Thursday, October 31, 2019

The Balkan War Of 1991-1995 Essay Example | Topics and Well Written Essays - 1500 words

The Balkan War Of 1991-1995 - Essay Example The belligerent groups in the Balkan war of 1991-1995 have been described by Gallagher (1999, p. 45), as being from diverse ideological and religious backgrounds. Some of the belligerent groups in the war had archaic and religious iconographies which included perceptions of being the elect, holy, most ancient, heavenly and sacred. As a result there were beliefs among the warring groups that they had a mission to fulfil which came from God. Glenny (1993, p. 211) reveals that the historic military crusades of various cultured nations and dictators who were declared to be chosen illustrates how religion can influence development of war. The religious traditions of the warring groups in the Balkans war and their impact on democracy and political policies are therefore blamed for the fighting in the Croatian region. During the war, fighters were motivated by the need to protect their religious identity against adversaries who were considered a threat to their beliefs and national heritage . As demonstrated by Denitch (1994, p. 24) the final analysis of the Balkan war of 1991-1995 shows that it was a religious war. Although the war has been attributed to the consequences of differences in culture, incompatible national policies and revenge for previous injustices, religion had a big role in the development of the war. Because the happenings which led to this war were spontaneous, unreasonable and irrational, the role of religion in the fighting is justifiable.

Tuesday, October 29, 2019

Advertising and Sales Essay Example for Free

Advertising and Sales Essay Assignment Q1. What is the meaning of advertising? Explain the advertising pyramid with a neat diagram. Advertising is the non-personal communication of information usually paid for and usually persuasive in nature about products, services or ideas by identified sponsors through the various media to reach broad audiences† The five basic element of this pyramid are: attention, interest, desire, action and satisfaction. Attention: The first objective of advertising is to capture attention of the consumer. The job is easy as even shouting or clapping can draw attention. Therefore, the copywriter usually makes the headline very catchy by using the bigger fonts. The other techniques are to use short punch lines in conversational language. Interest: The advertisement’s next objective is to create interest in the readers about the product. After giving a good headline, their interest is retained by elaborating on the key features of the product. This is usually incorporated in the body copy. Desire: In this step, the advertisement creates a situation for the prospective customer to enjoy benefits of the product vicariously. The writer creates a situation that makes the reader feel as though there is a lot that is being missed if one does not use the product. Action: The purpose of this step is to motivate people to do something. No advertisement is successful if it cannot induce any action. This is not a difficult step because if the copy is clear then surely the reader will act. Satisfaction: The tip of the pyramid is satisfaction. After the product is bought, the buyer should have a feel of satisfaction. The customer should always feel that it has got the appropriate returns for the money spent. Q2. What do you understand by integrated marketing communication (IMC)? What are the various roles? â€Å"IMC is a strategic business process used to develop, execute, and evaluate coordinated, measureable, persuasive brand commun ications programs over time with customers, prospects, employees, associates, and other targeted relevant internal and external audiences. The goal is to generate both short-term financial returns and build long-term brand and share-holder value.† Integrated Marketing Communications (IMC) is a process involving coordination of various promotional elements and other  marketing activities that communicate with a firm’s customers. It includes managing customer relationships that drive brand value through communication efforts. The role of IMC can be discussed with the following points:  · Identifying the target audience  · Specifying promotion objectives  · Setting the promotion budget  · Selecting the right promotional tools  · Designing the promotion  · Scheduling the promotion Identifying the target audience: IMC’s first function is to identify the right audience. It is very important to deliver the message to the right audience. Specifying promotion objectives:  · Designed for a well-defined target audience  · Measurable  · Cover a specified time period Hierarchy of effects: Sequence of stages a prospective buyer goes through Use as a tool to develop objectives  · Awareness – Ability to recognize and remember the product or brand  · Interest – Increase in desire to learn about the product features  · Evaluation – Consumer’s appraisal of the product on important attributes  · Trial – Consumer’s actual first purchase and use  · Adoption – Repeated purchase and use of the product or brand Setting the promotion budget:  · Percentage of sales: Funds are allocated as a percentage of past or anticipated sales  · Competitive parity: Matching the competitor’s absolute level of spending Selecting the right promotional tools  · Specify the combination of the five basic IMC tools – advertising, Personal selling, sales promotion, public relations and direct marketing  · Promotion mix can vary  · Assess the comparative importance of the various tools Designing the promotion:  · Design of the promotion plays a primary role in determining the message that is communicated to the audience  · Design activity is viewed as the step requiring the most creativity  · Design each promotional activity to communicate the same message Scheduling the promotion:  · Determine the most effective timing  · Promotion schedule describes  · Factors such as seasonality and competitive promotion activity can influence the schedule. Q3. While developing an advertisement, some theories are useful. Discuss the two theories to design an advertisement. In developing an advertisement for an advertising campaign, several theoretical frameworks are useful. The first theory is the hierarchy of effects model. The second is a means to an end chain. Both the hierarchy of effects model and a means to an end chain can be used to develop leverage points. 1. Hierarchy-of-Effects Model Among advertising theories, the hierarchy-of-effects model is predominant. It helps clarify the objectives of an advertising campaign as well as the objective of a particular advertisement. The model suggests that a consumer or a business buyer moves through a series of six steps when becoming convinced to make a purchase. These six steps are as follows: Awareness – If most of the target audience is unaware of the object, the communicator’s task is to build awareness, perhaps just name and recognition with simple messages repeating the product name. Consumers must become aware of the brand. Knowledge – The target audience might have product awareness but may not know much more; hence this stage involves creating brand knowledge. This is where comprehension of the brand name and what it stands for become important. What are the brand’s specific appeals, its benefits? Liking – If target members know the product, how do they feel about it? If the audience looks unfavorably towards the product then the communicator has to find out why. If the unfavorable view is based on real problems, communication campaigns alone cannot do the job of erasing it. Preference – The target audience might like the product but not prefer it to others. In this case, the communicator must try to build consumer preference by promoting quality, value, performance and other features. Conviction – A target audience might  prefer a particular product but not develop the confidence about buying it. The communicator’s job is to build conviction among the target audience. Purchase – Finally, some members of the target audience might have conviction but not quite get around to making the purchase. Th ey may wait for more information or plan to act later. 2. Means-End Theory A second theoretical approach a creative (team) can use to design an advertisement is a means-end-chain. This approach suggests that an advertisement should contain a message or means that lead the consumer to a desired end state. Means – end theory is the basis of a model called the Means-End Conceptualizations of Components for Advertising Strategy (MECCAS). The MECCAS model suggests using five elements in creating advertisements.  · The product’s attributes – delicious and refreshing are the products attribute.  · Consumer benefits – delicious and refreshing are linked with the benefit of freshness and good taste.  · Leverage point – the leverage point in the advertisement is the link between the benefit of delicious drink and the personal value of choosing the right drink of an athlete.  · Personal Values – the value of the consumer, the reason of buying Coca Cola. He could value the ’refreshing’ or the ’delicious’ attributes. The marketers need to understand the personal value so that the message will hit the right target. Q4. What do you mean by public relations(PR)? What are the difference between PR and advertising? â€Å"Public relations† is used to build rapport with employees, customers, investors, voters or the general public. Public Relations (PR) is the actions of a corporation, store, government, individual etc. in promoting goodwill between itself and the public, the community, employees, customers etc. The most comprehensive definition is as follows: â€Å"Public relation is the management function which evaluates public attitudes, identifies the policies and procedures of an organization with the public interest and executes a program of action and communication to earn public understanding and acceptance.† The following are the differences between advertising and public relations. Advertising 1. The company pays for advertising the company. Hence the focus is on getting its products or  services. 2. Since you are paying for the space, you have creative control on what goes into that advertisement. 3. Advertisements can be published or run repeatedly. An advertisement generally has a longer shelf life than one press release. 4. In advertising, you get to exercise your creativity in creating new advertising campaigns and materials. 5. If you are working at an advertising agency, your main contacts are yours-workers and the agencys clients. 6. You are looking out your target audience and advertise accordingly. You would not advertise a kid’s Product in a business magazine. 7. Some industry professionals such as Account Executive have contact with the clients. Others like Copywriters or Graphic Designers in the agency may not meet with the client at all. 8. â€Å"Sales!, 20% discount, Buy this product! Act now! Call today!† These are the things you can say in an advertisement. You want to use those buzz words to motivate people to buy your product. Public relations 1. The objective is to get free publicity for space. You know exactly when that advertisement will on air to be published. 2. You have no control over how the media presents your information, if they decide to use your information at all. They are not obligated to cover your event or publish your press release. 3. You submit a press release about a new product or about a news conference once. The PR exposure you receive is only circulated once and the editor will not publish more than once. 4. In public relations, you have to have a nose for news and be able to generate buzz through that news. You exercise your creativity in the way you search for new news to release to the media. 5. In PR, the main contacts will be people in the area of publications and broadcast media. 6. It is generally not possible to segment, target or position the product or service. 7. In public relations, you are very visible to the media. PR professionals are not always called on for the good news. In an emergency you may have to give a statement or on-camera interview to journalists. You may represent your company as a spokesperson at an event. 8. You are strictly writing in a no-nonsense news format. Any blatant commercial messages in your communications are disregarded by the media. Q5. What are the four types of annalists used to develop a comprehensive model for evaluation of a sales organization? There are mainly four factors or types of analysis that are usually needed to  develop a comprehensive model for evaluation of a sales organization. They are: 1) Sales analysis 2) Cost analysis 3) Profitability analysis 4) Productivity analysis 1) Sales analysis: It is an important factor for evaluating the effectiveness of a sales organization. Sales analysis detects strengths and weaknesses of the organization. Sales analysis is described as a detailed inspection of a company’s sales data, which includes assimilating, classifying, comparing and drawing conclusions. Sales analysis is done based on the following parameters: a) Levels in sales organization: Sales analysis should be done at all levels of the sales organizations. This includes evaluation of sales performance from the company level down to the last level. b) Types of sales: The analysis of different types of sales at different organizational levels definitely increases the sales manager’s ability to detect problem areas in the company’s sales performance. For example, analysis can be done: a. Based on type of products b. By distribution channels types c. By type of customer classifications d. By size of orders 2) Cost analysis: Cost analysis is the analysis of costs that affect sales volume. The purpose of marketing cost analysis is to determine the profitability of sales control units, like market segments, sales territories and products. This is done by subtracting the marketing costs from the sales revenues, associated with the sales control units. 3) Profitability analysis: Profitability analysis of marketing units (that is, regions, branches, channels, products or customer groups) can be developed by preparing profit and loss (or income and expense) statements for marketing units. However, the question arises as to how to allocate indirect or shared expenses to various marketing units. There are two approaches for profitability analysis 4) Productivity analysis: Productivity is usually measured by ratios between outputs and inputs. For example, sales per salesperson are used by many companies as a measure of productivity. There  are other productivity ratios such as selling expenses per salesperson, sales calls per salesperson, and quotations submitted per salesperson. Q6. Describe the meaning and importance of media fix decisions. A media mix is the way various types of media are strategically combined in an advertising plan, such as using newspaper and posters to announce a new product as the iPod managers did, followed by television advertising that shows how to use the product and billboards that reminded people to look for it when they go out to the store. A media vehicle is specific TV program (Comedy Circus, CID), newspapers (The Telegraph, Mumbai Mirror), magazines (The Sport star, Elle). Media planning is the way advertisers identify and select media options based on research into the audience profiles of various media; planning also includes scheduling and budgeting. Media buying is the task of identifying specific vehicles, such as TV channels/programs or websites, negotiating the cost to advertise in them and handling the details of billing and payment. Frequency refers to the number of times a person is exposed to the advertisement. An impression is one person’s opportunity to be exposed one time to an advertisement in a broadcast program, newspapers, magazines or outdoor locations. Circulation means the number of copies sold. In the media industry, there are professionals who do both, sell and buy advertising. Media sales people work for a medium, such as a magazine or television channel and their objective is to build the best possible arguments to convince media planners to use the medium they represent. There are also media reps, who are people or companies that sell space (in print) and time (in broadcast) for a variety of media. The rate base is the real number of copies of a newspaper or magazine that gets printed and sold. Readership is the average number of readers per copy sold.

