Wednesday, October 30, 2019

Hesiod's Theogony Essay Example | Topics and Well Written Essays - 250 words

Hesiod's Theogony - Essay Example We can therefore conclude that the cosmogony, as well as the theogony, is a representation of the universality of the world. These are representations of the realistic order of the world. According to mythology, the universe has gone several states from generation to generation and yet humans are still considered part of creation that only serve the balance and harmony of creation. We have no authority or power that could surpass the power of the gods. Theogony and cosmogony are realizations of the governing of things in the universe. Humans are a part of creation and that they have the authority to manage other creations. They are considered more special compared to other worldly creatures. On the contrary, they cannot be as powerful as the gods. They cannot be on the same ground as the gods. The story of Prometheus was an example of this governing and ordering of things. He was punished for his disobedience, and this first part of cosmogony just shows how inferior or powerless humans are compared to the gods. The place or position of humans whether in Greek mythology or the Genesis story of creation expresses authority and governess over the other creations on earth. It is more definite than the story of power struggle among gods. As a whole, humans are the center of balance and harmony in the real world.

Monday, October 28, 2019

Write a Summary of 350-700 Words Identifying Essay Example for Free

Write a Summary of 350-700 Words Identifying Essay For Sigmund Freud, the founder of psychoanalysis, our personality is rooted in the dynamics of our unconscious; all the ideas, thoughts, and feelings of which we are normally unaware. Freud identified sexual and aggressive instincts as the primary unconscious drives that determine human behavior. According to Freud, personality is made of three structures: the id, the only personality structure present at birth, operates in the unconscious according to the pleasure principle, meaning it tries to obtain immediate pleasure and avoid pain. The ego, the id’s link to the real world, controls all conscious thinking and reasoning activities and operates according to the reality principle. It tries to delay satisfying the id’s desires until it can do so safely and effectively in the real world. The superego acts as the person’s moral guardian or conscience and helps the person function in society (Morris, G. , Maisto, A. , 2002). It also compares the ego’s actions with an ego ideal of perfection. In Freud’s view, when the ego is unable to control impulses from the id in a way that is acceptable to the superego, it experiences anxiety and may resort to using defense mechanisms to reduce the discomfort caused by the anxiety. Carl Jung believed that the unconscious consists of two distinct components: the personal unconscious, which contains an individual’s repressed thoughts, forgotten experiences, and undeveloped ideas; and the collective unconscious, a subterranean river of memories and behavior patterns flowing to us from previous generations. Jung also believed that people generally exhibit one of two attitudes toward the world: Extroverts are interested in other people and the world at large, whereas introverts are more concerned with their own private worlds (Morris, G. , Maisto, A. , 2002). Jung further divided people into rational individuals, who regulate their behavior by thinking and feeling, and irrational individuals, who base their actions on perceptions. For Carl Rogers, people develop their personalities in the service of positive goals. The biological push to become whatever it is that we are capable of becoming is called the actualizing tendency. In addition to trying to realize our biological potential, we attempt to fulfill our conscious sense of who we are, which Rogers called the self-actualizing tendency (Morris, G. , Maisto, A. , 2002). A fully functioning person is someone whose self-concept closely matches his or her inborn capabilities. Fully functioning people were usually raised with unconditional positive regard, or the experience of being valued by other people regardless of their emotions, attitudes, and behaviors.

Saturday, October 26, 2019

Essay --

Memory in humans is a complex process and is divided into multiple components. Different areas of the brain are responsible for varying functions relating to memory such as short term memory and long term memory, which can further be broken down into subcategories such as emotional and semantic memory. Using fMRI, brain regions that participate in memory can be pinpointed and changes to memory that are resultant of aging or other neurological diseases and the pathology of the underlying brain structures can be detected as well. An example of a study done on memory was performed by Todd and Marois, with a goal of observing the role of the posterior parietal cortex in visual short term memory. To achieve this, seventeen subjects were given a visual delayed match to sample task during which the subjects were first shown a display of one to eight colored discs and after a timed delay had to indicate whether a probe disc matched one of the discs from the initial sample. In addition, to reduce any effects of the subjects using verbal strategies, the subjects had to simultaneously maintain a two digit number across the delay period. The results showed that the accuracy of responses decreased as the number of discs presented at the start of the trial increased. Moreover, it was established that the average visual short term memory capacity was capped at three to four objects. fMRI data was collected and analyzed from three brain regions: the intraparietal sulcus/inferior occipital sulcus (IPS/IOS), the ventral-occi pital cortex (VO) and the anterior cingulate cortex (AC). Activity in the IPS/IOS seemed to increase as the load of the task increased and it was shown that this region was active during maintenance and encoding. On the other h... ...Alzheimer’s, the roles cognitive reserve and compensatory recruitment can be observed. For example, education level and overall intelligence might alleviate some of the cognitive and memory deficits seen with age and disease related brain changes. Compensatory recruitment, such as bilateral activation of frontal regions on a verbal memory task compared to the left-lateralized activation seen with younger adults during the same task, is observed in older adults as well. These articles illustrate the point that there are multiple memory systems with differing functions. Taken together, these findings help explain why patients with brain damage to different regions do not always exhibit the same neurological deficits associated with memory. The use of fMRI has been extremely successful in identifying which brain regions are necessary for the multiple types of memory. Essay -- Memory in humans is a complex process and is divided into multiple components. Different areas of the brain are responsible for varying functions relating to memory such as short term memory and long term memory, which can further be broken down into subcategories such as emotional and semantic memory. Using fMRI, brain regions that participate in memory can be pinpointed and changes to memory that are resultant of aging or other neurological diseases and the pathology of the underlying brain structures can be detected as well. An example of a study done on memory was performed by Todd and Marois, with a goal of observing the role of the posterior parietal cortex in visual short term memory. To achieve this, seventeen subjects were given a visual delayed match to sample task during which the subjects were first shown a display of one to eight colored discs and after a timed delay had to indicate whether a probe disc matched one of the discs from the initial sample. In addition, to reduce any effects of the subjects using verbal strategies, the subjects had to simultaneously maintain a two digit number across the delay period. The results showed that the accuracy of responses decreased as the number of discs presented at the start of the trial increased. Moreover, it was established that the average visual short term memory capacity was capped at three to four objects. fMRI data was collected and analyzed from three brain regions: the intraparietal sulcus/inferior occipital sulcus (IPS/IOS), the ventral-occi pital cortex (VO) and the anterior cingulate cortex (AC). Activity in the IPS/IOS seemed to increase as the load of the task increased and it was shown that this region was active during maintenance and encoding. On the other h... ...Alzheimer’s, the roles cognitive reserve and compensatory recruitment can be observed. For example, education level and overall intelligence might alleviate some of the cognitive and memory deficits seen with age and disease related brain changes. Compensatory recruitment, such as bilateral activation of frontal regions on a verbal memory task compared to the left-lateralized activation seen with younger adults during the same task, is observed in older adults as well. These articles illustrate the point that there are multiple memory systems with differing functions. Taken together, these findings help explain why patients with brain damage to different regions do not always exhibit the same neurological deficits associated with memory. The use of fMRI has been extremely successful in identifying which brain regions are necessary for the multiple types of memory.

