Monday, September 30, 2019

Beowulf Essay

When Beowulf dies, the Geats dwell upon his greatness. They see him as a hero, not just because of the things he accomplished, but because of the sacrifices he made for them. The character, Beowulf, is a classic example of someone who fights for pride and glory. He is a brave warrior who is trying to repay his father’s debts to the king of Denmark. Beowulf is a tragic hero because he is noble, has a tragic flaw that leads to his downfall, and sacrifices himself for the good of his people. The achievements that Beowulf accomplishes make the people believe in him as a tragic hero. To be noble, one has to possess power and authority, but still fulfill obligations to their people. Beowulf stands as a noble king. He earns his power, and leads and fights for his people. At the end of the story, Beowulf battles a dragon that has been troubling his people. This shows us the sacrifice he makes for the Geats to try to save them. After Beowulf is defeated and killed by the dragon, his loyal warrior, Wiglaf, speaks. Wiglaf, the only warrior standing by his side during the fight, tells the other warriors that they have betrayed Beowulf, the king â€Å"who showered you with gifts† (2866). In this quote, Wiglaf is saying that Beowulf has proven his loyalty to his warriors by giving them weapons, armor, and treasure, which in their society was expected of a king or ring-giver. After Beowulf’s death, the Geats realize his nobility, generosity, and bravery. Although Beowulf is a noble king, he, like every tragic hero, has a tragic flaw. In Beowulf’s case it is hubris. Hubris is a characteristic of someone who is over confident or prideful. Pride has a good and a bad consequence for Beowulf. One benefit of pride is that it promotes confidence in battles. For example, when Beowulf goes to fight Grendel, he says, â€Å"now I mean to be a match for Grendel, / settle the outcome in single combat† (425-426). In this quote, Beowulf is saying that he wants to keep the matchup fair between Grendel and himself, so to keep the playing field level he will fight him without any weapons. This is a great example of Beowulf being over confident in himself by saying he doesn’t need weapons to kill Grendel. When he is young, his pride helps him win battles, but at an old age, hubris can be a flaw. This is seen when Beowulf faces the dragon after he has been king for 50 years. At this old age, Beowulf is still so prideful that he wants to fight the dragon alone. This is an example of how his hubris is a detriment. Because of his hubris, Beowulf does not regard age and thinks he will be victorious just as in previous battles. He finds out this is not so when he is defeated. Beowulf makes many sacrifices in the course of the story to protect his people. The final sacrifice even leads to his death. Near the end of the story, Beowulf hears of a dragon that has been terrorizing his people. To destroy this figure, which the people fear, he goes to fight the dragon with his warriors. When he arrives to the area where the dragon lives, he turns around to his men and says, â€Å"this fight is not yours, / nor is it up to any man except me/ to measure his strength against the monster or to prove his worth† (2533-2535). In this quote, Beowulf tells his warriors he wants to fight the dragon alone. He commands them to stay back so that he may kill the dragon by himself. The main reason why he does this is because he feels responsible for his people and he believes he is the only one that should defend them. His men obey his words, and he goes into battle by himself. At the end of the fight, Wiglaf sees Beowulf die, and realizes the honorable king he was and the heroic sacrifice that he made for his people. Throughout the story and his many battles, Beowulf displays the characteristics of a tragic hero. He was noble, and made many great sacrifices for his people. Beowulf shows that performing his duty as king was more important to him than his own life. This ultimate sacrifice shows the Geats the true hero he was for them. Beowulf, not only in this book, but in all old English literature is one of the best examples of a tragic hero.

Sunday, September 29, 2019

Team Discussion on App for Apple iPhone

Working for Apple the type of research one would want to see done would be a reporting study. This type of study will display data that provides statistics comparing the application to other applications that users are already using and what features of the application users are wanting. This report is the first step in determining if the application is worth moving forward with. Once the application shows to be a valuable asset for users the next step is to focus on what the users want in an applications. I would expect the proposal to demonstrate on how user-friendly the application is, and who is the target audience this application is intended for. Many users want an application easy to use that a child can figure it out in one step. Another key factor users look for is the cost of the application. Keeping the cost down at a low price that is appealing to the user but profitable to the company will make this application successful for both parties. Derek's Response to Nancy I think the reporting study would be a great way to determine whether or not to move forward with the acceptance of the App into the Apple Store. This is because the reporting study would give background information on the App study, including concrete details of the App and how it differs from other Apps in the same category. It would also give the necessary data to determine what group the App would best suit. This information would be obviously important because one would not want an App that is geared toward adults be in the viewing control of children without the proper warning labels. I think that it would have been a great way to find out if the customers would want to buy an app or not. When people are getting ready to get an app they definitely want something that is useful and they will not be disappointed with. When doing research you will be able to see if the app will do good or not. Also it will be able to decipher whether you are gearing it toward the correct audience. You do not want to just throw something out there to see if it will work without research. It is important to test your product before delivering it. If I worked for Apple, the first thing I would want to see in a proposal for a new App for the App store would be whether or not the proposal has met the policy and procedures by Apple. The reason I would do this is that if the requirements were met the App would be compatible with the requirements of Apple’s App store on so many levels. For example: If there are technical glitches or errors the App will not be approved by our technicians. I will also look for the simplicity of the App to make sure it will be user friendly. Creativity would play a big role in App approval because with more than 300,000 Apps in the App store, we would think it is important for the App to be unique. Research would be just as important as policies and procedures to gain approval for the App store. Although at times because of inappropriate research, we would have to be aware of this type of research to make sure it does not become part of the Apple App store. Inappropriate research will include anything that has any racial tones that may offend any of our customers and research must be in compliance with the law. Bottom line is, I will not except anything is unethical. User-friendly application is a function that users look for when deciding on purchasing the application or not. Statics stating what functions users are most likely to be attractive to provides insight if the product will be successful. These statics are important and presenting them in the proposal will help for determination of releasing the application. The application uniqueness is also important and knowing the competition of other application provides insight. Researching applications similar to the one in the proposal will reflect on the popularity of the new application. Following policies, procedures, compatibility, and ethical conduct are very important steps in business, but I am not sure if this information is appropriate research for a proposal. I agree with Derek on this one. You have to make sure that you can get approval from the app store before you try to finalize your product. If you were to introduce a product that was not something that the App store would not even be allowed to have in there store then you would be just wasting time. Research is the key ingredient to making sure that you are producing the right type of app or anything else. Without this we would have a lot of failed businesses. Always make sure that what we are producing is what the people want. Developers are constantly inventing and improving apps for the Apple ® iPhone ® mobile digital device. As a representative for Apple, researching the market of available apps helps take the first step into developing a successful app. A new app proposal requires a content analysis that helps educate developers on successful app designsand marketing. Proving there is a consumer interest for the app from a variety of age groups, demographics, genders, and geographical locations may help determine whether or not the app gets approved. The proposal should provide evidence regarding how the potential app meets the needs of Apple’s customer base. The proposed app plans should surpass the competition by demonstrating that it is one of a kind and has potential room for growth. The research of the app should determine its reliability and show data that ensure the app functions properly with the operating systems (OS) configurations for each device Apple offers. There are numerous apps with an exceedingly crowded market that the barrier to access is low and the barrier to attaining success is high. Offering research for an app that is difficult to duplicate but easy for customers to download will help in the approval process. However, including inappropriate research in the proposal is cause for disapproval. Technical problems like annoying bugs and constant crashes will result in disapproval from Apple. Using images, words, software, or ideas that Apple owns or information that does not pertain directly to the app and its functionality, technical content, or design criteria is inappropriate (Apple, 2012). Proposals containing explicit or offensive material such as adult material, racial slurs, and any kind of discrimination and defamation are considered inappropriate and disapproval may occur (Apple, 2012). However, there is also research that can be one of the priciest errors developers can make. Applying funds to insufficient research or researching ideas that are extensively available becomes futile for developers. They concentrate on generating original ideas and waste time as well as energy producing those apps.