Saturday, October 26, 2019

Internet of Things in the Public Sector

Internet of Things in the Public Sector Abstract Context and Objective The Internet of Things (IoT) is not merely a step along the path to digital transformation, it is the driving force to the way we live today, and our future. Many items in our daily lives, whether at home or work will interact with each other, enabling   us to use them in different and new ways (Goerlich, K, 2016). The objective of this paper is to analyse to what extent charities, social enterprise, public sector organisation and public-private partnerships use (IoT)? how has (IoT) helped their business to grow? or does (IoT) need to be implied within their organisation and how? Framework, Model and Analysis For this assignment an Evaluation framework is going to be used. This ecosystem approach will emerge in the form of an (IoT) software platform (Iansiti, and Levien, 2004). This represents a set of reusable components, modules, and other building blocks that are shared by multiple applications and products (Baldwin and Woodard,2009). The use of Secondary data analysis is the chosen method for this study, as this method includes both qualitative and quantitative and will be significant for this study (Saunders et al., 2016, p316-318). Rationale and Findings The chosen three case studies will be on Oxfam, Google and Microsoft for this research. This is due to their present or lack of activities within the (IoT). Although Microsoft and Google have accomplished (IoT) within education, Oxfam still needs to consider the (IoT) element which can help the less fortunate countries that they work with. Working together will enable a great partnership. Contributions Contributions of this paper could lead to organisations adapting their approach to the IoT, and give an insight to how we can significantly improve our lives and future by understanding more about the IoT. Introduction The aim of this paper is to investigate   how far charities, public private partnerships and public sector organisations use IOT and to what extent do they use IOT in their business. A research will be conducted to see how IOT has helped these businesses grow. In order to do so three companies have been chosen for this paper. Kobie (2015) highlights that the Internet of Things (IoT) has been present for decades, in which, the core aim reflects on the connection of devices with the use of internet. Technology will enable the connected systems to develop fundamental areas, for example education (Greengard, 2015, p. 1). The internet everlastingly developing has become a fundamental asset to everyday life (Dutton, 2014). Kevin Ashton (cited in Buyya Dastjerdi, 2016) quotes that things aspect of the way we interact and live within the physical world that surrounds us needs serious reconsideration, due to advances in computing, Internet, and data-generation rate by smart devices. IoT is considered as a way of performing jobs with the support of everyday objects that are linked to sensors and networks (Wà ³jcik, 2016). This paper will look into how the three companies use or potentially can use IoT technology by looking at the literature review and research method, including appropriate theoretical framework, whilst aiming to improve the wellbeing of students in education. Background The chosen organizations for this assignment are Oxfam, Google Inc. and Microsoft.They have been chosen for numerous reasons that will be discussed subsequently. All three make use of the Internet of Things (IoT) in different ways, which have diverse impact and repercussions. Oxfam is a charitable organization that deals with a multitude of projects mainly against poverty and the factors that cause it. This organization represents a global drive with millions of people that believe we live in a society with abundant means and resources, thus, hardship and poverty should not be an everyday issue or anticipated (Oxfam, 2017). IoT plays a key role in this association because it is the means by which the society exposes its work, statistics and achievements to the public. Additionally, the company receives its donations online; therefore the web is vital for the life of the organization. Through the Internet the company gives numbers and facts regarding the work they do, and raise awaren ess through various social media profiles they possess. In this way, Oxfam uses the Internet as a tool for education regarding their activities and regarding many realities in the world. For this, people are more conscious and ultimately responsive towards the association. Google Inc. is an American search engine company, which was established in 1988. More than 70% of online researches are monitored by this organization, and this company today offers over 50 online facilities and products (Hosch and Hall, 2015). The Internet is at the heart of this company as the original nature of Google Inc. is of an online search engine. Also, in 2011, 97% of Googles revenue originated from online advertisements further demonstrating the importance of the IoT for the existence of this company. Google conveys in educating through the web by making any information easily available to the public. Also, it has established many more tools such as Google Scholar, Docs and Slide which ease the search of original documentation and the sharing of any type of document, further helping education. Microsoft Corporation is an American software company, founded in April 1975 by Bill Gates and Paul Allen with headquarters in Redmond, Washington in the USA. The companys business is based on developing, manufacturing, and licensing software products, including operating systems, server applications, business and consumer applications, and software development tools, as well as Internet software, technologies, and services (Advameg, 2017). Literature Review DISCUSSION OF FRAMEWORKS It is essential to have clear understanding of IoT as it is forever developing and has a huge role in many lives. When looking into education, experts have been looking at new ways to help students get the most from their studies and succeed. The framework for Smart Buildings with cloud computing has been introduced in order to create smart environments with full use of resources (Carrillo et al, 2015). Carrillo et al (2015) also states that the framework includes the integration of Microsoft Azure, which is the main virtual database, and has control to manage the Smart control units. Microsoft Azure is also known to help education by providing a cloud-based service which includes managing applications, using tools and frameworks (Microsoft Azure, 2017). In comparison, the framework for evaluating internet of things platforms in relation to application provider viewpoint supports design and implementation which is the starting point of the device, and operations which supports three core areas; fulfilment, assurance and billing (Mazhelis and Tyrvainen, 2017). (Figure 1) An IoT application combines multiple software components that are dispensed across numerous redistribution points (nodes) that interconnect with each other (Figure 1). The Evaluation Framework was fabricated based on the service providers processes as defined in the TM Forums Business Process Framework à ¢Ã¢â€š ¬Ã‚ ¦and then utilised to evaluate the selected platforms (Mazhelis and Tyrvainen, 2014). As suggested by Mazhelis and Tyrvainen (2014), the initial analysis indicate that none of the platforms provide the comprehensive support for the application providers. However, with the assumption that all components remain mandatory and represent separate physical entities à ¢Ã¢â€š ¬Ã‚ ¦ The application provider will need to implement and integrate the software for each component or factor (Mazhelis and Tyrvainen, 2014). The framework, differentiates between the processes dealing with the design and development of the service And the core operations processes, which include the fulfil ments, assurance and billing processes (Figure 2) (Mazhelis and Tyrvainen, 2014). In order to prioritise and create strong values it is important to identify the most suitable (IoT) use cases as this can vary from service, IT, operations and many more (IoT Use Cases, 2017). IT and operations focus on creating a new technology project in which the product and asset connectivity includes the easy connectivity of devices to cloud services (PTC, 2017). When looking at the service aspect of (IoT), this includes areas such as remote services, which involves transferring files (IoT Use Cases for Service and Support, 2017). When looking into the education system, (IoT) will have a significant impact allowing schools to save money and help students develop high-tech skills (Augur, 2016). There are areas in which can be looked into that influence (IoT) in relation to education, for example, pupils can monitor their attendance on a wearable device, personalised learning materials, automatic purchases of stationery, data transfer including students receiving information on le ssons as soon as they enter the classroom (The internet of things for education: A brief guide, 2016). Melola (2016) states that the benefits of (IoT) includes safety of schools, tracking of resources and accessing information creating smart lesson plans.   MICROSOFT GOOGLE Despite the presence of cutting-edge technology influencing mainly specialists and enthusiasts, there is a lack of comprehensive engagement targeting the wider society (Mazhelis and Tyrvainen, 2017).   The technology industry giants Microsoft and Google are known to have engagement in (IoT) especially in education. On the other hand, there are companies such as Oxfam that do not involve with (IoT), however have the potential to do so to support those in education. Microsoft has introduced Microsoft Intune for Education which is a cloud-based service for teachers and students offering them a technological learning environment (Microsoft in Education, 2017). The virtual service allows schools to have access on applications and resources on any device, whilst ensuring that the data is secure (Microsoft Intune, 2017). The application is tailored for schools and integrated with Office 365 Education allowing teaching to become efficient, affordable, and safe (Microsoft, 2017). Google has also adapted to the use of (IoT) in which the Google Cloud Platform encourages secure, global, high-performance, cost-effective and constantly improving infrastructure (Google Cloud Platform, 2017). The service provides a wide range of benefits from computing to storage and development (Rouse, 2016) Oxfam Oxfam does not utilize (IoT) currently, however it could benefit from its use and definitely has the potential to do so. An (IoT) technology that Oxfam could use is smart buildings for education. Smart buildings are structures that use automated processes to automatically control the buildings operations including heating, ventilation, air conditioning, lighting, security and other systems(Tracy, 2016). This is done through the use of actuators, sensors and microchips that collect and manage data for smart solutions. Oxfam could use this for a variety of projects as smart buildings enable the improvement of thermal comfort air quality, physical security [and] sanitation at lower costs and environmental impact (Tracy, 2016). For this, Oxfam could use such technologies in constructing new homes or improving existing ones and in educational buildings such as schools. This would improve the quality of education and create more affordable options for people in need. Microsoft could help O xfam with the use of (IoT) technologies with its public cloud-computing platform called Microsoft Azure. This platform is used for things such as computing, data storage, analytics and helping users capture, monitor and analyse (IoT) data (Rouse, 2012). Therefore, this platform could not only help with data from educational buildings but also help educational institutions process, share and store files for students and teachers. Research Method Our research method will consist of data collection from secondary data. For this report, the secondary data will be based on (IoT) and how it is used in the three companies and how they use (IoT) in relation to education. The secondary data will mainly come from books, journals, articles and internet search. In order to analyse the three companies for this assignment a business framework will be used and secondary data will also be used in order to analyse how (IoT) is being used in the three companies and how its being used in education. The reason for why Google, Microsoft and Oxfam are being used for this report is due to the fact that these three companies already use (IoT) in their companies and in the sector that we would like to focus which is education. The Internet of Things is not exceptionally another innovation; however, the Internet of Things is progressively an advancement since a wide range of existing advances will be consolidated.When looking at the report the primary focus is to look at (IoT) and how it is being used for education and this will include looking at what the three companies have created that is currently being used in education or is in creation. The education sector was chosen due to the fact that (IoT) is used in schools, universities, colleges. (IoT) these days makes teachers and students jobs easier. For teacher, there able to use learning platform to be able to research, and then upload their class materials in order for students to see online, this allowing time for the student to study and get ready for their class. However, this is just the beginning because students can now take notes without leaving the classroom, or they can be taking their notes on their iPads or their laptops. Students can now also assess books through their mobile phone or laptop, saving them carrying the books with them and also allowing them to be able to learn and study at their own pace. The surge in connected technology means that instructors do not need to manually grade tests on paper or perform other routine tasks. (Meola, 2016) For instance, Microsoft in Beijing they have created a connected classroom which is a new innovative classroom software which connects