Thursday, October 24, 2019

Computer Studies

1 GCSE Computing Revision Booklet This booklet has been created to provide an overview of each of the topics that you need to revise. Each section is broken down and guidance given on what you need to know. Use it in conjunction with your own revision techniques, e. g. mindmaps, to prepare for the exam. Name: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 Fundamentals of Computer SystemsYou need to be able to: (a) define a computer system (b) describe the importance of computer systems in the modern world (c) explain the need for reliability in computer systems (d) explain the need for adherence to suitable professional standards in the development, use and maintenance of computer systems (e) explain the importance of ethical, environmental and legal considerations when creating computer systems. What is a computer sys tem? At its very basic, a computer system nothing more than an input, a processor and an output. InputProcessor Output A computer system will usually have some storage capability and more often now – a way of communicating with other devices. Computers are all around us and I’m not just talking about your desktop or laptop computer. Your â€Å"smartphone†, your games console, your ipad, even your Sky+ or freeview recorder is a computer system of sorts. 3 Computer systems are integral parts of our lives. Think about all the computer systems you or your parents use on a daily or weekly basis: Running washing programmes and sensing when clothes are dry.On-board computers to control everything from engine efficiency to voiceactivated MP3/Bluetooth hands-free system. Cashless catering system in school to add and subtract money from your account. Self-service checkouts in supermarkets that scan, weigh, take payment and give change. Contactless card payment systems whe re a small RFID (radio frequency ID) tag is embedded into the card and read when the card is near. RFID technology – often used in library books and shops to detect theft, also has future applications in â€Å"smart† clothes and food products.Imagine the RFID tag in your clothes tells the washing machine how to wash them. Or a smart fridge that knows when the milk is past it’s sell-by date and adds it to your online shopping list. Since we rely so much on technology there are huge problems when it goes wrong! If a supermarket checkout system goes down this could result in lost sales of thousands of pounds. However, if an automated system, like those onboard aircraft fails then it could end in disaster! 4 Why do we need to use the same professional standards when developing and maintaining computer systems?Without standards to adhere to we risk developing systems that are not compatible with each other. Would you be happy if your Nokia mobile could only call othe r Nokia mobiles? Standards also improve the quality of the computer system and its maintenance by ensuring that best practice is followed and people don’t cut corners. Considerations when creating computer systems: The Data Protection Act 1998 provides protection for all information stored on a computer system. It requires the person who owns the system to store the information securely and only use it for the purpose it was originally gathered for, e. . the school holds data on you for the purpose of your education; it cannot sell this data to companies who may wish to sell you things. The speed of progress means that many gadgets become old and obsolete quite quickly. This means there are potentially stockpiles of old technology which could end up in landfill. Many companies now recycle these by selling reconditioned devices to other countries or cannibalising the parts to be used again. Websites like Google use huge server-farms around the world. These buildings are full o f computers running 24/7.There is an impact on the environment from the huge amount of electricity needed to run these server-farms. Technology enables us to do many things. But are they always right? Google’s Street View caused controversy when it was launched after people said that taking photos of their houses was an invasion of privacy. Social networking sites, like Facebook, have made it easier to share information but have made it difficult to set privacy settings. You can now be tracked using GPS technology and Facebook places! Is this the â€Å"Big Brother† state? 5 Computer SoftwareYou need to be able to: (a) explain the need for the following functions of an operating system: user interface, memory management, peripheral management, multi-tasking and security (b) describe the purpose and use of common utility programs for computer security (antivirus, spyware protection and firewalls), disk organisation (formatting, file transfer, and defragmentation), and sy stem maintenance (system information and diagnosis, system cleanup tools, automatic updating) (c) discuss the relative merits of custom written, off the shelf, open source and proprietary software.Operating System functions Memory management User interface The OS manages the transfer of data between the CPU, RAM and main storage (e. g. hard drive) The OS provides the user with a way of controlling the functions of the computer without resorting to machine code. It can be graphical (GUI), e. g. Windows or text-based [no mouse] (CLI – Command Line Interface), e. g. MSDOS. The OS manages the input and output devices connected to the computer, including things like keyboard, mice and printer. The OS allows more than one program to be run at once so users can switch back and forth between applications easily.The OS provides security features to restrict access to the system or particular files. Peripheral management Multi-tasking Security When trying to remember the functions of a n Operating System – think MUMPS! Memory mgt, User interface, Multi-tasking, Peripheral mgt and Security. 6 Utility programs Type Security Purpose Detects and protects the computer against virus threats. Quarantines infected files. Spyware Detects and removes spyware (small protection programs that quietly monitor what you are doing) Firewall Restrict communication in and out of the computer from the applications that are running.Formatting Sets up a hard drive, memory stick or card into a format that the computer can use to store/retrieve data. The process of formatting erases any data that was previously on the storage medium. File Transfer Allows movement of files from one location to another, either locally or via memory stick/FTP to another computer. Defragmentation Re-organises the data on the hard drive to improve read/write access times. System info & Provides information about the diagnosis system in order to help with diagnosis of problems. System cleanup Removes te mporary files and tools compresses/archives unused files to increase free storage space.Automatic Uses the Internet to check the OS updating is up-to-date and applies software patches/fixes as necessary. Program Antivirus Security Security Disk Operations Disk Operations Disk Operations System Maintenance System Maintenance System Maintenance 7 Software development Custom written Developed specifically for a particular organisation. (a. k. a. bespoke/inAdv: custom made to meet exact purpose house) Disadv: very expensive and need technical expertise to develop. Off-the-shelf Developed by a software company to be sold to the general public. Adv: cheaper than developing it yourself and tech support available.Disadv: inflexible – might not do everything you want it to do. Open source Written by general public for everyone else to use. Source code provided so software can be tweaked. Adv: allows anyone to use/adapt the software to meet their needs, collaborative approach to develo pment which can lead to better quality software. Disadv: by making source code available to all, provide opportunity for people to â€Å"take advantage† of software installed on users’ computers compromise security. Proprietary Written by developer and allowed to be used by others but with certain restrictions, e. . can’t adapt software. Source code is hidden. Adv: can allow for different versions of same software, e. g. educational version with limited functionality or fullfunctionality version costing more. Disadv: source code cannot be inspected so may contain spyware or other malicious features within the software. 8 Computer Hardware Definition: Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners.The internal hardware parts of a computer are often referred to as components, wh ile external hardware devices are usually called peripherals. Source: www. techterms. com Inputs and Outputs (Peripherals) You need to be able to: understand the need for input and output devices (a) (b) describe suitable input devices for a wide range of computer controlled situations (c) describe suitable output devices for a wide range of computer controlled situations discuss input and output devices for users with specific needs. (d) Inputs and outputs are the computers way of communicating with us – the user.Without inputs or outputs our system would be quite limited. Imagine a calculator which didn’t allow you to type in numbers or display the answer on the screen! Here are some of the common input devices used: Keyboard The keyboard, along with the mouse, is one of the most used input devices. Once you get the hang of where the keys are, it allows people to enter textbased data quickly into the computer. A numerical keypad (found on most keyboards on the right) provides a fast way for accountants and people who work in finance to enter numbers. 9 There are some interesting variations on the keyboard:Roll-up keyboard (portable – can be rolled up and stuffed in laptop bag) Wireless keyboard (no need for messy wires, frees up user needing to be near computer) Laser Projection (projects a keyboard layout on to any surface; sensors detect which â€Å"keys† have been pressed) Mouse The computer mouse is another common input device. It allows the user to interact with the software on screen. The mouse is quite versatile, with at least two buttons and the ability to move in any direction. However, it can be difficult to be precise – e. g. drawing using the mouse is quite hard! Mice have also undergone a few changes over the years as well:Laptop touchpad (touch-sensitive pads that allow the mouse to be controlled by just a finger) Trackball (the user moves the pointer on-screen by moving rolling the ball; the unit doesnâ€℠¢t move around like the mouse) Optical Mouse (old mice used balls which used to get clogged with dirt and grease – new mice use small cameras to detect movement instead). 10 Other Input Devices Scanner Scanners convert physical documents and photos into digital format. They can be used in conjunction with special software to automatically read handwriting and convert it into computer text. This is called Optical Character Recognition.Some tickbox forms are scanned in, like the Census form or your multiple choice Science exams; this is called Optical Mark Recognition. Touchscreen Touchscreens have been around for years in one form or another. The latest versions, like the Apple ipad interface use multi-touch technology to allow greater control. Microphone Microphones convert analogue sounds into a digital format that the computer can understand and playback. Sounds are usually recorded as . wav or . mp3 files (the latter uses compression to make the file size smaller and is mo re likely to be used to store music tracks).Digital Camera Digital cameras convert live images into digital format. Photos are usually stored as JPEG files. The quality and size of the picture is determined by the number of megapixels the camera is capable of detecting, e. g. photos taken with an 8 megapixel camera are made up of 8 million pixels. 11 Webcam Webcams capture live video feeds and using appropriate software can then transmit those across a network. Sensors Sensors measure the physical world and translate that into a digital format that a computer can understand. There are various sensors that detect ll manner of things: movement, light, heat, moisture, gases (e. g. carbon monoxide levels), location (GPS), etc. For example, the iPhone has an accelerometer so it knows which way round it is to ensure the screen is rotated the correct way. Output Devices Printer Printers produce physical documents and photos from digital files. Most photo printing is done by inkjet printers which can be expensive to run. Laser printers use toner cartridges which are more expensive initially but can print more pages before being replaced. 12 Monitor/screen Monitors/screens provide the visual output from the computer system.Most computer monitors and mobile phones use colour LCD (liquid crystal display). Speakers Working the opposite way to the microphone input, the speaker converts digital sound into analogue waves. 3D Printer A 3D printer uses lasers and a special kind of plastic to build physical 3D shapes from drawings made using CAD software (computer aided design). The object is built up layer by layer. The whole process can take many hours before the final product is finished. They are often used for creating prototypes in manufacturing, e. g. Dyson uses them to create prototype parts for their products.They are still very expensive but the price is coming down. Motor A motor can be driven with precision by a computer system. Often used in manufacturing, e. g. bu ilding cars, motors are used to control robotic arms. 13 Input and output devices for specific needs Keyboards have been adapted for users with limited movement in their arms/hands. A keyboard designed to minimise the movement of your hands. Trackballs have also been used where users only have limited motor ability. They can be used by hands or feet, like the one below: A foot-operated mouse, ideal for people with limited/no mobility in their arms.For quadriplegic users, there are two alternatives to using the mouse or keyboard. The first is voice-recognition; this involves the user reading a passage of text from the screen so the computer â€Å"learns† their voice pattern. They can then use special software to control the computer using voice commands. The technology is getting better but can still make mistakes. The second is eye-tracking which uses small cameras mounted on the monitor to detect eye movement and move the cursor to the point where the user is gazing. A mouse click is made by blinking slowly.Stephen Hawking uses a special device to allow him to communicate. An infra-red sensor detects twitches in the cheek muscle below his eyes in order to enter words and then his device generates a computer synthesised voice to read them out loud. 14 Internal Hardware Devices (Components) Central Processing Unit (CPU) You need to be able to: (a) state the purpose of the CPU (b) describe the function of the CPU as fetching and executing instructions stored in memory (c) explain how common characteristics of CPUs such as clock speed, cache size and number of cores affect their performance.The purpose of the CPU is to Fetch and Execute instructions stored in memory. It acts as the brain of the computer and controls the rest of the system. INPUTS and OUTPUTS CPU RAM 15 Fetch Execute Cycle (using Little Man Computer) Download the software: http://www. cs. ru. nl/~erikpoll/III/lmc. Allows you to quit out of the current program and go back to the Start This d isplays which phase of the fetch/execute cycle we are currently in. The program that is currently being carried out. The current instruction is the one in line with the phase display. Provides the name of the current instruction, along with it's op code and operand.This explains what the little man is doing at each stage as he follows the program. Fetch phase Before the little man can carry out an instruction, he needs to find out which instruction he has to carry out. He does this by first getting the value from the program counter (The thing that looks like a green mushroom in a block of wood), and then fetching the value from the corresponding address in memory. The Program Counter The little man uses the value in the program counter to decide which address in memory he should get the next instruction from.After getting the value, but before going and getting that instruction, he increments the program counter, so that it has the correct value in it when he visits it next time. M emory Memory can be used to store programs, and data. In the fetch phase of the fetch execute cycle we are only interested in the fact that we can get instructions from the memory. 