within an institution but a popular guy and a good warrior who attract followers. The Greeks were greatly involve in warfare unlike other society. They were notoriously aggressive warriors (Drews & Robert, 2009). They â€Å"fought to live and lived to fight† and ‘drunk the blood of their enemies and used the scalps as napkins†. The heavily armed soldiers were standing in a long, parallel

Friday, August 23, 2019

Decision Making within college life Term Paper Example | Topics and Well Written Essays - 1750 words

Decision Making within college life - Term Paper Example Different courses of actions have different consequences and therefore since one cannot experience all these consequences before making a decision, then one should review previous decisions made and their consequences. Decision making is a process that one must undertake at one point in their life time. This therefore means that we all have to make choices. Decision making can be a very difficult process especially when one is under pressure. Young people especially those at the campus level are faced with various decisions to make within the course of their stay in school. Colleges are attended mostly by people between the ages of 19-25 years and these are the so called years of exploration. It is at this stage in life when one has obtained freedom in terms of not being shackled by parental rules such as curfews. While here, these young minds are at a curious stage in their lives. They want to experiment on what their parents have been shielding from them. It is at this point in lif e when most young people experiment with drugs, sex and other things. This paper seeks to discuss decision making in campus with the author including personal experiences. Personal Experiences The author will include some of his personal experiences while in campus in order to better understand decision making. Relationships There are very many relationships that are cultivated while in campus; relationships between lecturers and students, lecturers and subordinate staff, students and the administration and students with other students. Some of these relationships are benefitial to the students while others are detrimental. Take for instance relationships between students and lecturers. The relationship formed could be one of a mentor and a mentee. Such relationships could be very fruitful because the lecturer acts as a guardian and is concerned with the all-round life of the student and not its educational aspect only. Compare this with discreet relationships between these two same parties (lecturer and student) which are more sexual in nature. In campus, these are not uncommon relationships which in most cases are initiated by the students in search for better grades not because they deserve them but because they ‘forgot’ to work hard during the year. Degrees or diplomas obtained through such means are referred to as â€Å"STDs† which stands for- â€Å"Sexually Transmitted Degrees/Diplomas†. When such a student approaches a lecturer in such a manner, wearing skimpily in the hope of seducing him she has made a choice. The question as to whether she has considered the consequences is a different matter. A female student I was well acquainted with decided to pursue such a degree but unknown to her the lecturer was infected by HIV. One day she went for testing and upon discovering that she was positive she became so angry and vowed to take a large number of her fellow students to the grave with her. She went on a revenge mission and sl ept with around 150 men after she was infected. When on her death bed she relased a list of all the men she had sexual relations with. The list included the names of lecturers, subordinate staff and fellow students. The list was pinned on the notice board. This is one of the examples of detrimental relationships and the female student in this case made a choice to be vengeful. She had other options available to her such as forgiving and forgetting. Attribution Theory This theory was

Thursday, August 22, 2019

The Gospel according to Matthew Essay Example for Free

The Gospel according to Matthew Essay It is said that the ideas of Liberation Theology espoused by the more liberal elements of the Catholic Church is found the gospel according to (Saint) Matthew. one of the four major gospels in the New Testament. From the word itself, the words written here imply the truth and is considered sacronsanct and leaves no room for doubt. The gospel essentially states that Jesus is the messiah sent by God to the world. The question is how is Liberation Theology and social justice related to Matthews gospel? In the understanding of the Jews, as well as Liberation Theologists, when Jesus clashed with the Pharisees and scribes, it suggested that his teachings, as shown in Matthews gospel contain a message of social justice. This is underscored in one of the Eight Beatitudes, â€Å"Blessed are the lowly; they shall inherit the earth† (New American Bible, Matt. 5:5) and If you want to be perfect, go, sell your possessions and give to the poor, and you will have treasure in heaven. Then come, follow me (Matt. 19:21). I for one sees that this makes sense. Matthews teachings do evoke the need for social justice which can be inferred here as the hallmark of a true Christian regardless of the denomination one belongs to and not a nominal one where he is Christian by affiliation but not in practice. However, that is the extent of my agreement. Liberation theologists have a tendency to take it very far to demand change in governments by colluding with revolutionary movements just because they do not agree. When Jesus came to this world, this was what the Jews also thought but Christ reminded them he did not come to this world to be a political leader and liberate them from their political masters. He came to offer them something better and it is a matter of accepting this invitation to the kingdom of heaven. Works Cited New Amercian Bible. Camden, New Jersey: Thomas Nelson, Inc. , 1970.

