Monday, September 30, 2019

Poets present a culture Essay

Many poets present their own cultures in many different ways. â€Å"Search for my tongue† by Sujata Bhatt is about an Indian woman who moved to the United States. She feels out of place, and the poet explains what it is like to speak and think in two languages. We see that she wonders whether she might lose the language she began with, fearing that she is not herself. We also find out that her mother tongue remains with her in her dreams, but sometimes fails to come to surface. However, by the end, she is confident that it will always be part of who she is. â€Å"Presents from My Aunt in Pakistan† is about a girl who was born in Pakistan. She came to England when she was young. When she gets older she received gifts from her aunts in Pakistan. She gets various traditional Pakistani clothes. Whenever she thought about her nationality she did not feel whole.   he poem was written to show how the girl felt when her friends saw her clothes. The poem is written in free verse: the phrases are arranged loosely across the page. It is divided into stanzas of varying length. This poem has many small details which are spotted by the reader. These details give an insight to their lives as children, whether the memories are good or bad, it is these memories that make them who they are.  Ã¢â‚¬Å"Small tin boats†Ã‚  The main difference the poet uses is the comparison of eastern and western life. The main thing that the poet used is clothing. The monologue spoken by the girl shows how she respects her eastern culture, yet longs for western lifestyles. The main reason she would not like to wear her eastern clothes seems to be that is it impractical. In Pakistan, the more intricate and detailed the clothes, the more fashionable; however that is not always the case in all western places.  As both of these poems are written as monologues, they both use enjambment, this gives a sense of speed or urgency. It also personalises the poem as if someone was speaking it. â€Å"Search for my tongue† is written in 3 stanzas the second of which is written in Gujarati.

Sunday, September 29, 2019

Weekly accomplishment report in tourism department

Tourism Management-III Marketing Section Weekly Accomplishment Report Date: April 16, 2013- Tuesday Name of Company: Tourism Assigned: On this day there were many clients went to our office to inquire regarding on tarpaulin. More so, I was able to learn how to use fax machine. Date: April 17, 2013- Wednesday On this day I was assigned to make photocopies of important filed documents. And the rest of the day I learned to answer and transfer phone calls properly. Date: April 18, 2013- Thursday For this day I was assigned to answer and transfer phone calls for the whole ay.Date: April 19, 2013- Friday On this day I was assigned to answer phone calls and receive Inquiries from clients the whole morning. In the afternoon, Kohl and I together with our supervisor went to Treetop Adventure wherein we experienced their superman ride, treetop and parachute fall. And also were went to JEST camp to see their mini zoo, nonsectarian, and bird sanctuary. Date: April 20, 2013- Saturday For this day I was assigned to answer phones calls. And we talked Mr†¦ De about Tourism in the Philippines. He also gave us knowledge about his tour guiding quenches and how to be effective outrider.Fay Ann B. Toleration (Trainee) Julius M. Macaw (JOT Supervisor) XEBEC Date: April 22, 2013- Monday For this day I did most office works and should be our last day at Marketing Section. Date: April 23, 2013- Tuesday On this day, I was assigned to answer phone calls and Ms. Esther asked me to make photocopies an important filed documents. Date: April 24, 2013- Wednesday On this day we moved on to XEBEC headed by Ms. Niacin Orzo, but before that we started oriented by Mr†¦ Sham Malawi about tour guiding and how to be effective tour guide.He discussed everything we need to know about Cubic Bay Freeport Zone. Date: April 25, 2013- Thursday For this day Mr†¦ Sham continued tackled about Cubic Bay Freeport Zone and he gave us a short quiz. He also discussed us about the Mayhap Host. Date: Ap ril 26, 2013- Friday My task for this day was to answer phone calls and to make photocopies an important files given by our supervisor. By the afternoon, Mr†¦ Sham told us that were assigned at Travelers Hotel for tomorrow. Date: April 27, 2013- Saturday On this day we were duty at Travelers Hotel as Information assistance for theTriathlon Championship 2013. Ms. Nadia Linda DC. Roll Date: April 30, 2013- Tuesday We have a seminar together with different department of SABA employees about â€Å"Diplomatic Protocol and Etiquette† social graces and how to eat in a fine dining restaurant and the guest speaker was MR†¦ Leo Prostate. Mr.. Leo is a very good speaker we learned a lot from him and we thankful because we have been given an opportunity to be part in that seminar. Date:May 1, 2013- Wednesday It was Labor Day but we still choose to get in the office to lessen our training hours.We were assigned to answered phone calls and inquiries for the whole day. Date: May 2 , 2013- Thursday On this day, I was assigned to answer phone calls and Ms. Esther asked me to type and prints an important documents. Date: May 3, 2013- Friday On this day, I was assigned to answer phone calls and helped in office works. Adman Date: May 6, 2013- Monday For this day we were assigned to duty at Painkilling Forest Trails, we went to Pastoral with Kayak Anthony and we took almost 2 hours Just to get there. He told us different medicinal plants found on a Jungle and I learned a lot from him.Date: May 7, 2013- Tuesday Our 2nd day at Painkilling Forest Trails. Kayak Samson taught us how to make fire using a bamboo and they also made us spoon and fork, drinking glass using a bamboo. Date: May 8, 2013- Wednesday My Last Day at XEBEC and I was assigned in Adman together with ate Charlene and Dizzied. We were assigned to answer phone calls and to make photocopies an important files given by our supervisor. Date: May 9, 2013- Thursday On this day, I was assigned to answer phone calls and Ms. Mona asked me to make photocopies an important filed documents. Date: Malay, 2013- FridayWe have a seminar at Harbor Point about Personal Development and Cervical Cancer and also we tackled there about the art of SHARP and the guest speaker was Ms. Beagle Arenas. She is very good speaker and I learned a lot from her. Date: Mall 1, 2013- Saturday Ms. Del Deal Cruz Date: May 13, 2013- Monday Election Day!!! Date: May 14, 2013- Tuesday We were preparing for our mock tour with Sir Errol. He discussed everything we need to know about Cubic Bay Freeport Zone. Date: May 15, 2013- Wednesday We were continued to tackled about SIBS with Daddy Sham and he encourage us o study and to research more about Cubic Bay.Date: May 16, 2013-Thursday For this day I was assigned to answer phone calls and we Joined to the route of Mr†¦ Gadding outside the office. Date: May 17, 2013-Friday For this day, it was my first time to Join in a sit-in tour with Kayak Bryan I saw his techniques a nd how he speak in front of tourist. He's a very good outrider and I learned a lot from him. Date: May 18, 2013-Saturday Date: May 20, 2013- Monday practiced us on how to deliver and conduct a tour properly. Date: May 21, 2013- Tuesday On this day was our Mock Tour.It was successful although I've got really nervous because I wasn't familiarized those areas we scrolls. Date: May 22, 2013- Wednesday We have our evaluation meeting w/ Mr†¦ Role Vulgar. And we move to reservation section. Later on, Ms. Theresa asked me to encode the monthly income of Cubic Gym facility. Date: May 23, 2013- Thursday I was assigned to answer phone calls and Ms. Elaine asked me to checked the daily and weekly income and also Ms. Magma asked me to logged and to make photocopies an important files. Date: May 24, 2013- Friday I was assigned to answer phone calls and inquiries for the whole day.

Saturday, September 28, 2019

Global warming Article Example | Topics and Well Written Essays - 250 words

Global warming - Article Example Most of the remaining 70% is absorbed by the land and ocean and the atmosphere absorbs the remainder. Radiation takes place when the rocks, the seas, and the air get warm, thus forming energy that travels into the atmosphere and water vapor and gases like carbon dioxide and methane absorb most of the energy. Additionally, the absorption and radiation of heat by the atmosphere is important for life on earth as it provides a comfortable atmosphere as compared to the chilly atmosphere that would be caused by lack of green houses. Scientists argue that over the past 250 years, humans have increased significantly the concentration of greenhouse gases in the atmosphere. This is mostly through burning fuels and cutting down forests that absorb carbon. Today, the atmosphere is filled with greenhouse gas molecules and the atmosphere absorbs the energy emitted. Lastly, due to the increase in the concentration of greenhouse gases, the earth’s atmosphere is becoming an efficient

Friday, September 27, 2019

Outsourcing Is the American Way Coursework Example | Topics and Well Written Essays - 1250 words

Outsourcing Is the American Way - Coursework Example In fact, most of the jobs that are outsourced are because the technological capabilities to run many of these customer service centers with phone banks and high-speed Internet capabilities would be difficult—not to mention expensive—to maintain in the United States. Since India already has expanded its WiFi networks to accommodate several workers at cheaper prices, this actually keeps the production costs of products low because the customer support can be cheaply outsourced, thus giving companies more opportunities to invest their revenue elsewhere which can significantly increase their profit—and in turn, benefit employees and vested interests here in the U.S.   even-handed, centrist views on all the topics they cover. Lou Dobbs, on the other hand, is a conservative—and it could even be said ‘right-wing’— a commentator who only projects personal opinions supported by very little factual evidence. Mr. Dobbs is discriminatory against minorities and any other factions that don’t agree with his corporate elitist attitude and approach to the real issues at hand—ultimately making his claims that much less credible. Ultimately, Mr. Canto, seeing as how he writes for the Review, has much more credible insights.   outsourcing is truly the issue, and 2) how we might be able to create jobs in America since outsourcing is a way to get cheap labor to significantly reduce a company’s overhead. Regarding the first point, we need to realize if outsourcing really is the big problem some conservatives make it out to be. â€Å"In spite of what is said in much of the press, the greatest beneficiary of outsourcing is the U.S. itself. We import many more jobs than we export.