16 Execute phase Once the little man knows which instruction he is going to perform, he has to set about actually doing it. This is the ‘Execute' phase of the fetch execute cycle. For each instruction the little man will perform a series of tasks.For instance, for an input instruction, the little man will go to the input tray, take the value he finds there, and go and put it into the calculator. For an add instruction, he will take a value from memory, and add it to the value presently in the calculator. Once the execute phase is complete, the little man will start the cycle again, and head to the program counter to get the value of the next instruction he has to fetch. The Input and Output trays These are what we (the user) use to communicate with the little man. We provide him with data via the in put tray, and when he's ready, he provides us with data via the output tray.Calculator (Arithmetic Logic Unit – ALU) On a ‘real' computer, this would be the Arithmetic Logic Unit (ALU). It’s basically a calculator that will carry out arithmetic operations. Memory Memory is accessed during the execute phase when we need to store or access data. It is possible to overwrite your programs when putting data into memory though, so be careful where you put it. Following a program (Decoding instructions) The program is a series of instructions made up of an op code and operand (either data or the address where data is stored).For example: Op code Operand 1 2 3 4 5 6 7 800 801 802 9 Load Store Add Subtract Input Output Halt Skip If Negative Skip If Zero Skip If Positive Jump 2 means â€Å"Store† 2 99 99 refers to the memory address where little man should store the data. These can be stored as binary bit patterns, e. g. 10 could refer to the op code (2) above and 1 1000011 could refer to the memory address (99). Remember 2 in binary is 10 and 99 is 11000011. This would give the bit pattern for the above instruction as 1011000011 Q. How does little man (CPU) know the difference between data or an instruction?It all depends on which phase of the cycle the CPU is in, e. g. in the Fetch phase the CPU knows it is an instruction. In the Execute phase the CPU knows it is data. Op codes understood by LMC 17 Characteristics which affect performance Clock Speed This is the number of cycles that the CPU can complete in one second (measured in Hertz or Hz) A faster clock speed means the CPU can process more instructions per second. For example a 1MHz processor can process 1 million instructions a second; whereas a 1GHz processor can do 1000 million instructions in the same time.This is the A larger cache size means holding area for more data can be held and data from the it’s less likely that any cycles are wasted. A RAM. It ensures the CPU smaller cache size and is always busy fast clock speed may with data. result in a bottleneck between the RAM and CPU. A dual-core processor or This is the quad-core processor is 2 number of processing cores to 4 times faster than a conventional chip as they the CPU has. A can process simultaneous dual-core has instructions. two and is able to process two instructions simultaneously in the same cycle. Cache sizeNumber of Cores It is important to balance all of the above to avoid â€Å"over-speccing† one area and creating bottlenecks elsewhere. 18 Memory You need to be able to: (a) describe the difference between RAM and ROM (b) explain the need for ROM in a computer system (c) describe the purpose of RAM in a computer system (d) explain how the amount of RAM in a personal computer affects the performance of the computer (e) explain the need for virtual memory (f) describe cache memory (g) describe flash memory (h) discuss how changes in memory technologies are leading to innovative c omputer designs.RAM and ROM Both are needed in a computer system but for different reasons. In a computer computer, ROM (Read Only Memory) is used to store all the instructions (the BIOS – Basic Input/Output System) to get the computer up and running. It seeks out the amount of memory, input and outputs available to it and then loads up the operating system. In some computer systems, like your washing machine, the ROM stores the software to control the hardware, as well as data such as cooking/washing times etc.RAM (Random Access Memory) is used as temporary storage for instructions and data between the inputs, outputs, secondary storage (e. g. hard drive) and CPU. The larger the RAM, the more instructions/data can be held in quick access memory without needing to use Virtual memory; this can improve performance. Random Access Memory Read Only Memory Volatile (forgets everything when power switched off) Non-volatile (remembers content even if power switched off) Can be writte n to and read from Can only be read from (not written to) Usually measured in Gigabytes (Gb) For the BIOS, usually measured in Kilobytes (Kb) 9 Virtual Memory Depending on the size of the RAM, it is not always possible to store all the running programs in the RAM at once and the computer will start running low on memory and slow down. This is where virtual memory comes in. It stores the data that the RAM isn’t actively using on the hard drive to free up the RAM. Then, when the CPU needs the data it pulls it back from the virtual memory on the hard drive. As far as the CPU is concerned, all the programs are running from the RAM. The operating system sets up a page file on the hard drive to be used for virtual memory.This is usually set at twice the size of the amount of RAM, e. g. 1GB of RAM should have a 2GB page file. Cache Memory This has been explained in the CPU section on page 17. Flash Memory Flash Memory is often referred to as solid-state storage, which means that the re are no moving parts. It’s similar to RAM but is non-volatile which means when the power is cut off, it still remembers the content). Flash memory is used in USB memory sticks and memory cards for digital cameras and some games consoles, e. g. Sony PSP.Future developments in Memory technologies Physical Size & Capacity Costs Speed Power Memory chips have become more compact (storing more bits per chip) which has lead to smaller computing devices and larger capacities. The cost of memory has fallen which means it is now affordable to have large amounts of RAM available. Read/write times are improving which mean faster access and better performance. Memory chips are more power-efficient meaning portable devices work for longer between charges and batteries can be smaller and lighter. 20 Secondary StorageYou need to be able to: (a) explain the need for secondary storage (b) describe common storage technologies such as optical, magnetic and solid state (c) select suitable stora ge devices and storage media for a given application and justify their choice using characteristics such as capacity, speed, portability, durability and reliability. Secondary storage is needed for when we want to store files permanently or semi-permanently. We might want to transfer files between computers by using portable secondary storage media. Storage TechnologiesCodes data using microscopic dips on the surface of the disc. Units Optical Codes data using small changes in magnetic fields. Magnetic Uses non-volatile memory chips to store bits of data Solid State Candidates should be able to: (a) define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte Bit 1 Nibble 4 bits Byte 8 bits Kilobyte (Kb) 1,024 bytes Megabyte (Mb) 1,024 kilobytes Gigabyte (Gb) 1,024 megabytes Terabyte (Tb) 1,024 gigabytes 21 Storage Media Comparison Storage Medium CD Method Optical Capacity Medium 650-700Mb Small 1. 4Mb Large 1Gb to 2+ Tb Speed Fast access Portability Lightweight and fl at Lightweight and flat Heavy and not designed to be carried around. Requires integrating into computer system. Medium-weight. Plugs into computer USB or Firewire port. Lightweight and small. Durability and Reliability Easily scratched and will then not work. Can only be written to once. Can be snapped. Can be damaged by strong magnets or heat. Quite reliable but can crash – when the read/write head crashes into the platter. Sometimes happens on laptops when dropped. Can be damaged by magnets.Same concerns as internal hard drive. Floppy Disk Magnetic Slow access Internal Hard Disk Magnetic Fast access (dependent on speed of motor RPM – rotations per minute) Portable Hard Disk Magnetic Large 40Gb to 640Gb Medium-fast access (dependent on connection method, e. g. USB cable) Flash drive (USB stick or memory card) Blu-ray disc DVD (Digital Versatile Disc) Solidstate Optical Optical Medium/Larg Medium-fast access e (dependent on connection 1Gb to 64Gb method, e. g. USB cabl e or card reader) Large Fast access 50Gb Large Fast access 4. 7Gb Not affected by magnets.Quite hardy. Can be dropped without damaging contents. Easily scratched and will then not work. Easily scratched and will then not work. Lightweight and flat. Lightweight and flat. 22 Binary Logic You need to be able to: (a) explain why data is represented in computer systems in binary form (b) understand and produce simple logic diagrams using the operations NOT, AND and OR (c) produce a truth table from a given logic diagram. Computers use binary as it's a lot simpler. Each CPU is made up of millions of transistors which can only have two states (ON/OFF).Anything can be converted into a binary number so a computer can understand, process and store it. NOT Gate NOT Truth Table Input Output 0 1 1 0 Flips the input, e. g. 0 becomes 1 and 1 becomes 0. AND Gate a b Waits for 1 on both inputs before outputting a 1. AND Truth Table Input Input Output a b 0 0 0 0 1 0 1 0 0 1 1 1 OR Gate a b Wait for 1 on either input before outputting a 1. OR Truth Table Input Input Output a b 0 0 0 0 1 1 1 0 1 1 1 1 You can practice with NOT, AND and OR gates using the following website: http://logic. ly/demo/ 23 Representation of data in computer systemsNumbers You need to be able to: (a) convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa (b) add two 8-bit binary integers and explain overflow errors which may occur (c) convert positive denary whole numbers (0-255) into 2-digit hexadecimal numbers and vice versa (d) convert between binary and hexadecimal equivalents of the same number (e) explain the use of hexadecimal numbers to represent binary numbers. Denary and Binary conversions Numbers greater than 1 can be represented in binary by using more bits. e. g. 129 can be represented in 8 bit (byte) binary as 10000001.Denary Binary 128 1 64 0 32 0 16 0 8 0 4 0 2 0 1 1 This means that if you put a 1 on each increased by double bit (i. e. 11111111) the highest denary for each new bit added to the left. number 8 bits (a byte) can store is 255; 128+64+32+16+8+4+2+1 = 255. Notice how the number To convert binary into denary, just add together the denary numbers above each bit that has 1 in it, e. g. 10000001 = 128 + 1 = 129. To convert a denary number into binary, find the highest value that will go into it and then continue down the number of bits with the remainder until there is nothing remaining. 4 For example, to convert 44 into binary 8-bit format: 44 is smaller than 128 and 64 so we place 0s in those bits: Denary Binary 128 0 64 0 32 does go into 44 with remainder of 12, so we place a 1 in that bit: Denary Binary 128 0 64 0 32 1 The remainder of 12 is smaller than 16 so we place a 0 in that bit: Denary Binary 128 0 64 0 32 1 16 0 8 does go into 12 with remainder of 4, so we place a 1 in that bit: Denary Binary 128 0 64 0 32 1 16 0 8 1 4 does go into 4 with with nothing remaining, so we place a 1 in that bit: Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 nd 0s in all the remaining bits: Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 2 0 1 0 Therefore 44 as an 8-bit binary number is: 00101100. 25 Adding two binary numbers together Adding two binary numbers together is not as scary as it sounds or looks. It uses the same principles at the denary number system (Hundreds, Tens, Units). For example: Work from right to left, like you do when adding denary numbers using HTUs. 00010010 + 00010100 0+0=0 0+0=0 0+0+1 1+1=0 0+0=0 0 0 11 0 0 1 1 0 0+0=0 1+0=1 0+1=1 (carried over) = 1 (carry 1)Let’s convert it back into denary to check it is correct: Denary 128 Binary 0 16 + 2 = 18 Denary 128 Binary 0 16 + 4 = 20 Denary 128 Binary 0 32 + 4 + 2 = 38 64 0 32 0 16 1 8 0 4 0 2 1 1 0 64 0 32 0 16 1 8 0 4 1 2 0 1 0 64 0 32 1 16 0 8 0 4 1 2 1 1 0 So as 18 + 20 are 38. Then we know the binary calculation is correct! 26 Hexadecimal Numbers Programmers started to use hexadecimal to reduce mistakes and make it easier for them to underst and than using lots of 0s and 1s. Denary and hexadecimal conversions Hexadecimal uses a base 16 system = 0-9 and then A-F.That means that the denary number 15 is equal to F in hexadecimal. The denary number 16 is equal to 10 in hexadecimal (which means 1 lot of 16) The highest denary number represented in 8-bit (byte) binary is 255 and was represented by 11111111. In hexadecimal this would be represented as FF (15 lots of 16 + 15). Confused?! Remember, F in hexadecimal represents 15. Therefore F0 would be 15*15=240. The second F is 15, therefore FF = 240+15 = 255. To convert denary to hexadecimal you can divide the number by 16. For example, to convert 141 into hexadecimal do the following: 141 / 16 = 8 remainder 13. /16 = 0 remainder 8. Therefore, working from right to left, the hexadecimal number is 8 13 (and 13 is represented as D in hex) so it would be 8D. Alternatively, convert the denary number into binary and then binary to hexadecimal. 27 Binary to hexadecimal conversions To convert binary to hexadecimal you need to break it down into nibbles (blocks of 4 bits). For example, 141 as a binary number is: 10001101. The two nibbles are 1000 and 1101. Converting each nibble into denary we can see that 1000 = 8 and 1101 = 13.Remembering that 13 = D in hexadecimal then 141 would be represented as 8D. To convert hexadecimal to binary you just reverse the process. Convert each part of the hexadecimal number into nibbles of binary numbers. For example: Hex Denary Binary 8 8 1 4 0 nibble D 2 0 1 0 8 1 4 1 nibble 2 0 1 1 HELP! This conversion chart below may help to make sense of it all! Denary 0 1 2 3 4 5 6 7 Binary 0000 0001 0010 0011 0100 0101 0110 0111 Hexadecimal 0 1 2 3 4 5 6 7 Denary 8 9 10 11 12 13 14 15 Binary 1000 1001 1010 1011 1100 1101 1110 1111 Hexadecimal 8 9 A B C D E F 8 Using binary to represent characters You need to be able to: (a) explain the use of binary codes to represent characters (b) explain the term character set (c) describe with exampl es (for example ASCII and Unicode) the relationship between the number of bits per character in a character set and the number of characters which can be represented. Computers use the ASCII (American Standard Code for Information Interchange) format to use binary codes to represent numbers, letters and special characters. It uses 8-bits (byte) to represent each character, so every character has it’s own unique 8-bit ASCII code.Using the ASCII character set on the next page we can convert characters into binary numbers. For example, Isambard would be represented in binary as: I s a m b a r d = = = = = = = = 73 115 97 109 98 97 114 100 = = = = = = = = 0100 1001 0111 0011 0110 0001 0110 1101 0110 0010 0110 0001 0111 0010 0110 0100 Notice how the capital I is different from the lowercase i in the ASCII format. An upper and lower case version of each letter is present in the chart to enable the computer to tell the difference between them. If you remember what we said about binar y numbers back on page 23 then you know that 8-bits (a byte) can store up to 255 in denary.This means that the ASCII format can have up to 255 characters represented in a character set. 29 American Standard Code for Information Interchange character set Note: You don’t need to remember these codes for your exam but just be aware of how it works. 30 Using binary to represent images You need to be able to: (a) explain the representation of an image as a series of pixels represented in binary (b) explain the need for metadata to be included in the file such as height, width and colour depth (c) discuss the effect of colour depth and resolution n the size of an image file. Images on the computer are made up of lots of individual pixels (small squares of colour). If you zoom into any image enough times you will see these little blocks of colour. We can use binary numbers to represent each pixel. In a simple image, where there are only two colours (colour depth of 1) then we can si mply use a 1 for one colour, and 0 for another. For example, look at this small 3 x 3 pixel image below. The 1s represent the black colour and the 0s represent the white. 