Wednesday, August 21, 2019

Are We Too Overdependent On Computers Philosophy Essay

Are We Too Overdependent On Computers Philosophy Essay Computer is a relatively new invention. Computers were invented about fifty years ago. However they came in extensive use some thirty years back. Personal Computers were put in use some times in the year 1980. In this short spell of time computers made tremendous impact on our lives. We are now so much dependent on computers that life without computers can not be imagined. Imagine the amount of chaos that would occur if Railway Ticket Booking, Air Booking, Banking computers fails or they are removed worldwide. Time is collapsing. Distance is no longer an obstacle. Crossing oceans takes only a minute by a single mouse click. Computers and internet are the one of the evolved technological revolution in the 21st century. By using computers, we can make or work out most of difficult things which are hardly completed without their hands. The presence of increasingly sophisticated internet technology has changed human lifestyle and the demands on human competence. The following paper discussed the different arguments about the computer dependency in our daily life. Starting from the brief introduction about the uses, advantages and disadvantages of the computers and technology, the paper leads towards the discussion about the arguments on computer dependency. At the end I have summarized the point of views of my friends and colleagues about the same question then I have given my conclusion from the overall study. Contents Introduction Background Fun, relaxation, communication tools can you get all that with only one tool? The answer is yes. What is the name of that magical instrument? Technologys greatest innovation in recent past and those are computers. Computer is regarded as an unbelievable intellectual tool in our society. It plays a vital role in our everyday life and gives the workplace, education, entertainment, healthcare and communication a complete new form. In addition it helps us to do our work more efficiently and more professionally than ever before. They are exclusive equipment that performs three main tasks: accept user inputs, processes it according to prescribed rules and produce a result as output in the way which user requires. à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¦Ã¢â‚¬Å"In the 1980s, computers began to take up new roles in different forms. A simple computer could be a cash machine in a supermarket, which does not look like a traditional one. In the past two decades, the price of components used for computers steadily fell due to higher technological advancement, reduced cost of manufacturing, stiffer competition, entrance of more manufacturers, new usage that simplified many processes, greater market demand and inevitability to higher productivity. And the trend of the usage of computer is changing quickly, from governmental to societal. Till now, the beginning of the 21st century, computers are becoming more powerful and functional and much closer to our daily life.à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ã‚ Ã‚  [1]   Aim The aim of this report is to find out the relationship between peoples life and computer and to see how much we are dependent on computers in our daily life? Use of computers Nowadays, we cannot imagine our life without computers and the fact is that they have become so important that nothing can replace them. They seem to be everywhere today. Since 1948 when the first real computer has been invented our life has changed so much that we can call it real digital revolution  [2]  . Our lives have changed to a great extent because of developments in Information technology. Many of our traditional practices have also transformed because of computers. Things that were only dreamed of in the past are now possible due to computers. If one day all the computer systems were to stop working, we would have huge problems1. In the past, computers were different from todays ones. They were so huge that they occupied whole rooms or buildings being comparatively slow in processing data. They were not faster than current simple calculators. Nowadays they are also used by scientist and they may also be as huge as the old ones but they are million times faster. They can execute many multiple operations simultaneously and scientist practically cannot perform without them. Now people have access to massive amount of information. Gathering and collecting data has never been simpler than now. They are not only used in laboratories but also in factories to control production. Sometimes it is computers who manufacture other computers2. This is known as computer aided manufacturing (CAM) and computer aided designs (CAD). But not only in science and industry computers are being used. Thanks to them modern medicine and health science can diagnose diseases faster and more comprehensively. Also in banking system computers have become common. They control ATMs, all data is stored on special hard disks and paper is not used in accountancy any more. Furthermore, architects, designers and engineers cannot imagine their work without computers. This machines are really everywhere and we rely on them also in such fields as criminology. They help police to solve crimes and collect evidence. Moreover, computers are wide-spread in education. Use of technology is woven into an almost daily educational discourse and debate. It is relatively easy to forget that computer use in education is a relatively new phenomenon that has evolved to widespread use only within the last 20 years. Teachers began to have more control over classroom with the help of technology in-use with the introduction of the first microcomputers in 1997 according to Roblyer and Edwards (2000)  [3]  . Except their classic tasks such as administration and accountancy they are used in process of learning. Firstly, they store huge amount of data which helps students to gain information. Secondly, thanks to special teaching techniques and programs they improve skills of concentration and adaptation of knowledge. They have become so popular and in use that not knowing how to use those means to be illiterate. Advantages of Computers Out of many some of the advantages of computer in our daily life are as follows: Computers saves storage place. Imagine how much paper would have to be used, how many trees would have to be cut just to store information which is today on hard disks. Data stored on just one CD in paper form would use room of dozens square meters and would weight thousands of kilos. Nowadays techniques of converting data from paper to digital form have also terrifically developed. You can simply rewrite the text using a keyboard. If you are not good at it you can use a scanner to scan necessary documents. At least there are special devices which can transfer our voice into text. Thanks to computers; banks, private and government companies, libraries, and many other institutions can save millions of square meters in terms of space and billions of dollars in terms of money. Nowadays we have access to billions of pieces of information and due to the computers capabilities we actually do not need to worry not only how to store them but also how to process them. Computers can calculate and process information faster and more accurate than human. Computers improve our lives. They are very useful in office work, we can write text such as reports and analysis. Compared with old typewriters when using computers we dont have to worry about making mistakes in typewriting because special programs help as to avoid them and we can change them any time. When the text is finished we can print it in as many copies as we want. At least but not at last, we can communicate with whole world very fast and cheap using Internet. Computers are user-friendly. We can watch videos and listen to the music having only PC. We dont need video player, TV and stacking hi-fi any more. Furthermore, we dont have to buy PCs which can take much room due to their other necessary components and wires. We can always buy laptop or palm top which is even smaller, and use them outside anywhere we want. Of course except these excellent features there is also dark side of computer technology because every invention brings us not only benefits but also threats. Disadvantages of Computers Sitting in front of a computer for long has adverse effects. Radiation from the screen affects the eyes, making it difficult to identify objects in high resolution. A magnetic field, generated by computers, also harms the brain; therefore resulting in jumbled thoughts or memories. A common symptom of computers adverse effects is restless sleeping. When using a computer, the brain is constantly moving like a water turbine. Therefore, after prolonged use, the eyes are strained, the brain is on maximum is still expecting more work and so results in kicking and turning while sleeping. Health is not the only individual to be devastated by prolonged computer usage; relationships are also hit hard too. Computer users, who work on the computer for long periods of time, create less time for interaction with their society. The advent of social networking sites might be seen as a solution to that problem, but face to face interactions are beneficial once in a while. Over-dependence on computers creates room for laziness too. People tend to disregard learning to do some things the manual way. Thus, a computer break-down would leave them helpless until the computer is repaired. Violence and sex. The main threats to younger users of computers are internet pornography and bloody games. The presence of sexual content or level of violence should be properly marked and parents are obliged to draw their attention to this issue. There are many extremely bloody games such as grand theft auto, quake etc. For example, in GTA you are a member of mafia and to promote in crime hierarchy you should kidnap people, steal cars, robe banks etc. As a bonus you can also run over