to students devices and allows them to see what is being written on the whiteboard, the software also allows teachers to see who is connected. (IoT, 2014). Universities now also have their own learning platform such as blackboard or Moodle. These platforms allow the university to see who is accessing the database and how often and are able to monitor your learning. (Meola, 2016).Google have created a G Suite which offers schools to a email, calendar, and also give students and teachers access to spreadsheets, documents and students can also create projects and the teachers are able to have access to this and see how the group work is going (Rochelle, 2016). As Rochelle (2016) says : G Suite for Education is the same set of apps that you know and love-Gmail, Docs, Drive, Calendar, Hangouts, and more- but designed with new intelligent features that make work easier and bring teachers and students together. In this paper, the framework that is being used is the evaluation framework. The evaluation framework is used to evaluate (IoT) platforms and how they are developing and how the (IoT) platforms are improving, this is done by using openly accessible data about the platforms and the platform features and what services they have that support this (Mazhelis and Tyrvainen, 2017).The framework will be used to analyse Microsoft and Google as companies and what platforms that they currently have and analyse how they can use these platforms to help Oxfam. Analysis Increased numbers of institutions continue to embrace (IoT) platforms in the running of various operations with the objective of achieving efficiency. The new age has seen the popularity of (IoT) applications in organisations increase. Through (IoT), organizations can employ one intelligent network infrastructure to improve operations; increase safety and security and thirdly, gain valuable data insight to streamline automation. This trend has been the case for many companies cutting across the different industries from technology, transport, education, healthcare, manufacturing, and service among others. The different companies have employed this platform to streamline different activities or operations leading to better productivity. It is critical to note that the Internet of Things (IoT) is not exceptionally another innovation; however, the Internet of Things is a progressive advancement since a wide range of existing advances will be consolidated. The Internet of Things (IoT) can be defined as the interconnection of physical devices, sensors and actuators with the Internet through uniquely identifiable IP addresses. This interconnection is structured in ways to allow data to be gathered and communicated through connectivity technologies and (IoT) platforms (Nicole, 2017). This infrastructure can be seen as an additional layer of interaction and transaction of information and users of that information courtesy of the development of new devices, which have advanced capabilities including those of sensing, analyzing and communicating data by use of internet protocols. Ultimately, the development of the (IoT) comes to play a key role in bridging digital and physical realities through enhanced information-driven automation in various processes, critical to businesses and daily human lives.As noted, various companies have employed (IoT) apps to run their operations; while still more companies will in the future embrace (IoT) platforms to run their businesses. Among the top applications of the (IoT) is in the education sector; where various technology companies have developed (IoT) applications that allow their users to interact with new information in an effective manner. The cases include those of Google and Microsoft technology companies. These two giants in the technology sector took a lead in embracing (IoT) applications in facilitating their education services to the users of their service. Both companies employ (IoT) for education purposes. The application of (IoT) for education purposes in these companies has been exemplary due to the way thei r platforms have been tailored for the benefits of the users. Analyzing the case of Microsoft; it is evident that the company has taken a lead in the development and application of (IoT) platforms for education. According to Microsoft, the company envisioned a case where smart sensors would act as a mini-database with embedded machine learning algorithms. This today is a success due to its application in the creation of a connected classroom. Microsoft Company developed an (IoT) platform-Connected Classroom currently being applied in Beijing. This is a new program (software) that connects the students devices, and allows each learner to see what is being written by the instructor on the white board. This software further allows the teachers to see and follow up with who is connected (IOT, 2014).   This new software by Microsoft has worked greatly in allowing universities in Beijing to provide education to learners in a more effective manner.Besides, other universities have come up to adopt this (IoT) platform to see who is accessing thei r database and how often they do that. This (IoT) platform is of great benefit to the learning institutions through allowing the educators/instructors to follow up and monitor the learning process. It has also made it easier for teachers to connect with the learners in remote areas or catch up with learners who may not have the convenience of literally attending their classes (PustisÃÅ'Å’ek, 2014). Other related (IoT) softwares that are similar to Microsoft (IoT) platform are   blackboard or Moodle, which are owned by universities. This platforms allows a university to see who is accessing the database and how often. Google is another technology company that has developed an (IoT) application-the G-Suite. This is a software application that allows schools to share data through email; program data in the calendar, and allows the users (teachers and learners) to access documents, and spreadsheets. In addition, the G-Suite allows students to create projects and share data. The application further allows the teachers to access data fed into it, observe the group work that takes place, and monitor the learning process (Google 2017). The G-Suite for education is an app that is designed to make the learning process interactive and seamless by bringing the teachers and students connected. Ultimately, this allows effective learning process. Google G-Suite for education and Microsofts -Connected Classroom software applications can be used to help Oxfam. Oxfam as a confederation of charitable organizations with the objective of alleviation of global poverty would greatly benefit from these two applications developed by Google and Microsoft. One of the ways to alleviate poverty is through education. Enhanced education allows more people to access better jobs or create their own employment; thereby earning good incomes that would allow them to have a better life. Googles G-Suite for education can be used by Oxfam to reach out to places where the company runs its operations and allow more people to have access to learning (Skiba, 2013). In addition, Microsoft shared classrooms can be used by Oxfam. It can be used to reach out to areas of need, such as India and China; where shared classrooms will increase the numbers of learners at any given time. Discussion of Findings It is clear that (IoT) will be used in most of our lives, especially in the near future, as companies like Microsoft and Google are working towards making education effective by creating a virtual presence that can be accessible on most devices. As well as education, it can also be beneficial when looking at businesses and social life too. Whilst these companies look at fulfilling educational needs, other companies like Oxfam have not yet introduced (IoT) in education, however do have the potential to. Microsoft and Google can work with Oxfam with engaging in (IoT) in education. This would surely benefit the less fortunate people that Oxfam is focused on helping, and additionally it would greatly improve the company by advancing it with new technologies. Therefore, Oxfams progression to IoT technologies would lead to great benefits for different groups of people. Conclusions Recommendations In conclusion, IoT technologies are a current advancement that numerous companies are integrating into their organization. Some examples of this are Google and Microsoft, which are making noticeable progresses due to these technologies. Furthermore, there are companies who have not yet integrated IoT tools but have the potential to do so, such as Oxfam. Google and Microsoft could help companies such as Oxfam to develop and integrate the use of these technologies in their organization. This would significantly improve the management of charity organizations in general for education but also for costs, organization and environmental impact. Moreover, further research in this area could be conducted by considering more companies that use IoT technologies and analyse the benefits these technologies have conveyed to. Also, any type of organizations that do not have IoT technologies could be considered and an analysis could be done for how these could use the technologies and benefit from them. References Augur, H. (2016, December 13). IoT in education: the internet of school things. IBM. Available from https://www.ibm.com/blogs/internet-of-things/iot-education   [Accessed 2 March 2017] Baldwin, C. and Woodard, C. (2008). The Architecture of Platforms: A Unified View. in Platforms, Markets and Innovation. Available from http://www.hbs.edu/faculty/Publication%20Files/09-034_149607b7-2b95-4316-b4b6-1df66dd34e83.pdf [Accessed 1 March 2017]. Buyya, R., Dastjerdi, A. (2016). Internet of Things: Principles and Paradigms. Morgan Kaufmann. Carrillo, E., Benitez, V., Mendoza, C., Pacheco. (2015, October 25). IoT framework for Smart Buildings with Cloud Computing. IEEE Digital Library. Available from http://ieeexplore.ieee.org/abstract/document/7366197/?section=abstract [Accessed 1 March 2017] Dutton, W. H. (2014). Putting things to work: social and policy challenges for the Internet of things, 16 (3), 1-21.   Emerald Insight. Available from http://dx.doi.org/10.1108/info-09-2013-0047 [Accessed 27 February 2017]. Gerpott, T. and May, S. (2016). Integration of Internet of Things components into a firms offering portfolio: a business development framework. Digital Policy, Regulation and Governance, 18 (2), 53-63. Available from http://dx.doi.org/10.1108/info-11-2015-0051 [Accessed 16 February 2017]. Goerlich, K. (2016). Live Business: The Importance of the Internet of Things. Digitalist by SAP. Available fromhttp://www.digitalistmag.com/executive-research/live-business-the-importance-of-the-internet-of-things [Accessed 14 February 2014]. Goldacre, B. (2015). I did a Newsnight thing about how politics needs better data. Bad Science. Available from http://bad science/2015/02/ [Accessed 12 March 2015]. Greengard, S. (2015). The Internet of Things. The MIT Press. Hosch, W.L. and Hall, M. (2015). Google Inc.: American company. Encyclopà ¦dia Britannica. Available from https://www.britannica.com/topic/Google-Inc [Accessed 28 February 2017]. Iansiti, M. and Levien, R. (2004).   Strategy as Ecology. Harvard Business Review, 82 (3), 68-81. Available from https://hbr.org/2004/03/strategy-as-ecology [Accessed 1 March 2017]. IoT Use Cases. (2017). PTC. Available from http://www.ptc.com/internet-of-things/use-cases [Accessed 1 March 2017] IoT Use Cases for Service and Support. (2017). PTC. Available from http://www.ptc.com/internet-of-things/use-cases/service-and-support [Accessed 2 March 2017] Kobie, N. (2015). What is the internet of things?. The Guardian. Available from https://www.theguardian.com/technology/2015/may/06/what-is-the-internet-of-things-google [Accessed 22 February 2017]. Mazhelis, O. and Tyrvainen, P. (2014). A framework for evaluating Internet-of-Things platforms: Application provider viewpoint. In Internet of Things (WF-IoT), IEEE World Forum. on (pp. 147-152). Available from:http://ieeexplore.ieee.org/document/6803137 or https://learning.westminster.ac.uk/bbcswebdav/pid-1822773-dt-content-rid-4663729_1/courses/BBIM613.2.2016/A%20Framework%20for%20Evaluating%20Internet-of-Things%20Platforms%20Application%20Provider%20Viewpoint.pdf   [Accessed: 1 March 2017]. Bassi, A 2008. The Internet of Things (IoT). Mst News, 5 (1), pp. 14-16.Black, M 1992. A Cause for Our Times: Oxfam the First 50 Years. Oxfam. Nicole, K 2017. What is the internet of Things? The Guardian, Wednesday 6 May 2015 09.51 BST. Available at/: https://www.theguardian.com/technology/2015/may/06/what-is-the-internet-of-things-google [Accessed: 05 March 2017]. Google 2017. Google Suite for Education. Available at/: https://edu.google.com/products/productivity-tools/[Accessed: 5 March 2017]. PustisÃÅ'Å’ek, M 2014. Scopes in Internet of Things, PortorozÃÅ'Å’, Slovenija, 1 (2), pp. 85-88. Skiba, D 2013. The Internet of Things (IoT). Education Perspectives, 34 (1), pp. 63-64. Meola, A. (2016) How IoT in education is changing the way we learn. Business Insider UK. Available from http://uk.businessinsider.com/internet-of-things-education-2016-9?r=USIR=T [Accessed 28 February 2017]. Microsoft. (2017). Microsoft Intune for Education supercharges schools with incredible device management powers.Microsoft News Centre. Available from https://news.microsoft.com/europe/2017/01/27/microsoft-intune-education-supercharges-schools-incredible-device-management-powers/#sm.00002x5lsmqk2fj611i1acyye9iys#2fX5CuYZ1wwtKGvV.97 [Accessed 2 March 2017] Microsoft Azure. (2017). What is Azure? Microsoft Azure. Available from https://azure.microsoft.com/en-gb/overview/what-is-azure/ [Accessed 1 March 2017] Microsoft in Education. (2017, January 24). Introducing Microsoft Intune for Education. Youtube. Available from https://www.youtube.com/watch?v=ukrnCwcLvV8 [Accessed 1 March 2017] Microsoft Intune. (2017, January 24).Microsoft. Available from file:///C:/Users/berna/Downloads/Microsoft_Intune_datasheet.pdf [Accessed 1 March 2017] Microsoft IoT. (2014) Internet of Things: Creating a connected classroom with IoT. Microsoft. Available from https://blogs.microsoft.com/iot/201