Saturday, September 28, 2019

Police Thesis

CHAPTER 1 Introduction A. Background of the Study In the early years man had a difficult to accomplish their task in short period of time. Their works was never accurate and efficient since people had to do their jobs or responsibilities, manually. Hence, man has continuously looked for a better ways of doing things, for each invention and new development man had to extend their capabilities for making jobs easier and faster so as save time and effort. Man’s curiosity brought for the way of automation.Automation can be defined as a technology concerned with performing a process by means of programmed commands combined with automatic feedback control to ensure proper execution of the instructions. The development of this technology has become an increasingly dependent on the use of computers and computer related technologies. Advanced systems represent a level of capability and performance that surpass in many ways the abilities of human to accomplish the same activities.Manual procedures in performing transactions create problems which results to delay in the generation of reports, consume a lot of time in recording information and retrieving of files. One organization which uses manual record system and encountered those problems is the office of Philippine National Police (PNP) Roxas Zamboanga del Norte. The PNP Roxas, Zamboanga del Norte composing different registered of crime and incident from the different barangay of Roxas Zamboanga del Norte. PNP in cooperation of Local Government Unit (LGU) shall developed and implement programs on preventing crime and incident.The Local Government Unit (LGU) should provide the needs of the PNP Roxas Zamboanga del Norte. According to the PNP staff, recording and retrieving information of the incident and crimes happened and generating of report consume a lot of time since those transactions are done manually. This is the main reason why the researcher wants to conduct a study in the said office. The researcher wa nts to help their office by developing system software, making their transactions faster and easier to handle. B. Theoretical Framework. This study is anchored on Roger Clarke’s (1999) Diffusion of Innovation Theory.His theory describes the pattern of adoption, explains the mechanisms by which they occur, and assists in predicting whether a new invention will be successful. In its early stages, DOI theory was limited to expert in one specific field, examining and evaluating the diffusion of a process which relevant to their specialization. For example, medical sociologist would look a new technology occurring in health care and record the general rates of adoption, at the same time education researcher would study the spread of new teaching methodologist and its inevitable diffusion throughout the school system.Other theory is Everett Roger’s (1995) Diffusion of Innovation Theory. She defines innovation as an idea, practice, or object that is perceived as new by an ind ividual or other unit of adoption. In matters little, so far as human behavior is concerned, whether or not an idea is â€Å"objectively† new as measured by the lapse of time since its first use or discovery. The perceived newness of the idea seems new to the individual, it is innovation.This definition broadly takes on innovation to include not only products such as technological innovation but also ideas and processes that stimulate the development of human potential and organizational processes. Aside from that, Roger also stated in the year 2003 that Diffusion of Innovation theory is the process by which an innovation is communicated through certain channels over time among the members of a social System. † In other words, the study of the diffusion of innovation is the study of how, why, and at what rate new ideas and technology spread through cultures.The Office of PNP, Roxas, Zamboanga del Norte one of the offices that use a manual system in making Spot Report. T heir Spot Report procedures are done through the recording the information into the log book. By adopting the theory the researchers had enhanced the Spot Report of the said office and made known as Automated Crime and Incidents Record Keeping System. C. Conceptual Framework This figure below is the conceptual framework of the study which is represented by these three frames. The first frame refers to the system currently used by the office of the PNP Roxas Station which is Manual Record System.Through the used by the Manual Record System problems occur such as time consuming and delay in the recording and retrieving of information and generation of reports which can be seen in the second frame. Frame two (2) is the reason why the Automated Record System, Frame three (3) will be the focus of the researcher’s study in order to help the PNP in the processing of their transactions easier and faster. ManualRecordSystem| | Time consuming and delayed in the recording and retrieving of information and generation of reports| | Automated Crime and Incidents Record KeepingSystem| Figure 1.Conceptual Framework of the study This figure shows the conceptual framework of the study indicating the present system used at the PNP in processing their transactions. The problems they have encountered and the proposed system that that will help the PNP solve the problems they have encountered. D. Statement of the problem This study aims to design an Automated Record System at the Office of PNP Roxas Zamboanga del Norte. This study will seek to answer the following 1. What are the problems encountered in the Manual Record System at the Office of the PNP Roxas? 2. What system can be made to eliminate those problems?E. Objectives of the Study This study will be conducted in order to: 1. Identify the problems encountered in the PNP Roxas. 2. Develop a system that could eliminate those problems. F. Scope and Limitation This study was conducted at the Office of the PNP, Roxas Zamb oanga del Norte. The study was focused on the spot report, encoding incidences, crimes and generating reports. This study was conducted during the second semester of the SY 2011-2012. G. Significance of the Study The researcher conducted a study on Automated Record System at the Office of the PNP, Roxas Zamboanga del Norte.This study will aim to help the personnel responsible in the crimes and incident records and in the generation of reports to reduce time am effort in recording and retrieving of files. Through this Automated Record System, time consumed in recording information of the crimes, incidence and delays in the generation of reports encountered by the personnel will be reduced if not totally eliminated. For the researcher, this study will enhance their knowledge regarding system development For the future researchers, this study will serve as their reference in conducting system study. H. Operational Definition of Terms Activities or Programs.This refers to the different activities of the PNP like monthly assembly, police drill, etc. Admin. The one who is in charge and provides the recruitment information. Alert Team. The One who is responsible on responding incidents. Finance. The one that responsible on financing matters. Intelligence Division. The one who is responsible on secret record movement and illegal activities of the community. Investigator. The one who is responsible on investigative matters. Operation. The one who is responsible on operational function PCR. â€Å"Police Community Relation† the one who is responsible of the relationship of the community and police.Radio Operator. The one who is responsible in transmitting and receiving information. Spot Report. A report regarding to a happened incidents or crimes. Warrant & Subpoena Server. Te one who is responsible on issuing warrant and subpoena. Chapter 2 Review of Related Literature As we continue to barrel through the information age, it is hard to imagine conducting busi ness without computers. Each day, millions of people working in offices and homes around the world depend on computer technology to do their jobs efficiently and economically.To truly understand the computer’s history involves a daunting journey through mathematics, physics, and electrical engineering; through binary code, Boolean logic, real time, magnetic core memories, floating-point numeral notation, transistors, semiconductors, integrated circuits, and much, mush more. Luckily, most office workers do not need to understand this complex history to use computers and the dizzying array of software programs they execute. When computers were first developed nearly fifty years ago, the people who programmed them considered the task quite maddening.Fortunately, learning to use a personal computer today is often as simple as spending a few hours reading an instruction manual or following a hands-on tutorial. In recent years, computer technology has been incorporated into a wide range of costumers and industrial product. Computers are routinely used into word processing, email, video games, and other application that require repetitive tasks that can be automated. The offices and government institutions mentioned below are among the thousand of offices where application for membership are automated.One example is the Department of Social Welfare and Development. They are currently using the e-Donation Management System through a Memorandum of Agreement (MOA) with Globe X-Change Inc. (GXI) and Memorandum of Understanding (MOU) with the National Computer Center (NCC). The DSWD e-Donation Management System aims to provide the donor community a more convenient and cost-effective option of giving cash donation through the use of technology, such as short messaging services [SMS] or text message, as well as via online or internet.Likewise, it is a costume-designed turnkey solution that delivers, managers, and reconciles contribution and donations via text online transactions, working on a banking industry-standard ICT security environment, and a stable and scalable database system. This system takes the nature of an electronic payment system which is efficient and transparent, as well as fully received trough donation. Another is Tricare records-processing system. The TED system helps civilian providers get paid promptly for the services they provide to Tricare beneficiaries outside of military treatment facilities.Records are processed for provider payments in less than 24 hours in most cases. The ease and speed of the TED system gives providers an incentive to participate in Tricare. Increased participation in Tricare networks provides beneficiaries better access to health care. By verifying and analyzing the information in each records, the TED system allows providers payments to occur promptly and helps prevent payment of duplicate, fraudulent or erroneous claims. The information in the TED system provides data for developing health car e treads and budgets projection.TED system staff members have processed more than $140 billion of purchased services for Tricare beneficiaries worldwide since 2004. The Government Services Insurance System also uses the ECard System in which using your eCard plus, you can check your GSIS records, renew your active status (for Pensioners), and even apply for GSIS loans, when you go to any [email  protected] kiosk