pedestrians. There are also many games in which you are a soldier and your mission is to kill as many enemies as possible. The other threat to our children is internet pornography. The availability of sexual content is enormous and you can do practically nothing to protect your child, especially when its interested in this matter. The other threat is that you can be a computer addict. If you spend most of your free time using computer you should go to see a psychologist. Arguments about Computer dependency Since their invention, people far and wide have become increasingly dependent on computers. Computers have found their way into just about every aspect of our lives, and in most cases, they make things easier for us  [4]  . They allow us to work from home, socialize with our friends and family who live too far away to visit, and they provide an ever-welcome stress relief when we come home from school or work and just want to have some fun. But as we increasingly rely on computers to get through the day, the question begs to be asked: have we become too dependent on computers? Despite the many benefits of computers, there are also a number of arguments against them, one of which is the negative effect some believe they are having on childrens education. Illiteracy is a growing issue, and many say that computers are to blame. In the past few years, many teachers have taken to shuffling their students off to a computer to type out short, quick assignments that could easily be written out by hand. While this isnt much of an issue for older students, it is an issue for the younger students who are just learning to read and write. Regardless of how much were coming to rely on computers, printing and handwriting are a necessary skill to have. But typing out assignments has an effect on more than just the ability to print4. It can also negatively impact their spelling and grammar. While most programs now have spell- and grammar-check, they are not infallible; they cannot differentiate between homonyms and will often times suggest corrections that are not, in fact, correct. Furthermore, information is often more easily and accurately remembered when children have to spend a little time writing it out by hand, rather than a few quick minutes typing away at a keyboard. Because of these factors, computers in school should be reserved for older students, longer assignments, or classes which specifically teach how to use a computer. Another case against computers crops up when a persons interest in computers goes too far and becomes an obsession. Computers make our lives easier and give us new ways to learn about the things were interested in. They make it possible to do many things from the comfort of our own home. We can shop online, keep in touch with our friends online, even go to school online. They make it easier to record and organize information and entertain us with a nearly endless variety of games. However, its still important to maintain a life outside of the cyber world; a life spent attached to a computer screen isnt a real life. When a computer becomes the central point of a persons life, they undergo a change in behavior; they become lazy and develop anti-social tendencies, and, in some severe cases, simply cannot function without a computer. Its a common thing to see with children who have been allowed to spend too much time on the computer, watching TV, or playing video games: when it comes time to walk away, they throw temper tantrums. But its not just a matter of behavioral changes, when a person cant tear themselves away from the screen long enough to take part in any other activity, it can take a toll on their comfort and health. They may experience weight gain, strained eyes, and headaches, among other unpleasant side-effects. However, it can also be argued that this is not the fault of the computer, but rather the fault of the person  [5]  . Perhaps the most convincing argument, however, is the issue of safety. Aside from the issue of sharing personal information such as full names and addresses, there is also the bigger issue of stolen personal information. As our dependence on computers grows, so does our comfort level with them, and we are more likely to save personal information to our computer. While it would be nice to think that it is always perfectly safe to do so, the fact is that there are people who have any number of ways to gain access to your personal files, and therefore, any personal information stored on your computer. Even if you dont knowingly keep any personal information on your computer, if you bank or shop online at all, its possible for someone who knows what theyre doing to gain access to delicate financial information. But these are just examples of issues with household computers. What of the rest of the world? Instead of writing a cheque, we whip out our cards to pay for things when were short on cash. What happens when the internet goes down and youre stuck in the checkout line with $200 worth in groceries, and no way to pay for them because you dont have a blank cheque? What happens when everyone is driving their fancy, futuristic cars that run on a computer chip and something goes wrong? In a few hundred years, will anyone know how to drive the cars that we know today? Why are we really relying so much on computers? People put their computers through a lot of grief because they dont quite know what theyre doing when they decide to fix a problem or clean up their hard drive, but there are also errors in programming, bugs that need to be fixed long after the product is out on the market, and there are always people trying to ruin a perfectly good thing with viruses and the like. Survey Results We have asked the same question à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¦Ã¢â‚¬Å"Are we dependent on computers?à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ã‚  to our friends and fellow students and we gather these responses: Yes, because many everyday skills have been lost due to the use of computers and other technology. I have had this argument many times with people. Because of computers and smart phones, too many people cant think for themselves. They cant decide what restaurant they want to go to without pulling up a search engine. They cant add 2 + 2 because they always have their handy computer calculator to do the work for them. They cant manage their own time, because their computer schedule is what keeps them in order. In todays society, we are too dependent on computers. People are losing their ability to function without a computer. Memorization is a thing of the past, we now depend on our cell phones to have the phone number of everyone we know and we no longer can even remember the phone number of our parents or children. We no longer worry about what we are writing or typing because we all use a word processing program that has spellchecker and checks for grammar mistakes. So as you can see we depend on computers too much and are losing our ability to memorize, type, spell, or even write a grammatical correct sentence. We are way too dependent on computers today; most businesses are not able to run without a computer anymore. My belief that everybody somewhere somehow has to use a computer for what they are doing. Most businesses are run on computers or even by computers. Banking is now done on computers along with credit apps and even car and movie rentals. If we lost the use of computers at this point in time, our world would come to a screeching halt. Stocks would crash; gas pumps and credit card machines would go down. The dependency on computers is also an extreme risk to the way that businesses and lives are run. Some people are even addicted, having to be on the computer all the time. These reasons are why I think that we are too dependent on computers. If we lose computers we end up in chaos. It is important to properly understand what being too dependent is. If we say that too dependent means that if we lose it in an instant then we are completely screwed and end up in chaos, then sure, were too dependent on computers. However, does the concept of too dependent even exist? Is it even possible to be too dependent on something? But the way I see dependence, we are too dependent. Too many tasks are done using computers. At some point in a persons day, a computer is involved whether that is driving, writing, communicating, or even ordering food. Too many important aspects of our lives depend on computers and one of the crucial aspects is communication. For myself, I talk to more people per day via digital communication than in real life. We are not too dependent on computers, because they allow us to perform better and produce more. Computers are tools, and you can never be too dependent on tools. Tools allow us to perform better and produce more. When I was in high school, research meant a trip to the library, finding the right book, and then taking notes with pencil and paper. Today, research is going online and cutting and pasting. We are not too dependent on computers, because that would be the same as saying that we are too dependent on tools. Computers are only tools which help us to perform better. Is the survival of the human race dependent on computers? No. However, if you asked, if modern society developed nations are heavily dependent on computers? Then yes, to the extent that if you were able to destroy all computers overnight, then we would be in a terrible mess indeed, most forms of public transport, logistics, stock trading, banks, economy of the internet and modern life as we know it would come to a crashing halt and many of us would be too stunned to know how to deal with it. Conclusion In our opinion, computers and other developments of technology are useful and there is no possibility to live without them nowadays, as we got too much used to them. However, we should also work to find the ways of making our dependence on technology less dangerous for us. New developments should appear only when really important and helpful for people.