Friday, October 25, 2019

The Girl with The Silver Eyes Essay -- Literary Analysis, Dashiell Ham

Hard-boiled detective fiction sets the scene for a cold and harsh reality. Dashiell Hammett’s, â€Å"The Girl with The Silver Eyes† is no exception to this rule. In this short story Hammett paints a picture of a brutally realistic urban center filled with characters that not many people would want to call friends. The realistic qualities of Hammett’s story are drawn from his own life’s experience working as a Pinkerton detective. The detective in â€Å"The Girl With The Silver Eyes† works for the Continental Detective Agency and is, therefore, known simply as the Continental Op. In the beginning of the story the Op professes, â€Å"a detective, if he is wise, takes pains to make and keep as many friends as possible among transfer company, express company and railroad employees† (27). This paper will examine this philosophy of the Continental Op, how he employs this approach to detective work and uncover if this approach is beneficial or disa dvantageous. The Continental Op is an unsympathetic character with a stickler attitude to his work. The Op believes that the case he is about to take is legitimate but states that, â€Å"I am only a hired man and have to go by the rules† (23). At the core of this statement is a man that is unwilling to bend the rules outlined by his company. People who always follow the rules are often seen as trust worthy and at the same time difficult to get along with. When you know a person is always going to go by the book, like the Op, it makes their actions predictably frustrating. Things could go a lot faster if a person were to cut a corner or two and help out. By doing this the detective might have made himself more likable to his new client. The Op shows no desire to perform this way to have friends on his side. T... ... even if this means that he has to pay a few people to be his friends. Without the help of the girl at the Marquis Hotel the Op would not have been given that lead. If it were not for the help of Porky Grout over the past three years that the detective had employed him, who knows how many cases would have gone unsolved. Even though in the end things do not workout between Porky and the Continental Op and Porky meets his fate. It is clear that the Op’s philosophy about what it means to make and keep friends is different then what other people would describe. It is the strong moral code that the P.I. is constantly reinforcing that allows the case to come to a resolution. People may not like the Op and fortunately for the general public most people to not have the personality of the Continental Op. Fact is the detective solves the case and gets his women in the end.

Wednesday, October 23, 2019

Dystopian Society’ Essay

There are many dystopic experiences in Incognito and the real world. Examples include Nazi Germany, North Korea, the Taliban and Joseph Stalin. One main example is the Communist China which involved a revolution, power in the government and no freedom of speech. The person mainly responsible for this is Mao Zedong who overthrew his enemies and millions of people were killed or persecuted. This is similar to Incognito as it involves data lords and the overpowering government. It also shows similarity in the lack of freedom because in both realities, if you do or say something which is not smiled upon in the society, you don’t exist anymore (obliteration and persecution). Another example is Nazi Germany which was ruled by Adolf Hitler who eradicated all Jews in Germany by sending them to concentration camps. This shows a lack of freedom similar to Communist China’s lack of freedom of speech. However, this simply involves who you are religiously instead of physically. For example, while you could hide your opinion in China, you could not hide that you were Jewish in Germany. Also, this, instead of simple execution could also take away a part of you as a person, due to the Nazis forcing you to convert to their ways. In Incognito, the data lords stripped people of their identities if they were not worthy of their identity. The Taliban is a fundamentalist Muslim movement whose militia took control of much of Afghanistan from early 1995. During the Taliban’s years of control over Afghanistan, most governments did not recognise it as a legitimate government, due to concerns about human rights violations. Their aim was to publicise, in an often exaggerated fashion. The group is also attempting to assure Afghans that it has a strategy for governing the country again, presenting a platform of stamping out corruption and even protecting women’s rights. This is similar to Incognito’s (the spy group) purpose towards the government and trying to reduce corruption of people with a higher status than most others, ie: the data lord.