installed in all GSIS offices and other major government offices all over the country and manage your eCard Plus ATM account or pay bill online.Also the electronic medical record (EMR) is a computerized medical record created in an organization that delivers care, such as a hospital and doctor’s surgery. Electronic medical records tend to be part of a local stand-alone health information system that allows storage, retrieval and modification of records. Aside from that the Records management, or RM, is the practice of maintaining the records of an organization from the time they are created up to their eventual disposal. This may include classifying, storing, securing, and destruction (or in some cases, archival preservation) of records.A record can be either a tangible object or digital information: for example, birth certificate, medical x-rays, office documents, databases, application data, and e-mail. Records management is primarily concerned with the evidence of an organization’s activities, and is usually applied according to the value of the records rather than their physical formal. Haryana Government is also using a system known as Haryana Land Record Information System. This system is a based software system used by the Haryana government for the computerization of land records in its tehsils. It was developed by NIC Haryana state Unit.Chapter 3 Methodology A. Settings of Study One of the first section citizens read in the local newspaper is the police spot report which contains information on crimes and incident that could af fect them directly. The kind of information provided, however, largely depends on the publication. Local newspapers typically review these records, called spot and reports and print the crimes and incidents happen. Many police departments maintained a handwritten daily spot report. A police report is a record of crimes and incident and committed in a certain area during a certain period of time.Police agencies are required to keep a record of daily activities that can be inspected by the public. So as a police investigator, a factual, precise, accurate information must be posted in the police spot record and its depends upon the agency what type of information they want publish. Police spot report in certain cases, note a suspect’s name, age and address. A name of the victim or complaining party might also be included, but police might avoid providing additional of information if discretion is warranted. Where the crime occurred(at a residence, a business or elsewhere) should be noted as well.Likewise, if a vehicle was damaged or an item was stolen, those things might also be noted. This are the information to be stored in the system to make it easy to find the crimes in the previous recorded incidents. The purpose of a police spot report is to provide an accurate written account of a police officer’s observations during the investigation of a criminal incident. A police spot report can only be written by the officer(s) involved in the investigation of an incident. Each officer who makes a report must swear to its accuracy by signing it.The purpose of making a police spot report into database is to make the investigator easy to find or locate the file that being input in the previous record. PNP Head The figure below shows the organizational structure of the Office of the PNP. ADMIN Operation Radio Operator Intelligence Division Warrant/Subpoena Server PCR SALAAM Alert Team Investigator Finance Figure 2 Organizational Chart The organizational cha rt of the Office of the Philippine National police Roxas Zamboanga del Norte. This figure shows the hierarchy supervision at the Office of the Philippine National Police (PNP). B.Research Design and Procedure of the Study Request letter was sent to the Office of the Philippine National Police (PNP) asking permission to conduct a study in their office. It was followed with the distribution of questionnaire and the conduct of an interview. The researchers in return were provided useful tools such as the organizational structure and different forms like Spot Report form and the master list of the Crimes and Incidents. The researcher have also browsed the internet to gather some related literatures as their basis for the study. The preparation of the manuscript for the system proposal followed.Upon approval, the researcher started to design an Automated Crimes and Incident Record System. Figure 3 on the next page shows the Gantt chart that reflects he work plan in developing a system. C ost and benefits analysis was made to determine the affordability and worthiness of the system. Gantt chart (Work Plan Schedule) Planned starting date – September 2011 |   |   |   |   |   |   |   |   |   |   |   |   | Number of Months|   |   |   |   |   |   |   |   |   |   |   |   | Activities|   | Sept|   |   | Oct|   |   | Nov|   |   | Dec|   |   | Jan|   |   | Feb|   |   | March|   | Apr|   | 1.Conducting aninterview|   |   |   |   |   |   |   |   |   | |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 2. Planning|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 3. Problem|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | Definition|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 4.System analysis|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 5. Presentation|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | of the |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | proposal|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | Planned completion date – April 2012 Figure 3 (Gantt chart) This chart shows the work plan schedule in developing the system.Different activities were listed in order to determine the coverage of the certain activity. This chart also shows when the activities begin and end. C. Data Gathering Procedures The first procedure done by the researchers was conducting an interview to some of the staff of (PNP) for them to know how the PNP Officer processes the Record of Crime and Incidents and what are the problems encountered with regards to the transaction mentioned. When the reserchers found out that the office transactions are done manually, they sent a letter of request to the PNP officer.When the permission was granted, they conducted a formal interview to the PNP Officer , at the same time the questionnaire were given in order to gather more information Another way in which the researchers collected data was browsing the internet and reading some books. The researchers then prepared the proposal for presentation. D. Research Instruments Interview. A tool that was used to gather additional information on how the PNP Officer processed the Crime and Incidents Records. Questionnaires. A tool that was used to collect valuable information from the PNP Officer regarding the flow of processing the Records of Crime and Incidents.Observation. A tool that was also used to gather information by observing on how the Crime and Incidents Records is being done at the Office of the PNP. Journal. A tool that was used to record all observation and investigations done by the researchers so that they will be guided in the preparation and the final presentation of the proposal. Modeling tool. A tool that was used to describe the internal and external behavior of the system. It was composed of two models which is the essential and behavioral model. The environmental model describe the external behavior of the system. E. Data AnalysisData gathered from the research interview was carefully analyzed and interpreted through the cost and benefit analysis. Costs and Benefits estimates and totals at the equivalent money value of the benefits and cost of this system to establish whether this system is worthwhile and affordable to use. The purpose of the cost analysis is to calculate all the anticipated cost associated with the system. It concerns not only the cost of building the system, but also the cost of installing, operating and maintaining the system as well as the auxiliary cost, while the benefits analysis has two kinds.One is the tactical benefits that are often associated in reductions in clerical or PNP personnel and the ot her one is the strategic benefits which are an opportunity to save few clerical people as the ability to let the organization do things what would be possible with the current system. F. Cost and Benefit Analysis The purpose of the cost analysis is to calculate all the anticipated cost associated with the system. It concerns not only the cost of building the system, but also the cost of installing, operating and maintaining the system as well as the auxiliary cost, while the benefit analysis has two kinds.One is the tactical benefits that are often associated in reductions in clerical or PNP personnel and the other one is the strategic benefits which are an opportunity to save few clerical people as the ability to let the organization do things what would be possible with the current system. System Development Cost Visual Basic 6. 0Php 9,250. 00 Consultant Fee Php 9,025. 00 TotalPhp 18,275. 00 Present System Annual Operating Cost Office SuppliesPhp 15,465. 00 ElectricityPhp 2,564. 0 0 Hardware MaintenancePhp 2,000,00 TotalPhp 20,029. 00 Proposed System Annual Operating Cost SuppliesPhp 7,560. 00 ElectricityPhp 3,600. 40Hardware MaintenancePhp 2,100. 00 Total Php 13,260. 40 Annual Operating Cost:Php 13,260. 40 Present Annual Operating Cost A. Supplies 1. Ink (6 tubes/yr @ 1,130/tube)Php 6,780. 00 2. Ribbon Cartridge (5 boxes/yr @ 145. 00/box)Php725. 00 3. Bond Paper (5 rims (US long)/yr @240. 00/rimPhp 1,200. 00 (5 rims(US short)/yr @ 235. 00/rimPhp 1,175. 00 4. Stapler (1 pc/yr @ 145. 00/pcPhp 145. 00 5. Stapler Wire (30 boxes/yr @ 50. 00/box)Php 1,500. 00 6. Folder (30 pcs/yr @ 8. 00/pc)Php 240. 00 7. Fastener (15 boxes/yr @ 150. 00/boxPhp 2,250. 00 8. Puncher (1 pcs/yr @ 220. 00/pcPhp 220. 00 9. Ballpen (30 pcs/yr @ 8. 00/pc)Php 240. 00 10. Liquid Erasure 1 bot. /yr @38. 00/pcPhp 38. 00 Total: Php 14,513. 00 Electricity (Annual Consumption) No. of CPU 1 No. of Monitor 1 No. of Printer 1 Monitor Type Monochrome Working Days 200 General Charge 3. 95 Hours Used/ Days 6 System Unit Power Consumption/Day (6 hrs/ day * 400 watt) 2,400 watt/day HP Printer power Consumption/day (6 hrs/day * 90 watt) 540 watt/ day Monitor Power Consumption/ day (6 hrs / day * 30 watt) 180 watt / day Watt used for by device per day 2,400+540+180=3,120 wattsWatt used for all device / yr (3,210 * 200) 624,000 watts / yr Kilowatt used / yr (624,000 watts / 1000) 624 kilowatts / yr Watt / yr = (watt / day) * (working days / yr) =3,120 * 200 =624,000 Amount Due = (kilowatt / yr) * Generation Charge =624 *3. 95 Php 2,464. 80 Proposed System Annual Operating Cost B. Supplies 11. Ink (3 tubes/yr @ 1,130/tube)Php 3,390. 00 12. Ribbon Cartridge (2 boxes/yr @ 145. 00/box)Php 290. 00 13. Bond Paper (4 rims (US long)/yr @230. 00/rimPhp 920. 0 (4 rims(US short)/yr @ 225. 00/rimPhp 900. 00 14. Stapler (1 pc/yr @ 145. 00/pcPhp 145. 00 15. Stapler Wire (20 boxes/yr @ 50. 00/box)Php 1,000. 00 16. Folder (22 pcs/yr @ 8. 00/pc)Php 176. 00 17. Fastener (12 boxes/yr @ 150. 00/boxPhp 1, 800. 00 18. Puncher (1 pcs/yr @ 220. 00/pcPhp 220. 00 19. Ballpen (18 pcs/yr @ 8. 00/pc)Php 144. 00 20. Liquid Erasure (1 bot. /yr @38. 00/pcPhp 38. 00 Total: Php 9,023. 