Tuesday, August 20, 2019

Strategic management defined as consisting of the analysis and decisions

Strategic management defined as consisting of the analysis and decisions INTRODUCTION Strategic management can be defined as consisting of the analysis, decisions and actions an organization undertakes in order to create and sustain competitive advantages. Key attributes of Strategic Management Directs the organization toward overall goals and objectives. Includes multiple stakeholders in decision making. Needs to incorporate short-term and long-term perspectives. Recognizes trade-offs between efficiency and effectiveness. Strategy can be developed at many levels in a multi-layered organisation there may be: Corporate level strategy Business level strategy Functional level strategy Corporate level strategy describes a corporations overall direction in terms of its general philosophy towards growth and the management of its various business units. Such strategies determine the type of a business a corporation wants to be in and what business units should acquired, modified and sold. This strategy addresses the question what business are we in? Devising a strategy for a multidivisional company like Sony involves at least four types of initiatives. Establishing investment priorities and steering corporate resources into the most attractive business units. Initiating actions to improve the combined performance of those business units that the corporation first got into. Finding ways to improve the synergy among related business units in order to increase performance. Decisions dealing with diversification. Business level strategy deals with decisions and actions pertaining to each business unit. The main objective of a business level strategy is to make the unit more competitive in market place. This level strategy addresses the question how do we compete? Although business level strategy is guided by upstream corporate level strategy business unit management must craft a strategy that is appropriate for its own operating situation. Miles and Snow(1984) identified four modes of strategic orientation: Defenders, Prospectors, Analysers and Reactors. These strategies can help explain why companies facing similar environmental threats or opportunities behave differently and why they continue to do so over a long period of time. In turn the different competitive or business strategies influence the down stream functional strategies. Functional level strategy pertains to the major functional operations within the business unit, including research and development, marketing, manufacturing, finance, and human resource productivity and addresses the question how do we support the business level competitive strategy? The three levels of strategy corporate, business and functional form a hierarchy of strategy within in a large multidivisional corporation. Different levels of strategy of Sony Sony Corporation was founded by Masaru Ibuka and Akio Morita in 1946, now having head quarters at Minato, Tokyo, Japan. Sony is one of the biggest electronics in the world with revenue 7.7 trillion yen. Sony are making products like Consumer professional electronic equipments, Communication information-related equipments, Semiconductor, Electronic devices components, Battery, Chemicals, Sony Pictures Entertainment, Sony Music, PlayStation and Blu-Ray devices. Sony Corporation as a giant organization has divided its organization into five main business units as Sony Pictures Entertainment, Sony Computer Entertainment, Sony Music Entertainment, Sony Ericsson, and Sony Financial. Sony Corporation has its own corporate strategy, and the each of its five business units having their own business strategy. Corporate Strategy Business level strategy Functional level strategy In Sony Group Corporate Strategy Update FY2008 FY2010 Sony has set out some goals and revealed about its corporate strategy. In particular, the company will focus on strengthening core businesses, enhancing network initiatives and leveraging international growth opportunities to build for the future and drive further growth and profits. Main considerations in the strategy of Sony are, Further strengthening the core business Network initiatives Capitalize on Growth in BRIC Countries and Other Emerging Markets Environmental Initiatives Financial Strategies for the Mid-Term A good strategy always leads an organization towards success and improvement, in the other way a bad or inefficient strategy always takes that organization into losses and bad reputation. As we know that Japanese are good at management and most of other countries are try to implement Japanese management techniques. The term is a Japanese word adopted into English referring to a philosophy or practices focusing on continuous improvement in manufacturing activities, business activities in general, and even life in general, depending on interpretation and usage. Sony Corporation was good at strategic plans by applying these management strategies. As we discussed earlier a bad or inefficient strategy leads the organization into bad reputation, in the case of Sony they are failed to implement an efficient strategy which Sonys net profit for the July-September quarter for 2006 falling 94% to 1.7 billion Yen, compared to 28.5 billion Yen for the same period last year. From there they are tr ying to implement better strategies and to regain their reputation and brand value and to regain their number one position in electronics industry. Portfolio approach to strategy Portfolio approach was one of the early approaches to chart strategy and allocate resources in multi-business organizations. As corporate strategists jumped on the diversification bandwagon they soon found a challenge in managing the resource needs diverse businesses and their strategic missions, particularly in times of limited resources. Responding to that challenge the Boston Consulting Group pioneered an approach called portfolio techniques that attempted to help managers balance the flow of cash resources among their various businesses while also identifying their basic strategic purpose within the overall portfolio. The top managers at larger farms need a method for spotting product lines that deserve more investment as well as lines that arent living up to expectations. So they conduct a portfolio analysis, in which they evaluate they evaluate their companys products and divisions to determine which are strongest and which are weakest. Much as securities analysts review their portfolios of stocks and bonds, deciding which to retain and which to discard. Strategic business unit (SBU) Strategic business units are the key business units within diversified firms. Each SBU has its own managers, resources, objectives, and competitors. A division, product line or a single product may define the boundaries of an SBU. Each SBU pursues its own distinct mission and often develops its own plans independently of other units in the organization. BCG matrix To evaluate each of their organizations SBUs, marketers need some type of portfolio performance framework. A widely used framework was developed by Boston Consulting Group. This market share/ market growth matrix places SBUs in a four quadrant chart that plots market share against market growth potential. The position of an SBU along the horizontal axis indicates its market share relative to those of competitors in the industry. Its position along the vertical axis indicates the annual growth rate of the market. After plotting all of a firms business units, planners divide them according to the matrixs four quadrants as shown in the figure. Stars represent High market share and High growth rate. These products or SBUs are high growth market leaders. Although they generate considerable income, they need inflows of even more cash to finance further growth. Cash cows command High market share in Low growth markets. Marketers for such an SBU want to maintain this status for as long as possible. The business produces string cash flows, but instead of investing heavily in the units own promotions and production capacity, the firm can use this cash to finance the growth of other SBUs with higher growth potentials. Question marks achieve Low market share in higher growth markets. Marketers must decide weather to continue supporting these products or SBUs, because question marks typically require considerably more cash than they generate. If a question mark cannot become a star, the firm should pull out of the market and target other markets with greater potential. Dogs manage only Low market share in Low growth markets. SBUs in this category promise poor future prospects, and marketers should withdraw from these businesses or SBUs as quickly as possible. In some cases these products can be sold to other firms where they are better fit.

Monday, August 19, 2019

Evacuation Of Children in WW2 :: World War II History

Evacuation Of Children in WW2 During World War 2, many children were moved from areas that were at risk from bombing. The children had to leave their families and go to live with strangers in less dangerous parts of the country. This was called "evacuation". Foster parents usually took their children. However, many discovered that life away from home was no picnic. Some thought it would be fun and exciting, like an adventure. All the younger boys thought it was a holiday, but not sure why the women and girls were crying. The first school children were evacuated on the 1st September, 1939 - the day Germany invaded Poland. In the first three days of September 1939, nearly 3,000,000 people were transported to the countryside, these were mostly children. They thought that they would be home before Christmas. It was usually the poorer children were not used to travelling. The wealthier family children were not upset on a average compared to the others. This was because they were used to travelling and being long distances away. Some parents even visited their children at weekends! Within a week, a quarter of the population of Britain would have a new addresses. At the start of the war schools were moved together. The children wore identity labels, gasmasks hanging from their necks and a small suitcase full of clothes and food for the day. They left in the early hours of the morning when it was dark. The majority were schoolchildren, who had been sent away were labelled like pieces of luggage, separated from their parents and accompanied by new people and teachers. They were just numbers in older peoples view! Most parents tried not to cry, some parents couldn't let go. Parents gave instructions to their children these were to not complain, Grin and smile however you feel, look after your brother or sister...... and not forgetting to write home. The teachers or supervisors kept the children happy and told them not to worry. Kids were in good moods....... That was before they left. Children were transported by trains. These trains were more often than not dirty. The children were all packed together. Most of the kids weren't used to long distances and by the time they got out they were hot, bothered, tired and dirty. After they had arrived they were promptly sent to village or church hall. The village or town, officers lined the children up against a wall or on a stage in the village hall, and invited people in to take their pick.

Sunday, August 18, 2019

Panoptical Power in China Essay examples -- Prison Jail Imprisonment E

Panoptical Power in China Jeremy Bentham, a leading English prison reformer of the late 18th and early 19th centuries, developed an architectural plan for an ideal prison that he called the Panopticon. Such a prison would consist of a ring of individual cells encircling an observation tower. Each of the cells would open toward the tower and be illuminated by its own outside window. So, by the effect of backlighting, a single guard in the observation tower could keep watch on many prisoners--each of whom would be individually confined--without himself being seen. And because the prisoners could not see their supervisors, they would have to assume that they were being watched at all times--even if they were not. The Panopticon was designed to maximize the power of a dominating, overseeing gaze upon a transparent society of inmates. The purpose of the Panopticon was not so much to punish wrongdoers as to prevent wrongdoing by immersing prisoners in a field of total visibility in the expectation that the possibil ity of constant surveillance would serve to restrain the inmates (Foucault, 1980). Such surveillance would be aimed toward the interiorization of the supervisor's gaze so that each prisoner would, in effect, become his/her own overseer. Thus, through self-policing, surveillance would become permanent and pervasive in its effects--even if it was not continuously exercised. Although relatively few prisons have been constructed according to the plan of the Panopticon given Bentham's optimism about its practical utility, Foucault (1975/1977; 1980) has articulated the Panopticon as a generalizable model of the functioning of power in modern disciplinary societies with applications beyond the prison including hospitals, the... ..., J., Dubois, A.-M., Le Barbier, F., Olivier, J.-F., Peemans, J.-P., & Wang, N. (1979). China: The people's republic, 1949-1976. New York: Pantheon. Cheshire, G. (1992). The long way home. Film Comment, 28, 36-39. Foucault, M. (1977). Discipline and punish: The birth of the prison (A. Sheridan, Trans.). New York: Vintage. (Original work published 1975) Foucault, M. (1978). The history of sexuality, Volume I: An introduction (R. Hurley, Trans.). New York: Vintage. (Original work published 1976) Foucault, M. (1980). Power/knowledge: Selected interviews and other writings, 1972-1977 (C. Gordon, Ed.). New York: Pantheon. Link, P. (1992). Evening chats in Beijing: Probing China's predicament. New York: Norton. Min, A. (1993). Red azalea: Life and love in China. London: Victor Gollancz. Rayns, T. (1992). Nights at the opera. Sight and Sound, 2, 10-13.