0 0 0 1 0 0 0 1 31 That is the principle behind storing images as binary. However, we also need to know a few other things about the image in order to display it correctly, i. e. its height, width and colour depth. Image Metadata Height Width Colour depth Resolution The height of the image in pixels The width of the image in pixels The number of bits available to represent each pixel The pixels per inch (PPI) – if the pixels per inch is high, then the resolution and image quality is also high.Without this metadata the computer would not be able to reconstruct the image properly. Colour Depth In a simple 1-bit colour depth image, we can only display two colours. However, in an 8-bit colour depth image (like the gif format), we can display 256 colours (one for each binary number from 00000000 to 11111111). In a 24-bit colour depth image (like the jpeg format), we can display just over 16 million colours! If we use more bits to store each pixel, then the file size will be larger. That is why . gif images are often smaller in file size than . peg images. Resolution If the image has a higher resolution, it has more pixels to store data about and is therefore larger in size. If the image is lower resolution, this means that there are less pixels per inch, which means less pixels to store data about and is therefore smaller in size. 32 Using binary to represent sound You need to be able to: (a) explain how sound can be sampled and stored in digital form (b) explain how sampling intervals and other considerations affect the size of a sound file and the quality of its playback.Sound is stored in the computer by taking samples of the sound wave at regular intervals and converting those into binary numbers (using an analogue-to-digital convertor). The computer can then re-create the sound by reve rsing the process. The file size and quality of the sound recording is affected by the sample rate and bit rate. The sample rate refers to the number of samples taken each second. It is measured in Hertz (like the CPU clock speed). If the sound wave is not sampled at a higher enough rate, this can lower the quality of the sound recording, but the file size would be smaller.If the sound wave is sampled at a higher sampling rate, this will increase the quality of the recording, but the file size will be much larger. The bit rate refers to the amount of bits used to store the different levels of sound at each sampling interval. The more bits, the greater range of levels that can be distinguished. This also has the affect of increasing the file size if the bit rate is high (e,g. 16-bit instead of 8-bit). 33 Computer Communications and NetworksNetworks You need to be able to: (a) explain the advantages of networking stand-alone computers into a local area network (b) describe the hardwar e needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points (c) explain the different roles of computers in a client-server and a peer-to-peer network (d) describe, using diagrams or otherwise, the ring, bus and star network topologies (e) describe the differences between a local area network and a wide area network such as the Internet explain the terms IP addressing, MAC addressing, packet and (f) protocols (g) explain the need for security measures in networks, such as user access levels, suitable passwords and encryption techniques (h) describe and justify network policies such as acceptable use, disaster recovery, failover, back up, archiving. Why network? Allows computers to communicate with each other and share resources, e. g. peripherals (printers, scanners), storage, internet access. Data Packets Information is sent around a network in data packets. Data is broken down into packets to be sent over the network and ofte n may take different routes to get there. It contains info on where it needs to go (the address) and the packet number and an error-checking facility to ensure the packet arrives intact and can be put back together in the right order. 34Basic components of a local area network (LAN) Client/ Computer Hub, Switch or Router See next page for explanation of each. Server In a Client-Server network, the server handles the logins, applications and file storage. Modem Interfaces between the Internet and the network. Shared Peripherals Networks allow peripherals like this printer to be shared by all the computers on the network. Internet 35 Hub, Switch or Router? These are not the same. You need to know the difference between them. Hub A hub receives all data sent over the network and sends it to all the other devices on the network. Only the device who the data packet is for will acknowledge it; the other devices will ignore it.A switch is bit more intelligent than a hub and it learns which devices are on the network (and their port number/address) and only sends the data packet to the computer who is the intended recipient. This is more efficient than a hub as it doesn’t result in lots of unnecessary network traffic. A router is cleverer still than both hubs and switches. It can re-direct network traffic and deal with different packets in different ways. It can protect the computers on the network by hiding them from the outside world (i. e. a firewall). Some routers have a modem built-in and wireless capabilities. Most homes have a 4-port wireless broadband router to access the Internet. This combines the router and modem functions. Switch RouterWireless access points don't require a physical connection and therefore are suited for a variety of different devices and provide access to network over an area, e. g. iPad or smartphone. IP address The IP address (Internet Protocol) is a computer's unique address on the network, e. g. 192. 168. 0. 1 is usually your home router's address. On the Internet, each website has its own or several IP addresses. 36 MAC address The MAC address (Media Access Control) is a hexadecimal number that is unique to that particular device. Hey! Did you know that there are 281,474,976,710,656 possible MAC addresses in the world? That’s a lot of MACs baby†¦ huh huh! Network Protocols Protocols are a set of standards and guidelines that tell computers how they should handle the sending and receiving of data over the network.TCP/IP (Transmission Control Protocol and Internet Protocol) Used to exchanged data between computers on a network and route packets between networks and over the Internet. Used on WWW to transfer webpages and web content from the website host server to the computer requesting the page. Used to transfer files between computers over a network. Used to transport emails. HTTP (HyperText transfer Protocol) FTP (File Transfer protocol) SMTP (Simple Mail Transport Protocol) LAN or WAN? A L AN is a Local Area Network which is usually set-up within a certain area, e. g. a building or group of buildings – hence the term â€Å"local†. A WAN is a Wide Area Network which is usually on a nationwide or worldwide scale. The Internet is an example of a WAN – a series of interconnected LANs. 7 Network Topologies A network can be set up in three main ways: Ring 4 3 5 1 2 All the computers are linked together in a ring and data packets are sent one way round. For example in the diagram above to get from PC 1 to PC 5 the data needs to go through PCs 2, 3 and 4. It can’t go anti-clockwise back to PC 5. Drawbacks: If there is one break in the ring then the network breaks down. Also not very efficient as a lot of network traffic doesn’t take the most direct route. Bus All the computers are connected to a central bus. You can add and take away computers easily in a bus network as the computers are connected to the central bus, rather than between one another.Drawbacks: Only one computer can use the bus at once which means only one computer can communicate at a time – the others have to wait until the bus is free before sending their data; this makes it slow. If a computer connected to the bus breaks down, then the network still runs but if the central bus breaks down then so does the whole network. 38 Star 4 3 5 1 2 All the computers are connected to central server. The server can handle multiple communications at once and re-directs traffic over the network. More computers can be added or taken away without affecting the network. Drawbacks: If the main server fails then the network goes down. Client-server and peer-to-peer networks In a Client-server network, the server acts as the main computer handling login requests, user storage, etc.The client could be any computer. The user can log on to any client and still access their stuff on the server. In a Peer-to-peer network, each computer shares information equally and pl ays an equal role in the network. Network Security Part of Data Protection Act 1998 requires companies who store data electronically to keep it safe and secure. Without security then anyone could hack into the network and intercept data packets. Confidential data packets should be encrypted so if they are intercepted they are unreadable. There may be a need to prevent unauthorised access to particular areas of the system; this could be controlled by passwords and different user levels, e. g. n the school a student can only access the student shared drive, whereas teachers can access both the student shared drive and the staff shared drive. 39 Network Management Policies Disaster recovery In the event of the system failing there needs to be plans in place to get the network up and running again as quickly as possible. Many organisations, such as banks, have a disaster recovery plan which may mean relocating to a different location (if the building is no longer accessible). Failover a nd backups If there is a power cut, many networks have UPS (uninterrupted power supplies) which are large batteries with enough charge to keep the network going long enough to shut it down correctly. If a hard drive fails, there is usually a backup which can take the strain.Networks are often backed up at least daily and these backups are stored off-site or in a fire-proof safe so in the event of a disaster in the building, the data is still intact. Maintenance Sometimes data needs to be kept but is not accessed regularly. This data can be archived off onto tape to help free up space on the network. Acceptable Use It is important for the network to have an acceptable usage policy to provide users with guidelines about what they can and can’t do using it. For example, it would use up vital network bandwidth if some users decided to play a network game or download the latest torrent from the Internet. If users start file sharing copyrighted materials, like music, using the netw ork then there is a legal issue to consider as well. 40 The InternetYou need to be able to: (a) describe the nature of the Internet as a worldwide collection of computer networks (b) describe the hardware needed to connect to the Internet including modems, routers etc (c) explain the need for IP addressing of resources on the Internet and how this can be facilitated by the role of DNS servers (d) explain the importance of HTML and its derivatives as a standard for the creation of web pages (e) describe common file standards associated with the Internet such as JPG, GIF, PDF, MP3, MPEG (f) explain the importance of compressing files that are transmitted via the Internet (g) describe the differences between lossy and lossless compression. What happens when you type in a web address in your browser? When you enter a web address in your browser, it heads off via your modem to your ISP’s (Internet Service Provider) domain name servers (DNS).These computers store the IP address(es) for each website and directs your request to the relevant server hosting the webpage you want to view. The information is then sent back to your ISP and then back to your computer. Why HTML? HTML (HyperText Markup Language) provides a standard format which any computer with web browser can interpret and display the pages. It allowed the World Wide Web to get going as there was a universal standard that everyone could now use to share information. 41 Common file formats used on the Internet . html . jpg HTML Web page JPEG image Used to store webpages Used to store photos as can show up to 16. 7 million colours. Used for simple graphics and short animations – can show up to 256 colours.Used to store noneditable documents for viewing on the Internet using the free Adobe viewer software. Used to store music tracks. Compressed to make downloading faster. Used to store videos. Compressed to make downloading faster. Used for Adobe Flash files to add interaction and/or animations to websites. Used to store video files playable using free Apple viewer software. .gif Graphic Interchange format image .pdf Adobe Portable Document format .mp3 MP3 Music format .mpg MPEG video format .swf Shockwave Flash format .mov Apple Quicktime format Why compress on the Internet? The Internet can be slow at times, especially in it’s early days relying on early 56Kbps modems as opposed to the 3-4 Mbps average.Therefore if you could compress the files that were being sent on the Internet, then you sent smaller files, and smaller file sizes meant faster downloads. It also frees up the network and avoids clogging up the bandwidth. 42 Lossless versus Lossy Compression Lossless compression Compression used means the original file stays completely intact and unchanged. Used for text documents, data files and executable programs where it would not be desirable for parts to be lost. Used for multimedia files, i. e. sound, images, video. Lossy compression Compression which involves discarding parts of the file which won’t be noticed if they are not present.For example, it is possible to remove some data within an image and your brain fills in the gaps. Take a look at the images of the dog below: Source: wikipedia. org The image has more compression applied to it as you go from left to right. Even though the image on the right in heavily compressed, we can still see it is a dog. Our brain fills in the gaps. 43 Databases What is a database? A database is a persistent organised store of data which can be easily and quickly searched. They are most commonly used for Marketing, e. g. loyalty cards. Huge databases are searched for patterns in customer’s buying habits and then targeted coupons are mail shot to customers.The school has several databases to store everything from your behaviour logs and Brunels, to your address, date of birth and even how much money you have on your lunch card! Data handling software, such as Microsoft Access, allow users to: add tables, define fields and validation (create) add/edit/delete data (maintain) run queries to extract information from the database (interrogate) DBMS (Database Management System) Many large databases use a database management system (DBMS). This system separates the data stored from the data handling applications used to maintain and interrogate the database. Feature Concurrent usage Security Recovery & Backup Data integrity Why is this good? Allows multiple users to use the database at the same time Provides bility to allow/restrict data access to individuals or applications Provides backup solution and recovery tools to ensure data is not lost in event of failure Enforcing data integrity by ensuring data is consistent and adheres to the rules Relational databases A flat-file database is when all of the data and fields are stored in one table, e. g. an excel spreadsheet full of names and addresses – see below: 44 A relational database is when that data is separated i nto individual tables (entities) that are linked by a primary key (which appears in each table). Student Student ID First name Surname Class Class ID Student ID Teacher ID Teacher Teacher ID Name SubjectIn the example above, the STUDENT, CLASS and TEACHER are all tables (entities) in the database. The id is the unique piece of information (the primary key) that identifies each instance of a student, class or teacher. We couldn’t use First Name as the primary key in STUDENT as many people share the same first name – it isn’t unique enough! The advantage of separating the data into different entities is to avoid data redundancy – when the same data is stored in several places in the database. Let’s imagine if we stored the information above in a flat-file database (all in one table) – it would look something like this: Duplicated data Can you see the duplicated information?Not only does this use up space but it is easier to make a mistake (and lose data integrity) if we only update one of the records. E. g. if Miss Parsons gets married and her name changes to Mrs Smith then we need to make this change for every record in the database. If are using a relational database, because the Teacher’s name is stored in a separate table and linked to the rest of the entities, we only need to update it in the TEACHER table once. In the CLASS entity, both Teacher ID and Student ID are foreign keys (primary keys that when linked to another table become foreign keys in that table). Components of a relational database Tables Represents the entity in the database. Fields and primary keys are defined and data stored in the table. Create) Forms Provide a customisable user interface to add/edit and delete data (Maintain) Queries Allow data that meets specific criteria to be extracted and displayed (Interrogate) Reports Displays the results of queries in a customised format designed to be printed Querying a database 45 When interrogat ing a database, you need to specify the fields you wish to display and the criterion you will use to search. E. g. if you were searching for a car on a car supermarket website you might search using the make of the car you wanted: Make = â€Å"Ford† You could also use logical operators such as (NOT equal to), < (less than), > (greater than), = (greater than or equal to). E. g. Mileage