00 Electricity (Annual Consumption) No. of CPU 1 No. of Monitor 1 No. of Printer 1 Monitor Type Monochrome Working Days 200 General Charge 3. 95 Hours Used/Days 8System Unit Power Consumption/Day (8 hrs/ day * 400 watt) 3,200 watt/day HP Printer power Consumption/day (8 hrs /day * 90 watt) 720 watt/ day Monitor Power Consumption/ day (8 hrs / day * 30 watt) 240 watt / day Watt used for by device per day 3,200+720+240=4,160 watts Watt used for all device / yr (4,160 * 200) 832,000 watts / yr Kilowatt used / yr (832,000 watts / 1000) 832 kilowatts / yr Watt / yr = (watt / day) * (working days / yr) 4,160 * 200 =832,000 Amount Due = (kilowatt / yr) * Generation Charge =832 *3. 95 Php 3,286. 40 Annual Benefit Present System Annual Operating Cost = Php 14,513. 00 Less Proposed Annual Operating Cost = Php 9,023 Annual Sav ings: Php 5,490. 00 Table of Annual Net Benefit Year| Annual saving| (1+i)n| Present value| Cumulative Value| 1| 5,490. 00 | 1. 024| 5621. 76| 5621. 76| 2| 5,490. 00 | 1. 049| 5759. 01| 11518. 02| 3| 5,490. 00 | 1. 74| 5896. 26| 17688. 78| 4| 5,490. 00 | 1. 100| 6039. 00| 24156. 00| 5| 5,490. 00 | 1. 126| 6181. 74| 30908. 07| This Table shows the table of annual net benefit. Project in percentage from 1-5 the cash flow. This table shows that Present value are computed by getting the product of annual saving and (1+i)n while the cumulative value is computed by getting the sum of the present value of that particular year and the cumulative value of the previous year. Where I = interest rate n = no. of years 3% = interest rate Payback Period 2+ Proposed System Annual Operating Cost- Cumulative Value in 3 Years Present Value in 3 Years The Cost and Benefits Analysis given above will help the Finance officer to decide whether to implement a computerized Land Patent Form System. It shows that the total annual operating cost of the present system is Php 14,513. 00; the researcher’s analysis reveals that the proposed system is lower operating cost, lower supplies expenses, less physical space needed, fewer operators required, faster turnaround time, greater accuracy, more comprehensive reports and improves morale-financial benefits school pegs at Php 5,490. 0 annually. Base on the cost-benefits estimates, the office would see a return on each investment in 2 years and seven months. In this case, it is very clear that the expected benefits of the proposed system do exceed the expected cost. G. Hardware and Software Hardware and software requirements are very essential in the automation of the system and they are the component in the system analysis. In choosing hardware factors to be considered include the following ability, affordability, speed and robustness of the hardware to save time and energy. H. Hardware and Software ConfigurationHardware Configuration C omputer: Personal Computer with Pentium (R) or higher processor Memory: 512MB of Random Access Memory or Higher Display: 32bit (1024 x 768 pixels) Monitor: video Graphics Accelerator (VGA) or Higher : Resolution monitor (Super VGA recommended) Hard Dick Requirements: At least 700MB of free space Video Display Adapter: 64MB (Any branded video card) Key board Features: Standard 101/102-Key or Microsoft PS/2 keyboard Mouse: Microsoft mouse compatible pointing device Power Supply: AVR (Automatic Voltage Regulator) 500watts & 220volts outlet UPS (Uninterrupted power Supply) 300watts & 220volts outlet Printer: EPSON LQ300+2 (dot matrix printer) : MP1600Le (photocopier/printer/scanner) Software Configuration Operating System: Microsoft windows 2009 Dark edition, Windows 98, Windows XP, SP2, SP3, Windows 2000 Application Software: MS Office Programming Language: Visual Basic I. Essential Model The essential model is a modeling tool shows what the system must do in order to satisfy t he user’s requirements on how the system is implemented. It consist of two major components namely the environmental model and behavioral model. I. 1. Environmental modelThe environmental model is modeling tool that defines the boundary and the interaction between the system and the environment. It consists of the statement of the purpose event list and context diagram. I. 1. 1 Statement of Purpose The Manual Crime & Incidents Record System of the PNP Roxas Zamboanga del Norte is use to record update and edits information about Crime and Incidents such as Car crash, Robbery etc. and surveying of records. It is also used to generate reports such as Spot Report. I. 1. 2. Event List The event list is a narrative list of all activities that occur in the environment to which the system responses.It has seven events namely: 1. PNP Head request Spot Report 2. Responder Submitted Spot Report 3. Provincial Police Office Request Report 4. Provincial Police Requires Report 5. Region al Police Office request Report 6. PNP Roxas submits the spot report Responder PNP Head Spot Report Spot Report Manual Crime and Incidents Record Keeping System Note Spot Report Master list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Provincial Office Regional Office Figure 4. The Context Diagram that shows the Automated Crime and incident’s Record Keeping System.The figure shows the different external entities in which the system responses. The Responder, PNP head, Provincial Police Office, Regional Police Office are the persons involve in the processing of the Crimes and Incidents record system or information and in generation of reports. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the coll ection of data. Responder Spot Report Spot Report Spot Report File Spot Report ProcessRequest Figure 5. Event List 1: PNP Head Request Spot Report This figure shows that when the PNP Head requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Responder Process of the Spot Report Note Spot Report Master list of crimes and incidentsFigure 6. Event List 2: PNP Head Request Spot Report This figure shows that when the PNP Head requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Terminal – the exter nal entities of the individual or group of people. Legend: Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Provincial Police HeadquartersMaster list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Spot Report File Process Request Figure 7. Event List 3: Provincial Police Headquarter request Master List This figure shows that when an PNP Head submit’s the Spot Report and Master List file to the Provincial Police Office. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Process RequestSpot Report PNP Head PNP Head submit’s the Spot Report Provincial Police Office Figure 8. Eve nt List 4: PNP Head submit’s Spot Report This figure shows that when an PNP Head submit’s the Master List file to the Provincial Police Office. Legend: Terminal – the external entities of the individual or group of people. Process – it represent various individual functions that system carries out. Flows – the connection between processes. Data Store – store the collection of data. Master list of crimes and incidents Regional Police Headquarters Master list of crimes and incidents Spot Report FileMaster list of crimes and incidents Process Request Figure 9. Event List 5: Regional Police Headquarter request Master List This figure shows that when the Regional Police Office requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Legend: Terminal – the external entities of the individual or group of people. Process – it rep resent various individual functions that system carries out. Flows – the connection between processes. Data Store – store the collection of data. Process RequestPNP Head Spot Report PNP Head submit’s the Spot Report Regional Police Office Figure 10. Event List 6: PNP Head submit’s Spot Report This figure shows that when an PNP Head submit’s the Master List file to the Regional Police Office. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. 1. 2 Behavioral Model This model is primary concern on the internal behavior of the system to interest with the environment.This model includes Data Flow diagram, Process specifications and Data dictionary. The behavioral model includes the following: 1. 2. 1 Data flow diagram (DFD) –are us ed to describe how the system transforms information. They define how information processed and stored and identify how the information flows through the processes. 1. 2. 2 Data dictionary – specify relationship between each of said user application. Program and said sets of data stored in said database associated with each of said user application programs. 1. 2. 3 Process Specifications – a step by step flow of transaction on each process.Top Level Data Flow Diagram 1. Process Submission of Spot Report 2. Process Request Spot Report File Spot Report Spot Report Master list of crimes and incidents Spot Report File Spot Report Master list of crimes and incidents Figure 11. This figure shows entire flow of the data through the system. It implies how the transaction is processed and described how the different process involved. Data Store – store the collection of data. Flows – the connection between processes. Process – it represent various individu al functions that system carries out. Terminal – the external entities of the individual or group of people.Legend: 1. Process Submission of Spot Report Spot Report Spot Report File Spot Report Figure 12 Process Submission of Spot Report This figure shows that during the process of Submission of Spot Report. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Spot Report Master list of crimes and incidents 2. Process Request Master list of crimes and incidents Spot Report Spot Report File Figure 13Process Request This figure shows that during the Process of Request and Release of Spot Report and Master List File of Crime and Incidents. Legend: Terminal – the external entities of the individual or group of people. Data Store – store the collection of data. Process – it represent various individual functions that system carries out. Flows – the connection between processes. J. 2. Data Dictionary Alphanumeric=* either number or letter or combination of both* Address=*address of the person where involve in an incidents or crime Character=*a letter, number and special character*sContact No. =*Contact No. of Person Involve [email  protected]{numeric} Date =*(mm/dd/yy)* [email  protected]{numeric} Name =Name of person [email  protected]{character} Numeric =*a number (0-9)* Request information =*an information of a particular crime or incidents* [email  protected]{alphanumeric} Record =*It refers to all the information of the requested item which is being inputted by Responder* [email  protected]{alphanumeric} Record File =*refers to the file in which all the record information about the Crime and Incidents is stored. This file is also used during retrieval of information* @{alphanumeric} Spot Report =*refers t o the file in which all the record information about the Crimes and Incidents is stored. This file is also used during retrieval of information* [email  protected]{alphanumeric} ={Full name}+{age}+{address}+{sex}+{time}+{date}+{place}+{evidence}+{Materials}+{summary of the incidents} J. 3 Process Specification Process 1: Submission of Spot Report Begin Open Spot Report File If Close Close Spot Report File End If End Process 2: Process Request Begin Open Spot Report File If Close Close Spot Report File End If End