The History Of Rave Music :: essays research papers fc

The history of Rave Music is quite interesting. It has been around for decades. Some enjoy it, some don’t. There is some conflict as to where Rave Music actually started. Some people, non-ravers most likely, ask what is Rave Music? Rave Music is made up of technologically advanced beats that are mixed with other beats to form music. Rave Music has a culture of its own, as so does any other music type. The history of Rave Music is hard to sum up, but here it goes... The controversy in â€Å"Who started Rave Music, U.K. or U.S.?† is going to forever live on. But in all actuality, the U.S. sparked the flame that started it all. It all started back in 1970, in Detroit and Chicago, when Djs, like Frankie Knuckles, would program drum rhythms and play disco records over the top of his beats. He would play this â€Å"music† in the â€Å"club environment†. In 1977, in Chicago, the first club, playing this â€Å"music†, opened and was called The Warehouse. This is where house music received its name (shortened version of the clubs name). The U.K. heard of this and adopted the music. The music blew up over seas. Meanwhile it was still on the low in the U.S.. That is why people say the U.K. started it. House music was being played in gay clubs, in England, for 2 years before any sign of acceptance in the straight scene. While that was going on, the Djs in the U.S. were playing around with their music and somehow came up with the idea of mixing house music and hip-hop together. In 1985, Hip-house was born. This is when house music blew up in the United States. In 1986, Underground was born. Djs started getting creative with their music and in 1987 Deep House and Techno were born. In 1988, came Acid House. This was invented by 2 Djs who were hooking up their equipment and someone accidentally hit the on switch and on came the speakers making an â€Å"acidy† noise. The Djs liked the noise and decided to mix house music in. Thus, making Acid House. The U.K. began feeling left out and started experimenting themselves. In 1989, they came up with New Beat, a mix between Acid, Techno and House. While this was going on the U.S. came up with Hardcore, some really really fast house music. In 1990, LA finally decided to step away from the rap scene and give House/Techno a try. The History Of Rave Music :: essays research papers fc The history of Rave Music is quite interesting. It has been around for decades. Some enjoy it, some don’t. There is some conflict as to where Rave Music actually started. Some people, non-ravers most likely, ask what is Rave Music? Rave Music is made up of technologically advanced beats that are mixed with other beats to form music. Rave Music has a culture of its own, as so does any other music type. The history of Rave Music is hard to sum up, but here it goes... The controversy in â€Å"Who started Rave Music, U.K. or U.S.?† is going to forever live on. But in all actuality, the U.S. sparked the flame that started it all. It all started back in 1970, in Detroit and Chicago, when Djs, like Frankie Knuckles, would program drum rhythms and play disco records over the top of his beats. He would play this â€Å"music† in the â€Å"club environment†. In 1977, in Chicago, the first club, playing this â€Å"music†, opened and was called The Warehouse. This is where house music received its name (shortened version of the clubs name). The U.K. heard of this and adopted the music. The music blew up over seas. Meanwhile it was still on the low in the U.S.. That is why people say the U.K. started it. House music was being played in gay clubs, in England, for 2 years before any sign of acceptance in the straight scene. While that was going on, the Djs in the U.S. were playing around with their music and somehow came up with the idea of mixing house music and hip-hop together. In 1985, Hip-house was born. This is when house music blew up in the United States. In 1986, Underground was born. Djs started getting creative with their music and in 1987 Deep House and Techno were born. In 1988, came Acid House. This was invented by 2 Djs who were hooking up their equipment and someone accidentally hit the on switch and on came the speakers making an â€Å"acidy† noise. The Djs liked the noise and decided to mix house music in. Thus, making Acid House. The U.K. began feeling left out and started experimenting themselves. In 1989, they came up with New Beat, a mix between Acid, Techno and House. While this was going on the U.S. came up with Hardcore, some really really fast house music. In 1990, LA finally decided to step away from the rap scene and give House/Techno a try.

Saturday, August 17, 2019

Forgetting Sarah Marshall Essay

The movie â€Å"Forgetting Sarah Marshall† is a successful example of comedy. It was theoretical released on April 18, 2008. The film was brought together by a group of well acted performers and was very famous for perfectly combining the hilarious performances and the laughter together. I think that a successful comedy movie has to have these important factors. First, it needs to be performed with the perfect sounds elements such as the background music and the songs in the movie; second, the movie should be brought by some famous figures and directors, which were well-known in the comedy industry to make sure it will have a great hit this time; third, there should be a lot of stupid scenes with nonsense in the movie that will make people laugh their heads off. The movie â€Å"Forgetting Sarah Marshall† won the Golden Trailer Award for Wild Posts in the year 2008 and was nominated for 6 different awards such as the Golden Trailer Award Best Comedy, and Teen Choice Comedy Awards. The film is directed by the famous Nicholas Stoller and was written by Jason Segal. The movie was a successful hit and was well know among the teen’s group as well as the adults group. The main character of the movie; Peter, he had the most perfect life that all man wished for; which is dating the most famous and the sexiest TV star of the show Crime Scene, Scene of the Crime. But an awful break up which was brought up by now his ex-girl friend, TV star Sarah Marshall; Peter felt like he needs to get away from his life and forget everything about Sarah, so he decided to go to Hawaii for a vacation. The problem is Peter’s ex-girl friend is also on a trip to Hawaii with his new boyfriend; Snow. Peter had to learn to forget the past, stop being a baby, and finally become a man. In the movie, Peter is a sound effect editor for his ex-girlfriend’s TV show; Crime Scene, Scene of the Crime, he was suppose to do dark and ominous music for the background, after he broke up with Sarah, he was playing lively music for the show, which was a perfect part with sarcastic and dark humor in it. The movie cleverly blends together his act with his music talents. Such as the Dracula puppet song that he sang in front of a crowd of strangers that has no idea what he is doing, as soon as he is finished with the Dracula song; the awkward situation that everyone was in total silence was amusing and made the audience want to laugh without a reason. When Sarah Marshall’s new boy friend went on stage and sang her the song â€Å"Inside You†, with the ridicules body movements that he did with the song, the audiences are usually stunned at first, but as we watch it further, it definitely leads to full of laughter. A powerful comedy should be brought together by a group of well known figures in the comedy industry. â€Å"Forgetting Sarah Marshall† is a perfect example of a good comedy because it was produced by four producers, which they were all very famous for being in the comedy business for so long. The exclusive producer Richard Vane was also the producer of Last Holiday (2004), Rodney Rothman who was also the producer for Help Me Help You (2006), and Judd Apatow who was the actor in Pineapple Express (2008). Most importantly, Producer Shauna Robertson. She was the producer for many previous comedy great hits; such as the Pineapple Express (2008), Knocked Up (2007), The 40-Year-Old Virgin (2005) and Meet the Parents (2000). Jason Segal which was the writer of the film was also the leading actor of the movie. Actress Kristen Bell from the famous TV show Gossip Girl also took part in the movie, as well as Mila Kunis who was the sound for Meg Griffin for Family Guy and Bill Hader from Knocked up. With this impressive group of producers and performers, people will surge into the movie theater as soon as the film is released in the theaters. The most important element for a comedy is it has to have some scene that came out of nowhere and was totally stupid with nonsense. It is very important for a comedy, because people usually watch comedies when they don’t want to think about things and just want to enjoy the movie; otherwise there is no point of watching it. â€Å"Forgetting Sarah Marshall† is a perfect example because it is filled with nonsense. After breaking up with Sarah, Peter Felt like that he needs to have sex with different women just because his ex-girlfriend is having sex with another guy. After having a one night stand with a women that he barely even known, Peter cried in front of her and was acting totally out of ordinary. Also when the chief invite him to go and prepare dinner with him, they end up chasing a pig and Peter had to kill the pig with his bare hands. Scene in the movie shows much different nonsense that will usually make people laugh from their heart. The movie was loved widely all over the world, but there are still a lot of people who didn’t like the movie â€Å"Forgetting Sarah Marshall†. A lot of professionals’ movie critics didn’t like the movie because they think that the contents are â€Å"totally forgettable† or they think that â€Å"it is hard to like a character in the movie, when his own movie makes fun of himself. † I disagree with these critics, because there are many scenes in movie that people will not forget after that watched it, and a comedy are usually funny because the main characters were made fun of, either by himself or the other characters in the movie. That is what usually makes a movie a great hit of comedies. Just like what I previously mentioned, â€Å"forgetting Sarah Marshall† includes the perfect factors of sound element, was performed and brought together by a power group of people in the comedy industries, it also includes many stupid senses that people will not forget and will be talking about it among everyone who have watched the movie. This film is a great example of a comedy, and it is only for you to watch it and find out for yourself.