Thursday, September 26, 2019

Concept Comparison and Analysis Across Theories Paper Essay

Concept Comparison and Analysis Across Theories Paper - Essay Example Early nursing theorists aimed in defining what is nursing; conversely, contemporary theorists discussed the metaparadigm concepts in more depth, gave high regard to nursing actions in particular, and attempted to provide the rationale as to when is nursing necessary (Daniels, 2004). The works of contemporary theorists like Myra Levine, Dorothea Orem and Sister Callista Roy as highlighted by Daniels (2004), serve as the theoretical basis for a variety of interventions in current nursing practice. In the theories formulated by Sister Callista Roy which is known as the Adaptation Theory and in the Self-Care Theory by Dorothea Orem, the concepts given emphasis pertain to Man, Health, the Environment and Nursing (Timby, 2009). Man as defined by Dorothea Orem in her Self-Care Theory, is â€Å"an individual who utilizes self-care to sustain life and health, recover from disease or injury, or cope with its effects† (Timby, 2009, p. 7). On the contrary, according to Sister Callista Roy in her Adaptation Theory, Man is â€Å"a social, mental, spiritual and physical being affected by stimuli in the internal and external environments† (Timby, 2009, p. 7). In these two definitions of man, it is evident that man as described in the Adaptation theory portrays the different dimensions of a man whereas man in the Self-Care Theory is depicted in general. Health is the product of practices that people have learned to carry out on their own behalf to maintain life and well-being as stressed in the Self-Care Theory by Dorothea Orem (Timby, 2009, p. 7). Conversely, Health is defined as the persons capability to respond appropriately to changes in the environment (Timby, 2009). It is apparent that the two aforementioned theories defined health in varied ways; Self-Care Theory views health as an end product of individuals practices while Adaptation Theory deems that health is

Wednesday, September 25, 2019

Persuasive apology Assignment Example | Topics and Well Written Essays - 250 words

Persuasive apology - Assignment Example I am also a family man with a lovely God-fearing wife and a son and have great respect for them. I have constantly taught my son the value of being polite and honest as well as not letting emotions overcome the situation. I clearly let my emotions for failing the course repeatedly take control against my better judgment. I sincerely pray that you may find it in your heart to forgive my actions and words and not throw me out of the school. The book of First John 1: 9 says that â€Å"If we confess our sins†¦he will forgive us and purify us from all unrighteousness.† My actions have been unrighteous and I seek forgiveness. The good book also says in Mathew 6: 14 â€Å"For if you forgive men when they sin against you, the heavenly father will also forgive you.† Your forgiveness to me will mean a lot to not only me but my family and the Lord our father. I assure you and the entire fraternity that I will be an obedient, honest and honorary student from now henceforth if you only find it in your heart to grant me another chance to complete my remaining

Tuesday, September 24, 2019

Hominin study guide Coursework Example | Topics and Well Written Essays - 500 words

Hominin study guide - Coursework Example They are close the human relatives. This is from the fact they have some features that are close to the modern man. Their body has been shorter just as of the modern man. However, theirs were relatively shorter to that of the modern man. They used sophisticated tools and they made use of fire to warm them, to scare away animals and even to cook their meat. Their skulls have been found in various parts of the world, thus resulting to their various names. The following is a list of their names, characteristics and location they were found (Sawyer 357). As their names, suggests they are considered wise because of how they manipulated the environment to their advantage. They are referred to as anatomically modern human from the fact that some members of this group had physical features that are analogous to those of the human beings. The following are subgroups and their characteristics (Sawyer

Monday, September 23, 2019

What are causes and effects of not conforming to social pressure Essay

What are causes and effects of not conforming to social pressure - Essay Example According to Asch’s research, most subjects tend to trust their own decisions even though they are under pressures that the confederates try to force subjects into changing their opinion. As a result, conformity is not totally necessary for people in order to stay in the group. Having a fashionable high technology product is what most people want today, especially the iPhone from the Apple Company. It is built with the latest technology and with elegant looks. Many people are conforming to buy it because of the advertising and existing users’ pressure. Their envy makes them follow others’ behavior. I was once asked by my friends to replace my phone with the iPhone because they are all using it. However, I refused to buy it because I feel I do not need it. It is not necessary to have such an expensive cell phone that I may not use the full functions of. I always ask myself the question of why I have to be like everyone else. Indeed, there is certain conformity such as traditional culture that people should follow, but it doesn’t mean that I should behave like some of those people buying pointless, fancy products. Even though I do not conform to social pressure, there is nothing changing in my life. I am still part of my social group, where my friends do not judge me as an outsider. Actually, there is nothing wrong with nonconformity. At least I have my own value to analyze anything. My mind and behavior are not controlled by someone else. So, I can have my own principle to do what I want. Similar to Asch’s experiment, only people who trust their own judgment will get the correct answer. However, people who conform to the group pressure are just for their self-complacence. They think it is the only way the group can accept them and have the same place in the conversation. In fact, it is how social groups make people think they are in the top trend and control their

Sunday, September 22, 2019

International accounting Essay Example | Topics and Well Written Essays - 750 words - 1

International accounting - Essay Example This allows the company to avoid currency conversion costs when acquiring specific raw materials and machineries from the international market. The company can also use the same to cater for foreign loan repayments instead of converting locally generated revenues. The company holds a large volume of inventories, which contains mainly finished products ready for the market. This exposes the company to adverse effects in the market whereby, a decrease in currency value consequently leads to a decline in the value of the stocks held. This includes the loss in value due to obsolescence and possible theft. In addition, the company could be forced to sell the products at a loss to create more space especially if the market is highly dynamic in their tastes and preferences. The company holds substantial amounts of trade and other receivables in its accounts. This exposes the company to the risk of suffering bad debts in cases where the debtors fail to honor their obligations. Although this represents future cash flows for the company, there is so much risk involved that it would advisable for a company to advance the same in the least possible value. The value also provides a pointer towards the possibility that buyers are making payments slowly, which reduces the amount of funds available to cater for expenses

