Monday, September 30, 2019

Field Programmable Gate Arrays and Applications

Chapter 2 Field Programmable Gate Arrays and Applications ( FPGA ) 2.1 Introduction to FPGA: A FPGA is a device that holds a lattice of reconfigurable entryway exhibit logic hardware. At the point when a FPGA is arranged, the inner hardware is joined in a mode that makes adjustments executing of the merchandise proviso. Dissimilar to processors, FPGAs usage committed equipment for managing logic and do n't hold a on the job model. FPGAs are truly parallel in nature so typical transforming operations do n't necessitate to seek the same assets. Therefore, the executing of one some piece of the proviso is non influenced when excess preparing is included. Additionally, different control circles can run on a lone FPGA appliance at typical rates. FPGA-based control models can authorise basic interlock logicand could be intended to debar I/O drive by an decision maker. Nonetheless, dissimilar to hard-wired printed circuit board ( PCB ) plans which have altered equipment assets, FPGA-based models can really rewire their interior hardware to allow reconfiguration after the control mo del is sent to the field. FPGA appliances convey the executing and dependableness of devoted equipment hardware. A individual FPGA can replace many distinct sections by consolidating a big figure of logicentryways in a lone coordinated circuit ( IC ) bit. The interior assets of a FPGA bit comprise of a grid of configurable logicsquares ( Clbs ) encompassed by an outskirts of I/O pieces. Indexs are directed inside the FPGA grid by programmable interconnect switches and wire classs. 2.1.1 Need of FPGAs: By the early 1980 ‘s extended graduated table coordinated circuits ( LSI ) structured the spinal column of a big part of the logiccircuits in important models. Chip, transport/IO accountants, model redstem storksbills and so on were actualized utilizing integrated circuit industry invention. Irregular â€Å" paste principle † or interconnects were still needed to assist fall in the huge integrated circuits to: 1. Produce world-wide control marks ( for resets and so forth. ) 2. Information marks get downing with one subsystem so onto the following bomber model. Systems normally comprised of few huge graduated table coordinated parts and extended figure of SSI ( small graduated table incorporated circuit ) and MSI ( average graduated table incorporated circuit ) components.intial enterprise to take attention of this issue prompted betterment of Custom Ics which were to replace the expansive step of interconnect. This reduced model elaborateness and piecing cost, and enhanced executing. Then once more, usage Ics have their ain peculiar hinderances. They are by and large highly extortionate to make, and delay acquainted for point with concern sector ( clip to market ) in visible radiation of expanded lineation clip. There are two kinds of disbursals included being developed of usage Ics 1. Expense of promotion and constellation 2. Expense of production ( A tradeoff by and large exists between the two disbursals ) Therefore the usage IC methodological analysis was executable for points with high volume, and which were non clip to market delicate. FPGAs were acquainted as an option with usage ICs for realizing whole model on one bit and to give adaptability of reprogram ability to the client. Presentation of FPGAs brought about alteration of thickness in regard to discrete SSI/MSI sections ( inside around 10x of usage ICs ) . An alternate playing point of FPGAs over Custom Ics is that with the aid of machine helped constellation ( CAD ) devices circuits could be executed in a short step of clip ( no physical design transform, no screen devising, no IC piecing ) . 2.2 FPGA Design Flow: A standout amongst the most imperative focal points of FPGA based lineation is that users can be after it utilizing CAD instruments gave by constellation cybernation organisations. Bland constellation watercourse of a FPGA incorporates wining stairss: 2.2.1 System Design: At this phase conceiver need to take what section of his utility must be executed on FPGA and how to organize that utility with remainder of the model. 2.2.2 I/O integrating with remainder of the system: Input Output watercourses of the FPGA are coordinated with remainder of the Printed Circuit Board, which permits the lineation of the PCB quickly in constellation procedure. FPGA merchandisers give extra cybernation programming replies for I/O outline procedure. 