Wednesday, October 23, 2019

Street Racing and Li Ping Wong

I INTRODUCTONStreet racing has long been identified as a threat to civil society with significant social and economic impact. Street racing threatens the lives of other road users and causes unnecessary nuisance to the public. There are several ways to prevent teenagers from being involved in illegal racing are parents need to play their role, organizing campaigns and talks, and creating legal racing area.II BODYA. One ways to prevent teenagers from being involved in illegal racing are parents need to play their role. 1. Family socio economic status and family structure may influence an adolescent risk taking behaviours (Li Ping Wong, 2011) a. Parents must give attention to their teenagers.b. Parental support,monitoring and strict rules and attitudes according to Li Ping Wong.2. Parents should also spend more time with teenagers a. Give more attention.B. Another ways is organizing campaign and talks.1. Government should hold campaigns and talks about road safety at school and public area. a. Contain with information that tells about the effects of illegal racing. 2. Organizers of the campaigns bring along former street racer. a. Talks about the disadvantages and the effect of illegal racing. b. Make teenagers realize the dangers of illegal racing.C. One other ways is creating legal racing area1. Collaboration with other organization, a legal racing venue (Kenny J.Peak, 2004) a. Divert a safer racing environment b. Experience the positive expect of legal racing. 2. Participant rules should be in place a. Posses a valid driver licence and vehicle insurance b. Submit to safety inspectionsIII CONCLUSIONIllegal racing is associated with a variety of participants, parents and family characteristics. Government also should take action by preventing this problem become worst. Parents need to play their role, organizing campaigns and talks, and creating legal racing area for seems to be the ways to prevent teenagers from being involved in illegal racing.

Tuesday, October 22, 2019

How External Environmental Factors Impact Marketing Decisions essays

How External Environmental Factors Impact Marketing Decisions essays The field of marketing is a complex one. Those who work in it are charged with reaching the masses for the purpose of promotion, regardless of what may be going on in the world at the time. Marketing companies world wide have to remain ever mindful of external factors including legal, economical and technological aspects if they want to remain successful. Looking at these external environmental factors can provide foundational information for the planning of marketing strategy. This holds true whether the marketing is to target a global audience or remain in the domestic One of the most important things to incorporate into any marketing plan regardless of its size is the understanding of legal aspects. The legality of the world must be adhere to in any life plan but in marketing it can mean the difference between success and public humiliation. All one has to do is look through the news history and one will locate stories in which marketing went against the legal system and caused a company to close or a product to be pulled off the Market. Disregarding the legal aspects of marketing can be extremely expensive(Fitzpatrick, 2004). One example of this is a tactic called bait and switch. Advertising laws prevent the offering of one product or price to lure consumers in, and then claiming it was JUST sold and trying to steer them into purchasing a more expensive product. It is bait and switch if when the ad was placed there was knowledge that the advertised product It is illegal throughout America and ignoring the legal factor of marketing One such suit was against a bank in Rhode Island. The class action suit accused Fleet Bank of using age old familiar bait and switch tactics to lure new credit card customers to their offices. "During 1999 and 2000, Fleet conducted a nationwide advertising campaign, offering a non-introductory, fixed annual percentage rate of 8.5 percent or lower for...