Saturday, September 21, 2019

Exchange Relationship Essay Example for Free

Exchange Relationship Essay 1. Introduction Sociologists have long accepted that exchange relationship is a preliminary part of human interaction (Homans 1958; Emerson 1972; Blau 1986). In general, it is accepted by people that who have treated them well should be rewarded and those who have treated them unfriendly or bad should be punished (Gouldner, 1960; Perugini, Gallucci, Presaghi, Ercolani, 2003; Eisenberger, Lynch, Aselage, Rohdieck, 2004). The concept of exchange relationship is a joint activity of two or more people in which individual has something the other values. The specific task in exchange relationship is to bring benefit for people by exchanging behaviors or goods that many people cannot achieve alone (Thibaut Kelley 1959; Homans 1961; Emerson 1972). Exchange relationship originally formulated by Thibaut and Kelley (1959) and Emerson (1972). It is developed and extended by Emerson and Cook (1978) and Molm (1989). Exchange relationship between two people, who exchange resources with each other. People could be individuals or groups. Each individual resource in the exchange relationship are items in that peoples behavior that produce consequences of value for the other people (Emerson, 1972). Firstly, the valued consequences of among people may be tangible objects like money or goods, social rewards such as status or approval, or psychological states such as happiness or self-esteem. The exchange relationship provides people with opportunities to exchange resources, the relations changing in the frequency with opportunities are used after a period of time and the value and distribution of exchange. Since people provide valued benefits for one another, they are depends on each other or interdependence. Interdependence between people varies directly with the value of the benefit other people can provide, or conversely with the availability of the benefit to themselves from alternative sources (Emerson, 1972). These alternatives are other exchange relations as well, connected to each other in larger exchange networks. If exchange in one relation affects the other relation, the two relations are connected. Network connections are positive to the degree that exchange in one relation is accompanying by exchange in the other. On the other hand, negative to the degree that exchange in one relation is without accompanying by the other (Emerson, 1972). Exchange relationship had been used as a fundamental to social stability. According to the Gouldner (1960) existence of the mutual exchanges of benefits is to make the social system to be stable. Flynn and Brockner (2003) stated that both givers and receivers prefer to engage in the exchange in ways that strengthen the relationship with one another. They do not want to engage the exchange relationship in the ways that harm the particular relationship in order to make a stable social system. Exchange relationship serves as a starting mechanism to initiate the social interaction. As refer to Emerson (1972) indicated that the consequences for social relation and social structure are regularly resulting in the exchange relationship as the dependent variable. It is believe that people always form a relationship is resulting from the exchange with attention to gain a certain benefits. It also can help people to interpret, cope and adapt to the relationship formed through the exchange relationship (Larsen Buss, 2005). The exchange relationship has been at the heart of economics theory from the beginning and anthropologists such as Malinowski (1922), Mauss (1925) and Strauss (1969) focused attention on the social implications of exchange. These varied social science perspectives share the observation that exchange can be done through different forms of interaction, including negotiation, gift-giving, and even implicit understandings of direct or indirect reciprocity among individuals in networks, groups, or communities. The resulting social structures and the consequences for social relations are often taken as dependent variables in exchange relationship (Emerson, 1972) 2.0 Content 2.1 What is Ethics? The word ethics comes from the Greek â€Å"ethos† which means the customs, habits and morals of people (Trimble Dickson, 2010). Ethics is defined as a set of moral principles or values. This is the most common way of defining â€Å"ethics† as norms for conduct that distinguish between acceptable and unacceptable behaviour (Resnik, 2011). According to Crommelin and Pline (2007) stated that ethic distinguishes between what is good and bad; determines moral duty and obligations; and establishes principles of conduct for an individual and a professional group. According to Velasquez (2001), he defined ethics as â€Å"The principle of conduct or behaviour that govern an individual or a group of people.† Ferrell, Fraedrich and Ferrell (2010) have also defined ethics as â€Å"Inquiry into the nature and ground of morality†¦Ã¢â‚¬  In fact, ethics is deï ¬ ned as the systematic reï ¬â€šection on what is moral. Morality is the judgment of standards and conducts which an individual or group has about what is right and wrong, or good and bad (Velasquez, 2001). Essentially, ethics is the process of examining the moral standards of a person or society in which the degree of reasonableness in applying the moral standards to concrete situations is determined. In short, people need to systematically reflect on what people think is right or wrong. In regards to this, developing a body of moral standards that are reasonable for people to accept and apply to the choices people have to make in life, is the ultimate aim of ethics (Velasquez , 2001). Ethics is a requirement for human life. It is important in adaption of human behaviour (Gintis, Bowles, Boyd Fehr, 2003). Ethical behaviour versus unethical behaviour are based upon the degree to which a proposed act is perceived as right versus wrong, good versus evil, fair versus unfair (Roman, 2003). Human actions would be random and aimless if without ethics. According to Landauer and Rowlands (2001), people are able to organize their action to accomplish their most important values through a degree of rational ethical standard is taken. Humans feel honour toward ethical action and shame toward acting unethically because of human nature as moral beings. So, any flaw in ethics will reduce ability to be successful in the effort. 2.2 Exchange Relationships Exchange relationships refer to the dyadic interaction in which the giving and receiving resources is predicted on the expectation of equitable resources being provided directly in return (Homans, 1958; Blau, 1964). Thus, Blau (1964) defined exchange as unilateral acts of giving that either reciprocate previously rendered favors or are given with expectations of reciprocation. As Gouldner (1960) has pointed out that the need to exchange for the benefits received serves as a starting mechanism of social interaction. When people are thrown together, and before common norms or goals or role expectations have crystallized among them, the advantages to be gained from entering into exchange relations furnish incentives for social interaction, and the exchange processes serve as mechanisms for regulating social interaction, thus fostering the development of a network of social relations and a rudimentary group structure. Therefore in exchange relationships, trust and commitment are the key component to constructs and promote a long-term relationship (Gouldner, 1960; Ganesan, 1994; Sanzo, Santos, Vazquez, Alvarez, 2003). It is well accepted that the trust and commitment are desired dominant sentiments in any exchange relationship. According to the Sanzo, Santos, Vazquez, Alvarez (2003) found that the trust and commitment have a great influence in the exchange relationship directly. These two components serve as a variable to moderate in the exchange relationship. In other words, in order to build an exchange relationship, trust and commitment is the component must take into consideration. 2.2.1 Components in Exchange Relationship a) Trust Most of the researches consider trust as an antecedent of successful exchange relationship (Stanko, 2007; Cater Zabkar, 2008). Trust has long been considered fundamental to exchange relationships (Deutsch, 1962; Blau, 1964). It is one of the most important elements in exchange relationship (Gundlach, Gregory, Achrol, John, Ravi Mentzer, 1995; Geyskens, Inge, Steenkamp, Nirmalya, Jan-Benedict, Kumar, 1999). It is defined as the willingness to rely on an exchange partner with whom one has confidence (Moorman, Christine, Deshpande, Rohit, Gerald Zaltman, 1993; Morgan Hunt, 1994). The existence of trust is a central component in exchange relationship when one party has confidence in an exchange partner’s reliability and integrity (Morgan Hunt, 1994). Hon and Grunig (1999) define trust as one party’s level of confidence in and willingness to open oneself to the other party. An exchange relationship evolves in a slow process, starting with minor transactions in which little trust is required because little risk is involved (Blau, 1964). For instance, Hansen and Riggle (2009) had indicated that the relationship between ethical sales behavior and buyer commitment to the salesperson is completely mediated by buyer trust in the salesperson. Partnering relationships with other individual depend on exchange processes that are characterized by high levels of trust between the parties involved in an exchange (Morgan Hunt, 1994). An exchange relationship requires trusting others to discharge their obligations. If partners in exchange relationship trust each other more, they are more emotionally involved and less consciously weighing the benefits against the costs of that relationship (Wetzls, 1998). In other words, the receiver in an exchange relationship will tend to neglect their obligation to make a reciprocate toward the giver because of the trust build in the exchange relationship make the both partners less concern about the benefits gain compare to the cost invest in the relationship. b) Commitment Commitment in exchange is defined as the belief of an exchange partner that an ongoing relationship with each other is important to warrant maximum efforts aimed at maintaining it, including short-term sacrifices (Kumar, Nirmalya, Scheer, Lisa, Steenkamp, Jan-Benedict, 1994; Morgan Hunt, 1994; Geyskens, Inge, Steenkamp, Nirmalya, Jan-Benedict, Kumar, 1999). Research suggests that commitment is at the core of all exchange relationships and it is an essential ingredient in successful long-term exchange relationships (Anderson Narus, 1998). This means that commitment is a good indicator of long-term exchange relationship. This is because commitment includes an attitudinal component signifying an enduring intention by the parties to develop and maintain a stable long-term relationship (Anderson, Barton, Erin Weitz, 1992). Hon and Grunig (1999) reflect commitment as the extent to which the exchange parties feels that the relationship is worth spending time and energy to maintain. As indicated by Moorman, Zaltman, and Deshpande (1993), commitment defined as an enduring desire to maintain a valued relationship. 2.2.2 Interdependence in Exchange Relationship Interdependence plays pivotal roles in the exchange relationship. A shared concept among all exchange relationship derived by researcher is interdependence between people (Thibaut Kelly 1959; Homan, 1961; Blau, 1998). An individual’s behavior in exchange relationship is dependent on the other’s behavior in order to drive the interaction. According to the Blau (1998) states that interdependence is not in itself sufficient enough for exchange relationship to exist between two people. Blau (1998) suggests that there is another criterion to meet the existence of exchange relationship which is interaction with another specific individual which whom one is interdependent. Interdependences occur when someone has performed a favor to an individual is required to reciprocate that favor by that particular individual. If that person fails to reciprocate then they are seen as ungrateful and interdependence is not obtained. However, if the favor is reciprocated then it induces the other to reciprocate in kind and encourages both parties to continue such exchange. Each individual’s behavior in this exchange is dependent on the other’s behavior in order to drive the interaction. If one was to fail to reciprocate, the exchange would then halt and interdependence would no longer exist. 2.3 Importance of Exchange Relationship in Individual Behaviors Exchange relationship is an important and normal phenomenon that happening everywhere and everyday in human life. Most of the studies have examined that either how givers respond to favor they have performed (Cialdini, 1993; Latane Darley, 1970) and how a receivers respond to that favors have been done for them (Gergen, Ellsworth, Maslach Seipel, 1975; Nadler, 1991). The exchange relationship is purportedly maintained by invoking the norm of reciprocity which is stipulates that people should help those who have helped them (Gouldner, 1960). The norm of reciprocity act as a social rule that maintains, among other thing, that people should return favors and other acts of kindness (Gouldner, 1960). Blau (1964) establish the notion that individuals prefer to maintain balance in their exchanges. For individuals to enter into mutually beneficial exchange relationships, they have able to commit to fulfill their contractual obligations. A lender will not lend without being assured that the borrower will not invest the money in a hopeless venture or take the money and run. Particularly, neither givers nor receivers prefer to engage in favors exchange in ways that strengthen their relationship with one another (Flynn Brockner, 2003). This means that they will do not want to engage in favor exchange in ways that harm their relationship. A proper structure of our relationships in a manner will enables us to benefit from exchange. For instance, an individual would enter into exchange relationship unless assured that the exchange can indeed make him better off and that the other party would act in manner that will make him better off. 2.4 Exchange Relationship in Organization The relationship between employees and their organizations has often been described as an exchange relationship (Mowday, Porter, Steers, 1982; Eisenberger, Huntington, Hutchison Sowa, 1986; Rousseau, 1989). Member of organizations often request favors to perform tasks or obtain resources they might not be able to perform or obtain alone (Blau, 1964). Exchange relationship between the leaders and subordinates develop from the interactions between these parties and motivated by the mutual benefits derived from the exchange (Blau, 1964; Brown Trevino, 2006). An effective exchanges relationship must be created between the parties in order to increase their dependence upon each other for long term survival. Leader and subordinates have closer relationships, the latter will tend to receive better performance evaluations and more promotion opportunities. In addition, mutual trust, respect and care are more likely to happen between subordinates and their employers (Graen, Novak, Sommerka mp, 1982). In return, the subordinates will show more loyalty and respect toward their leader. Organizational commitments have emphasized the importance of employee perceptions of the exchange relationship with the organization. Many scholar like Major, Kozlomski, Chao and Gardner (1995) and Lee (2001) indicate that the high quality of the leader-member exchange relationship such as employees empowerment, attracting reward and compensation is positively correlated with the organizational commitment and negatively correlated with turnover. This is because they tend to be satisfied with the organization. A large number of studies have shown that employees who feel that they have been empowered are likely to remain more committed to their organizations (Allen Meyer, 1990; Liden, Wayne Sparrowe, 2000). Empowered employees will consider themselves more capable of influencing their work and organization in a more meaningful way and more willing to stay in the organization. This is where the exchange relationship exists when a employees had empowered by their managers will willing to remain and work for the organization as a return. There are two important frameworks for exchange relationship in organization which are psychological contracts and perceived organizational support. Psychological contract is means that an individual’s belief regarding the terms and conditions of an exchange relationship with another party in organization (Rousseau, 1989). Perceived organizational support captures an individual’s perception concerning the degree to which an organization values their contributions and cares about their well-being (Eisenberger, Huntington, Hutchison Sowa, 1986). These two frameworks are similar in that they are both grounded in exchange relationship as the explanatory mechanism for their consequences on employees’ attitude and behavior. The psychological contract and perceived organizational support are also both positioned as key means by which an employee globally evaluates the employment relationship with the organization. Perceived organizational support is one-sided in that it focuses on the employer’s side of the exchange as perceived by employees. Psychological contract includes an employee and employer perspective which is the contingent relationship between an employee’s perception of the reciprocal obligation between that individual and the employer (Jacqueline, Shapiro Conway, 2005). 2.5 Relationship Between Exchange Relationship And Ethics Exchange relationship and ethics are two concepts that correlated. These two concepts are explained in theory which is able to enhance the understanding of the concept. Exchange relationship is a dyadic interaction between two parties by giving and receiving resources while ethics are the basic concepts of human conduct. An ethical action can build a long-term exchange relationship. According to Hansen (2011) says that someone who had perceived as an ethical people will more likely to gain a trust from others and develop an exchange relationship easily with them. As mentioned above, trust is one of the elements in building an exchange relationship. In other words, behave ethically can gain trust easily from others party. Exchange relationship can be developed through the trust between two parties (Brower, Schoorman Tan, 2000). Besides that, commitment tends to be higher between the parties who involved in exchange relationship due to ethical behavior. This is because they perceived ethical behavior can make them constantly engage in particular relationship. By referring to Gouldner (1960) norm of reciprocity which act as a social rule that maintains, among other things, that people should return favors and other acts in kindness. This means that peoples should treat others as how they want to be treated. If an individual act ethically will tend to influence people around them to act ethically. This is a learning process take place where people learn to behave ethically during interaction in exchange relationship. Therefore, people will learn to behave ethically to affect others to act ethically so that they can be gain the ethical treatment from the others as well. According to the Brown and Trevino (2006), ethical individuals are a role model for the others to follow because they tend to seek to do the right thing and conduct their personal lives in an ethical manner. For instance, an ethical leaders in organization are in the habit of seeking out â€Å"what is right† (Brown Trevino, 2006). This means that they are tend to make a fair and balanced decision from a means rather than just an ends perspective (Brown Trevino, 2006). Most studies consider how the managers’ ethical attitudes and behaviors influence those of their direct subordinates and how the subordinate respond toward it (Porter, Allen Angle, 1983; Ginzel, Kramer Sutton, 1993; Pfeffer, 1997). Leaders who are perceived as ethical will positively influence employee work behavior (Mayer, Kuenzi, Greenbaum, Bardes, Salvador, 2009). In other words, a manager who acts ethically can make a great influence toward employee’s behavior in exchange relationship. By referring to the relational leadership theory (Brower, Schoorman Tan, 2000) stated that an ethical leader are likely to develop the exchange relationships between the leader and subordinate because ethical leaders exemplify the essential of trustworthiness in the eyes of their subordinate. In an organization, the subordinates who perceive their leader to be an ethical people will be more likely to perceive this leader as a trustworthy leader and intend to continue in the exchange relationship development process with that leader (Hansen, 2011). In other words, an ethical leader who are honest, seek to do the right thing and holding high moral standards will lead their subordinate to perceive them as a trustworthy leader. This perception of trustworthiness on the ethical leader will act as a catalyst to the development of the exchange relationship between the leader and subordinate (Brower, Schoorman Tan, 2000). Exchange relationships between ethical leaders and their subordinates develop from interactions between these parties and are motivated by the mutual benefits derived from the exchanges (Blau, 1964; Brown Trevino, 2006). Ethical leaders are more likely to develop a strong exchange relationship with their subordinate because they are trusted by their subordinates. Scholars have been suggested that exchange relationships are related to discussions of ethical leadership (Brown, Trevino Harrison, 2005; Brown Trevino, 2006). Exchange relationships require a significant amount of trust the part of exchanging parties. In other words, keeping the definition of ethical leadership in mind that characterizes ethical leaders as being ‘trusted’ by their subordinates, it is quite likely that a subordinate who perceives his or her leader to be an ethical leader will also perceive this leader to be trustworthy. 3.0 Conclusion Exchange relationship is important in human interaction. Exchange relationship is a dyadic interaction between the individual in order to gain something from other and reciprocate something as return. Norm of reciprocity serves as a guideline for individual to deal in the exchange relationship. In exchange relationship, Batson (1993) claims that an individual assume that benefits are given with the expectation of receiving a benefit in return while the receipt of benefits incur in a debt or obligation to return a comparable benefits. The benefits that issue must be intentionally given and may include anything of use or value, tangible or intangible; they need not involve money or things for which monetary value can be calculated (Clark Mills, 1979). Ethic is study of moral principle while it helps in govern our decision making and moral choices (Ianinska Zamor, 2006). Human actions always judge by others in term of ethical or unethical. Without ethic act as guide for human, human a ction will tend to be aimless. From the study, exchange relationship is required the involvement of trust and commitment elements. These two elements is important in generate a successful exchange relationship. Trust and commitment is the key component in promoting a long-term exchange relationship (Gouldner, 1960; Sanzo, Santos, Vazquez, Alvarez, 2003). These two elements serve as a starting point for an exchange relationship to be generated. Before an exchange relationship build, the two party must have a certain degree level of trust between them. Without a minimum level of trust, it is hard to deal in exchange relationship. This is because exchange involves a certain level of risk need to be taken (Blau, 1964). Besides that, interdependent is also play an important role in exchange relationship. Interdependent will occur when each of the party who delivered some favors to another party is required a return for that favour from the recipient. Therefore, the exchange relationship only can be exits through interd ependent individuals. For the individual behaviour, exchange relationship will not run away from their interaction. It is focus on how the parties perform and respond to the favour in exchange relationship (Cialdini, 1993; Latane Darley, 1970; Gergen, Ellsworth, Maslach, Seipel, 1975; Nadler, 1991). A mutually benefits is expected by both of the party in exchange relationship. Therefore, individual will expect toward the benefits to be gained when making an exchange with particular individual. Exchange relationship is vital for organization as well. As the most scholar had study the exchange relationship between the employees and organization widely (Mowday, Porter, Steers, 1982; Rousseau, 1989; Eisenberger, Huntington, Hutchison Sowa, 1986). In deep, the leader and employees move in a same direction because of willingness to exchange their value each others. For instance, the manager empowered their employee and the employees feel satisfy then they tend to perform well and commit in their duty as well as the organization (Allen Meyer, 1990; Liden, Wayne, Sparrowe, 2000). At the end, the organization is the greater beneficial receiver. Next, study on relationship between exchange relationship and ethics is the main discussion part. The researches have widely examine this topic by reflect it in the organization (Brown Trevino, 2006; Porter, Allen Angle, 1983; Ginzel, Kramer Sutton, 1993; Pfeffer, 1997). It is explain that how a person to behave ethically in exchange relationship. Normally, a person will get influence by the ethical individual in exchange relationship. For instance, Mayer, Kuenzi, Greenbaum, Bardes and Salvador (2009) claim that the ethical leader can influence their subordinate behavior in the organization. Employees will perceive the ethical leader as their role model. These means that employees will tend to be trust on their leader due to the moral principle hold by their leader. In other words, leader established a positive behaviour toward their subordinate, the subordinate will tend to act the same way in manner. In exchange, employees to be more commitment toward their leader as well as org anization due to the ethical leader had gain a trust from their employees. Last but not least, two relevant theories had been established to explain the concept of exchange relationship and ethics. Social exchange theory and leader member exchange theory had been used to provide a clear understand of the topic. Social exchange theory is the human fundamental activity aid to clarify about social behaviour through the exchange relationship. This theory explain that in exchange relationship, an individual should reciprocate on the favour that given by the giver on a pro quo basis (Brown Mitchell, 2010; Blau, 1964). In general, social exchange theory had involved three main types of exchange which are negotiated exchange, reciprocal exchange, and generalized exchange. Each of the type served in different situation in term of risk involvement. Another theory that been used is leader member theory. This theory helps in explain how the exchange relationships occur among the employer and employees. From this theory, the exchange relationship among the leader and employee is related to the quality of the relationship. Throughout this relationship, leader and subordinate will generate a trust among them to establish the exchange relationship. A high quality of relationship involves showing mutual respect, concern and sharing of decision control (Dienesch Liden, 1986; Liden Maslyn, 1993). Therefore, exchange for benefits can be developed easily between the leader and subordinate.