2.2.3 Design Description: Designer depicts outline usefulness either by using conventional editors or by using one of the different Hardware Description Languages ( HDLs ) like Verilog or VHDL. 2.2.4 Synthesis: Once lineation has been characterized CAD instruments are utilized to put to death the constellation on a given FPGA. Amalgamation incorporates bland promotion, slack promotions, power betterments took after by agreement and directing. Use incorporates Partition, Place and class. The output of constellation executing phase is bit-stream papers. 2.2.5 Design Confirmation: Bit stream papers is bolstered to a trial system which reenacts the constellation utility and studies faux pass in desired behavior of the lineation. Timing instruments are utilised to concentrate greatest clock return of the constellation. Soon the lineation is stacking onto the mark FPGA appliance and testing is carried out in nature ‘s sod. 2.2.6 Hardware design and development: The general methodological analysis of adjustments betterment for programmable logicis demonstrated in Fig. 2.1 and depicted in the subdivisions that take after. Possibly the most dramatic differentiation between equipment and scheduling lineation is the manner an applied scientist must chew over the issue. Programing applied scientists have a inclination to believe in turn, really when they are making a multithreaded requisition. The lines of beginning codification that they compose are invariably executed in a specific order, at any rate inside a given twine. On the off opportunity that there is a working model it is utilised to do the visual aspect of correspondence, yet there is still merely one executing motor. Throughout outline entryway, equipment fashioners must think-and system in analogue. The greater portion of the info indexs are transformed in analogue, as they go through a set of executing motors each one of an agreement of macrocells and interconnections-to their end o utput marks. Fig 2.1: Programmable Logic Design Process Normally, the constellation entryway measure is taken after or assorted with times of utile reenactment. That is the topographic point a trial system is utilized to put to death the lineation and affirm that the right outputs are processed for a given set of trial inputs. Despite the fact that issues with the size or timing of the equipment may at present manifest subsequently, the Godhead can at any rate make certain that his logicis practically right before go oning to the undermentioned stage of betterment. Gathering merely starts after a practically right representation of the equipment exists. This fittings agreement comprises of two alone stairss. First and first, a center of the route representation of the equipment lineation is generated. This measure is called combination and the consequence is a representation called a netlist. The netlist is gadget independent, so its substance do n't trust on upon the specifics of the FPGA or CPLD ; it is by and large put away in a standard organisation called the Electronic Design Interchange Format ( EDIF ) . The 2nd venture in the reading methodological analysis is called topographic point & A ; class. This measure includes mapping the consistent constructions depicted in the netlist onto existent macrocells, interconnectednesss, and include and yield pins. This process is like the relative venture in the betterment of a printed circuit board, and it might likewise take into history either programmed or manual design sweetenings. The effect of the topographic point & A ; class procedure is a bitstream. This name is utilised blandly, irrespective of the manner that every CPLD or FPGA ( or household ) has its ain, typically sole, bitstream group. Suffice it to state that the bitstream is the mated information that must be stacked into the FPGA or CPLD to do that bit to put to death a specific adjustments lineation. Increasingly there are to boot debuggers accessible that at any rate take into consideration single-venturing the equipment program as it executes in the programmable logicgadget. Anyway those merely supplement a reenactment environment that can use a per centum of the information created throughout the topographic point & A ; class venture to give door degree diversion. Clearly, this kind of incorporation of appliance peculiar informations into a nonexclusive trial system obliges a great working relationship between the bit and reproduction setup Sellerss.