Friday, September 27, 2019

Composition of the Song of Deborah Essay Example | Topics and Well Written Essays - 1000 words

Composition of the Song of Deborah - Essay Example Ackroyd, who mainly comments on the authenticity of the historical facts, starts his essay by pointing out the differences between the prose that narrates the story in logical sequences and the poetry, that picks up only the special, particularly selected scenes, both, according to him, are not unnatural and unprecedented. He mentions Carrington's article that talks about King Alfred who as a fugitive was reprimanded by the farmer for allowing the cakes to burn in his royal preoccupations. He agrees with Carrington's argument that in medieval times there was hardly any demarking line between the fact and fiction and it is difficult to authentically agree if such a situation ever arose during King Alfred's fugitive status. Ackroyd finds the relevance of these points with the Song of Deborah and its study because poetry always picks up important points and leaves the rest. Another reason is that a period of a century lies in between the event and its poetical formation. According to Gerlaman the date is an 'unconfirmed presumption' although the poem sounds rather primitive with its tribal sketches of scenes with Jael, Sisera and Sisera's mother. The eye witness accounts might have been exaggerated or colourised. According to his visualisation of the battle, the stage was Israel in Canaan and the poetic glorification of Yahweh and over the years, accounts must have changed, diminished, improved upon, and hope for factual accounts dwindles. He feels that a more scientific historian might have tried to reconstruct the scene later dropping the unwanted elements out of it giving more coherence to certain dull points. He argues that the song should be viewed as a preserver of traditions instead of trying to make it a historical and well-authenticated document. It is not possible to derive exact history of events from this song because the writer himself was confused between the Sisera of the tradition and the captain of Jabin of Hazer's army. Still, the poem is invaluable as a document that could evidence for the days of the writer, and that means only one century this way of the real event. This view is not accepted by all. According to Globe (1974), Song of Deborah is a literary unity. "The poem has a carefully composed structure employing a significant number of recurring literary forms. No detail of the subject matter is out of place in a victory ode of the late second millennium near East" (511). Answering various contradictions about the literary context, recently Labuschagne said: "Like the poems in Exodus 15 and Deuteronomy 32, the Song of Deborah in Judges 5 is an embedded hymn. It is not an inset hymn, because there is no indication whatsoever that the poem had a previous setting from which it was transferred and inserted into its present context" and mostly the scholars are agreeable with this context now. http://www.labuschagne.nl/3.jud5.pdf The story of this fiery female judge who could prophesy, who is also hailed as the Mother of Israel, told once in prose and then in poetry in the book of judges, also tells that she was not a queen, but was equally respected and moved in the male-dominated world of arguably eighth century BC. In the patriarchal set up, this capable woman rises to tell that Israelites are not forgotten by God and guides them during an acute hour of need. Gerleman also says: "The emotional colouring, the ethos which irradiates the Song of Deborah and gives it an inner uniformity has a two-fold source, viz. the fusion of

Thursday, September 26, 2019

UN Resolution on Israel (assigned Country is Nigeria) 1.15 single Essay

UN Resolution on Israel (assigned Country is Nigeria) 1.15 single spacings - Essay Example ons Human Rights Council of 24 January 2008 and of the United Nations  Office for the Coordination of Humanitarian Affairs of 25 May 2010, as well as the statements conveyed by the United Nations Special Rapporteurs present in the Gaza Strip, Fully alarmed that the continuation of the present crisis in the relations between the State of Israel and the Palestinian authorities in the Gaza Strip may undermine the peace process and lead to significant challenges to the regional stability, 1. Calls upon the two Parties concerned to exert all efforts necessary to resolve their differences and to make full use of the instruments of pacific settlement of disputes provided for in Chapter VI of the Charter of the United Nations. Such a settlement shall be conducted under the procedural rules the two Parties find the most beneficial to their common interests, and shall be supervised by the special Commission of the Security Council of the United Nations; 2. Condemns the unjustifiable acts of violence committed by the armed forces of the State of Israel and the paramilitary formations of the Palestinian authorities in the Gaza Strip against the civilians residing both in Israel and Palestine and calls for the objective arraignment of all the persons involved in them; (a) Avoid interfering with independent attempts of international non-governmental organizations to provide humanitarian assistance to the civilian population of the Gaza Strip, invite the States concerned to provide security assistance to the participants in such efforts; 4. Recalls an obligation on both Parties to respect the previous Resolutions of the Security Council with regard to maintenance of the peace and stability in the Middle East and appeals to all Parties concerned to exercise the maximum restraint when faced with mutual disagreements; 5. Welcomes the efforts of the Government of the United Kingdom of Great Britain and Northern Ireland to enable the relaxation of the blockade of the Gaza

I Have a Dream by Martin Luther King Essay Example | Topics and Well Written Essays - 1000 words

I Have a Dream by Martin Luther King - Essay Example By focusing on the spirit that the civil rights movement portrayed, King made a speech that managed to resonate not only in America, but in other parts of the world as well. Though the speech was regarded as being very powerful, various historians ask whether the speech is the greatest in history (McFarnon). This paper will discuss the impact that Martin Luther King’s speech I Have a Dream has towards portraying an era of racism, discrimination and injustice that perpetrated against African American in the US. Discussion Any historian may judge the King’s address as being the greatest in history, though it is classified as among several epochal speeches in the history of America. The speech reveals some of the greatest gifts that King possessed where he was able to address different groups of people with a single voice. He managed to revive the souls of crusaders and awaken the consciences of the general public. King was capable of speaking in an eloquent manner about the experiences that African Americans went through and awaken the American spirit in a simultaneous manner (McFarnon).

Wednesday, September 25, 2019

The purpose that HR serves in the organization and to society also Research Paper

The purpose that HR serves in the organization and to society also encourage an understanding of one HR practice - Research Paper Example However, for a company to benefit and manage its resources accordingly there is a need to have human resources department to oversee the organizational management process and procedure (Bogardus 26). In an organization, there are three main organs, which must coordinate in order to achieve the organizational goals; the shareholders, management and employees. The shareholders are the top leadership who recruits the management to run the organizational programs on their behalf; the employees are the junior staff and sources of labor to handle the organizational operations as scheduled by the management (Gaspar 19). Through the human resources management department, employees are assigned duties that must be monitored to affirm that the employees are working in accordance with the terms and conditions that they accepted during the recruitment process (Kamoche 40). In order for a strategy to be implemented in an organization, the human resources management department must be involved being the management consultants employed by the executive leadership of the organization to hire, monitor employee performance and keep the best workforce and fire the unproductive workforce leaving the employees who would work towards the accomplishment of organizational objectives (Price 44). The mandate of the human resources management is to ensure that the organization is operational meaning that the set return goals and objectives are met with adequate investment returns (Armstrong 06). However, according to the requirements of an organization, the human resource management should be well vast with company laws and regulations in order to implement the same on the employees and reduce cases of unnecessary claims hence shaping the whole organization towards the management process (Price 85). Any organization does not only benefit the employees and workers; the community and society are also able to

Tuesday, September 24, 2019

Applied research methods Proposal Example | Topics and Well Written Essays - 4750 words

Applied methods - Research Proposal Example Opening up another store is a part of the rigorous expansion plan that the business has on its cards (http://www.debenhams.com). Debenhams plc is a UK based retailing business, operating as a departmental store within UK and across various countries. It is also listed at the LSE by the symbol DEB. The business was formed centuries back in 1778. As of April 2009, the company owned over 150 outlets and 40 franchises (http://www.debenhams.com). The revenues for the firm, for the year 2008, exceeded GBP 1.8 billion, while operating income was in excess of GBP 170 million; the net income figure remained over GBP 70 million, with an employee base of over 27,000 individuals (http://www.debenhams.com). Based on the above discussion, it can be stated that the aim of this research is to conduct the various research techniques, primarily the questionnaires and focus groups on the prospect customers and interviews from the company officials (as the later chapter of proposed study states). The underlying objective of the research would be to realize the realistic conditions and ground realities amongst the prospect customers that are they actually in a welcome mode for a new store in their respective region. It is important to absorb as many subtle cultural comments about the proposed stores as possible, so a relaxed survey and focus group environment is essential, yet the retailing concept being discussed must be as realistic to the respondent as possible. The absolute ideal situation would be to conduct the surveys in a complete simulation of the real version of the store being proposed, including fully-stocked display racks, lighting, flooring, sounds, smells, air conditioning, cash registers etc. and with realistic prices, so that the customer gets a clear idea of what they are being asked to pay for and why. If a full-scale mock-up is unaffordable a large-screen presentation of a virtual simulation of a store would be prove critical. 2. Literature Review 2.1 Retailing and Retail Business Dunne (2004, p 52) states, and is agreed by various authors such as Findlay (2002, p 105), Bruce (2004, p 60), Hinfelaar (2004, p 90) and Cateora (2002, p 205), that retail sector is one of the booming sectors in the global economy today, with not just boom associated but tremendous level of competition also associated to the line of business. Retailing business is mainly the approach from business to consumer, or more commonly stated as B2C approach of a business, whereby, the goods and services are transferred from business to consumers/customers via fixed locations such as departmental stores, display showrooms, etc (Journal of Retailing, p 140). Supermarkets, departmental stores, factory outlets, fast food, grocery shops, are prime examples of retailing business, while the real companies that can

Monday, September 23, 2019

Low risk 1 Essay Example | Topics and Well Written Essays - 250 words

Low risk 1 - Essay Example If his right to grant remission in such cases were despised, the guilt would remain entirely unforgiven.   This means the Pope has no power to remit sins. Only God can remit sins. What the Pope can do here is only to declare to a person that God has remitted their sins. Therefore, when the pope offers the sacrament of penance, he does not effect the penance himself, but lets the penitent know that God has remitted their guilt. This shows it is only God, who has the power to remove a person’s sins. The Pope has no power to remove sin. What the Pope can do in this case, is only offer the sacrament of penance, after a person humbles and accepts their sins before the pope. However, the real penance comes from God. Canon law, including the penitential laws only applies to the living and not the dead. Therefore, the dead souls in the purgatory are not under the judgement of penitential canons. This means the Pope has no power to remit the penalties owed by the souls in the purgatory, since the penitential laws do not apply to them. Either way, in case the souls in the purgatory have any remorse, this is outside the power of the pope, and there is nothing he can do. This means when a person dies, they are released from penalties. The canon law then no longer holds them. The dead, by virtue of being dead are entitled to freedom from all penalties, and this release from penalties is owed to God, and not to the Pope. Therefore, the Pope has no power to free the dead from their penalties, as God is responsible for