Friday, September 20, 2019

History Of The Bus Topology

History Of The Bus Topology A bus topology is a network set up in which nodes are connected to a segment of cable in the logical shape of a line, with a terminator at each end. A bus topology connects each computer or nodes to a single segment trunk. All nodes on the network share a common bus and use a multi-drop transmission medium. Bus network allows only one device to transmit at a time. A distributed access protocol determines which station is to transmit. The signal goes from one end of the bus to another. A terminator is needed at each to cut down the signal so it does not reflect back across the bus. CSMA/CA, media access method, is used to control the collisions that take place when two signals placed on the wire at the same time. There are two types of bus topology: Linear Bus Topology and Distributed Bus Topology. In Linear Bus Topology, all nodes of the network are connected to a common transmission medium which has exactly two endpoints. Distributed Bus in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium. Bus networks do best with a limited number of devices. If more than limited computers are added to a bus, performance problems will be result. If the backbone cable fails, the entire network effectively becomes unusable. Fig: Bus Topology Ring Topology Ring network topology has no central server and connects computers in a circle of point-to-point connections. Each node handles its own applications. And also shares resources over the entire network. If one node becomes break down, the others are still able to maintain contact with one another. Such a network is best for decentralized systems because no priorities are required. The signal is transferred through a token for one station to the next. When a station needs to transmit, it grabs the token, attaches data and an address to it. And then routes it around the ring. The token travels along the ring till reaches the destination address. The receiving computer replies an acknowledgment to the sender source. The sender then releases the token for use by another computer. Each station on the ring has equal access but only one station can use token at a time. To allow an orderly access to the ring, a single electronic token passes from one computer to the next around the ring. A computer can only transmit data when it captures the token Fig: Ring Topology Star Topology A star topology is one of the most use common network topology where each of the devices and computers on a network connect to a central hub or sometimes just a switch. On a star network, data passes though the hub to its destination. The hub manages and controls all functions of the network. It also performs as a repeater for the data flow. In a star network, the entire network is dependent on the hub so if there is a problem with the hub, the entire network is not working. This makes it easy to troubleshoot by offering a single point for error connection and at the same time the dependency is also very high on that single point. Every computer in the network is safe when the hub is safe. This type of network also offers more privacy than any other network. The star network topology requires more cable than the usual Bus topology. A common cable that is used in star network is the UTP or the unshielded twisted pair cable. Another common cable that is used in star networks is the RJ45 or the Ethernet cables. If one computer fails in the network, it does not affect any other computer in the network and the purposes of this computer can be easily changed to the next computer easily using the controls of hub. In a Star Network Topology it is possible to have all the important data backups on the hub in a private folder so if one computer fails, it can still use data using the next computer in the network and accessing the backup files on the hub. New devices or nodes can easily be added to the Star Network by just extending a cable from the hub. Because of the hub controls everything, the addition or removal of devices are done using the hub. If the hub adds a device such as a printer or a fax machine, all the other computers on the network can access that new device by accessing the hub. The device is no need to be installed on all the computers in the entire network. The central function is cost effective and easier to maintain. Fig: Star Topology Mesh Topology A type of network configuration where each of the computers and network devices are interconnected with one another allows for most transmissions to be distributed even if one of the connections goes down. This type of topology is not commonly used for most computer networks because it is difficult and expensive to have redundant connection to every computer. In Mesh network, it can route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around broken or blocked paths by hopping from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. The network can still operate even when a node fails or a connection goes bad. On a mesh network, messages can send via any of several possible paths from source to destination. It employs one of two connection arrangements, full mesh topology or partial mesh topology. In the full mesh topology, each node is connected directly to each of the others. In the partial mesh topology, some nodes are connected to all the others, but some of the nodes are connected only to those other nodes with which they exchange the most data. Fig: Mesh Topology Different types of cables Different types of network cables are used depending on the kind of network. The type of cable used for a network depends on the networks topology, protocol, and size. If a network has large number of network devices, it will need cables that provide high speed and error free connectivity. Some of the cables being used today are Unshielded Twisted Pair (UTP) cables, coaxial cables and fiber optic cables. The UTP cable is the most popular variety, largely used for school networks as it transfers data at 100 mbps. Coaxial cables have a single copper conductor at their center. A plastic layer provides insulation between the center conductor and the braided metal shield. The outer metal shield blocks out outer interferences such as lights, motors and other computers. Fiber optic cables consist of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals and transfers signals over much longer distances than coaxial and twisted pair cables. Network cables are the backbone of any network. However, today several networks are switching over to other mediums of data transfer such as high frequency radio signals, and infrared light beams to connect the workstations. These systems are not only fast and effective, but also do away with the problem of maintain several hundred feet of cables spreading across the workspace. With such technologies coming to the forefront, the future may well tilt in favor of wireless systems. 10Mbps Networking Standard Cable Type Segment Length Connector 10Base2 Thin Coaxial 185 meters BNC 10BaseT Category 3, 4, 5 twisted pair 100 meters RJ-45 10BaseFL Fiber-optic 2000 meters SC/ST b) Advantages and Disadvantages of medium. Media Type Maximum Segment Length Speed Cost Advantages Disadvantages UTP 100 m 10 Mbps to 1000 Mbps Least expensive Easy to install; widely available and widely used Susceptible to interference; can cover only a limited distance STP 100 m 10 Mbps to 100 Mbps More expensive than UTP Reduced crosstalk; more resistant to EMI than Thinnet or UTP Difficult to work with; can cover only a limited distance Coaxial 500 m (Thicknet) 185 m (Thinnet) 10 Mbps to 100 Mbps Relatively inexpensive, but more costly than UTP Less susceptible to EMI interference than other types of copper media Difficult to work with (Thicknet); limited bandwidth; limited application (Thinnet); damage to cable can bring down entire network Fiber-Optic 10 km and farther (single-mode) 2 km and farther (multimode) 100 Mbps to 100 Gbps (single mode) 100 Mbps to 9.92 Gbps (multimode) Expensive Cannot be tapped, so security is better; can be used over great distances; is not susceptible to EMI; has a higher data rate than coaxial and twisted-pair cable Difficult to terminate c) Recommendation. Star topology would be the best way to use for renewing Townsville Police Department Network infrastructure because of in-house network (LAN) structure. Star topology should be also used for following reasons. Easy to install and reconfigure. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. Less expensive. Includes robustness, that is, if one link fails, only that link is affected, other links remain active. It has been said that Townsville Police Department covers an area of 100 square kilometers and Townsville is divided into four districts (Northern, Eastern, Western and Southern). For that reason, the switch should be placed in the center of four districts. So, the network cable must cover 50 kilometer and the switch must be gigabit Ethernet. Therefore, UTP with cat6E is the most suitable network for such an area of network. Category 6 UTP Category 6 supports gigabit Ethernet and is recognized by standards bodies as supporting 10GBASE-T, however there are limitations that must be considered. The IEEE 802.3an standard cites a 55 meter distance limitation for standard category 6, which is not universally agreed upon within the TIA and ISO standards.TIA TSB 155 recently released a Technical Service Bulletin covering additional parameters for running 10GBASE-T on standard category 6. In this document a 37 meter distance limitation is referenced for 10GBASE-T on standards compliant category 6 systems. Between 37 meters and the IEEE referenced 55 meters, standard category 6 may support 10GBASE-T, but it is possible that the installer may have to use alien crosstalk mitigation techniques such as unbundling cables or replacing patch cords to improve the electrical parameters to allow 10GBASE-T to work properly. Above 55 meters, it is unlikely that category 6 UTP would work properly without a large amount of mitigation to reduc e alien crosstalk. A key takeaway is that using category 6 UTP for 10GBASE-T should be focused on existing installations, not new installations. The choice for new installations designed to support 10GBASE-T should be augmented category 6 UTP, STP or optical fiber systems. Category 6 Advantages  » Cost and size of media, relative to augmented category 6 and STP  » Installed base currently the dominant UTP cabling standard  » Installation widely accepted Category 6 Disadvantages  » Limited distance for 10GBASE-T  » External noise suppression at 100 m, relative to shielded systems or augmented category 6 Task 2 a) Nowadays, there are several usages of Internet by means of so many ways. There are three basic Internet services: Information (browsing, online-shopping, etc.) Communications (mail, chat, Video conferencing, etc.) Files sharing (downloading, uploading, etc.) b) The connecting suitable for above severs are as follows: For Information service: It can cover only 100 Kbits/s usually prove adequate. For Communication: For video conferencing, bandwidths of no more than 384 Kbits/s usually prove adequate. As for chatting communication, especially for yahoo chat, 28 Kbits/s should be enough. For File Sharing: As for file sharing, bandwidths of more than 1 Mbit/s are most suitable. c) The Internet Service Provider in Myanmar Myanmar Posts and Telecommunications The Myanmar Posts and Telecommunications (MPT), is the sole provider of telecommunication services in Myanmar. It is a Government Agency, operating under the Ministry of Communications, Posts and Telegraphs. It was founded in 1884 as a small Department of Posts and Telegraphs and has grown into the present day Myanma Posts and Telecommunications with approximately 13800 employees of which about 380 are managerial level staff. The present organization is headed by the Managing Director and a General Manager as his deputy. There are nine major departments operating under respective deputy general managers/chief engineers in the fields of administration, works and inspection, planning, training, finance, stores, automatic telephones, overseas communications and long distance communications. The three main categories of services rendered by MPT are the postal services, telegraph services and telephone services, for both domestic and international communications. d) Since, there is only one ISP in our country (Myanmar); we have to use MPT (Myanmar Posts and Telecommunication) as an ISP for our country. Task 3 a) Methods of Two-Way Voice communications Two-way voice communications (radios) are essentially available in three types: Hand-held portable, Vehicle-mounted mobile, and Desktop-base station There are also unique two-way radio devices such as indoor and outdoor call boxes and one-way radio receivers for wireless paging. Hand-held portable two-way radios are the walkie talkie type of radios. As ruled by the FCC (Federal Communications Commission), hand-held radios may not have more than 5 watts of power. Vehicle-mounted mobile two-way radios mount in a car or truck and they use the vehicles battery for power. They may have their own antenna, but better range is achieved by using an externally-mounted antenna. Desktop base station radios use wall AC power and they too may have a built-in antenna, but this antenna may be disconnected and then connected to cable that leads to an external-mounted antenna. The higher the antenna is mounted, the better the range. The vehicle-mounted mobile radios are usually used as base stations by just adding an AC to DC power converter. Mobile and Base station radios are usually more powerful than hand-held radios and may have as much