Tuesday, October 22, 2019

The Meaning of the Surname Fuchs

The Meaning of the Surname Fuchs The Fuchs surname means fox, from the Middle High German vuhs, meaning fox. Sometimes used to describe someone with red hair, or someone considered crafty or clever - characteristics attributed to the fox. The name first came into use in the German state of Bavaria. Fox is the English version of this surname. Fuchs is the 42nd most common German surname. Surname Origin:  GermanAlternate Surname Spellings:  FUHS, FUX, FOX Famous People with the Fuchs Surname Bernard Fuchs  - French pilot and WWII heroEduard Fuchs  - Marxist cultural scientistEmil Fuchs -  Ã‚  German theologianErich Fuchs  - English physiologistPeter Paul Fuchs - Austrian-born conductor and composerVivian Fuchs - British geologist and polar explorer Where the Fuchs Surname Is Most Common According to surname distribution from Forebears, the Fuchs surname is most common in Austria, where it ranks as the 11th most common last name in the country. It is also very common in Germany (36th), Switzerland (39th) and  Liechtenstein (72nd). WorldNames PublicProfiler indicates that Fuchs is most widespread in eastern Switzerland, in the Zentralschweiz region, and throughout much of Austria, especially in the Graz and Landeck regions. Surname maps from Verwandt.de indicate the  Fuchs last name is most common in southern Germany, especially in the counties or cities of Munich, Rhein-Neckar-Kreis, Ostalbkreis, Cologne, Passau, Muremberg, Rhein-Sieg-Kreis, and Karlsruhe. Genealogy Resources for the Surname Fuchs Meanings of Common German Surnames: Uncover the meaning of your German last name with this free guide to the meanings and origins of common German surnames.Fuchs  Family Crest - Its Not What You Think: Contrary to what you may hear, there is no such thing as a Fuchs  family crest or coat of arms for the Fuchs surname.  Coats of arms are granted to individuals, not families, and may rightfully be used only by the uninterrupted male-line descendants of the person to whom the coat of arms was originally granted.Fox Y-DNA Surname Project: Individuals with the Fox  surname, and variations such as Fuchs, are invited to participate in this group DNA project in an attempt to learn more about Fox family origins. The website includes information on the project, the research done to date, and instructions on how to participate.FUCHS  Family Genealogy Forum: This free message board is focused on descendants of Fuchs ancestors around the world. Search or browse the archives for posts ab out your Fuchs ancestors, or join the group and post your own Fuchs query. FamilySearch - FUCHS  Genealogy: Explore over 630,000 results from digitized  historical records and lineage-linked family trees related to the Fuchs surname on this free website hosted by the Church of Jesus Christ of Latter-day Saints.FUCHS  Surname Mailing List: Free mailing list for researchers of the Fuchs surname and its variations includes subscription details and a searchable archives of past messages.DistantCousin.com - FUCHS Genealogy Family History: Explore free databases and genealogy links for the last name Fuchs.GeneaNet - Fuchs  Records: GeneaNet includes archival records, family trees, and other resources for individuals with the Fuchs  surname, with a concentration on records and families from France and other European countries.The Fuchs Genealogy and Family Tree Page: Browse genealogy records and links to genealogical and historical records for individuals with the Fuchs surname from the website of Genealogy Today. References: Surname Meanings Origins Cottle, Basil.  Penguin Dictionary of Surnames. Baltimore, MD: Penguin Books, 1967. Dorward, David.  Scottish Surnames. Collins Celtic (Pocket edition), 1998. Fucilla, Joseph.  Our Italian Surnames. Genealogical Publishing Company, 2003. Hanks, Patrick and Flavia Hodges.  A Dictionary of Surnames. Oxford University Press, 1989. Hanks, Patrick.  Dictionary of American Family Names. Oxford University Press, 2003. Reaney, P.H.  A Dictionary of English Surnames. Oxford University Press, 1997. Smith, Elsdon C.  American Surnames. Genealogical Publishing Company, 1997. https://www.thoughtco.com/surname-meanings-and-origins-s2-1422408