Sunday, September 22, 2019

School bullying Essay Example for Free

School bullying Essay Bullying is the use of force or coercion to abuse or intimidate others. The behavior can be habitual and involve an imbalance of social or physical power. It can include verbal harassment or threat, physical assault or coercion and may be directed repeatedly towards particular victims, perhaps on grounds of race, religion, gender, sexuality, or ability.[2][3] The victim of bullying is sometimes referred to as a target.( Wikipedia), also according to stopbullying.gov bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Both kids who are bullied and who bully others may have serious, lasting problems , and another statement from childparenting.com bullying is intentional aggressive behavior. It can take the form of physical or verbal harassment and involves an imbalance of power (a group of children can gang up on a victim or someone who is physically bigger or more aggressive can intimidate someone else, for instance). Bullying happen in different places but according to Wikipedia Bullying is a common occurrence in most schools. According to the American Psychological Association, approximately 40% to 80% of school-age children experience bullying at some point during their school careers.[16] Regardless of the grade level, socioeconomic environment, gender, religion, or sexual orientation, bullying can happen to anyone. However, various studies point out that students from lower socio-economic backgrounds are more bullied than students from higher socio-economic background. Most children experience bullying at some point in their academic careers. The following is a list of statistics that illustrate the severity of bullying within classrooms:[16] * 20-40% of bullying victims actually report being bullied * 70% of middle school and high school students experience bullying in school * 7-12% of bullies are habitual and pose a serious threat * 23% of 9th graders have carried a weapon to school recent ly[18] * 5-15% of students are constantly bullied * 27% of students are bullied because of their refusal to engage in common sexual practices * 25% of students encourage bullying if not given proper education and support in anti-bullying techniques[15] Due to the low numbers of students who actually report incidents of bullying, teachers need to have a certain level of awareness that will thwart any potential problems. This awareness starts with understanding bullying. Bullying can happen in school, so it is the responsibility of students to protect their classmates and to show everyone the dignity and respect they would like to be treated with. The first line of defense in bullying is in student’s own behavior. But when that fails, it must be brought to the attention of someone in authority, like a teacher. The concept of someone in authority failing to address the problem is simply not acceptable. This is why you must speak to a teacher you trust and know will do something to stop the bullying. There are different kinds of bullying; one of those is verbal bullying. Verbal bullying mostly happen in schools. In many cases, verbal bullying is the province of girls. Girls are more subtle (and can be more devastating), in general, than boys. Girls use verbal bullying, as well as social exclusion techniques, to dominate others and show their superiority and power. However, there are also many boys with subtlety enough to use verbal techniques for domination, and who are practiced in using words when they want to avoid the trouble that can come with physically bullying someone else.( bullyingstatistics.org). Examples of this are name calling, insults, teasing, and intimidation, homophobic or racist remark. In the Philippines, it is common to have a group of friends and teased those people who are isolated. One example that shows verbal bullying happens in schools is the news regarding the teacher who bullied her disabled students, the today shows reported the incident and the recorded tape said: Wilt, who did not respond to requests for an interview, can be heard on the recordings alongside Chaffins calling Cheyanne â€Å"lazy† and â€Å"dumb.† â€Å"Cheyanne, are you kidding me? Are you that damn dumb? You are that dumb?’’ Chaffins can be heard saying in one instance. â€Å"Oh my God. You are such a liar. You told me you don’t know. It’s no wonder you don’t have friends. No wonder nobody likes you because you lie, cheat.’’ On the other hand, the more serious and dreadful regarding the issue of bullying is the physical bullying, About 42 percent of kids have been bullied while online with one in four being verbally attacked more than once, 80% of the time, an argument with a bully will end up in a physical fight, 43% fear harassment in the bathroom at school. Physical bullying mostly happens between boys. It is usually their way of getting their anger out. Physical bullying can be pinching someone on the arm, to kicking someone in their stomach, and everything in between. Physical bullying is also stealing or destroying someone else’s property. According to Wikipedia.com, cyber-bullying is defined as: â€Å"when someone repeatedly makes fun of another person online, or repeatedly picks on another person through emails or text messages, or uses online forums and postings online intended to harm, damage, humiliate, or isolate another person whom they don’t like.† Online bullying, termed â€Å"cyber-bullying†, happens when teens use the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person. Cyber-bullying researchers, Hinduja and Patchin define cyber-bullying as â€Å"willful and repeated harm inflicted through the medium of electronic text†, and recently updated the definition to account for cyber-bullying through internet that occurs without actual text, such as videos being uploaded from â€Å"You Tube† for example. In schools, bullying may take the form of repeated name-calling, physical abuse, and continually making fun of diff erences. In the workplace bullying may be characterized by harassment, scapegoating, name-calling, physical abuse, or unfair work pressures. Although people who bully exude a tough exterior, they are often motivated by insecurity, feelings of social rejection, lack of control, and stress. Stressors that can motivate a person to bully include poor academic or work performance, an unsupportive peer network, and strained parental relationships. Commonly, people who bully have been the victims of abuse and express their anger by directing it toward others. Bad behavior frequently gets more attention then good behavior; the need for attention may influence a person to act out and bully another individual. According to abs-cbn news site, In a study led by Plan International and Unicef on Violence Against Children in Public Schools in 2009, it revealed that 4 out of 10 children in Grades 1 to 3 and 7 out of 10 in both Grades 4 to 6 and high school have experienced some kind of violence in school. The study also said that verbal abuse is the most prevalent form of violence experienced by children at all school levels. This includes being shouted at and being cursed, ridiculed, teased or humiliated. It also revealed that children experience violence both from their peers in school and from school personnel. Reccie Oliveros, a volunteer for Volunteers International for Development, Education and Service of Young People and Women (VIDES), has for many years dealt with children who have been bullied as well as the bullies themselves. She said some signs that your child is being bullied are when he or she becomes iyakin, biglang tumatahimik, may fear sa mukha, ayaw ng manood ng mga violent shows. Yung iba ayaw ng pumasok sa school. Oliveros said parents should talk to their children who are victims of bullies. Tanungin ang anak, baka may nasabing di maganda, may nagawa na di sinasadya. Tapos kausapin ang teacher at tapos hikayatin sila na dalawin ang pamilya ng batang bully, she said. Oliveros said the bullies usually have problems at home like parents who are absent all the time. Insecure sila. Kulang sa atensiyon. Minsan nam-bubully pag walang pumapansin sa kanila, said Oliveros. Social factors also contributed in bullying, In two studies, McKown and colleagues had a total of 284 children, ages 4 to 16 years old, watch movie clips and look at photos before judging the emotions of the actors based on their facial expressions, tones of voice and body postures. Various social situations were also described and the children were questioned about appropriate responses. The results were then compared to parent/teacher accounts of the participants friendships and social behavior. Kids who had social problems also had problems in at least one of three different areas of nonverbal communication: reading nonverbal cues; understanding their social meaning; and coming up with options for resolving a social conflict. A child, for example, simply may not notice a persons scowl of impatience or understand what a tapped foot means. Or she may have trouble reconciling the desires of a friend with her own. It is important to try to pinpoint the area or areas in a childs defici ts and then build those up, McKown explained. When bullying continues and a school does not take action, the entire school climate can be affected. The environment can become one of fear and disrespect, hampering the ability of students to learn. Students may feel insecure and tend not to like school very well. When students don’t see the adults at school acting to prevent or intervene in bullying situations, they may feel that teachers and other school staff have little control over the students and don’t care what happens to them. The effects of bullying are so devastating and profound that over the last few years at least 37 state laws against bullying have been adopted. There have also been civil suits brought against schools and school systems over bullying incidents, some with damages in the millions of dollars. It is important to realize that, like sexual harassment and racial discrimination, some forms of bullying are illegal actions. Bullying is a serious issue that will impact the school experience of all children involved. This is why it must be taken seriously and effective measures to prevent it must b e put in place. Van der Kolk, McFarlane, and Weisaeth (2007) state, â€Å"Trauma in childhood can disrupt normal developmental processes. Because of their dependence on their caregivers, their incomplete biological development, and their immature concepts of themselves and their surroundings, children have unique patterns of reaction and needs for intervention.