as 100 watts of power. Frequencies There are two major frequency formats for two-way radios. They are Ultra High Frequency (UHF) radio and Very High Frequency (VHF) radio. Neither frequency band is inherently better than the other. They each have their pluses and minuses. Both formats are effective ways to communicate with another person. UHF radio The UHF radio band for commercial radios is between 400 512 MHz. Until recently, it wasnt widely used. Now, the UHF radio frequency is used for two-way radios, GPS, Blue-tooth, cordless phones, and WiFi. VHF radio The VHF radio band for commercial radios is between 130 174 MHz. FM radio, two-way radios, and television broadcasts operate in this range. Both UHF and VHF radios are prone to line of sight factors, but VHF a little more so. The waves make it through trees and rugged landscapes, but not as well as UHF frequencies do. However, if a VHF wave and a UHF wave were transmitted over an area without barriers, the VHF wave would travel almost twice as far. This makes VHF easier to broadcast over a long range. Two-way radios, hand-held portable, vehicle-mounted mobile and desktop base station are full duplex. b) Legal requirement for operation system Two -way radio devices Two-way radio power Antennas Channel usages FCC Licensing Audio Accessories Cases, Holsters, and Belt Clips Batteries Repeaters Drop-in Charger Multi-charging Units Selectable Power Operators Administrators Control station Additional and optional knowledge of two-way voice communication technology Overall knowledge of how to use a selected two-way voice communication device Costs of setting up and operating the system in my country As for hand-held two way voice communication device, according to amazon.com, the costs are as follows: For Cobra CTX400 GMRS/FRS 2-Way Rechargeable Radio with Hands-Free Operation (Pair) $36.88 For Townsville Police Department, total cost for using hand-held two way voice communication device is up to $2065.28. d) Limitations of each method (interference, range, etc.). Product Features 22 Mile Range, 22 Channels 121 Privacy Codes 10 Channel NOAA radio Hands-free operation (VOX) 8 Rechargeable AAA batteries, and a 2 port desk charger included Maximum range extender and belt clip included for maximum efficiency and carrying ease Lead-Free, Eco-Friendly Packaging e) As for following feature Highlights, tow way voice communication should be set up. VOX The Voice Activated Transmit (VOX) feature enables us to use our radio hands free. When VOX is turned on, the radio will automatically begin transmitting when we speak, without pressing the push-to-talk button. VOX works well for any application. On most VOX-capable radios there is a slight delay between when we start speaking and when the microphone turns on so the first part of the conversation may be clipped. Most radio users overcome this by repeating the first word. Military Specification Standards In an effort to achieve standardization objectives for purchases of products used by the military and other government organizations, the U.S. Department of Defense created standards that these products must meet. We will see these standards called military standard, MIL-STD, or MIL-SPEC. These standards ensure products meet certain requirements, commonality, reliability, compatibility, and similar defense-related objectives. According to Military Specification Standards, Townsville Police Department should be used Cobra CTX400 GMRS/FRS 2-Way Rechargeable Radio. Task 4 a) Since AVAYA IP Office 4.0 is only software for PBX telephone system, the main equipment that would be installed is only software. The procedure for the installation is as follows: Installation To establish and maintain an IP DECT installation, a network infrastructure is assumed, which comprises at least the following components: IP Base Stations IP DECT phone IP Office TFTP server (which can be the IP Office or 3rd Party) Depending on the operational requirements the following services should be provided: DHCP SNTP DNS WML/HTTP Syslog daemon b) AVAYA IP Office 4.0 Telephone System (IP DECT) Digital Enhanced Cordless Telecommunication The standard (ETS 300 175) essentially specifies the air interface, known as the radio interface. Voice and data can both be transmitted via this interface. DECT key technical characteristics are: Frequency range: approximately 1,880 1,900 GHz (approximately 20 MHz bandwidth) 10 carrier frequencies (1,728 MHz spacing) with 12 time slots each Doubling the number of time slots (to 24) using the TDMA process Net data rate per channel of 32 kbit/s (for voice transmission using ADPCM) Voice coding using the ADPCM method Maximum transmission power of 10 mW GAP Generic About the IP DECT Base Stations There are two types of IP Base Station. All IP Base Stations have the same hardware and software capabilities. Indoor IP Base Station The indoor IP Base Station is for indoor use only. It can be powered by a mains adapter or by 802.3af compliant power over Ethernet. Note For Australia and New Zealand the mains adaptor is not currently supported. Only 802.3af compliant power over Ethernet is supported. Outdoor IP Base Station The outdoor IP Base Station can be used outdoors or indoors. The outdoor IP Base Station can only be powered by 802.3af compliant power over Ethernet. Note Avaya Power over Ethernet adaptors are non 802.3af compliant, and therefore cannot power the ADMM. One of the IP Base Station within an IP DECT installation must be chosen (at installation time) to operate as the ADMM. This ADMM mode is in addition to the normal IP Base Station functionality that all the other base stations retain. c) Costs for installing AVAYA IP office There are two models of phones: the 3701 and 3711 phones. Avaya Kirk DECT phones (WT9620 and DT20) function on the IP DECT solution, but the functionality is limited. AVAYA Partner 18D- Digital phone 3 new from $95.00 Avaya 6408D+- Digital phone -multi-line operation Avaya 5621SWP IP Phone (700385982) Avaya IP400 Analog Trunk 4 card Available at external website: Atlas Phones for $199.00 d) Costs for operating the system Avaya IP Office Smart Card w/Voicemail Pro like new, available at external website: Atlas Phones for $1,095.00. Premise-based IP PBX systems vary extremely widely in cost and even more so as we look at wide-scale deployments and future growth and additions to a system. A basic premise-based box for a relatively small number of users say up to 20 in a single location can cost less than $1,000 excluding the phones themselves. But expansion costs and other branch locations can change the cost equation dramatically. In addition, we will have ongoing costs related to connection to the regular phone system and whatever connection costs are imposed by our backbone supplier. These ongoing costs are nevertheless going to be considerably lower than any other form of phone system. They should be lower than hosted VoIP solutions, and they will be dramatically lower than any older PBX and telecommunications provider. Phones are an additional cost, but when buying a premise-based IP PBX system, we often have greater flexibility than in any other arrangement. We can choose to go with very low-cost, no-name or bottom-of-the-line phones (which are still perfectly capable) all the way up to top-notch phones from manufacturers such as Polycom and Siemens that provide usability benefits (although often at a price premium). For Townsville Police Department, AVAYA Partner 18D- Digital phone should be used up to 6 base stations as for details, one Headquarter Reception Area, four Districts, and one serious crime squad. e) Recommendation for AVAYA The IP DECT solution delivers all the benefits of IP-based converged communications with the convenience of in-building wireless communications. Designed to support a large number of users, the IP DECT system enables users to carry a wireless phone and get full access to all the features they are accustomed to using at their desk phone. The IP DECT solution, which connects to the IP Office using a variant of the H.323 protocol, can support users in different offices that are connected via a WAN. An IP DECT cordless handset can travel from one office to another, making and taking calls. The DECT over IP system comprises the following components: At least one IP Base Station connected over an IP network and offering IP DECT as a wireless interface. A maximum of 32 IP Base Stations are supported. IP Office Small Office Edition, IP Office 406v2, 403, 406v1 or 412 with available VCM resources. IP DECT phone: Avaya 3701 and Avaya 3711 wireless phones. A maximum of 120 IP DECT phones are supported. Avaya IP DECT Mobility Manager (ADMM): management interface for IP DECT Wireless Solution, which runs on either one of the IP DECT Base Stations. The picture displayed next page gives a graphical overview of the architecture of the IP DECT Wireless solution. The IP Office, ADMM and the IP Base Stations communicate through the IP infrastructure. The IP Base Stations and the IP DECT phones communicate over air. Graphical overview of the architecture of the IP DECT Wireless solution Task 5 Task (5) This is the detail report for the overall tasks sorting from Task 1 to Task 4.In Task 1, the Townsville Police Department should be used Category 6 UTP by the following reasons:  » Cost and size of media, relative to augmented category 6 and STP  » Installed base currently the dominant UTP cabling standard  » Installation widely accepted And it is suitable for Townsville Police Department. Category 6 supports gigabit Ethernet and is recognized by standards bodies as supporting 10GBASE-T, however there are limitations that must be considered. The IEEE 802.3an standard cites a 55 meter distance limitation for standard category 6, which is not universally agreed upon within the TIA and ISO standards.TIA TSB 155 recently released a Technical Service Bulletin covering additional parameters for running 10GBASE-T on standard category 6. In this document a 37 meter distance limitation is referenced for 10GBASE-T on standards compliant category 6 systems. Between 37 meters and the IEEE referenced 55 meters, standard category 6 may support 10GBASE-T, but it is possible that the installer may have to use alien crosstalk mitigation techniques such as unbundling cables or replacing patch cords to improve the electrical parameters to allow 10GBASE-T to work properly. Above 55 meters, it is unlikely that category 6 UTP would work properly without a large amount of mitigation to reduc e alien crosstalk. A key takeaway is that using category 6 UTP for 10GBASE-T should be focused on existing installations, not new installations. The choice for new installations designed to support 10GBASE-T should be augmented category 6 UTP, STP or optical fiber systems. Townsville Police Department has been restructured within an area of 100 square kilometers. But Townsville PD could not over more than 500 square kilometers because the head departments are divided into four districts (Northern, Eastern, Western and southern). Cat 6 UTP could support that area. For Task 2, the services for internet connections are as follows: Information (browsing, online-shopping, etc.) Communications (mail, chat, Video conferencing, etc.) Files sharing (downloading, uploading, etc.) These services are the most common used for internet. And recommended connection speeds are as follows: For Information service: It can cover only 100 Kbits/s usually prove adequate. For Communication: For video conferencing, bandwidths of no more than 384 Kbits/s usually prove adequate. As for chatting communication, especially for most chatting communications, 28 Kbits/s should be enough. For File Sharing: As for file sharing, bandwidths of more than 1 Mbit/s are most suitable. There is only one Internet Service Provider in our country, Myanmar Ports and Communications. In Task 3, there are too many options for two -way voice communication devices. Two-way voice communications (radios) are essentially available in three types: Hand-held portable, Vehicle-mounted mobile, and Desktop-base station These are most common used for two-way voice communication. And I provided the recommendation the device as follows: Military Specification Standards In an effort to achieve standardization objectives for purchases of products used by the military and other government organizations, the U.S. Department of Defense created standards that these products must meet. We will see these standards called military standard, MIL-STD, or MIL-SPEC. These standards ensure products meet certain requirements, commonality, reliability, compatibility, and similar defense-related objectives. According to Military Specification Standards, Townsville Police Department should be used two way voice communication technology. For Task 4, the main equipments that would be installed are just only the software. There are so many options and vendors that provide telephone known as PBX. Among those vendors, I chose AVAYA IP Office 4.0 Telephone System (IP DECT). As for Townsville Police Department, like military office, it is important to choose the right products. The IP DECT solution delivers all the benefits of IP-based converged communications with the convenience of in-building wireless communications. Designed to support a large number of users, the IP DECT system enables users to carry a wireless phone and get full access to all the features they are accustomed to using at their desk phone. The IP DECT solution, which connects to the IP Office using a variant of the H.323 protocol, can support users in different offices that are connected via a WAN. An IP DECT cordless handset can travel from one office to another, making and taking calls.