Sunday, September 29, 2019

Independence air was a low cost air line

Independence air was a low cost air line that was owned by FLYi, Inc who had their headquarters in Virginia. Independence air operated from the year 1989 and it’s stopped its operations in 2006. Independence air mainly focused on the East Coast and the West coast.The route network of independence air was based in Washington Dulles international airport. Unfortunately the company ceased its operation on January 5th 2006 at 8:24 p.m.The company (independence air) had been in Chapter 11 bankruptcy from 7th 2005 there were some discussion that was taking place, which people thought would have saved Independence air but that did not happen.Explanation of Independence Air business planAtlantic Coast Airlines is the predecessor of Independence air line. The independence air line company started has Atlantic Coast Airlines in 15th December 1989. It (Atlantic Coast Airline) was operating a feeder services as United Express for Delta Connection and United Air lines.United with drew from contract after disagreement with Atlantic Coast. This forced Atlantic company to reinvent itself to a low cost independence air. The main objective of independence airline was to come with an air carrier with bargain base, off beat and a friendly service (Sharkey 2006)The 4 Ps for the independence airliner is: For their Promotion – independence airliner carried out intensive promotion even before it was launched. On 20th May 2004, before they inaugurated their first flight, they signed a three year deal with Washington Redskins; the company was to become the official sponsor of Washington Redskins.This was a marketing strategy for independence. In the summer of the year 2005 independence air line offered College students a Glide Summer travel pass.After paying two hundred and fifty US dollars Customers were to fly free (after paying airport fees and taxes) from May 1st to August 31st on Saturdays, Wednesdays and Tuesday. This was not geared towards getting any revenue, it wa s purely meant to have customers fill in the empty seats.The company also invested on a fleet of twenty promotional vehicles, which they dubbed â€Å"Jet trucks†. They modified pick ups trucks and painted them in airline’s livery and on the trucks bed they attached an aircraft tail.The company also had some humorous touches which it added to flying experience like the company replaced the flight attendant safety announcement   with a version of celebrities such   Mary Matalin and James Carville which had earlier on been pre recorded.On their Pricing, the company opted for a lower price as compared to their competitors, this was mainly meant to attract customers. They finally succeeded in attracting more customers, such that at their peak they were operating 600 flights on a daily basis.Their pricing strategy was one of the factors that some scholars argued that failed, because whenever the price of fuel roused, they didn’t adjust their prices. When it comes to Place, Independence air mainly focused on the East Coast and the West coast. The route network of independence air was based in Washington Dulles international airport.The company had many diverse Products in terms of the type of airplane that they were operating. Independence airline operated the following airplanes CRJ200, Bombardier, British aerospace jet stream 4100 turbo prop and several air buses.   (Williamson 2006 pp 19 -26).Independence air line had many strengths and weaknesses.   Some of its weakness was: the company was faced with a lot of competition from its competitors who were charging a higher price for their ticket as compared to Independence airline examples of some of their competitors were United air line. The second weakness is that the company failed to undertake a more intensive promotion; this made them to loose some of their customers to united airline.Lastly some critics also point out that the management of independent airline was also not effectiv e. Some of its strength were the   company had a lot of capital that they invested,   the company had a sales and marketing team that was creative lastly lowering the prices of their services was also a strength to them because it made them to attract more customers.While carrying out their Environmental and market assessment the company carried extensive studies on some of the companies that they thought will be their competitors.These gave them an idea on how the market is and how they were going to enter into the market. Independence air line believed that it could easily prosper on its own because of the strategy that they were going to use to enter the market. They were confident that by reducing the prices of their services they will be able to attract more customers (French 2004)

Saturday, September 28, 2019

Mathematics and statics for economists Statistics Project

Mathematics and statics for economists - Statistics Project Example The sample data for happiness is positively skewed which means that most people interviewed has a positive happiness level. The kurtosis of 15.41579212 shows that the probability of extreme values is less than for a level of happiness, and the values are wider spread around the mean of 4.820680628. The histogram gives a clear graphical representation of positive kurtosis and skewness. The data are concentrated to the left of the mean level of happiness representing a general positive level of happiness among the sample population. In a nutshell, the data is positively skewed but with a median of 5, the data is almost normally distributed considering that the mean is 4.820680628. From the Anova results above, the P value 0.00 while the significance level ÃŽ ±=0.05. The P value 0.00 The correlation results show that level of happiness and means of traveling to work exhibit a positive association. The correlation coefficient is 0.819346. This happiness and means of travelling travel in the same direction. The regression equation shows the relationship between happiness and means of travelling travel in the same direction. According to the regression line, an increase of means of travelling to work by one unit will increase the level of happiness 2.740298 when all factors are held constant. From the regression result, means of traveling to work positively influence the level of happiness. This means the two variables exhibit a positive relationship. The results according to the link above show that there effects of commuting to the level of happiness at