† Many of the children who are affected by traumatic stressors such as bullying can have their developmental processes and parts of their brains affected by the traumatic events (Ziegler, 2002). Many psychologist said that bullying is related to the person’s view of him/her self according to Tammy Wilgenbusch, a clinical psychologist with University of Iowa Childrens Hospital, said that at this age, children are developing their personalities and independence so they may be more likely to take their insecurities out on or try to wield power over others. By later adolescence, they have a better sense of self and are less likely to take insecurities out on others, Wilgenbusch said in a statement. Bullying is a negative or aggressive act that is systematic and ongoing that can be instigated by one person or a group of individuals, Wilgenbusch explained. Meanwhile if bullying can cause a stress and anxiety, it has a lot of tendency lead to suicide attempts. The statistics on bullying and suicide are alarming, suicide is the third leading cause of death among young people, resulting in about 4,400 deaths per year, according to the CDC. For every suicide among young people, there are at least 100 suicide attempts. Over 14 percent of high school students have considered suicide, and almost 7 percent have attempted it. Bully victims are between 2 to 9 times more likely to consider suicide than non-victims, according to studies by Yale University. According to statistics reported by ABC News, nearly 30 percent of students are either bullies or victims of bullying, and 160,000 kids stay home from school every day because of fear of bullying. The correct definition to this question is bullycide is suicide caused from the results of bullying. Children and teens who are bullied live in a constant state of fear and confusion in their lives. Many feel the only way to escape the rumors, insults, verbal abuse and terror is to take their own life. Bullycide is clearly a serious issue. Bullying has been a major topic since last year in mainstream media news and has become a problem everyone is taking awareness on — more than ever these days. Kids and teenagers are scared to talk about the issue they are facing. It even happens with high school students, where according to U.S. News studies done by the National Center for Education Statistics states that, only a quarter of high school students speak out on being bullied. There are various things that a parent or teacher can do to teach their children and their students about the effects of bullying. Information on the facilities and action that can be taken to educate the young can be found in the Scholastic article, â€Å"Bullying and Teasing: No Laughing Matter† that explains the issue to parents. From my own personal experience with bullying for nine years, victims are set to believe students/kids become bullies because of their insecurity and issues at home, which they cast on the victims; which usually turn out to be the school â€Å"underdogs.† From my own experience, I noticed that when victims, such as myself, approach a counselor or someone else for help in school, we hear the bullies are trying to take their own rage and aggression due to insecurity or personal problems at home out on the victims. Serious action and consequences however are not being taken by counselors, and/or deans until the situation of bullying goes to the extreme, forcing the school in jeopardy of getting a bad reputation for bullying. Even though the idea that, bullying is wrong can be taught through anti – bullying organizations, and advocates against bullying, we also have to realize there are problems that the perpetrator is facing and needs help with. Therefore, while helping the victim, the perpetrator should also be helped. With so much awareness on bullying by mainstream media news, there have been various organizations that have made it their mission to put an end to bullying. A couple of years ago, anti-bullying organizations, including STOMP OUT Bullying and Champions Against Bullying took a stand to bring awareness to this problem. However, the effects of bullying, like Ty’s case, has brought more awareness to this problem which is making organizations come together to teach the youth on why bullying is wrong. Therefore, and organization made up of 52 other organizations was created in April 2011 called â€Å"Be a STAR Alliance. Be a STAR Alliance was founded by the Creative Coalition and World Wresting Entertainment (WWE) to educate children on bullying. Even though some might take what WWE is doing as promoting bullying when they are doing their wrestling shows, they strongly continue to advertise what they do is being done in a safe environment by trained professionals and should not be done at home, school or anywhere else. Ironically, the WWE is promoting bullying through wrestling but they are doing this to entertain fans through wrestling not to promote bullying. As a victim of bullying, I have joined the Be a STAR Alliance organization and its partners to bring awareness on bullying as well as to end it. Be a STAR Alliance has a pledge they encourage members and others to take to put an end to bullying through their Public Service Announcements (PSA). The way to put an end to bullying is to educate young students who will form the next generation. If they get educated to not be a bully from their youth, then they will know how to show tolerance and respect to their friends, peers, and anyone they meet in their lifetime. That is exactly what the goal of the alliance is. Be a STAR stands for Show Tolerance and Respect; hence STAR is capitalized due to the value of the letters for this organization. At the same time, there are steps and help for both victims and perpetrators that need to be strictly enforced in a school environment. With bullying on the rise, more student, parents, and educators are encouraged to take a stand by organizations like Be a STAR alliance to put an end to bullying. Hopefully, with more people and organizations standing up to stop bullying, everyone can put their foot down to end this problem once and for all so the effects of bullying stops short of death or suicide for children, as in Ty Smalley’s case. Bullying behaviour is seen all over the world and almost in all sections of society. It might start at an age as early as preschool and might intensify in the transitional teenager years. There can be various reasons behind this kind of aggressive behaviour. Often the victim is shy and introvert and weak in built as compared to bully. On the other hand, bullying is a behaviour which does not necessarily demand a great built. A bully tries to attract the attention of others in a negative manner. It can be correlated with attention deficit hyperactivity disorder. Similarly children coming from aggressive or disturbed family background showcase the bullying behaviour. Sometimes bullies just gives around what they have been through as retaliation. The affected child is most of the times submissive and docile in nature. It is extremely hard to identify if the child is facing bullying at school or community. Generally the affected children don’t talk with their parents about the incidences. They are either too scared or feel embarrassed to admit such behaviour happening to them. But parents might notice a quite withdrawal of the children from daily situations. The kid may repeatedly complain of false aches and avoid going school. Frequent crying or getting upset often over trivial matters is also sign of bullying. Any kind of unexplained bruises or abnormal behaviour of the children must be checked and investigated thoroughly. On identifying the problem the foremost thing is to build confidence in the child. It is important to make him understand that he is listened to and his feelings are respected. Pay attention to each and every detail the child narrates. Sometimes it is hard to identify the gravity of the situation and any loose thread may lead to serious consequences. School authorities, or teachers, or counsellors at school may be approached regarding the matter. If necessary, parents of the bully can also be approached but it is always advisable to do so in front of counsellors only. Bullying is a serious matter and should be strongly dealt with. Even if the child has not yet faced any such situation it is important to explain him such prevalent behaviours in the society and ways to tackle it. If left unattended, this childhood problem can have serious effects on the personality of the child throughout his life. Recent shootings at various schools in US are thought to be an expression of physical bullying only. This is enough to explain the gravity of the situation and early remedial measures should be taken. Bullying is a serious problem that can dramatically affect the ability of students to progress academically and socially. A comprehensive intervention plan that involves all students, parents, and school staff is required to ensure that all students can learn in a safe and fear-free environment. â€Å"When people hurt you over and over, think of them like sand paper. They may scratch and hurt you a bit, but in the end, you end up polished and they end up useless.† ― Chris Colfer