Thursday, September 19, 2019

Biography Of Charles Dickens :: essays research papers

Biography of Charles Dickens There is something about Charles Dickens' imaginative power that defies explanation in purely biographical terms. Nevertheless, his biography shows the source of that power and is the best place to begin to define it.   Ã‚  Ã‚  Ã‚  Ã‚  The second child of John and Elizabeth Dickens, Charles was born on February 7, 1812, near Portsmouth on England's south coast. At that time John Dickens was stationed in Portsmouth as a clerk in the Navy Pay Office. The family was of lower-middle-class origins, John having come from servants and Elizabeth from minor bureaucrats. Dickens' father was vivacious and generous but had an unfortunate tendency to live beyond his means. his mother was affectionate and rather inept in practical matters. Dickens later used his father as the basis for Mr. Micawber and portrayed is mother as Mrs. Nickleby in A Tale of Two Cities. After a transfer to London in 1814, the family moved to Chatham, near Rochester, three years later. Dickens was about five at the time, and for the next five years his life was pleasant. Taught to read by his mother, he devoured his fathers' small collection of classics, which included Shakespeare, Cervantes, Defoe, Smollet, Fielding, and Goldsmith. These left a permanent mark on his imagination; their effect on his art was quite important. dickens also went to some performances of Shakespeare and formed a lifelong attachment to the theater. He attended school during this period and showed himself to be a rather solitary, observant, good-natured child with some talent for comic routines, which his father encouraged. In retrospect Dickens looked upon these years as a kind of golden age. His first novel, The Pickwick Papers, is in part an attempt to recreate their idyllic nature: it rejoices in innocence and the youthful spirit, and its happiest scenes take place in that precise geographical area.   Ã‚  Ã‚  Ã‚  Ã‚  In the light of the family's move back to London, where financial difficulties overtook the Dickens's, the time in Chatham must have seemed glorious indeed. The family moved into the shabby suburb of Camden Town, and Dickens was taken out of school and set to menial jobs about the household. In time, to help augment the family income, Dickens was given a job in a blacking factory among rough companions. At the time his father was imprisoned for debt, but was released three months later by a small legacy. Dickens related to his friend, John Forster, long afterward, that he felt a deep sense of abandonment at this time; the major themes of his novels can be traced to this period. His sympathy for the victimized, his fascination with prisons and money, the desire