Monday, October 21, 2019

Library Information System Essays

Library Information System Essays Library Information System Essay Library Information System Essay Information System: We are living in the 21st century which is known as the †computer age†, where almost every kind of work is carried out with the help of computer. From the smallest work to the most critical works are carried out with the help of computers. What is more, now with increasing popularity of the internet many important applications have sprung up to make use of this wonderful technology. Many important applications have been designed with the view to communicate information to people all around the world. An information system is an open system that allows input and facilities interaction with the user. In our case †Library Information System† is an open system which allows taking input from the user provide interactive environment to have di? erent output according to user’s need. The library information system maintains the record of Library for the following purpose: 1. For day to day issuing of library books. 2. For fast retrieval of books information. 3. Maintaining information about journals, magazines ,newspapers etc. 4. Information about the vendor’s of books ,journals,newspaper. 5. To produce di? rent reports against di? erent query as per our need. 6. Information about the students and sta? to whom books has been issued. 7. Maintain the record of ? nes. 8. Maintain the record of billing the newspapers, journals etc. 9. Maintain the record maintenance of books. 10. Record of bindings of journals. 1 2. 1Introduction to Initial Investigation: Initial i nvestigation determines whether an alternative system can solve the problem. 2. 2Existing System The present library management system of AEC is to keep record of various books, journals, newspapers, magazines etc to whom they are issued and the vendors and ? es related to the books. The present Library system of AEC is manual, means the librarian maintain the various records in ? les. There is no computer based information system. 2. 3Drawback of the Existing System: The present library system of AEC keeps all its records in paper ? les, which lead to maintaining a lot of ? les and document. This take a lot of time, e? ort and space from the cost involved in it. The addition and maintenance of personnel details of new student to whom books are issued at the beginning of every session as well as the old students who are promoted to the next class, in paper ? es is tiresome, time consuming and costly a? air. The information is kept in an unstructured and unsystematic manner and scatt ered among huge number of ? les. So ? nding of speci? c information needs going through a lot of papers, as proper indexing system is not there. Apart from these, billing of newspapers, journals, calculating total ? ne collected at the end of the month ,year needs a lot of calculation. Then for generating reports separate manual type machine is employed. 2. 4Proposed System: The proposed system aims at making the above system automated and online. The computerized system allows the librarian to calculate the ? ne, the bill by just click of a mouse. The status of a book could be known by knowing the title or author or the accession number of the book. The library form can also be downloaded from it. The software is required to perform the tasks as narrated below: 1. Online membership. 2. Keeps the track of issues and submission of books. 3. Status of b book. 4. Status of a member. 5. Status of the student who has taken the book. 6. Status of the book yet to be returned. 7. Calculation of ? ne. Also various reports will be generated on these topics. The system is also required to provide for 3 levels of access. These are as follows: General User: They have permission to search books in library, change their own password, and can view their own details. Librarian: The librarian is allowed to add, delete and modify the various records related to books and members. He/she can issue books to users. In brief we can say that he/she can maintain the information of the system. Administrator: The administrator has the highest level of access. He/she can creates, modify and delete the account of a member. FEASIBILITY AND REQUIREMENT ANALYSIS 3. 1Introduction Feasibility study is carried to check the workability of the candidate system. It’s impact on the organizational ability to meet the user need and the e? ective use of the system. The object of the feasibility study is not to solve the problem but acquire a sense of its scope. During the study of the de? nition is centralized and aspect of the problem to be included in the system are determined. Consequently cost bene? ts are with great accuracy at this stage. The result of this feasibility study is a normal proposal. There are three key considerations involve in the feasibility study analysis. They are as follows: 3. 1. 1Economic Feasibility Economic Feasibility looks at the ? nancial aspects of the project. It is most frequently used technique for evaluating the e? ectiveness of a proposed system. Economic feasibility is more common known as Cost Bene? t Analysis. The procedure is to determine the bene? ts and savings that are expected from a proposed system and compare them with cost. It bene? t outweighs costs, a decision is taken to design and implement the system. Otherwise, further justi? cation or alternatives in the proposed system will have to be made if it to have a chance of being approved. The proposed system, no doubt require some initial investigation , but it will bene? t the organization in its long run in the form of reduce total number of employees, quick decision making capacity to the management to capture the market occur etc. So, we can say that our project will help the organization in ? nancial gaining at its long run and so it is economically feasible. So, the bene? t expected from the system is much more compared to the cost incurred in computerizing. Hence the system is economically feasible. 3. 1. 2Technical Feasibility Technical Feasibility determines whether the technology needed by the proposed system is available and how this technology can be integrated within the organization. The technical needs of the system may vary considerably but might include: 1. The facility to produce output in a given time 2. Response time under certain conditions 3. Ability to process a certain volume of transaction at a particular speed. 4. Facility to communicate data to distant location During examining the technical feasibility, we have given more importance to the con? guration of the system than the actual make of the hardware con? guration. It provides us a complete picture about our system requirements; like how many workstations are required, how these units are interconnected so that they could operate and communicate smoothly, what speed of input is achieved at particular quality of printing. The proposed system is technically feasible as it examined that the hardware and software is enough at the workplace to carry out the system and also can support addition. The proposed system presents a technically feasible picture since all the resources necessary for the developments of the system under considerations are present in the AEC Library. 3. 1. Operational Feasibility Proposed project are bene? cial only if they can be turned into information systems that will meet the operating requirements of the organization. In general, people resist to changes and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user sta? is likely to have towards the development of a comp uterized system. It is common knowledge that computer installations have something to do with turnover ,transfer, retaining and changes in employee job status. Therefore it is understandable that the introduction of a candidate system requires special e? rt to educate, sell and train the sta? on new ways of conducting business. With the co-operation and understanding of the project development, the whole endeavor becomes not only di? cult but meaningless too. Hence, the operational feasibility is one of the vital factors for the overall success of the project. The proposed system is operationally feasible as: 1. Suitable codes are used to generate reports and queries 2. Although the client organization has not computerized the proposed system but most of the employees are quite familiar with the computer as they have other system already computerized. Moreover, we are providing user manual and help for better understanding and operating system. So , the proposed system is operationally feasible. 3. 1. 4Conclusion From the observation made in the feasibility study described above, it was recommended that proposed system is feasible and justi? ed that the feasibility study could be followed by the system analysis phase. 3. 2Requirement Analysis Information gathering is usually is the ? rst phase of software development project. The purpose of this is to identify and document the exact requirements for the system within the framework of the organization. The requirement analysis must be based upon the user need, the developer and the organization. 3. 2. 1Information Analysis There are four strategies available for determining information requirement. They are as follows: 1. Asking (interviewing) 2. Deriving from the existing information system 3. Review the written documents 4. Synthesizing from the characteristics of the running system In the purpose system the strategies asking and reviewing of the written documents has used for requirement analysis. Presently in the existing system all record are maintained manually. For the development of the proposed system review written documents has done the requirement analysis. Again rule and regulation of the management information system are determined by asking strategy to implement in the proposed system. 4. 1Hardware Requirements: 1. System Type : IBM compatible PC’s 2. Processor: Intel(R) Pentium(R) 4 processor 3. RAM: 512 MB 4. HDD: 40 GB 5. Monitor: Any standard color monitor 4. 2 Software Requirements: 1. Platform: Asp. Net 2. Language Used: C# 3. IDE Used: Microsoft Visual Studio 2008 4. Database: SQL Server 2005 5. OS Used: Windows XP 6. Internet Browser: Any web browser . 3 Technology and Tools Used Microsoft Visual Studio 2008 In computing, Microsoft Visual Studio is an Integrated Development Environment (IDE) from Microsoft. It can be used to develop console and graphical user interface applications along with Windows Forms applications, web sites, web applications, and web services in both native code together with managed code for al l platforms supported by Microsoft Windows, Windows Mobile, Windows CE, . NET Framework, . NET Compact Framework and Microsoft Silver light. Visual Studio includes a code editor supporting IntelliSense as well as code re factoring. The integrated debugger works both as a source-level debugger and a machine-level debugger. Other built-in tools include a forms designer for building GUI applications, web designer, class designer and database schema designer. It accepts plug-ins that enhance the functionality at almost every levelincluding adding support for source-control systems and adding new toolsets like editors and visual designers for domain-speci? c languages or toolsets for other aspects of the software development lifecycle (like the Team Foundation Server client: Team Explorer). Visual Studio supports di? erent programming languages by means of language services, which allow the code editor and debugger to support (to varying degrees) nearly any programming language, provided a language-speci? c service exists. Built-in languages include C/C++ (via Visual C++), VB. NET (via Visual Basic . NET), C# (via Visual C#), and F# (as of Visual Studio 2010). Support for other languages such Python, and Ruby among others is available via language services installed separately. It also supports XML/ XSLT, HTML/ XHTML, JavaScript and CSS. Individual language-speci? versions of Visual Studio also exist which provide more limited language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++. Microsoft provides †Express† editions of its Visual Studio 2010 components Visual Basic, Visual C#, Visual C++, and Visual Web Developer at no cost. Visual Studio 2010, 2008 and 2005 Professional Editions, along with languagespeci? c versions ( Visual Basic, C++, C#, J#) of Visual Studio 2005 are available for free to students as downloads via Microsoft’s Dream Spark program. Visual Studio 2010 is recently released. Designer Visual Studio includes a host of visual designers to aid in the development of applications. These tools include: Windows Forms Designer The Windows Forms designer is used to build GUI applications using Windows Forms. It includes a palette of UI widgets and controls (including buttons, progress bars, labels, layout containers and other controls) that can be dragged and dropped on a form surface. Layout can be controlled by housing the controls inside other containers or locking them to the side of the form. Controls that display data (like textbox, list box, grid view, etc. can be data-bound to data sources like databases or queries. The UI is linked with code using an eventdriven programming model. The designer generates either C# or VB. NET code for the application. WPF Designer The WPF designer, codenamed Cider, was introduced with Visual Studio 2008. Like the Windows Forms designer it supports the drag and drop metaphor. It is used to author user interfaces targeting Wi ndows Presentation Foundation. It supports all WPF functionality including data binding and automatic layout management. It generates XAML code for the UI. The generated XAML ? le is compatible with Microsoft Expression Design, the designer-oriented product. The XAML code is linked with code using a code-behind model. Web designer/development Visual Studio also includes a web-site editor and designer that allow web pages to be authored by dragging and dropping widgets. It is used for developing ASP. NET applications and supports HTML, CSS and JavaScript. It uses a codebehind model to link with ASP. NET code. From Visual Studio 2008 onwards, the layout engine used by the web designer is shared with Microsoft Expression Web. There is also ASP. NET MVC support for MVC technology as separate download and Dynamic Data project available from Microsoft Class designer The Class Designer is used to author and edit the classes (including its members and their access) using UML modeling. The Class Designer can generate C# and VB. NET code outlines for the classes and methods. It can also generate class diagrams from hand-written classes. Data designer The data designer can be used to graphically edit database schemas, including typed tables, primary and foreign keys and constraints. It can also be used to design queries from the graphical view. Mapping designer From Visual Studio 2008 onwards, the mapping designer is used by LINQ to SQL to design the mapping between database schemas and the classes that encapsulate the data. The new solution from ORM approach, ADO. NET Entity Framework, replaces and improves the old technology. Properties Editor The Properties Editor tool is used to edit properties in a GUI pane inside Visual Studio. It lists all available properties (both read-only and those which can be set) for all objects including classes, forms, web pages and other items. Object Browser The Object Browser is a namespace and class library browser for Microsoft . NET. It can be used to browse the namespaces (which are arranged hierarchically) in managed assemblies. The hierarchy may or may not re? ect the organization in the ? le system. Solution Explorer In Visual Studio parlance, a solution is a set of code ? les and other resources that are used to build an application. The ? les in a solution are arranged hierarchically, which might or might not re? ect the organization in the ? le system. The Solution Explorer is used to manage and browse the ? les in a solution. Team Explorer Team Explorer is used to integrate the capabilities of Team Foundation Server, the Revision Control System into