Friday, September 27, 2019

An Analysis of the Juvenile Justice System Research Paper

An Analysis of the Juvenile Justice System - Research Paper Example Because many commonalities are shared by the juvenile and adult criminal justice systems, it is often easy to confuse the overall goals and mechanisms which drive them. The most notable contrast between the juvenile justice system and the adult criminal justice system is the fact that the juvenile justice system has it its core the goal and desire to rehabilitate the offender rather than merely punish him/her for the crime. Because of the varying degrees of compatibility and comparison between the two systems, this analysis will examine Supreme Court rulings in order to show a pattern of differentiation and evolution of juvenile justice over time. 1 In re Winship 397 U.S. 358, 90 S.Ct. 1068 (1970) The first case in question is case 397 U.S. 358 (In re Winship). The case revolved around a 12 year old who was charged with stealing money from a woman’s purse inside a store. Although the defendant was seen running from the scene, the Supreme Court determined that the preponderance of evidence alone was not sufficient to convict the juvenile of the crime; instead, the court ruling upheld that juvenile justice cases must be held to the same rigor that traditional criminal justice cases are in that it must be proved beyond â€Å"reasonable doubt† that the accused was guilty. ... need not operate under the same standards of law that applied to adult courts because the juvenile justice system was intended to save rather than to punish. Rather, the Supreme Court sided with the defense and ruled that proof beyond reasonable doubt as well as the existence of a preponderance of evidence was necessary to adjudicate cases within the juvenile justice system. To an extent, this case further restricted the existing juvenile justice system. Prior to this precedent, the juvenile justice system was not beholden to many of the guiding standards that affected traditional criminal cases. As a result, the juvenile justice system encouraged an judicial atmosphere of â€Å"make it up as you go along†. Unfortunately, this type of attitude did not lend itself to the appropriate dispensation of justice. Judges were taking liberties with the notion that they were responsible for saving the accused youth; thereby encouraging the judges to err on the side of caution when handi ng down sentences in the hopes that they might reform an errant youth. Although the Supreme Court upheld the right of the juvenile justice courts to correct the youth as well as punish them, the constraints of how the judges were to go about â€Å"correcting† the youth was significantly altered. 2 McKeiver v. Pennsylvania 403 U.S. 528, 91 S.Ct. 1976 (1971) In much the same vein, 403 U.S. 528 worked to create further delineations of due process within the juvenile justice system. The case regarded a 16 year old boy who was charged with robbery, larceny, and the receipt of stolen property. The case hinged upon the fact that the youth was only provided with a few moments to meet with his attorney prior to going before the judge. Because of the overall lack of legal defense preparedness, the

Thursday, September 26, 2019

The Application of Marketing - PARTA -The tools of Marketing Essay

The Application of Marketing - PARTA -The tools of Marketing - Essay Example For example, advertising is a powerful means to reach out to customers, but it is expensive and needs to use the right media and the right message for effective results on the vast resources expended on it. Public relations is a more subtle approach useful in managing issues of public concern and top level messages, but suffers from the deficiencies of requiring professional support and difficulty in evaluating its impact. Sales promotion is an effective means of addressing a particular target market, whose impact on the objective of increased sales can be measured, and enhances sales channel commitment to the product. However, it suffers from the deficiencies of forecasting problems, with the effect being only as long as the sales promotion lasts and the possibility of brand devaluation, particularly if price is a part of the sales promotion strategy. Yet, when used in conjunction these tools of marketing can be an effective to achieving the marketing objectives for a product (Cheve rton, 2006). In 2003, Coca-Cola along with its competitor Pepsi ran into trouble on India, when the environmental NGO, Centre for Science and Environment (CSE report) released a report that the presence of pesticides in the soft drinks exceeded the European standards (Vedwan, 2007). Coca-Cola attempted to negate the effect of this accusation by running advertisements using film stars to indicate that their production infrastructure and methods provided soft drinks that were pure for consumption. In addition they ran a sales promotion campaigning giving 50 ml more of soft drink at no extra cost. These efforts failed, though Coca-Cola was not at fault for the CSE report on the presence of pesticides in the soft drinks and their market share dropped. There was more faith in the non-profit making report than in the claims of the profit making multi-national giant and went to show the inept

Wednesday, September 25, 2019

International Law Essay Example | Topics and Well Written Essays - 2500 words - 1

International Law - Essay Example Senegal has ratified the U.N. Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, and is obligated under its provisions to either prosecute or extradite Hebrà © (aut dedere aut prosequi).3 However, such obligation does not require Senegal to extradite Habre specifically to Belgium. Recent conventions and state practice has embraced a duty not to extradite persons that face seriously discriminatory applications of criminal law authority. This limitation on the duty to extradite is incorporated in both the European Terrorism Convention4 and the United Nations Terrorist Financing Convention5: â€Å"Nothing in this Convention shall be interpreted as imposing an obligation to extradite†¦if the requested State Party has substantial grounds for believing that the request for extradition†¦has been made for the purpose of prosecuting or punishing a person on account of that persons race, religion, nationality, ethnic origin or political opinio n or that compliance with the request would cause prejudice to that persons position for any of these reasons.† Thus, an individual does not face fair criminal prosecution where relevant forms of discrimination result in selective prosecution.6 Such emergent exceptions to extradition should also be automatically incorporated in Article 1(F)(b) of the Convention relating to the Status of Refugees.7 Belgium as well as the Western World has shown a persistent practice of discrimination against Africans and to some extent Latin Americans so far as prosecution for crimes against humanity are concerned. While Belgium has readily prosecuted or initiated investigations against Africans accused of crimes against humanity, in March 2003, when at the behest of family members of civilians killed in the 1991 Gulf War, Belgian prosecutors launched an investigation of former President George H.W. Bush,