Wednesday, September 18, 2019

Free Essays - All Quiet on the Western Front :: All Quiet on the Western Front Essays

Paul Bäumer, the narrator and protagonist in All Quiet on the Western Front, is a character who develops extensively within the course of the novel. As a young man, he is persuaded to join the German Army during World War I. This three year ordeal is marked by Paul's short, but tragic trek into adulthood as he learns to cope with the trials and tribulations of war. In the wake of a struggle which claims millions, Paul loses his precious innocence as he is further isolated from society and engulfed by bloodshed. Paul's evolution throughout the novel is a result of his having to adapt in order to survive. Paul's experiences in combat shatter his former misconceptions of war; consequently, he gains the ability to reflect on events with his own accord. His naive ideas are severely challenged when he first witnesses the ugly truth of war. "The first bombardment showed us our mistake, and under it the world as they had taught it to us broke in pieces"(13). Paul's first engagement in combat reveals that everything he was taught as a young recruit are lies; consequently, he can now form his own conclusions. Through the ongoing course of the war, Paul comes to grips with the reality of the situation. "They are strong and our desire is strong-but they are unattainable, and we know it"(121). Paul realizes that the soldiers former lives are all but distant memories. His maturing personality gives him the insight to see past the facade of war and expose it for what it truly is. Paul loses his innocence and childhood during the war; as a result, he becomes a man. When Paul and his companions encounter some French women, they exchange food for sexual intercourse. "We unwrap our parcels and hand them over to the women. Their eyes shine, it is obvious they are hungry"(148). Through this transaction, Paul uses the women as an outlet for his sexual urges. Shortly after this rendezvous, Paul receives a leave of absence; however, he finds it difficult to leave the war behind. "Speak to me - take me up - take me, Life of my Youth - you who are care-free, beautiful - receive me again - "(172). Paul can no longer conjure up the feelings of happiness which accompanied his youth, in essence his childhood is lost. The war has stripped Paul of his innocence and taken away everything that he treasured.

Tuesday, September 17, 2019

Exploring Research Methodologies: Positivism and Interpretivism Essay

Exploring Research Methodologies: Positivism and Interpretivism Before a researcher can initiate a research project, they face the confusion and the range of theoretical perspectives, methodologies, methods, and the philosophical basis that encompasses them all. This seemingly meticulous structure for the research process is in fact aimed toward providing the researcher with a ‘scaffolding’, or a direction which they can go on to develop themselves to coincide with their particular research purposes. (Crotty, 1998) Once a researcher has developed a research question they are seeking to answer, they must consider what methodologies and methods they will employ in the research; what theoretical perspective lies behind the methodology; and what epistemology informs this theoretical perspective. (Crotty, 1998) Before continuing it is important to explain these key terms: Epistemology is ‘the branch of philosophy concerned with the theory of knowledge, which seeks to inform us how we can know the world.’ (Jary and Jary: Dictionary of Sociology, 1991) In the context of social research, epistemology is the form of proof one requires to justify a claim to knowledge about the social world. This will have a salient impact on the kind of data one can collect in order to validate their arguments concerning the social world (methodology), as well as the methods one considers in collecting valid data (methods). A researcher’s choice of methods will be conditioned by theoretical perspectives, the way one sees the social world. (Livesey) Researchers of social science use a wide variety of research methods to gain and enhance knowledge and theory. The different types of research methodologies, quantitative and qualitative, are associated with the epistemological and theoretical perspectives the researcher wishes to adopt. This choice the researcher makes determines the way in which research should be conducted. This paper will discuss, critically analyse and compare the epistemological and theoretical perspectives of two research methodologies used for social research: positivism and interpretivism. The various research methods used within the frameworks of each of these will then be discussed. Positivism There are two main types of epistemologies: positivist and anti-positivist. â€Å"Positivist research is an approach which combines a deductive approach w... ... 12.  Ã‚  Ã‚  Ã‚  Ã‚  Love, T. (1998). Value Role in Computer-assisted Designing. Western Australia: Dept of Mechanical and Materials Engineering. 13.  Ã‚  Ã‚  Ã‚  Ã‚  Neuman, L.W. (2000). Social Research Methods: Qualitative and Quantitative Approaches. Sydney: Allyn and Bacon. 14.  Ã‚  Ã‚  Ã‚  Ã‚  Orlikowski, W. J. & Baroudi, J. J. (1991). Studying Information Technology in Organizations: Research Approaches and Assumptions. Information Systems Research, pg 1-28. 15.  Ã‚  Ã‚  Ã‚  Ã‚  Pawson, R. & Tilley, N. (1997). Realistic Evaluation. London: Sage. 16.  Ã‚  Ã‚  Ã‚  Ã‚  Sarantakos, S. (1998). Social Research. Melbourne: Macmillan. 17.  Ã‚  Ã‚  Ã‚  Ã‚  Sharma, B.A.V., Ravindra Prasad, D. & Satyanarayana. (1984). Research Methods in Social Sciences. New Delhi: Sterling Publishers Private Ltd. 18.  Ã‚  Ã‚  Ã‚  Ã‚  Silverman, D. (2000). Doing Qualitative Research. London: Sage. 19.  Ã‚  Ã‚  Ã‚  Ã‚  Vrasidas, C. (2001). Interpretivism and Symbolic Interactionism: â€Å"Making the Familiar Strange and Interesting Again† in Educational Technology Research. In Heinecke, W. & Willis, J. (Ed.), Research Methods in Educational Technology. Greenwich, CT: Information Age Publishing, Inc. 20.  Ã‚  Ã‚  Ã‚  Ã‚  Wainwright, S. P. (2000). For Bourdieu in Realist Social Science. London.

Monday, September 16, 2019

HBS. Tristar

Rainbow Products and the paint-mixing machine A) The paint-mixing machine cost 35. 000 dollars, which is the initial cash outflow. The machine will generate additional cash inflows of 5. 000 dollars for the next 1 5 years. With cost of capital of 12% the Net Present value can be calculated using the NP formula in Excel: NP= – 945. 68 Data Description Rate $0. 12 935,000. 00 Investment $5,000. 00 scofflaws at the end of year $34,054. 32 NP $-945. 68Note that because the cash inflow is constantly reoccurring and occurs for a set period of time the Present value could also be calculated as an Annuity and then added to the initial cash outflow. Doing this calculation, one would expect the result to be the same. Internal Rate of Return, AIR, is the return on the investment when NP is zero. AIR can also be calculated using Excel: Because AIR is less than the cost of capital (12%) and the NP is negative, both methods suggest that undertaking the investment would destroy shareholders value, hush the investment should not be undertaken.The simple Payback period is when the initial investment is recovered, this will occur at the end of year 7, thus the payback period is 8 years. B) For an additional 500 dollars the machine can get service each year to â€Å"as-good-as- new' and the value of the investment can thus be calculated as a perpetuity. A Perpetuity is calculated as: Thus, NP = -35,000 + 37,500 = 2500 NP is positive with the service contract, so Rainbow Products should undertake the investment, as it will increase shareholder value.C) Rainbows engineers have another way of preserving and increasing the capability of the machine, which allows the annual scofflaws to increase by 4%, this requires reinvesting 20% of the annual scofflaws. The Present Value of an end-of-year perpetuity is calculated as: Thus, the NP = -35,000 + 50,000 = 15,000 As the NP of the investment in the machine with engineers added work is 12,500 dollars more than the NP of the investm ent in the machine with â€Å"as-good-as-new contract.

Gore-Tex Case Study

Questions 1. Explain what happened to the Gore-Tex brand after the patent expired. What activity can firms use to try to maintain any advantage developed during the patent protection phase? -When the patent to a company expires, the company would no longer hold the exclusivity of the item’s format. The creators of it gives up the right to ownership of it and other companies are allow to replicate and compete with them on the same product lines. Firms can stay ahead of the game by trying to improve on the foundation of the designs and further advanced their products for future uses. . List some of the wide range of products where the Gore-Tex fabric has been applied. -Gore offers raincoats, shoes, backpacks, pants, jackets, hats and many other types of apparel. 3. It seems that Gore Associates is heavily oriented towards technology; what are some of the dangers of being too heavily focused on technology? -Focusing too much on technology can limit a company’s potential to strive towards other goals. It can set them back by having them spend too much money on R&D for lost purposes instead of focusing on becoming innovated and creative with new things.A well-rounded company should find common ground on innovations and refine the scope how technology can help better them. 4. Cooperatives and share-ownership schemes provide many attractions and benefits, but there are also limitations; discuss these. -The issue with this is that there can be too many people trying to fight to take charge and lead with what they feel is the best route to take with a company. This will limit the scope of the business since nothing is really being done but clashing of superiors. Companies can be torn in various ways because of this cooperative and share-ownership schemes. . What has been the Gore strategy to achieving success in its markets? How is this strategy now being challenged? -I think a great strategy for their success is that they had been able to keep up with the times that they were trying to achieve business in. Such as the demand to be in the outdoors of the mid 90’s, their products like backpacks and hunting gear were greatly accommodating to their consumers. The issue is now their competitors have also been successful at getting through to the customers and they accumulated too much competition.