Friday, August 16, 2019

Relationship Between Public and Private Policing Essay

Abstract This paper will explore the historical relationship between public and private policing. It will also discuss how the relationship has changed in recent years. Relationship Between Public and Private Policing Since the terrorist attacks that struck inside the heart of our country on 11 September 2001, civilian law enforcement agencies have been busy performing not only their regular duties of crime prevention and response, but also taking on a large number of homeland security functions and all of this during a time when local, state and federal budgets are ever tightening. Similarly, private security institutions are under comparable pressure to carry out their traditional duties to provide protection of information, property and people, as well as sharing the additional duties of homeland security. Despite the fact that public and private police organizations share the same ultimate goal of protecting the public, they do not have a long history of working well together. Security officers have historically been looked down upon by law enforcement personnel. Some police feel that there is a definite lack of pre-employment screening, certification, training, standards, and regulation of security officers. Other police officers feel that security personnel receive insufficient training, especially those who carry weapons. Another perception that some police have is the view that security officers are those who couldn’t make it as law enforcement officers so they settled for a career in security. Meanwhile, some security officers view police as snobs who do not have an understanding of the range of capabilities, functions and resources offered by the private security field and thus fail to appreciate the role they can play. Private policing really got its start in the U.S. in the mid-1800s with the  foundation of the Pinkerton National Detective Agency in Chicago Illinois by Allan Pinkerton, the first man to be appointed as a detective in the Chicago Police Department. Since the federal government did not have personnel that could follow criminals across state lines, and local police personnel were ill equipped to handle the job, the Pinkerton Agency was hired to deal with criminal gangs (BSIS, n.d.). The company also performed many duties that are now handled by federal and state law enforcement agencies such as guarding railroads, conducting criminal investigations, and providing security advice to banks and other businesses. â€Å"Policing is not necessarily the exclusive dominion of government, but rather a ‘service’ that could be assumed either by public or private agencies† (Elizabeth Joh, 2004). According to the Department of Justice, Bureau of Justice Statistics, in 2000 th ere were 797,000 law enforcement officers employed in the United States by local, state and federal agencies. In comparison, private security organizations throughout the country employed roughly two million security officers (National Policy Summit, 2004). With these numbers it only makes sense for there to be a cooperative relationship between public and private police agencies. Joining the capabilities of the two sides would benefit each profession and greatly enhance the protection level that could be afforded to the citizens of this country. For example, the public police agencies usually receive more current threat information, while the private police agencies tend to maintain control over the areas or facilities that are considered vulnerable to attack. It has been estimated that â€Å"85 percent of the country’s critical infrastructure is protected by private security organizations† (National Policy Summit, 2004). One factor that I believe has had a positive impact on improving relations between public and private police agencies is the crossover of personnel. Many times when law enforcement personnel at the local, state or federal level retire from their agencies, they tend to take on positions of employment with in the private police field as Directors or other higher level positions due to the degree of their experience. These personnel maintain their contacts from within the law enforcement realm which can facilitate opportunities for much needed training and education of security officers, as well as increased probabilities for the sharing of information between agencies. Another aspect which is closely related is the hiring of  off-duty police officers to perform private security functions and details. Many companies feel that hiring an off-duty police officer to perform private security functions can be an effective crime deterrent when there is a visible police officer presence. Most public police agencies allow their officers, with advanced permission from the department, to work security duties or details while wearing their police uniform and even operating their department issued police vehicle. Another advantage of hiring off-duty police officers is that they maintain the power of arrest and use of force at all times, whether on or off-duty. So when a crime occurs, you already have a police presence on scene that can handle the matter. There are even some police agencies which are actually commercializing their services. According to Massimiliano Mulone, â€Å"police organizations are selling the services they provide to private individuals/organizations, from renting off-duty police officers to offering training for the private security workforce† (2012). There are some negative aspects to hiring off-duty police personnel to perform private security duties. First of all, the average police officer will charge at least twice as much as the hourly wage a typical security officer will be paid. Another issue to consider is the fact that some police officers will not perform some of the more menial tasks that a regular security officer would be required to perform as par t of their normal duties. Additionally, since the police officer is not depending on this part time job as a primary source of income, they may not put the same level of devotion into completing the tasks of the position as a security officer that is performing this job as their primary source of employment. Furthermore, â€Å"recent research finds that that fatigue associated with overtime and outside employment may contribute to accident and injuries involving police officers and may lead to more citizen complaints† (James Brunet, 2008). Another issue of concern is that while a police officer is performing in an off-duty capacity as a security officer, they can be called away from these duties to assist on-duty officers with incidents that occur nearby. Lastly, a company that hires off-duty police personnel to work in a private security capacity must be aware that there are unique legal issues to be considered, such as when Miranda warnings should be used and under what cir cumstances searches may be authorized. In almost every major city throughout the country, shopping malls, hospitals, apartment complexes, university campuses and housing associations depend on various private police organizations for security. Evidence shows that private policing has considerably decreased crime rates in neighborhoods across the country. â€Å"After the ‘Grand Central Partnership,’ an organization of over 6,000 businesses, hired a private security force to guard a 70 block area in the midtown Manhattan area, crime rates dropped by 20 percent after two years, by 36 percent after three years and 53 percent after five years† (Kai Jaeger and Edward Stringham, 2011). Another example of this statement is the â€Å"introduction of private policing by Critical Intervention Services in a low-income area of Florida that reduced crime rates an average of 50 percent† (Jaeger and Stringham, 2011). The greater the number of private property establishments that can be covered by private police agencies will allow the public police officers to concentrate their efforts on responding to the more significant crimes. The reality is that government agencies are being required to do more with less, cut budgets and ultimately cut the number of public police officers that are needed to protect the public. On the other side of the issue, private security organizations are constantly growing and providing more professional and better trained security officers in order to stay competitive in the private policing field. In many instances it is getting harder to distinguish between the public and private police officers and the overall duties they can perform. By combining the efforts of the two spheres of responsibility it would greatly benefit both sides, as well as provide a higher level of protection for the citizens of this country. References Brunet, J. A., PhD. (2008). Blurring the line between public and private sectors: The case of police officers’ off-duty employment. Public Personnel Management, 37(2), 161-174. Retrieved from http://ezproxy.bellevue.edu:80/login?url=http://search.proquest.com/docview/215949642?accountid=28125 Bureau of Security and Investigative Services. (n.d.) A Brief History. Retrieved from http://www.bsis.ca.gov/about_us/history.shtml Jaeger, K. and Stringham, E. (2011). National Center for Policy Analysis. Private policing options for the poor. Retrieved from http://www.ncpa.org/pub/ba763 Joh, E. E. (2004). The Paradox of Private Policing. Journal of Criminal Law & Criminology, 95(1), 49-131. Retrieved from http://ezproxy.bellevue.edu:80/login?url=http://search.proquest.com/docview/218388345?accountid=28125 Mulone, M. (2012). When private and public policing merge: Thoughts on commercial policing. Social Justice, 38(1), 165-183. Retrieved from http://ezproxy.bellevue.edu:80/login?url=http://search.proquest.com/docview/1022716230?accountid=28125 National Policy Summit. (2004). Building Private Security/Public Policing Partnerships to Prevent and Respond to Terrorism and Public Disorder. Retrieved from https://www.theiacp.org/LinkClick.aspx?fileticket=LNLjjcfSktQ%3D&tabid=432