Tuesday, September 24, 2019

Impacts of Immigration on Origin and Host Countries Research Paper

Impacts of Immigration on Origin and Host Countries - Research Paper Example This is because they are likely to move out of their native homes at one point in search of employment or for other reasons thus it is important that they understand the consequences of immigration. Immigration refers to the movement of individuals from their country or region to other countries that they are not native. In most cases, people move to other areas for the purpose of settling permanently. It is usually a result of a number of factors some of which include economic and political reasons, natural disasters or one’s willingness to change the environment. Immigration is also associated with both negative and positive impacts. On one hand, they may fill the workforce gap in the country they might have moved into that may have been created as a result of the aging population especially in the western countries. This is usually the case where Africans move to the western countries. On the other hand, the immigrants may influence the natives negatively by introducing culture in the new environment that could be detrimental to the culture of the country that they will have moved to. Studies indicate that immigration has been found to have negative impacts on the native population. Data 1: Research has shown that the majority of the immigrants consist of the young population that possesses high degrees in different domains. They usually move from their native homes especially those in the developing nations in search of job opportunities in the developed nations. Backing: In the developing nations, there is a little industrialization and thus high unemployment cases due as there is competition for the few jobs available. Individuals then move out of their countries and in turn this causes brain drain. This is because as they move out, the number of elite individuals decreases.

Monday, September 23, 2019

Managerial Finance Assignment Example | Topics and Well Written Essays - 500 words

Managerial Finance - Assignment Example c) The utility company can take out a large debt as it is able to sustain it as it generates enough revenue throughout the year to finance the debt where a software company which works on one of orders and generates revenue on successful orders completed hence they cannot afford to reduce their profitability and revenues by taking debt and then giving interest on it. d) The investor would not invest all the investment in one company as this will increase risk. When the investment is spread over all the various companies and various industries of different nature the inherent risk of investment is diversified and minimized. P2-15 a) The company has a very effective sales collection system in place and as per the figures the company has a defective rate of 12.5% and rest of the sales in other terms have been collected in cash or were already collected as per the system. b) Yes it would increase the entire debt from a 12.5% to a staggering 16.67% which would mean the company is effectiv ely loosing 16.67% of the 75% sales that it is making which is a huge problem for the company.

Sunday, September 22, 2019

The bad effects of plastic on humans Research Paper

The bad effects of plastic on humans - Research Paper Example This is because it is non-biodegradable hence an environmental pollutant (Vogel, 2013). It is not only an environmental pollutant, but it has harmful effects to humans. This paper discusses the various dangers plastic presents to humans. Effects of Plastic on Children Most of children toys and equipments, such as baby bottles and teething rings, are made of plastic. They therefore contain phthalates that soften plastics, and Bisphenol A, which makes the hard clear plastics (Schierow, (2011). The children readily consume these chemicals through ingestion. The entry of these toxic chemicals in their body system leads to suppression of hormones in their body system. This therefore results in underdevelopment of some of their body organs. Small exposures to these chemicals have the same effect as when there is a large exposure because of their small body mass (Hochberg, 2012). Effects of Burning Plastic As a method of disposing plastic materials in the homestead, people opt for burning. Burning of plastics emits dangerous gases which, inhaled, may increase the probability of suffering from heart attacks, asthma, emphysema, rashes and nausea among others. Burning of polystyrene polymers, for example the yoghurt containers, leads to production of styrene which when absorbed through the skin may damage the mucous membrane and the eyes. Plastics containing PVC are the most dangerous since the toxic dioxins emitted when burning them is carcinogenic (Vogel, 2013). Some of the waste from the burning of plastic persists for long periods in the environment. As a result, the wind blows them into the water bodies or various sections of the land. The persistent pollutants are therefore able to bio-accumulate, hence are able to increase in quantity in water bodies, contaminated water and food. The exposure of humans to these pollutants is through consumption of animals that consume the products from the water bodies, for example fish may consume mercury-contaminated water (Knig ht, 2012). This may lead to health problems such as cancer, deformation of their children, failure of reproducing, and immune diseases. Impact of Littering Plastic Littering plastics in the environment also have negative effects on our land. It increases the level of land and water pollution. Their disposal on land leads to the degradation of land, where the land reduces its capacity of food production. They block the absorption of water and mineral soils hence lessen the growth of plants and trees (Schierow, (2011). Disposal of a large mass of plastics in the environment can cause landslides, which may cause death of humans. In water, they attract the persistent organic pollutants, which are hydrophobic (Hsieh et al., 2004). They are therefore able to spread the pollutants into the clean environment, where they gain contact with wildlife. Consumption of these wastes leads to health problems such as infertility, deformation of offspring and respiratory problems, which may lead to de ath (Vogel, 2013). Wildlife may also consume the small pieces of plastic that may cause death of wildlife. The increase of death of wildlife reduces the number of tourist attractions, therefore reducing the level of income in the country. Effects of Industrial Production of Plastic Manufacture of plastics leads to emission of large quantities of carbon monoxide, which readily oxidizes to carbon dioxide. Due to the