Monday, October 21, 2019

Person Health Assesment Essay Example

Person Health Assesment Essay Example Person Health Assesment Paper Person Health Assesment Paper Personal health is a term that is used to refer to one’s state of complete physical, mental and social well being. In addition it includes absence of diseases in one’s body. Every person requires being healthy in order to carry out his or her daily routine effectively and on time. It is for this reason that each person carries out his or her personal health assement. For the last one year I have not had any serious health problems, though from time to time I have had minor body ailments. My mental health has been good, I have not experienced  Ã‚   depression, stress or other mental-related diseases .I have been able to use my cognitive and emotional capabilities, function well and meet my everyday life demands .I also feel capable and complete, can handle stress, live an independent life as I maintain satisfying relationships. My body measurements are above average. This includes my height and weight. Normal weight has been through improved nutrition and health care. Proper nutrition protects the body from weight-related diseases or disorders. I have not had any allergic diseases . A wide variety of food types can be eaten without developing allergic complications. This has been an advantage in balancing my diet. No chemicals or environmental sensitivies have been observed. Therefore I have been able to stay in varying environments especially those that assist me in keeping me healthy .For example, I have gone camping and hiking in areas that other people are allergic to (their components). My blood sugar level has been normal as required by the body .I go for examination very often .In addition, my blood pressure is fine as confirmed by the doctor’s examination. This is due to proper nutrition where components that cause these diseases are only consumed in required levels .I have had digestive problems and diarrhoea at least once per month. This is usually experienced when I take food types that I have not taken for a long time. I rarely get headaches or migraines, unless when I’m exposed to extreme weather conditions or very loud music. No skin disorders or sleep problems have bee experienced. Problems that I may experience include backaches due to my working under strenuous conditions sometimes .I’m also prone to not taking enough water every day as required. This may result to constipation. . Digestive problems and diarrhoea may arise due to my tendency to eat foods that I have not eaten for a long time when I come across them. If I expose myself to extreme weather conditions or very loud music, I’m likely to get headaches or migraines. High cholesterol levels in my body are a possible in future, since sometimes I take high-cholesterol foods much often. Strategies that can optimize wellness in later life for me and for others are very critical in Proper nutrition assists in regulation of food components that one puts into the body. One avoids taking disease-causing components if taken in large amounts, while eating foods that boost the immune system. Also helps prevent deficiency in the body. Physical exercises maintain the physical fitness of the body .It prevents diseases like cancer, heart disease, obesity and a back pain .It promotes healthy weight, healthy bones and strengthens immune system. Keeping warm during the cold weather keeps one from catching a common cold or a running nose. Positive thinking, building confidence in one’s self and meditation helps reduce stress which may cause mental disorders. Ensuring proper hygiene of the body and the surroundings prevents infections and illnesses. Proper medication should always be sought in case of an illness to prevent serious complications. Consultation should be with a competent physician .All these ensure good personal health. References Yahoo! Health: Diet and Fitness, Mind and Mood, Longevity, Conditions. www.Health.yahoo.com Accessed on April 16 2008. www.health.com.Health articles and Medical Information from Health.com Accessed on April 16 2008.

Sunday, October 20, 2019

9 Super-Tricky Job Interview Questions and How to Answer Them

9 Super-Tricky Job Interview Questions and How to Answer Them You’ve done a lot of interview prep already and you’re feeling pretty ready. But you’re still dreading the questions you haven’t prepped for- or the really tricky ones that seem perfectly simple, but have multiple strategic layers designed to get at something subtle. Don’t get tripped up or surprised by the following tricky questions- prepare your answers now so you’re calm, cool, and collected on your interview day.1. â€Å"Why did you leave?†Mostly tricky if you just got fired or quit soon after starting. Easy enough to answer if you lost your job as a part of a restructuring or layoff; just be honest there. Otherwise, be as transparent as possible and try to give answers about things that were out of your control (lack of growth opportunity or challenge, etc.). And restrain yourself from saying anything negative about the company or your former boss.2. â€Å"What’s your salary requirement?†Remember: loser speaks first. Try to avoid being the first person to say a hard number in this situation. Pivot if you can and do your best to get them to throw out a number first. If you must give a direct answer, make sure you have a good sense of what sort of salary range would be appropriate for you and start there. Make sure the bottom is no lower than your current salary or the low end of their advertised range.3. â€Å"How did you hear about the position?†You might be thinking: why do they want to know this? But remember, most hirers like referrals and it’s all about who you know. They’re trying to figure out who you might already know at the organization. They want to know whether you’re a champion networker, up on all the latest industry intel. Try to find an elegant answer to this question that isn’t just â€Å"uh†¦ I found it on a web search?†4. â€Å"What is your greatest professional achievement?†You get a chance to go into one accomplishment in depth here and really sell yourself. Try to load in plenty of quantifiable and verifiable detail into your answer. Back up any claims of your own greatness. But  don’t go overboard with the self-praise- humility might also be something they are looking for.5. â€Å"Where do you see yourself in 5 years?†They want to know first and foremost that you have a career vision for yourself. They also want to know if you’re so obsessed with finding a path up that you’ll be taking the first path out. Strike a balance between assuring them you’re keen to be a loyal contributor to the company for the long haul, and showing your ambition. Enthusiasm for the company itself will go a long way here, particularly if you feel you’re a great fit for their work culture and could see yourself advancing internally.6. â€Å"What’s with the gap in your employment?†You should be ready for this question if there are gaps in your employment. Be honest and succinct. Make sure to mention any volunteering or education that could earn you extra points. And be passionate about explaining any career changes, taking extra care to mention how your unique skills translate perfectly to this job.7. â€Å"Are you hoping to start a family?†Questions about your marital status and plans to have children are illegal, but you will occasionally be asked. Pivot from this answer as quickly as you can. Say something like: you’re really more focused on your career at the moment and very interested about this fascinating part of the company’s work†¦ is there more they could tell you about that?8. â€Å"Do you like to work on your own or as part of a team?†Both. You like both. Explain how great you are at both. Don’t let yourself get pigeonholed here, because you’ll never know when they’re looking for a self-starter they don’t have to worry about, or a true team player for a more collaborative environment.9. â€Å"Do you have any questions for us?†Interviews are supposed to be more of a two-way street than an interrogation. You will be asked if you have any questions and you will need to have a few. Even if most of your questions have been answered in the course of the interview, have one or two things you could ask. When in doubt, try: â€Å"What’s your favorite thing about working here?† And give your interviewer a chance to talk about herself and the company while you regroup.

Saturday, October 19, 2019

Business Ethics Essay Example | Topics and Well Written Essays - 750 words - 23

Business Ethics - Essay Example By so doing, businesses will increase their profit and benefit the society by reducing their suffering. The theory makes businesses to work in a way that will help the society and not cause them pain (Mill 2007). The purpose of this theory is to enable businesses to get the best results from their actions. According to Marshall (2009), every person has their own rights that should be respected. Businesses need to also respect the rights of their customers. According to Velasquez (2015) Kant feels that individuals should be assisted to achieve their expected end results. It is also the duty of businesses to sell goods and services that help their customers to get what they wanted when they were buying the goods and services. Businesses should sell goods that are fresh and not expired because it is the right of the customer to get good products. When businesses do something wrong to their customers, they should do justice by taking actions that will make their customer to recover what they have lost (Wettstein 2009). According to Velasquez (2015), Maqasid al Sharia states that justice and equity should be established in the society to protect the individuals and their property. Businesses need to take good care of their customers. When they do so, the customers will feel good about buying the goods or services from the business and this will increase the profits of the business. According to Frei & Moriss (2012), customers return to buy goods from a business when they feel that the business is taking good care of them. Caring for customers makes them happy and happy customers will return to buy things from the business many times. Capitalism is a system where businesses and other money making activities belong to individual people or companies. This makes businesses to compete with each other so that they can serve their customers well and make a lot of money (Boltanski & Chiapello 2005). Businesses that make

Create a marketing plan Essay Example | Topics and Well Written Essays - 2000 words

Create a marketing plan - Essay Example This will not only help him to offer the customers better services but also increase the popularity of the cafe through word of mouth. Apart from this the focus would be on providing services according to preferences of the local customers. Another advantage of running a sole proprietorship business would be keeping all the profits and all the business affairs a secret so as to compete successfully with the competitors. The location of the cafe would be 46/48 The Hornet, Chichester, West Sussex, PO19. The size of the property is 2250 sq. ft, which includes the ground floor, first floor and the second floor of the building. The Hornet was selected as it is situated in a very prominent trading spot of the city. The place is crowded with traders and it is a very busy location of the city where the population of coffee drinkers is high. The rent of the property would be ? 27,500. Market Analysis Market analysis involves studying the dynamics and the attractiveness of the market within th e industry. It is a part of industrial analysis, which also helps to understand the internal and external environment of the company. It is also referred as an investigation often whole market that is required to take necessary decisions regarding promotional activities, purchases, recruitments, facility expansion and other significant tasks. 1 Market Segmentation Marketers cannot customize their products according to the taste and preference of every individual. So they identify people with similar needs, tastes and preferences and group them together to form market segments. This not only helps the marketers to identify the preference of different groups, but also help them to focus on a few groups and develop their products accordingly. 2 Restaurants and cafes form a part of the hotel and restaurant industry. People from all age groups visit restaurants and cafes. Moreover, cartoon or comic themed cafes would not only be preferred by kids but also youngsters, college goers, marri ed couples and old people. So One Piece cafe should welcome diversity in this case. They should not limit themselves to a specific segment based on the demography or geography or behavioural pattern. The working or business class women should be paid more attention to show that One Piece Cafe values its customers. The cafe is mainly based on the theme of One Piece, which is actually a well-know Japanese animation series. There is a huge fan following for this cartoon series in Japan and in other parts of the world. It is based on a pirate theme. So the interior designs also would be based on the same. This would attract the fans of One Piece round the world to visit One Piece Cafe. Even Tourist visiting the country would like to come to One Piece Cafe to experience the One Piece ambience and enjoy dinner or simply a cup of coffee. Targeting Target market involves a group of customers for whom the company designs, and develops a product or service. The marketing strategy and mix are designs prepared by the marketers to satisfy the target customers. Targeting can be of two types: differentiated and undifferentiated. Differentiated targeting signifies focusing on a particular type of customers and leaving out the

Friday, October 18, 2019

Marketing Communication for Startford Upon Avon Essay

Marketing Communication for Startford Upon Avon - Essay Example Proceedings will commence with guided tours around various sections of the facility including the redeveloped auditorium, the Swan Theatre, the Observation Tower and the â€Å"One-Room† (Chambers 2004, 67). This shall then be followed by the airing of an hour long documentary that follows the exceptional account of how the theatre came to be. Some of the plays that will later be performed during the day will include Shakespeare’s very own Othello and Romeo and Juliet. Other plays that are lined up for that day include the Revenger’s Tragedy, The Magic Flute, Camino Real and The War of the Roses. Some of these plays shall include names of famous Hollywood actors such as Candice Bergen, Ewan McGregor, Bradley Cooper and the lovely Emma Stone in the performances. Visitors can find food and drinks at the Rooftop Bar and Restaurant as well as the Riverside Cafe and Terrace. The Royal Shakespeare Company intends to increase cultural awareness of potential visitors with regards to the various activities and opportunities that is offered at the Royal Shakespeare Theatre. The company intends to raise both domestic and international tourist visits within the area by defining the product and services they offer and thereby providing a high standard of cultural and diplomatic repertoire through cultural interactions. Another objective of the event is to provide to the target audience a variety of social activities that they can enjoy while visiting the area (Fill & Hughes 2008, 266). Key stakeholders in the media fraternity have been invited to contribute towards the success of the event. Both local and international television channels have confirmed their attendance in what is considered a crucial step towards the revitalization of the country’s tourism sector. Several Radio stations and newspaper agencies have also been invited to cover the