Saturday, September 21, 2019

What, How, Who and Answers to Global Warming

What, How, Who and Answers to Global Warming Global Warming Determining What, How, Who and Answers to Global Warming Global Warming is steady increase of average temperatures due to the slowly growing strengths of human made greenhouse gases. Global warming can also mean that observing the temperatures without indicating of the cause too. The most accepted reason is the burning of fossil fuels which does expel carbon dioxide into our atmosphere. â€Å"As of 2010, the concentration of carbon dioxide is about 50% higher than it was before the start of the industrial revolution in the late 1800s.† (Australian Coal Association Low Emissions Technology, 2014) The increase in temp is contributed to the CO2 absorbing radiation which is the radiation the Earth loses to space when heated by the sun. This reaction produces greenhouse gas which helps produce a blanket over the planet that retains warmth. Since the early 70’s, 91% of the radiation energy has been stored in the oceans. The oceans main role in energy absorption is also used to increase the average temperature of the Earth’s Air and Seas temperatures. Since the turn of the century our Earth’s air and sea temps have steadily increased about 1.4F with about 2/3’s of the increase happening in the last 30 years. Each of the last 3 eras has been increasingly warmer at the Earths surface then the last hundred years combined. We have been recording temperature records since the late 1800’s so this data is well documented and gives us a baseline to go from. These data collections are the result of natural changes with the Earth and human beings making Greenhouse Gases. â€Å"A panel convened by the U.S National Research Council, the nations premier science policy body, in June 2006 voiced a high level of confidence that Earth is the hottest it has been in at least 400 years, and possibly even the last 2,000 years.† (Stanford Solar Center, 2013) But since humans are still to burning fossil fuels, the Earth is steadily warming unnaturally. The Northern most part of the hemisphere has experienced the most major rise in temperature, near 2.5’ Fahrenheit. â€Å"Average temperatures in Alaska, western Canada, and eastern Russia have risen at twice the global average, according to the multinational Arctic Climate Impact Assessment report compiled between 2000 and 2004.† (National Geogr aphic, 2014) We all know this CO2 release is coming from our automobiles, factories and burning coal etc. Our way of life is killing mother Earth, we continue to cut down trees pollute our oceans and for what? This paper is going to breakdown in three major sections giving my conclusions on what, how, why and fixing this Global Warming problem we as a planet face. There are many different factors which can make the warm the planet, but the major contributor is human created carbon dioxide emissions from fossil fuels. A huge contributor to global warming is the greenhouse gases that people release into the atmosphere. Majority of the gases released include carbon dioxide, nitrous oxide and CFCs (chloral floral carbons). The use of natural resources has increased the amount of CO2 in the atmosphere. â€Å"However, over the last several hundred years, humans have been artificially increasing the concentration of these gases, mainly carbon dioxide and methane in the Earths atmosphere.† (Earth Observatory, 2014) Let’s not forget about another form of global warming like deforestation. Forest grounds are moist, but without protection from tree cover they can dry out. Trees also help spread the water cycle by releasing water vapor back into the atmosphere. If we do not have trees helping with the ecosystem we will soon loose countless specie’s. Cutting down trees deprives the forest of its canopy, which helps cut down the sun’s rays during the day and retains heat at night. This displacement leads to higher temperatures ranges that can be harmful to plants and animals. Trees also play a critical role in absorbing the greenhouse gases that fuel global warming. Fewer forests means larger amounts of greenhouse gases entering the atmosphere and increased speed and severity of global warming. Thousands of years have since past and the Earth has had a diverse temperature effect without any human influence. This temperature change has been the result of other factors such as: the tilt of the Earth and changes in the levels of gases in the atmosphere. The Earth actually wobbles throughout its solar rotation around the sun. â€Å"This wobble in the Earth’s rotation has been causing changes in the temperature of the atmosphere for many millions of years.† (A Cooler Climate (2014) The suns variations in size from the past to present has an ecosystem effect. Scientist believe we are experiencing more and more solar flares that have a negative impact on our atmosphere too. There is a theory amongst scientist that Global Warming is a â€Å"regular life cycle event but I do not believe this to be true. Even though the Earth had ice ages and warmer temps in the past. Industry throughout the world gives off CO2 and it thickens the atmosphere UV rays are not being able to reflect back into space warming the Earth. A blend of compound atmospheric and ocean sequences which are inevitably driven by changes in solar output. The Earth goes through constant climate change cycles and has done so throughout its history. The exact mechanism is not well understood but appears to be related to the sun plus solar activity. â€Å"The ocean and volcanoes are much bigger sources of CO2 and other such greenhouse gases than humans. If the CO2 count is increasing, the influence of man may be minimal.† (Bionomic Fuel, July 16, 2014) The planet is currently in a cool down cycle and will continue to be so for at least a several years because the Pacific Decadal Oscillat ion. It would only make sense that the last thirty years with the Pacific Decadal Oscillation in its warm phase caused the planet to warm. I read that people were asking questions like, who would be the most affected by this. And the answer is simple, everyone on the planet will pay a price for Global Warming. Theoretically every living breathing thing can be affected by climate change. Warmer seas means changing currents, which means distorted rainfall amounts on the continents. Plant life will move because of changing rainfall patterns. Insects, trees and animals will move to follow the vegetation and water. If global warming continues, there will be irreversible effects. Effects like erratic weather patterns, sea levels rising, dry waterless areas and ice caps melting. The US alone has millions of people living within a mile of the oceans. The majority of our major cities are located of the coasts or Great Lakes. All of these will be under water and completely useless. The world’s mountain contain some 80% of fresh water in forms of ice and snow. Global Warming would potentially melt this with devastating cons equences like massive flooding. â€Å"Urgent action is necessary to combat these effects. We cannot afford to wait as the well-being of you and your children is at stake. It is up to you to take responsibility for your actions.† (A Cooler Climate, 2014) Around the globe, people are taking responsibility and helping reduce CO2 emissions through more efficient environmentally energy resources. Unfortunately the people, who will be affected by Global Warming the most, are the poorer countries. These countries lack proper funding and education to help build finance facilities that can reduce our carbon foot print. Your citizens need to have a good understanding of what can happen when greenhouse gases are not taken seriously. Properly educating everyone will ultimately benefit the planet. How about free trade being affected? Every nation on Earth has some form of trade going on and you must take in account rising sea levels major trade ports being underwater. Who is going to rebuild all of the sea lanes, rebuild the docks? How about taking in account how are household items like food, water, TV and so on get here. Since the launch of industrialization in the modern world global trade has added to pollution of our environment. Looking at data gathered global trade contributes near as much pollution per capita calendar year as public transportation does. â€Å"Effectively combating our planetary climate crisis will require changes to the underlying manufacturing, energy, farming – and trade – systems that are now fueling carbon emissions.† (Greenpeace USA, 2014) Due to the outsourcing of companies and products nearly every household product in America travels on average over 4500 miles to reach its home, these items are transported by planes, ships or trains all of which burn massive amounts of fossil fuels. The link between Global trade and Global Warming has many ties like burning fuel which creates greenhouse gas and the amount of trade that goes on any given day is unbelievable. What can we do as regular people do to help reverse this growing problem? There are many easy steps you can do right now to cut global warming pollution. Make sustaining energy a part of your normal routine. Each time you choose a LED light sticker bulb over an traditional bulb, youll lower your energy consumption and keep nearly 600 pounds of CO2 out of the air. By purchasing brands with the energy star sticker, this indicates it uses at least 16% less energy than what the federal mandate is over a less traditional models. Lower cost, reliable cars to help reduce Global Warming gases are available now. From small cars to large trucks, there is no reason not purchase these to help take a step in the right direction fuel cell vehicles can help answer the problem for our future. Hybrids can help eliminate pollution by 1/3 or more and are currently available by every major car manufacturer in the U.S. Voluntary cutback programs have not been effective at stopping the growing of emissions. Many CEO’s of major corporations have agreed it is time for the governments to step in and create tougher, stouter laws to help combat Global Warming. Here is the and Canada public support is at it all time highest to propose and cap emissions of CO2 and other greenhouse gases produced from larger power plants (coal burning) and transportation fuels. We should start implementing cleaner cars and electrical generators into widespread use; this will start reducing gas contamination from vehicles and power plants immediately. By doing this we should start pushing and relying more on alternative solutions like wind, solar, geothermal and wave power. Firmer efficient obligations by appliance manufacturers for electrical appliances will help lower pollution. We need more programs or laws in place like what the Clinton administration implemented in the 90’s. Household central air units/heat pumps must reduce electrical usage by 30% for all new installs. This act will help reduce carbon release by 51 million metric tons a year. Alternative solutions for power consumption are here and we must start embracing it or Global Warming will not stop. Alternative energy defines all things that do not use or consume fossil fuels. These alternatives are found everywhere and anyone can use the majority of them plus they are eco-friendly. With very small to no pollution why not use them? South Africa is helping lead the way of solar power. They just installed the world’s largest solar farm producing some 18 gag-watts a year. South Africa, like other countries, is trying to reduce CO2 emissions as well as increase its alternative energy solutions. Wind energy is a very unlimited resource here in the Midwest. A single windmill can supply crop irrigation, pumping water and powering electric lights. Just in Indiana alone we have hundreds of windmill farms all over the state that helps reduce our grid consumption and saves on the release of fossil fuel gases released into the atmosphere. Geo thermal energy is taking off and it is accessible anywhere on Earth. Geothermal energy means energy drawn or harnessed from beneath the earth. A lot of countries try to use this energy to generate electricity for thousands of homes. Geothermal energy produces no pollution, lowers our dependence on fossil fuels. â€Å"Geothermal fields produce only about one-sixth of the carbon dioxide that a relatively clean natural-gas-fueled power plant produces.† (National Geographic 2014) There are many different ways to use alternative solutions to help reduce our dependence on greenhouse gas producing fuels. Listed above are a few but here are some more to help get you interested; Hydroelectric Energy, Biomass Energy, Ocean Energy and Hydrogen Energy. In conclusion, we the people of mother Earth must alienate ourselves from fossil fuels, if we are going to stop or reduce the effects of Global Warming. Right now we have a chance to redeem our planet but once we cross a certain line there is no going back. Let’s unite and save the planet. References Earth Observatory (2014) Global Warming: What is causing Global Warming? http://earthobservatory.nasa.gov/Features/GlobalWarming/page2.php Jonathan Strickland and Ed Grabianowski, (2014) How Global Warming Works: http://science.howstuffworks.com/environmental/green-science/global-warming.htm National Geographic (2014) Global Warming Fast Facts http://news.nationalgeographic.com/news/2004/12/1206_041206_global_warming.html Ecosystems Hazards to our World (2014) Global Warming http://peer.tamu.edu/curriculum_modules/Ecosystems/hazards/global_warming.htm Stanford Solar Center (2013) Global Warming: What is it? http://solar-center.stanford.edu/sun-on-earth/glob-warm.html Random Facts (January 29, 2009) 35 Critical Facts about . . . Global Warming http://facts.randomhistory.com/2009/01/29_global-warming.html References A Cooler Climate (2014) Global Warming Natural Causes http://www.acoolerclimate.com/global-warming-natural-causes/ Bionomic Fuel (July 16, 2014) Is Global Warming Fake? http://www.bionomicfuel.com/is-global-warming-fake/ GreenPeace USA (2014) Climate Change Trade Policies: We have a problem: our current trade rules are worsening climate chaos http://www.greenpeace.org/usa/en/campaigns/global-warming-and-energy/Climate-ChangeTrade-Policies/ National Geographic (2014) Geothermal Energy: Tapping the Earths Heat http://environment.nationalgeographic.com/environment/global-warming/geothermal-profile/ Australian Coal Association Low Emissions Technology (2014) What is Global Warming? http://www.newgencoal.com.au/faq/68.html 1