Sunday, September 15, 2019

Brain Stimulation

The primary aim of this study was to determine the extent to which human MT+/ V5, an extrastriate visual area known to mediate motion processing, is involved in visuomotor coordination. To pursue this, the excitability of MT+/ V5, primary motor, and primary visual cortex was increased or decreased by the application of seven minutes of anodal and cathodal transcranial direct current stimulation (tDCS) in healthy human subjects while they were performing a visuomotor tracking task involving hand movements.The percentage of correct tracking movements increased specifically during and immediately after cathodal stimulation, which decreases cortical excitability, only when V5 was stimulated. None of the other stimulation conditions affected visuomotor performance. The researchers propose that the improvement in performance caused by cathodal tDCS of V5 is due to a focusing effect on the complex motion perception conditions involved in this task.This hypothesis was proven by additional ex periments: When testing simple and complex motion perception in dot kinetograms, it was found that a diminution in excitability induced by cathodal stimulation improved the subject’s perception of the direction of the coherent motion only if this was presented among random dots (complex motion perception), and worsened it if only one motion direction was presented (simple movement perception). The data suggest that area V5 is critically involved in complex motion perception and identification processes important for visuomotor coordination.The results also raise the possibility of the usefulness of tDCS in rehabilitation strategies for neurological patients with visuomotor disorders. Article 2 Environmental stimulation, parental nurturance and cognitive development in humans Martha J. Farah, Laura Betancourt, David M. Shera, Jessica H. Savage, Joan M. Giannetta, Nancy L. Brodsky, Elsa K. Malmud and Hallam Hurt 1. Department of Psychology and Center for Cognitive Neuroscience, University of Pennsylvania, USA 2. Division of Biostatistics and Epidemiology, Department of Pediatrics,Children’s Hospital of Philadelphia and University of Pennsylvania; Department of Epidemiology and Biostatistics, University of Pennsylvania, USA 3. Division of Neonatology, Department of Pediatrics, University of Pennsylvania and Children’s Hospital of Philadelphia, USA Developmental Science 11:5 (2008), pp 793-801 The effects of environmental stimulation and parental nurturance on brain development have been studied extensively in animals. Much less is known about the relations between childhood experience and cognitive development in humans.Using a longitudinally collected data set with ecologically valid in-home measures of childhood experience and later in-laboratory behavioral measures of cognitive ability, the researchers were able to test hypotheses concerning the effects of environmental stimulation and parental nurturance. A double dissociation was found: On one hand, there was a selective relation between parental nurturance and memory development, consistent with the animal literature on maternal buffering of stress hormone effects on hippocampus development.On the other hand, there was a selective relation between environmental stimulation and language development. The results primarily suggest that the same general dimensions of early life experience identified as important in animal studies of brain development are also important for humans. In particular, the relation between the composites measuring parental nurturance and later memory ability, which have no common-sense connection, is consistent with studies of experience and brain development in animals. The present findings thus provide an important bridge between the study of neurocognitive development in animals and humans.Secondarily, variation in the childhood experience of healthy humans bears a systematic relationship to cognitive development, and this relationship is more selective and specific than simply better environments predicting better development. Memory development is predicted by parental nurturance but not environmental stimulation, whereas language development is predicted by environmental stimulation, but not parental nurturance. Finally, these effects represent a possible mechanism by which socioeconomic status is associated with intellectual attainment. Article 3 MEG Study of Short-Term Plasticity Following MultipleDigit Frequency Discrimination Training in Humans Lichan Liu and Andreas A. Ioannides Laboratory for Human Brain Dynamics, RIKEN Brain Science Institute (BSI), 2-1 Hirosawa, Wakoshi, Saitama, Japan. Brain Topography, Volume 16, Number 4, Summer 2004 The researchers trained four right-handed male subjects to detect small changes in the frequency of 21 Hz electrical stimulation applied to digits 2+3+4 of the right hand for four hours. Before and after the training, magnetoencephalographic (MEG) signals were recorded whe n the stimulation was applied to digit 2-5 separately using a whole-head MEG system.Tomographic analysis was applied to the MEG data to track the evolution of activity over the entire brain every 1. 6 ms and evaluated the change for each digit before and after the training. In summary: (1) subjects improved in discrimination performance with training; (2) activations were identified in the left primary somatosensory (L-SI) and medial parietal precuneus (PCu) areas, but no systematic changes were observed in location and strength of activation of these two areas; (3) after training in L-SI, the 21Hzspectral power increasedfor digits 3 and 4 over the stimulation period, while the 10 Hz spectral power increased for digit 3 around stimulus onset and offset; (4) only digit 3 showed significant change of correlation between L-SI and PCu areas around the stimulus onset and offset, coincident with the increased 10 Hz spectral power. The results suggest that short-term plasticity is associat ed with changes in timing and interaction between cortical areas. DiscussionThe main finding of the first study is that cathodal tDCS applied to the left V5 improved performance in a visuomotor coordination task that encompassed both dynamic, high-resolution perception and selection of motion predetermined by a moving target. Stimulation of the primary visual cortex and the left motor cortex did not result in significant changes in performance, nor were the reaction times in the random dot kinetogram task significantly affected. These results suggest that tDCS indeed modified visual motion perception and motor performance.Common sense says that childhood experience affects cognitive development. Yet common sense does not say which psychological or brain functions will be affected by experience, or which specific aspects of childhood experience will exert an effect. The second study attempts to address these issues empirically with a unique longitudinally collected data set including ecologically valid in-home measures of early childhood experience and later laboratory measures of cognitive function. The effects found were strikingly selective and, in addition to their statistical significance, were substantial in size.In the third study, functional rather than anatomical short-term plastic changes in the brain induced by the frequency discrimination task were identified. After training, no new activated areas or expansion of activated areas or systematic increases in activation strength in any one specific area were observed. Instead, increased spectral power around 21 Hz in L-SI for both trained digits 3 and 4 for all 4 subjects was observed. Furthermore, for digit 3, increased spectrum power at 10 Hz in L-SI for all 4 subjects between map I and II around thestimulus onset and offset was observed. Conclusion After analyzing the above three methods of brain stimulation, one can come to the conclusion that the first study was found to have the maximum results i n term of invoking activity of the stimulated areas. The study stands out among the other two not just for its methodology, but also for its high reliability and accuracy. Hence, transcranial direct current stimulation (tDCS) can be considered to be the best method of brain stimulation.

Saturday, September 14, 2019

Raed Hassan nabawy Essay

Obtaining an opportunity in your organization. I hope this will greatly improve my technical skills and further develop my experience. Experience NOV 2007- SEP 2012 unton National sank Dubai (IJAE) Senior Relationship Officer As Relationship Manager you will help people get the most from their money, make the right choices and make their money work for them. Often working for a bank or building society, you’d be the number one resource for customers to get advice on their account. This would range from their account details to advice on the best financial service for them. You’d have to assess each individual customer’s needs and accounts as well as generating new business and clients. Speaking with customers would be a large part of your day to day work, either over the phone, on the internet or face to face. You’d set up a meeting with them, discuss their financial needs and details and keep records, negotiate over financial products and keep your customers well informed and advised at all times. It would be important for you to keep up to date with the latest products, services and financial laws so you can give reliable advice. You will also be expected to meet sales targets, by offering them to clients and also drawing in new ones to increase business. 2004-2007 Mercedes-Benz Shuwaikh Kuwait Sales & Customer Service Making all invoices for the vans and trucks. Office Administration Responsible for shipmen for all vehicles and vans. Selling Vans and Trucks during Sales agents’ vacation. Correspondence with the HO in Germany for shipment. Handle with Clint after sale Solve the pro Education Languages Soft Skills blem tor customer Courses Studies Computer: Master Degree (MBA) Still study Graduation date : July 2003 College: modern academy Department: business administration English Grade: good with honor. Rank: Third Arabic : Mother Tongue English: Fluent French: Basic Outgoing personality. Good communication ; Organizational skills. Natural or professional selling skills. Excellent Interpersonal ; presentational skills. Organized, able to work under stress. Teachable, tactful and self-motivated. Ability to work in a group or individually according to the Job Body Language and Charisma , Union National Bank Introduction in Union National Bank English Grammar for everyday use, Union National Bank How to attract your prospect? , Union National Bank Selling Smarter, Union National Bank Sales Steps, Union National Bank Microsoft Windows Microsoft Office (Access, Word, Excel, PowerPoint) requirements

Friday, September 13, 2019

What would the impact on globalisation be if the internet collapsed Essay

What would the impact on globalisation be if the internet collapsed for a prolonged period of time - Essay Example iduals had to consume goods and services imported from other countries; globalisation in the 1990’s also improved the capability of individuals to influence political institutions both within and outside the frontiers of their own country (Bimber 2002). Several analysts claim that the Internet is a dynamic society. Probably not unexpectedly as it provided the originality of the new digital media, there is trivial agreement on the specific changes that occurred. The unparalleled technical innovations that led to the creation of the Internet have been thought about from various views and perspectives, above all by professionals such as engineers and computer scientists. However, a substantial aspect of the success of the Internet, the production and development of management, and authority arrangements that have facilitated the interconnection of geographically scattered computer units throughout the globe, is still something of an enigma (Cooke 1993). The processes that government officials, technocrats, entrepreneurs, and other elites in the area of leadership from multiple and diverse autonomous nations have been capable of influencing co-operations in an exceptional short period of time. These processes have prompted co-operation s to design and enforce policies and directive for the relatively stabilised functioning of the Internet, within intricate business-related and legal structures at the global lever are still under study (ibid). This research study aims to develop sound and well-documented answers to the possible impact of the collapse of the Internet and the affect this would have on globalisation, specifically in international politics and democracy. Several analysts have coined the term â€Å"electronic democracy† (Dimaggio 2002, 307) to imply two separate meanings. The first is the scheme and operation of digital information and communication technologies to improve democratic political means. The second is a new level of democracy, a level during