the IDE (and the basis for Microsoft’s Code Plex hosting environment for open source projects). In addition to source control it provides the ability to view and manage individual work items (including bugs, tasks and other documents) and to browse TFS statistics. It is included as part of a TFS install and is also available as a download for Visual Studio 2005 and 2008. Team Explorer is also available as a stand-alone environment solely to access TFS services. Data Explorer Data Explorer is used to manage databases on Microsoft SQL Server instances. It allows creation and alteration of database tables (either by issuing T-SQL commands or by using the Data designer). It can also be used to create queries and stored procedures, with the latter in either T-SQL or in managed code via SQL CLR. Debugging and IntelliSense support is available as well. Server Explorer The Server Explorer tool is used to manage database connections on an accessible computer. It is also used to browse running Windows Services, performance counters, and Windows Event Log and message queues and use them as data source. Microsoft SQL Server 2005 SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it de? ned an xml data type that could be used either as a data type in database columns or as literals in queries. XML columns can be associated with XSD schemas; XML data being stored is veri? ed against the schema. XML is converted to an internal binary data type before being stored in the database. Specialized indexing methods were made available for XML data. XML data is queried using XQuery; CLR Integration was the main features with this edition where one could write SQL code as Managed Code these are those code which are being executed by CLR (Common Language Runtime). SQL Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in T-SQL. In addition, it also de? nes a new extension to XQuery, called XML DML that allows querybased modi? cations to XML data. SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed over web services, results are returned as XML. For relational data, T-SQL has been augmented with error handling features (try/catch) and support for recursive queries (Common Table Expressions). SQL Server 2005 has also been enhanced with new indexing algorithms and better error recovery systems. Data pages are check summed for better error resiliency, and optimistic concurrency support has been added for better performance. Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more e? cient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier. SQL CLR was introduced with SQL Server 2005 to let it integrate with the . NET Framework. SQL Server 2005 introduced †MARS† (Multiple Active Results Sets), a method of allowing usage of database connections for multiple purposes. 5. 1Introduction: The design process translates requirements into a representation of the software that can be assessed for quality before coding begins. Once the requirements have been collected and analyzed, it is necessary to identify in detail how the system will be constructed to perform the necessary tasks. The design activity is often divided into 2 separate phases. One is system design and the other is detail design. System Design: System design aims to identify the modules that should be in the system, the speci? cation of these modules and how they interact with each other to produce the desired result. System design describes what components are needed. Detail Design: During detail design the internal logic of the modules speci? ed in the system design is decided. Detail design focuses on designing the logic of each of the modules. Detail design describes how the components identi? ed during system design can be implemented on the system. 5. 2System Design The web enable system for Asaam Engineering College Library has at present three modules with a number of sub modules. The following system design documents focuses detail on these modules and the speci? cation of these modules. The software modules of this web enable system are : Administrator Module 1. Create and delete account 2. System backup 3. View record Member Module 1. View record 2. Compile record 3. Enter record 4. Update record 5. Delete record 6. Generate reports User Module 1. View record 5. 3Detail Design During detailed design the internal logic of each of the modules speci? ed in system design is decided. The main aim of the detail design is to explain how the system work or how the ? ow of data takes place within the system. Detailed design deals with system speci? cation. 5. 3. 1 Abstract Representation of the proposed system Before making the detailed design of a system, ? rst the most abstract representation of the problem is worked out. The following use case diagram gives the working of the proposed system. 5. 3. 2The Uni? d Modeling Language: The uni? ed modeling language (UML) is a language just as sure as C, C++, Pascal, German, English etc. And the UML is probably the newest languages invented by human kind, invented around 1997. The UML is used to build models that will later be used to build real products, in our case Software. A model is a collection of text and diagram that represents something. A model is to software that a blueprint is to a house. Models are valuable for many speci? c reasons. Models are valuable because they consist of pictures to a large extent and even simple pictures can convey a lot of message then a lot of text. The UML is an o? cial de? nition of a pictorial language where there are common symbols and relationships that have one common meaning. The UML supports all aspects of SDLC from requirements gathering to design to development. There are mainly types of diagrams in the UML. The major types are: 5. 3. 1. 1Use Case Diagrams: Use case diagrams are a part of the requirements gathering process and are used in highlevel design to identify fundamental requirements of a system. It describes the participants and is also helpful in developing test plans. A use case’s main symbols are the actor and the use case oval. Use case diagrams are called the mother of all other diagrams of the UML. It gives the static view of a system and focuses on goals not processes. 5. 3. 1. 2Activity Diagram: Activity diagram are like ? ow charts but are more ? exible by supporting parallel application and by dividing areas of responsibility into swim lanes. Activity diagrams are used to analyze processes and if necessary, perform re-engineering. 5. 5 Data Tables A database is a collection of inter-related data, stored with minimum redundancy to serve many users quickly and e? ciently. The primary objectives of a database are fast response time to queries, more information at low cost, control redundancy, clarity and ease of use, accuracy and integrity of the system, fast recovery, privacy and security of information, data and program independence and availability of powerful end user language. The heart of a database is the DBMS. System analysis clears that all data used by process must be derived directly from input documents and reports are to be retrieved from the database ? les. The database of Library Information System† is a collection of di? erent types of information. So it has di? erent tables to access the information easily and e? ciently. Also the data redundancy is checked in the database. To get a nice understanding of the database, we have divided the database into several tables which are as follows. 1. Book Information: The Book Information store the all related information regarding a book. Table 1: Book Information ELEMENT NAME DATA TYPE CONSTRAINT Accession no nvarchar Not null Title nvarchar Not null Author nvarchar Not null Publisher nvarchar Not null Volumme nvarchar Not null Edition year nvarchar Not null nvarchar Not null Source 2. Member Information: Member Information table store the details of a member. The member may be a student, stu? or the librarian. 3. Card Inforamtion: This table stores the information regarding a card. 4. Transaction Table:: This table stores the transaction information of a book. Table 2: Member Information ELEMENT NAME DATA TYPE CONSTRAINT Member id nvarchar Not null nvarchar Not null Roll no Name nvarchar Not null nvarchar Not null Branch Session nvarchar Not null Town/Vill nvarchar Not null nvarchar Not null Dist Table 3: Card Information ELEMENT NAME DATA TYPE CONSTRAINT Card no nvarchar Not null nvarchar Not null Issue date Due date nvarchar Not null Table 4: Transaction Table ELEMENT NAME DATA TYPE CONSTRAINT User id nvarchar Not null Accesion no nvarchar Not null Issue date nvarchar Not null Return date nvarchar Not null Due date nvarchar Not null 5. User Login Form: This table contains data regarding log in information. Table 5: Transaction Table ELEMENT NAME DATA TYPE CONSTRAINT User id nvarchar Not null nvarchar Not null password roles nvarchar Not null Database normalization for the Library Information System The Library Information System is normalized up to BCNF (Boyee Coded Normal Form). st Normal Form: No column in the database contains multiple values, so the database is in the 1st Normal Form. 2nd Normal Form: Every Non key attributes fully functionally dependant on the primary key. Hence it is in 2nd Normal form. 3rd Normal Form: All non key columns do not depend on any other columns . Hence the database is in 3rd Normal Form. 4th Normal Form: A relation R is in BCNF if and only if every determinant is a candidate ke y. All the tables in the Library Information System ful? ll the condition. Hence the database is in BCNF. 6. 1Introduction: A system should always be tested thoroughly before implementing it with regards to its individual programs, the system as a whole, user acceptance etc. This is because implementing a new system is a major job which requires a lot of manpower, time and other resources. There are many levels of testing which ultimately leads to an error free system. The testings which are carried out is described below: 6. 1. 1 Program Testing: The program testing is carried out during the programming stages itself to test the logical and syntax error. 6. 1. 2 Unit Testing: In the unit testing di? rent modules were tested against the speci? cation produced during design of the module. When this testing was done with di? erent modules, some errors were detected and debugged and when modules were found to be working properly independently, next round of testing was followed. 6. 1. 3 String Testing: String testing is a method in which each program is tested to see whether it conforms to the related progra ms in the system. Each portion of the library management system was tested against the entire module with both test and live data before the entire system is ready to test. 6. 1. 4 System Testing: It was done to uncover the weakness that was not found during string testing. The whole system tested to see whether it works properly with valid and invalid data. The system was also tested for recovery after various major failures such as power failure etc. 6. 1. 5 Acceptance Testing: It is the system testing and performance tests performed by the customer to determine whether or not to accept the system. The library information system was accepted by the system. Implementation includes those activities that take place to convert the older system to the new one. The new system may be totally new or replacing an existing. In either case proper modi? cation is essential to provide a reliable system to meet the organization requirements. System implementation describes how the di? erent parts of the system are interacting with each other to give us a feasible software solution. The project is implemented on 3-tier architecture. It is installed on SQL server and which can be accessed by all users. This application is secured by putting user name and password, a user has to enter login details to the system. Figure 1: How the Application works The web server receives a request for some processing. Depending on the sent request the web server passes the request is forwarded to the respective request handler class and after the processing is done. The required data is fetched from the database, the required result i. e. response is passed to the client. Any further request from the client to the server goes through the same procedure. Once the software is developed, delivered and deployed, it enters the maintenance phase. Changes are inevitable when computer based systems are built, therefore mechanism for evaluating, controlling, and making modi? cations has to be adopted. These are called the maintenance activities they include: 1. Corrective Maintenance 2. Adaptive Maintenance 3. Perfective Maintenance or enhancement 4. Perfective Maintenance or reengineering Software may have some errors or bugs remaining in the system that must be removed as they are discovered. This is called corrective maintenance. Once the software system is deployed, the environment in which it operates changes. The software must adapt to the changed environment. The maintenance due to this phenomenon is called the adaptive maintenance. Software must be upgraded and enhanced to include more features and provide more services. As a result new versions of the software are released. This is called perfective maintenance or software enhancement. Reengineering is a rebuilding activity for added functionality, better performance and reliability, and improved maintainability of the software product. Unmaintainable software is subjected to rebuild following a reengineering process model. CONCLUSION 9. 1Introduction: The main concerns of the software development are software quality, programmer’s productivity and increase job satisfaction. The fundamental problems of software development are control of complexity, the lack of physical constraints, and boundaries in software and tendency to mix concerns that belong to di? rent level of abstraction. Finally, it is a people intensive activity for developing software for its use by other people. The †Library Information System† is designed and developed to satisfy the organization needs as far as possible. The Library Information System has built after an extensive research and evaluation of the existin g manual system. The main aim of the system is to maintain the records of the membership registration and the book issued to the member with the very best of accuracy and e? ciency. The purpose system is economically, technically and behaviorally feasible and is incorporated with some security measure so hat only authorized personal can manipulate the record. While developing this software we have tried to consider all the points, may be due to time constraint we may miss some valuable points for which we apologize to the concerned people. Any comments or suggestion that can improve the software are welcome. 9. 2 Overview of the System The proposed system covers the following area and processes: 1. Member’s registration 2. To maintain the record of individual member’s in detail 3. Status of the book. 4. No. of books available subject wise. 5. User friendly interfaces. Limitation of the Propose System The limitations of the purpose system are as follows: 1. † The system cannot give information about the vendors. 2. The data implementation with SQL server. 3. Security consideration and implementation is left to the database . administrator. 4. Need the help of manual system. 9. 4Scope and Further Enhancement of the Propose System: 1. The process of maintaining the detail information of the vendor can be included. 2. More enhancements can be identi? ed when the system is in the operation or used by di? rent users. ABSTRACT This report describes our group’s implementation of an online library information system. We used the Entity-Relationship model to design a database that will store and organize the library’s data. We have created the database using SQL and populated it with some sample data. The system can keep track of library cards, users, librarians, administrator, books and the relationships betwee n them. Using ASP. NET with C#, we have created an Internet-based graphical user interface that allows users and librarians to access the system remotely