Leadership Vision Essay Example | Topics and Well Written Essays - 750 words

Leadership Vision - Essay Example m and hard work for Stanford R Ovshinsky in accomplishing his vision of making big sheets of thin photovoltaic material that can help to derive electricity from sunlight at a cheaper cost and an alternative for fossil fuels. When Ovshinsky unveiled his vision before 40 years, nobody believed his vision at the initial stage. A vision can be more than a dream which is a motivated view of the future that everyone associated can believe in , which may offer better improvement what that may exist then and one that can realistically be accomplished. Strong, inspiring visions have been culminated with improved performance of the organisation. (Daft & Lane, 2007, p.391). Thus, this essay will look into detail about how leaders direct their insight and wisdom to lead others. The leadership vision is the founding stone of the leader’s view of leadership and sets out the long-run goals of a leader. The vision for leadership surpasses beyond simple perceptive and expectations about the function and role of the leader. It details and captures the preferred future that one visualizes for himself and his team, community or organization. An organization mission is totally diverging from a leader’s vision. Thus, the leadership vision can be described as an expression of what one want to do, establish or create when he assumes in a leader role. Vision details the leader’s philosophy pertaining to leadership and his reason in preferring to be a leader, and it acts as a significant guidepost for the key demeanors that being enacted as a leader. (King et al, 2011, p.50) As per John Gardner, the vision is the essential need of leadership. James Kouzes and Barry Posner view that leaders encourage a shared vision. Warren Bennis is of the view that leaders should have the capability of establishing a persuasive vision, to manage the dream. As per Ken Blanchard, two aspects of the leadership role are having a vision and applying the same in real terms. Margaret Sanger and Martin

Thursday, October 17, 2019

Economy or goberment related Personal Statement Example | Topics and Well Written Essays - 500 words

Economy or goberment related - Personal Statement Example One can clearly see how Economics has overtaken all other fields. Wolfers (2015) gives an explanation of the development in question by arguing that the Great Depression was the major reason why Economics took over. The government needed to devise a way that would relieve the country from the economic strains that it had gone through. The economist came in handy. Major focus and importance was given to Economics as it gave answers to the existing problems as opposed to Psychology or even Anthropology (Wolfers, 2015). In the work, the author also explains that Economists are also consulted in numerous fields today, including fields that touch on social issues (Wolfers, 2015). This explains why Economics has become a major for many students, as the field is extremely marketable in the job market. The popularity of the field is also expected to increase with the years. From Wolfers’ (2015) work, I agree that the field of economics has taken over the field of Social Sciences. In the present society, it is evident that a huge percentage of articles, even in the archives, mention concepts related to economists. The number of articles on Psychology, Sociology and other arts are reducing by the day. This explains the extent in which the world is shifting towards an economic turn. Wolfers (2015) also explains that the rise of economy began in the 1980s to date. This can be linked to the Great Depression that caused massive impacts on the economy of the country. After the catastrophe, the government opted to come up with stringent measures that would prevent such an occurrence (Wolfers, 2015). This explains the great interest in economics. I agree with the author’s sentiments as the government was obligated to come up with measures that would see to a stable economy. The historians that had taken up a huge share of the market had no place, and were slowly overtaken (Wolfers, 2015). I believe the economists were justified. No government

Compare Zara and Primarks operations Essay Example | Topics and Well Written Essays - 2500 words

Compare Zara and Primarks operations - Essay Example The company is a subsidiary company of the Associated British foods Company. Primark is in the business of selling readymade garments including women’s wear, children wear and menswear of stylish fashion and high variety at accessible and affordable prices. The company mainly operates in the market of the United Kingdom with its stores in different European countries like London, Portugal, Spain, Belgium, German, and Holland etc. The company has more than 150 stores located in different parts of the United Kingdom. The main competitors of Primark are Next, River Island, Guess, Gap, and Zara. The competition between these companies is based on achieving competitive advantage through the use of different business models and unique operational strategies. The report encompasses a study of the business models followed by Zara and Primark with an identification of the key similarities and differences in the two business models and a study of the key business objectives of these two companies and their impact on the competitive advantage creation for both the companies.  The report also includes a tradeoff analysis of the two companies on the basis of key operation factors like cost, quality etc. The report is suitably concluded with the recommendations given to the companies for achieving sustainable competitive advantage. The owner of Inditex, Amancio Ortega Gaona has been renowned for adapting innovative business models in all his fashion brands. The business model adopted in Zara is unique and one of a kind. The business model followed by Zara is a popular fast fashion retail model. On the other hand, the business model of Primark is aimed at providing low cost products to the consumers. The business model implemented by Primark is a ‘no whistles no bells’ business model in which redundant services are done away with to make the supply chain more efficient and to incur low operating

Wednesday, October 16, 2019

Economy or goberment related Personal Statement Example | Topics and Well Written Essays - 500 words

Economy or goberment related - Personal Statement Example One can clearly see how Economics has overtaken all other fields. Wolfers (2015) gives an explanation of the development in question by arguing that the Great Depression was the major reason why Economics took over. The government needed to devise a way that would relieve the country from the economic strains that it had gone through. The economist came in handy. Major focus and importance was given to Economics as it gave answers to the existing problems as opposed to Psychology or even Anthropology (Wolfers, 2015). In the work, the author also explains that Economists are also consulted in numerous fields today, including fields that touch on social issues (Wolfers, 2015). This explains why Economics has become a major for many students, as the field is extremely marketable in the job market. The popularity of the field is also expected to increase with the years. From Wolfers’ (2015) work, I agree that the field of economics has taken over the field of Social Sciences. In the present society, it is evident that a huge percentage of articles, even in the archives, mention concepts related to economists. The number of articles on Psychology, Sociology and other arts are reducing by the day. This explains the extent in which the world is shifting towards an economic turn. Wolfers (2015) also explains that the rise of economy began in the 1980s to date. This can be linked to the Great Depression that caused massive impacts on the economy of the country. After the catastrophe, the government opted to come up with stringent measures that would prevent such an occurrence (Wolfers, 2015). This explains the great interest in economics. I agree with the author’s sentiments as the government was obligated to come up with measures that would see to a stable economy. The historians that had taken up a huge share of the market had no place, and were slowly overtaken (Wolfers, 2015). I believe the economists were justified. No government

Tuesday, October 15, 2019

Dialogues in Virtual Environment Term Paper Example | Topics and Well Written Essays - 2500 words

Dialogues in Virtual Environment - Term Paper Example Numerous researches have been conducted on the application of virtual environments. Animesh et al.’s MIS QUARTELY described it as below. Virtual environments refer to interactive, head-referenced computer displays that are enhanced by special processing and nonvisual display modalities such as auditory and haptic, they convince users that they are in a computer simulated space. Organizations working on virtual environments have a virtual team and office. The popularity of working in a virtual office is becoming common. Many businesses, organizations, and institutions are not run from a central office with set hours. The workforce in the current world is more flexible,. mobile, preferable and more convenient trend with the help of the modern portable technology and wifi. One can work in a coffee shop, in another state, in airports, beaches,...just to mention but a few; all what they need is a laptop and access to internet to connect to workplace, clients and team members. As we ’ve already stated, organizations may work with a virtual team on global levels. These teams operate autonomously with directions from a manager. The major advantage of these teams is that they try to maximize geographic talents to focus on key elements of the organization. The economists believe that the virtual office will change the way our economy works as well as the nature of work. Working from home or places where we are more comfortable exerts less stress on individuals, which can adversely affect the quality of work being produced. Dialogue is a most important proponent of virtual office. It is more efficient to avoid unnecessary meetings, dealing with office chatter, gossip and commutes. Dialogue supports a wide range of applications of virtual environments in businesses, education, healthcare, government and entertainment. The usefulness is in customer service, selling, help desk, technical support, and personalized service, training, education, website navigation and simple dialogue systems. The virtual office involves space utilization, however, a the actual application requires live communications or dialogue. This is possible through various methods. First, workers can use high-tech computer telephone integration software, a voicemail, mailing, business meeting space, and many other applications for communication. Systems Theory A set of interacting, interrelated, and interdependent components that form a complex and a unified whole is known as a system. Systems are everywhere- example is functional departments in any organization, the human circulatory system, and so on. They have several defining characteristics: First, every system has a role to play within a larger system. Second, all parts of a system must be present for a system to carry out its purposes optimally. Third, system’s parts must be arranged in a particular manner, if they are rearranged, the whole system would have trouble executing its purpose. Fourth, Systems c hange in response to a feedback, and finally, they maintain their balance by making changes based on the feedback (Pokharel, 2011). Systems theory, therefore, is a trans disciplinary study of systems in general, irrespective of their kind, type, or nature of existence. It focuses on the relations and arrangement of parts which connect them into a whole rather than reducing an entity into parts like organs or cells. Systems theory as a trans disciplinary study addresses a problem regardless of discipline in diverse fields like engineering, biology, sociology, psychology, and organizational theory. There are two versions of systems theory: closed systems and open systems. Closed systems originated in classical physics which deals with relatively few variables. Its modern version is exemplified by

Monday, October 14, 2019

Indian Independence Speech Essay Example for Free

Indian Independence Speech Essay As you know all of us have gathered here to celebrate 67th independence day of our nation. This day, after the hosting national flag, we usually make mistake by remembering the heroic deeds of only few freedom fighters. But freedom fighting was collective effort. Without cooperation, sacrifice and involvement of all Indians it was impossible to get the freedom. So people of India were the real national heroes behind the success. We should express our sincere gratitude to all those who participated in the freedom struggle. This can only be done by defending our freedom like our ancestral property which cannot be valued. How to defend? Single person cannot defend it; again group effort is essential it is nothing but unity. How to form this unity? We should always remember that only patriotism can form unity irrespective of religion, language, caste, customs and traditions. So having patriotism only can save the freedom of our nation. To keep faith in secularism No compromise must be with patriotism, Punish the forces that support terrorism Else one bad day we will loose our freedom. I would like to express my views about the dark side of Present India. How should I say ‘My INDIA is great’? In this republic from schools to parliament, Elections are held at every moment, Children’s are taught fighting for the seat, How should I say ‘My India is great’? Even after golden jubilee of unconstraint, Many citizens are unable to fill their gut, Rich become richer and rests are indigent, How should I say ‘My India is great’? People are emotionally divided by communalist, Border in the north and south has water dispute, Leaders are selfish and have no solving interest, How should I say ‘My India is great’? Capable civilians are facing unemployment, Socially unfits have led the political movements, Voters are under tense of serious terror threat, How should I say ‘My India is great’? All are seeking benefits without effort, Bribery has become the style of management, Whole country pushed into a big corruption pit, How should I say ‘My India is great’? I pray to the divine creator with sentiment, Please give birth to sincere nationalist, Who should drive my nation towards overall development, So that I should say ‘My India is great’ Apart from these Our India is great country because Indians are generous, broad minded, kind hearted and united. No doubt we quarrel among ourselves for various reasons but we stay united in front enemies and in times of danger. I have got few facts which are in support of above statements. During Kargil war our Govt couldn’t spend even a single paisa from the budget but people gave every kind support for it. During Tsunami in Chennai, Flood in Bihar and Orissa, draught in the country, earthquake in Gujarat and Maharashtra and similar other natural disasters people stood united and helped each other, extended all kind of cooperation to start a new life. So I Say that My India is great and Indians are the greatest. â€Å"I am proud to be an Indian† India is a great country with many religions. It has rich natural resources and lengthy frontier with vast region. North has The Himalayas and south with the Hindu ocean, Bay of Bengal in the east and the west has the sea Arabian. It’s being administered with language wise partition. All are leading peaceful life with national integration. Enemy’s conspiracy is impossible with the unity of the nation. Festivals are celebrated here with memorable function.People help each other in time of affliction. So my India is great also I am proud to be an Indian.