Thursday, August 15, 2019

Health Care Marketing Information Matrix

Source of Health InformationType of Health-Related InformationMarketing MessagesHow the Consumer May Assess the Accuracy or Reliability of the Marketing Messages List the information source, such as Internet websites, WebMD, MedLine, or the news media. Type of information provided by the sourceList at least one marketing message being communicated to the consumer within this information source. List one approach the consumer may use to verify the accuracy of the marketing message.Example: Website relating to Zyrtec McNEIL-PPC, Inc. (n. d. ). Zyrtec. In Zyrtec. Retrieved from http://www. zyrtec. com/econsumer/zyrtec/index. view Example: Information relating to the use of Zyrtec in the treatment of allergiesExample: Zyrtec is a fast-acting allergy medicine that maintains its effect for 24 hours after a single dose. Example: Use the product to assess whether it works as stated. Web MD relating to appetite suppressants http://www. ebmd. com/diet/guide/weight-loss-prescription-weight-loss -medicineInformation relating to a prescription weight loss drug to treat obesityAppetite suppressants trick the body into believing it is not hungry or that it is full. The best way to ensure if the appetite suppressants are reliable are by purchasing the product and trying the product for a few weeks or months to see if it actually works. Website relating to Listerine http://www. listerine. om/products-why-mouth-rinse-at-nightInformation relating to an antiseptic mouth wash (Listerine) to kill plaque and gingivitis germs. Rinsing with Listerine twice a day cleans your whole mouth and kills plaque and gingivitis for 24 hoursListerine is the only branded anti- microbial mouthwash among OTC rinses to receive the ADA Seal of Acceptance. On the other hand, it has 25 years of research to validate it kills plaque and gingivitis. Website relating to Infants’ Motrin http://www. motrin. com/product_links/20? val=overview#Information relating to infants’ Motrin that support red ucing fever, sore throat, toothaches, and minor aches and pains due to the common cold Infants’ Motrin contains Ibuprofen. Ibuprofen is a nonsteroidal anti-inflammatory drug (NSAID) over-the-counter. NSAIDs are effective in relieving pain and reducing fever. Follow the label carefully and shake well before using. Locate the dosing chart and apply dose based on the weight, otherwise age. Use the enclosed measuring device. Only use up to 4 times daily and give to child every 6- 8 hours.