Sunday, October 20, 2019

What to Do if Youve Been Placed on a College Waitlist

What to Do if Youve Been Placed on a College Waitlist Its important to understand what it means when youve been placed on a college waitlist. Like thousands of students across the country, you havent been accepted or rejected, and the resulting limbo can be frustrating. Youll make better decisions if you have a clear picture of how waitlists work and what your options are. Key Takeaways: College Waitlists Colleges use waitlists to ensure a full incoming class. Students get off the list only if a school falls short of admission targets.Chances of getting off a waitlist vary from year to year and school to school. Because of the uncertainty, you should move on with other plans.Be sure to accept a position on the waitlist and send of letter of continued interest if allowed. In the spring, college applicants begin getting those happy and sad admissions decisions. They tend to begin something like this: Congratulations! . . . or, After careful consideration, we’re sorry to inform you . . . But what about that third type of notification, the one that is neither acceptance nor rejection? Thousands upon thousands of students find themselves in college admissions limbo after having been placed on a waiting list. If this is your situation, what now?  Should you accept a position on the waitlist? Should you get angry at the school for waitlisting you and decide you didn’t want to go there anyway? Do you go ahead and put down a deposit at a school where you’ve been accepted, even if your waitlist school is your first choice? Do you simply sit around and wait? The answers to these questions, of course, vary depending upon your situation and the schools to which you applied. Below youll find advice for your next steps. Here's How Waitlists Work Waitlists have a very specific purpose in the admissions process. All colleges want a full incoming class. Their financial well-being is dependent upon full classrooms and full residence halls. So, when admissions officers send out acceptance letters, they make a conservative estimate of their yield (the percentage of admitted students who will actually enroll). In case the yield falls short of their projections, they need some students on back-up who can fill out the incoming class. These are the students on the waitlist. The widespread acceptance of the Common Application, Coalition Application, and new Cappex Application make it relatively easy for students to apply to many colleges. This may be convenient for students, but it also means that students are applying to more colleges than they typically did in decades past. As a result, colleges get more half-hearted applications and its more difficult to predict the yield on their applications. The end result is that colleges need to put more students on waitlists in order to manage the uncertainty. This is particularly true at highly selective colleges and universities. What Are Your Options When Waitlisted? Most schools send out a letter asking you if you will accept a position on the waitlist. If you refuse, that’s the end of the story. If you accept, you then wait. How long you wait depends on the school’s enrollment picture. Students have been known to receive acceptances from the waitlist a week before classes start. May and June are more typical notification times. You essentially have three options when waitlisted: Decline a position on the waitlist. If you got into a school you like more, you should decline. Its rude and inconvenient for other students and the college if you accept a place on the waitlist simply to see if youll get in. If you dont plan to attend, dont put yourself on the waitlist.Accept a position on the waitlist, sit back, and wait. If youre still considering the school, you should definitely put yourself on the waitlist.Accept a position on the waitlist, and then take action to improve your chances of getting off the waitlist. Be realistic here- your chances of getting off the waitlist probably are not great, and any actions you take may or may not help. Still, something as simple as a letter of continued interest can have a positive effect. What Are Your Chances of Getting Off a Waitlist? It’s important that you have a sense of the math, for in most cases the numbers aren’t encouraging. The examples below vary widely, from Penn State where 80% of waitlisted students were admitted, to Middlebury College where 0% were offered admission. The norm tends to be in the 10% range. This is why you should move on with other options rather than pin your hopes on the waitlist. Also, realize the numbers below will vary significantly from year to year because a colleges yield will vary from year to year. Cornell University Number waitlisted: 3,213Number who accepted a place on waitlist: 1,976Number admitted from waitlist: 279Percentage admitted from waitlist: 14% Grinnell College Number waitlisted: 740Number who accepted a place on waitlist: 279Number admitted from waitlist: 16Percentage admitted from waitlist: 6% Haverford College Number waitlisted: 732Number who accepted a place on waitlist: 305Number admitted from waitlist: 10Percentage admitted from waitlist: 3% Middlebury College Number waitlisted: 1,231Number who accepted a place on waitlist: 603Number admitted from waitlist: 0Percentage admitted from waitlist: 0% Penn State University, University Park Number waitlisted: 1,828Number who accepted a place on waitlist: 1,704Number admitted from waitlist: 1,356Percentage admitted from waitlist: 80% Skidmore College Number waitlisted: 1,584Number who accepted a place on waitlist: 522Number admitted from waitlist: 59Percentage admitted from waitlist: 11% University of Michigan, Ann Arbor Number waitlisted: 8,385Number who accepted a place on waitlist: 2,776Number admitted from waitlist: 525Percentage admitted from waitlist: 19% Yale University Number waitlisted: 728Number who accepted a place on waitlist: 204Number admitted from waitlist: 56Percentage admitted from waitlist: 27% A Final Word on Waitlists Theres no reason to sugarcoat your situation. Yes, we can say, At least you werent rejected! The reality, however, is that its frustrating and discouraging to be placed on a waitlist. If you were waitlisted from your top choice school, you should definitely accept a place on the waitlist and do all you can to get an acceptance. That said, you should also move on with plan B. Accept an offer from the best college that accepted you, put down your deposit, and move forward. If you are lucky and get off the waitlist, you will likely lose your deposit, but thats a small price to pay for attending your top choice school.

Saturday, October 19, 2019

Aids Essay Example | Topics and Well Written Essays - 1750 words

Aids - Essay Example It can also be transmitted through infected blood transfusions. Drug addicts who use syringes are also at a high risk of developing the disease. It can be transmitted to the fetus from the mother during pregnancy as well as during birth and nursing. The disease affects the major systems of the human body owing to the suppression of immunity by the virus. It can result in severe conditions which include pneumonia as well as cancers like Kaposi’s sarcoma. The treatment for the condition is mainly antiretroviral therapy. Prevention is aimed at awareness. Acquired Immunodeficiency Syndrome Acquired Immunodeficiency Syndrome is a pathological condition which is referred to as a syndrome owing to the fact that this disease affects many systems of the human body and is characterized by many secondary infectious diseases as well as cancers arising from different cells. It may also affect the nervous system of the patient and hence the patient presents with signs and symptoms of nervou s disease. This syndrome is led to by the human immunodeficiency virus. This virus and the resulting disease were identified in the year 1981. The virus possesses the ability to decrease the efficacy of the immune system of the human body and hence it puts a person at risk of the development of many diseases that would not occur in a normal healthy person. The pathology has led to increased attention from international health organizations due to the severity of the disease accompanied by the fact that the number of infected people keeps on increasing every year (Davidson et al 2006, Levinson 2008, Robbins et al 2005). Acquired Immunodeficiency Syndrome has been ranked as the second most common pathological condition across the world which explains the fact that this disease follows a global pattern. It has been labeled as an epidemic due to the increased presentation of the number of cases. In Africa it has been identified as the first most common reason of death and has been repor ted to lead to more than 20 percent of deaths in the region. Ever since the disease has been identified, it has been linked to greater than 20 million deaths around the world. The World Health Organization presented with the findings that 39.4 million people had AIDS or were infected with the human immunodeficiency virus in the year 2004 (Davidson et al 2006, Levinson 2008). 70 percent of the people who suffer from this disease belong to Africa. In the year 2002, it was identified that 900,000 residents of the United States were suffering from the disease. Amongst the residents of the U.S., it is considered to be the second reason of death amongst the males of the age group 25 to 44. On the other hand, amongst the females of this age group, it is ranked as the third life taking reason. The pathology is also found to affect young children below the age of 13 years. It has been analyzed that 2 percent out of the total cases of the disease affects these children. In 2002, 800,000 more children were affected with this syndrome (Robbins et al 2005, Levinson 2008). There are many underlying causes that can result in AIDS. The human immunodeficiency virus which is the causative organism for this disease prevails in the fluids of the human body which include the blood, semen, saliva as well as milk from the mammary glands. Thus contact with infected body fluids increases the susceptibility of contracting the disease (Davidson et al 2

Friday, October 18, 2019

Political broadside detailing your objections to new Constitution Assignment

Political broadside detailing your objections to new Constitution - Assignment Example A state should be allowed to ratify a proposed federal constitutional amendment. The process of ratification may be very complex when it comes to being practiced all over the country, but in a state scenario, the ratification convention method is a bit less complex in comparison. The new constitution was suggested when the war was over, and the United states was said to be one of the sovereign states that has in place a weak central government. The new constitution proposes a bicameral legislature. This is a legislative branch that comprises of two chambers. Here, each state would represented depending on the number of inhabitants that exist in their state. This meant that large states would have more representatives than small states. The constitution also stated that the members of the legislature would be elected by the citizens, and the executive selected by the legislative branch. The terms of office in the constitution were not specified (Kelly, 2005). Ratification of the constitution would give only one political party the authority to suppress the rights of the minority. This would not be fair to the minority groups in several states that have a greater population of minorities than other states. The constitution would also allow the larger states to rule over the smaller states in situations of democratic responsiveness not only at the state level, but also at the national level. According to the new constitution, the number of representatives in the legislature is dependent on the inhabitants. Larger states would, therefore, have more representation in the legislature as compared to the smaller states. The constitution is, therefore, set up in a particular way whereby, the larger states get to dominate. This brings about the strong need for an amendment of such a proposed constitution. Every state needs to have equal representation in the