Sunday, October 13, 2019

Population Analysis of Yemen

Population Analysis of Yemen Geography Yemen is basically situated on the southern tip of the Arabian Peninsula, between Oman to the northeast (288 km of borderlines) and Saudi Arabia to the north (1,458 km of borderlines). Yemen has border with the Arabian Sea and the Gulf of Aden to the south, and the Red Sea to the west. The length of coastline constitutes 1,906 kilometres and the width of coastal strip is between 30 and 60km. Yemen is world’s 49th largest country covering the area of 527,968 square kilometres or nearly twice the size of the US state of Wyoming or about the size of France. Topographically, Yemen is divided into five main geographical areas: mountains, plateaus, coast, Empty Quarter (AR-Rub-Alkhali) and islands. Yemen has 112 islands (mostly volcanic origin) of which the biggest and most inhabited is Kamaran. Kamaran is known for exceptional wild animals and plant species. Mayonoon Island (Breem) has strategic importance due to its location which lets to control the strait of Bab Al-Mandab. The specific feature of this country is that it is situated at the entrance to the Bab-el-Mandeb Strait, which links the Red Sea to the Indian Ocean (via the Gulf of Aden) and this circumstance permits it to call one of the most active and strategic shipping lanes in the world. Temperatures are generally very high in Yemen, especially in the coastal regions. This part of country is hot and humid throughout the year. The central highlands at 10,000 feet (3,048 meters), experience an average annual high temperature of 21 °C: average daily temperature in January stands at 14 °C and in July reaches 22 °C. The climate of western coastal plain is tropical, therefore temperatures occasionally exceed 54 ° C, and the humidity ranges from 50 to 70 per cent. Rainfall usually comes in irregular heavy torrents with averages of 130 millimetres annually. The climate in Yemen is mostly desert, very hot and humid along the coastal sections. In addition to this, Yemen‘s western mountains are affected by seasonal monsoons, which rains may occur from April to August and from November to January. Chart 1 Location of Yemen Source: Euromonitor International Regions Yemen administratively is divided into 21 governorates, including the three newly created governorates Amran and Al-Daleh and Reymah. The governorates are further subdivided into a total of 333 districts and around 2,000 sub-districts. Yemen is a relatively rural country, at an urbanization rate of just less than 33% at the end of the period. Most governorates boast low urbanization rates with the exception of Aden and Sana’a City that were 100% and 98% urbanized in 2013, respectively. According to the World Bank report 2012, governorates with the greatest poverty rate were Amran, Al-Bayda, Hajjah, and Shabwah and moat wealthy are Sana’a City and Al-Maharah. Yemen is suffering from a strong north-south divide, with violence, armed clashes and protests hindering not just regional development and agricultural activities, but also detracting investors and much needed tourists away from the region. Up to late 2013, the UN-backed national dialogue between northern and southern representatives was mostly unsuccessful, causing UN to warn participators about â€Å"procrastination† and â€Å"obstruction† and urge breakthrough in the talks. The northern regions are expected to remain in a relatively better position than the south, due to greater political power and control of most natural resources. The future of Yemen and its administrative division will depend on the performance of the National Dialogue Conference and the president’s decision. A new federal system in Yemen is to be expected in the near future. In early 2014, the National Dialogue Conference’s committee presented a final report on resolving the North-South tension issue. The Southern region would get 50% representation in executive, legislative and judicial bodies, as well as the army and security services. The final step is for the president to form a committee to decide on the number of regions in Yemen. Chart 2 Regional Map of Yemen Source: Euromonitor International Table 4 Regional Statistics: Population, Urbanization Rate and Share of Population in Poverty Population 000 (2013) Urbanization rate (2013)% of population in poverty (2006) Taiz2,9542238 Al-Hodeidah2,6843532 Ibb2,6221830 Sanaa City2,2059815 Hajjah1,825948 Dhamar1,6411426 Hadramout1,2854636 Sanaa1,1362.828 Amran1,0871764 Laheg896947 Saadah8591517 Aden74810017 Al-Baida7121952 Al-Mahweet611731 Al-Daleh5831344 Shabwah5821654 Al-Jawf5451350 Abyan5402646 Reymah4861.034 Mareb2951346 Al-Maharah111429 Total24,4073335 Source: Euromonitor International from National Statistics Cities As of 2012, there were 225 cities in Yemen. The most significant and the largest urban centres in terms of population were the capital Sanaa (2.2 million people in 2013), a seaport city of Aden (748,000 ) and Ta’izz (around 600,000). Although an overwhelming majority of Yemenis live in rural areas (close to 70% in 2013), urbanisation is increasing. Sana’a Sana’a – Yemen’s capital city has played a key political and economic role in Yemen for centuries. Sana’a is one of the major transport hubs in Yemen. A road link from the capital leads to Ta’izz and further to the old port of Mocha. Sana’a’s function as one of the most important transport nodes in Yemen, however, was underscored by the country’s biggest international airport located in the nearby town of Al Rahabah. Through this airport, Yemen’s capital is connected to key metropolises on the Arabian Peninsula, nearby African countries and India. In 2013, United Arab Emirates national airline Etihad Airways launched its new Abu Dhabi-Sana’a route by conducting an inaugural flight with high level officials from both countries. Excellent education is one of the most notable characteristics of the Sana’a city the University of Sana’a, founded in 1970, is one of the biggest higher education institutions in the Arab countries. In terms of manufacturing, a once flagship plant in the city – a cotton textile mill – after years of neglect and mismanagement, stands vacant awaiting for more funding. Nevertheless, Yemen’s capital is witnessing a major real estate boom, as urbanisation processes in the country are moving forward. Some of the on-going projects include Sana’a City Mall and Sana’a East Sana’a Terraces. Sana’a City Mall was estimated to cost US$200 million and was scheduled to be completed in 2013. The mall is expected to become the biggest shopping centre in Yemen, hosting shops, 10 cinema halls, an amusement area, a food court, a supermarket, and a parking space for 2,000 cars. Sana’a East Sana’a Terraces is a project worth US$400 million and expected to be completed in 2016. It will be a mixed use development encompassing residences, hotel facilities, recreation, shopping and office zones. Sana’a’s main strengths in attracting business opportunities are the proximity of government agencies and relatively extensive infrastructure. As of 2013, Sana’a international airport was undergoing a major renovation initiative amid the governmental ambition to boost tourism revenues: the construction of 12 air bridges and four halls to enable simultaneous handling of 18 aircrafts. Yet the future development of the city is likely to be significantly constrained by an on-going severe water crisis and lack of security. If the city’s water resources do not get replenished, Sana’a is expected to become a â€Å"ghost town† by 2030, according to an insight by the Reuters investigation. Aden Aden, located 400 km south of the capital Sana’a, is a vital seaport of Yemen, handling more than 60% of the country’s total incoming ships in 2012 and nearly 70% of net registered tonnage. Throughout its history, commercial activities in the port dominated in Aden’s economy. It used to be a major refuelling stop for vessels under the British colonial rule in 1950-1960 and later an economic engine of South Yemen. However, recently, the port has been witnessing a major blow to its operations, resulting from political protests in the country following the Arab Spring and disagreements between the national government and the port operator Dubai Ports (DP) World that abandoned its obligations in 2012. With the port operations having been so essential to Aden, as of early 2013, Yemeni authorities were negotiating a master plan for the city’s future development with the World Bank. Aden has strengths that may be utilized to realise its commercial and tourism potential. It is strategically positioned in close proximity to major trade routes. Given its location on the Gulf of Aden, the city can potentially avoid widespread water shortages in Yemen if resources are mobilised to implement sea water desalination projects. Yet a major weakness in the city’s development has been the poor execution of laid out plans. For example, Aden Free Zone, created in 1991, is still only an empty parch of land, while in nearby Djibouti, the Free Zone, established in 2004, is already up and running. Aden’s port has seen a precipitous decline of transhipment volumes of 37% per year in 2007-2009, whereas Djibouti port’s figures have been on the rise (15% growth per annum in the same period). Future development of Aden will greatly depend on whether city’s officials can follow through with commitments and plans. Tai’zz Ta’izz is one of the most populous cities in Yemen. Ta’izz is Yemen’s most developed industrial city. Adequate rainfall and arable soil in the surrounding areas boost agro-industrial activities in Ta’izz, particularly coffee, cotton and vegetable cultivation. The city is also known for its leather and jewellery industries. Another important factor contributing to the development of Ta’izz’s industrial sector is the proximity of Aden, Al Hodeidah and Mocha ports which provide for an easy shipment of produced goods. Ta’izz is the capital of the most populous governorate of the same name, with a relatively large consumer market providing further benefits for local companies. In fact, numerous biggest businesses in Yemen are located in Ta’izz, some of which belong to the HSA Group Yemen’s major conglomerate engaged in manufacturing, commercial and services sectors. Ta’izz has good prospects for continued growth; yet as in all of Yemen, progress is primarily stalled by political upheavals and lack of security.