Wednesday, August 14, 2019

Project Management Tools/Methods Essay

Over the years, Information Technology (I. T) projects has been known to fail, that is, they are either completed with over budget or not completed within time and budget. Information Technology projects are often complex and detailed in nature and require cognitive knowledge and skills for its accomplishment. I. T projects are often difficult to estimate and manage as some projects are either cancelled or reduced in scope because of over budgeting and time overruns or failure to produce anticipated benefits (Kumar, 2001). Failure of I. T projects is often characterised by the inability to meet the customer’s requirement or change in requirements during the project. To achieve a successful project, monitoring and control process performance is important, that is, control of Information Technology projects involves the use of appropriate management frameworks/methodologies and planning tools. In this report, we are going to look at the various ways of we can monitor and manage I. T projects, evaluating some management frameworks/methodologies and planning tools used with critical analysis on their functions, benefits as well as their weaknesses. Project monitoring and control are steps taking to keep track of a project process to ensure its success. Project monitoring is the gathering of information to determine the current state and progress of a Project in relation to its expected state and success (McBride, 2008; Aljibouri, 2003). Despite efforts put into project planning, things do change or occur that cause our project to derail. At this point, an effective monitoring and control process is useful and required to get the project back on course. It is in the control and monitoring process that we keep track of the project process, identify deviations, and determine and implement corrective actions. Many Organisations tend to manage I. T projects in an unstructured or ad hoc manner throughout its life cycle with limited understanding of the relationship between I. T project implementation and traditional business performance metrics (Stewart, 2008). The attention to schedule and cost are of utmost relevance in project monitoring and control as well as the scope of the project, risk and change control plus the overall performance measurement and reporting. The essential purpose of project monitoring and control is to alert the project manager to any project inter-dependencies that are becoming critical in terms of delivery date, resource allocation, cost or benefits (Lycett et. al, 2002). The basic challenge of project management in achieving its goals it based on managing effectively its typical constraints which include time, scope, budget. The following activities are involved in monitoring and control of I. T Projects; * The adoption of appropriate management framework/methodology – reporting structure, assessing progress, communication. Use of Planning and scheduling tools/techniques e. g. Gantt chart, PERT, CPA, WBS e. t. c * Data control – reporting progress of risk or staff activities MANAGEMENT FRAMEWORKS/METHODOLOGIES Project management methodologies can be said to be a set of principles or guidelines that can be defined and applied in monitoring and control of projects. Project management framework defines and determines how to initiate and run a project. These various methodologies ensure; * Clearly visible and defined management process for project execution * Defined line of reporting and decision making Risk management * Staff are appropriately trained and suitable to handle and run projects * Commitment to the proposed project. There so many various methodologies available as it all depends which suits the organisation practice. Here are a few of some well known ones below: PRINCE 2 – It is an acronym for Project IN Controlled Environment. PRINCE 2 is a structured project management methodology and a widely used standard for managing I. T projects. It significantly provides assistance with the optimal usage of resources with risk management initiatives to manage projects. Elkington and smallman (2000), argues that though the PRINCE 2 method has greatly increased the success rate of projects, but it has little in the way of directing project managers in handling project risk. It offers no advice to project managers on risk estimation. PRINCE 2 promotes consistency of project work and also facilitates staff mobility, reduction of personnel change impact. The method also provides for the absolute recognition of project responsibilities in order for participants to understand each other’s role. The Prince 2 method helps you work out who should be involved and their responsibility. Due to the numerous changes attached to I. T projects, PRINCE 2 has a technique of controlling the impact of change in a project so as to prevent the project from derailing from the right direction. SSADM – Structured System Analysis and Design Method is a method widely used in information system development in the U. K. it is based on data flow diagram. SSADM divides a system development project into stages, steps and tasks and provides a framework for analysing projects in a defined way to manage project. It aims at improving project management and control, develop quality systems, and establish a framework for good communication among personnel in a project team. It also ensures project continuity if there is a loss of staff without any effect on the project success (Middleton and McCollum, 2001). However, some limitations occur in the use of SSADM as it puts much emphasis on the analysis of the system and its documentation. This causes the impact of over-analysing, and can be cost and time consuming. Also, due to various types of description method, consistency checks cannot be carried out. The outline diagram can become very unclear, especially with large systems because all relevant data flow have to be included. Agile Methodology – Agile Development is a term that covers several iterative and incremental software development methodologies. This agile methodologies includes Scrum, Extreme Programming (XP), Dynamic systems development method (DSDM), Crystal, Feature-Driven development (FDD) e. t. c â€Å"Agile Software development represents a major departure from traditional plan –based approaches to software engineering â€Å"(Dyba and Dingsoyr, 2008). Each of these Agile methods is unique in its specific approach, but they all share a common core values and vision. Agile method is a new system development methodology which is used by software development teams to improve the software development process in terms of increased productivity of I. T personnel and higher quality of the final I. T solutions (Chan and Thong, 2008). According to Chan and Thong, (2008); Reifer, (2002), agile methodologies, such as Extreme programming (XP) and Scrum have received praise from practitioners because of their abilities to deal with volatile requirements. Although the deployment of these agile methodologies by I. T personnel is still resistance, industry surveys have indicated that its acceptance in I. T organisations is still at an early phase with many respondents indicating a limited knowledge (Chan and Tong, 2008). Also, in as much as the agile method have generated quite a bit of controversy, but since its entrance into the software community, most projects have continued to deliver high quality software systems within time than the traditional processes. BASIC I. T PROJECT MANAGEMENT PLANNING AND SCHEDULING TOOLS Different types of planning and scheduling tools exists, but we are going to discuss some of the basic one used in managing Information technology projects like Gantt Charts, CPM, PERT, WBS Gantt chart and Critical path Analysis flow diagrams are two commonly used tools for detailed project management planning, scheduling, costing and budgeting. Gantt chart is a typical scheduling method for most types of projects. A Gantt chart provides a graphical illustration of a schedule which helps in planning, co-ordinating and tracking specific tasks in a project. A key feature of Gantt charts is its focus on systemic rather than algorithmic solutions to utilisation problems† (Wilson, 2003). It specifies complex task sequence, that is, a task or more can be required to be completed before other tasks can start. According to Maylor, (2001), he emphasizes that the use of Gantt chart in controlling information systems projects is beneficial as it shows clearly the overlap of scheduled task s, which commonly occurs in system development. Gantt chart supports modification of task dependencies, creation of new task connector as well as re-scheduling individual tasks. It also helps to evaluate the progress of a project. Although, Gantt chart is a widely used and beneficial tool which gives clear illustration of project status, it also has some limitations. Gantt chart do not show task dependencies of one task to another, that is, it is difficult for you to see or tell the effect of a task falling behind schedule of which PERT chart does. Also, Gantt chart does not show the necessity of completing one task before the start of another as Critical Path Analysis will do. Gantt chart is also often used as a reporting tool. PERT and CPM Type Program Evaluation and Review Techniques (PERT) and Critical Path Method (CPM) are useful tools that help to manage and schedule complex projects. Activities of a complex projects can be performed parallel and some sequentially. The collection of these activities can be modelled as a network. PERT type network looks for the schedule to minimize the objective function of the total elapsed project time, that is, it determines the start and the finish times of each activity or task. CPM type is based on the critical path method. It looks for the schedule with the minimum cost in a definite period of time (a case where the cost is associated with each task). CPM provides a graphical view of a project, helps predict the time required for project completion and shows which activities are critical to maintaining the schedule and which are not. â€Å"CPM execution can enable monitoring and control over various topics uniquely related to software projects† (Gelbard et al, 2002). The CPM considers a set of precedence relations between the tasks of a project, that is, some tasks must be finished before other tasks can be started (Conde, 2009). CPM helps to plan all tasks that must be completed as part of a project. When managing I. T projects, CPM helps to get a project back on course by showing you where remedial actions need to be taken as in the case of Gantt Charts. CPM type is deterministic as it uses a fixed time estimate for each activity. According to Chanas and Zielinski, (2001); Yakhchali et al (2009), they emphasizes that the importance of CPM is that the activities duration time are deterministic and known, but the assumption cannot always be fulfilled with satisfying accuracy. Therefore, in order to deal with imprecise durations, they suggested that PERT method be used, which has conception of random variable with beta distribution to model the activity times. However, CPM is simple and easy to understand, but it does not consider the time variations that can have a huge impact on complex project completion time. For less routine projects, there is more uncertainty in the completion times of which PERT network is an alternative as it allows a range of durations to be indicated for each activity. The reduction of time and cost required for project completion is one of the capabilities of a PERT network. PERT assumes that the time estimate for an activity lies within the range of earliest time and latest time. It uses a three time estimates (optimistic, most likely, pessimistic) to compute the expected average time. However, PERT technique provides less benefit if the uncertainty of time estimates is relatively small and irrelevant. Chanas et al, (2001) and Conde, (2008) agrees that the PERT assumes beta distributions for the individual task completion times but also that the assumption and some other conditions are not exempt for criticism. â€Å" Apart from that, PERT provides a scheduling mechanism that is based on resource reallocation and ordering the project activities for cognitively driven task like software projects and research/development projects. â€Å"The main drawback of PERT technique is the difficulty of obtaining the time estimates† Changes do occur in I. T development projects, of which most often result to failure of the overall project. Controlling changes provides stability to projects. Changes to project agreement must be evaluated and recorded accordingly. According to Wang et al, (2008), change control facilitates software flexibility by controlling risks due to unstable scope and run-away requirements. Change control is necessary in project monitoring as it ensures; * Prevention of unauthorized use of resources * Proper update of project plan, its scope, budget expectations, schedule and quality * That the recommended change is consistent with external agreements. Monitoring and control process is no doubt necessary in project development by use and application of methodologies, tools and techniques. However, evaluating the various ways, their functions and characteristics, it can be said that there is no better of f methods as they have their benefits and weaknesses in various areas which other encompasses and vice versa, in other words, there is no-one –fits-all methodology. In practice, project managers have found out that it is difficult to simply use a methodology or tool exactly as it stands. But, it can be said that a good and successful project which delivers quality result, within time and budget are generally dependant on the quality and effort of participants from the project board down to the individual team members.