Saturday, September 21, 2019

Excel Igcse Computer Studies Glossary Essay Example for Free

Excel Igcse Computer Studies Glossary Essay Actuator – It is a device that can be operated by signals from a computer or control system causing physical movement. (E.g. devices for opening windows in a computer controlled ventilation system) Algorithm – It is a sequence of instructions designed to perform a particular task and it is independent of any programming language. It includes precise details about the operations to be performed and in what order. (E.g. pseudo-code or program flow chart) Batch processing – It is a processing that doesn’t start until all the data are collected without any needs of human interaction. It uses computer during overnight. (E.g. payroll system, billing, cheque processing) CAD (Computer Aided Design) – It is the use of computer system that allows engineers and architects to design new projects by producing drawings. (E.g. designing new cars) Command-line interface – It is a set of commands instructed by the user in order to communicate with the computer and get the requirements sorted out. Compiler – It is a program that converts high-level language into machine language and converts whole program before execution. Cookies – It is a text which the user receives when in access to the internet website and gets automatically downloaded onto the user’s computer and further develops to infect a computer. (E.g. it can be blocked when the user rejects it by setting its restriction on the web page) Data integrity – It refers to the accuracy of data. Data-logging – It is an automatic capturing and storing of data readings from sensors over a period of time. (E.g. weather forecasting) De-skilling – It is replacing a semi-skilled labour with a micro-processing control system. Dry run – It is working through a program or a section of a program manually. This is useful for locating errors, particularly run time errors. E-commerce – It is an electronic commerce that allows buying and selling goods and services through the internet/computer networks. Either B2B or B2C, they still serve their products. (E.g. on-line shopping, Internet/online banking) H.J.Hong Encryption – It is a way of preventing data files that contain sensitive  information from being used if they’re stolen. Expert system – It is an application of artificial intelligence (AI) to a particular area of activity where traditional human expert knowledge and experience are made available through a computer package. (E.g. medical diagnosis) Generic software – It is a type of software that can perform many different related tasks. Intranet – It is a communication system, providing similar services to the internet solely within a particular company or organization. It makes it possible to share documents, databases and applications, using the same protocol as the internet. (E.g. more secure data) Logic gates – They are the components used in making logic circuits. Each gate has 1 or more inputs and produces a single output that depends upon the input(s). Simulation – It is a study of the behaviour of a system by using a model. (E.g. flight simulator) Structure diagram – It is a means of representing the design of a program or system and it demonstrates what happens at a program level Top-down design – It is the technic of breaking down a problem into subtasks that are sufficiently simple enough to be written as a self-contained module or procedure. (E.g. allows several programmers to work on the same large task, each module can be tested/debugged separately) Validation – It is a check on the data input and detects any data that is unreasonable and unacceptable. Video-conferencing – It is a form of an electronic communication through Internet for people who are geographically separated to transmit audio and video data. (E.g. meetings held at different locations) Virtual reality – It is a computer simulation that uses special interactive devices such as data gloves to create an artificial environment. (E.g. viewing newly constructed houses/pilot training) Virus – It is a program which replicates itself and damages files or data. (E.g. it alters the data on the infected computer without the user knowing it)

Friday, September 20, 2019

Computing And It In Workplace Information Technology Essay

Computing And It In Workplace Information Technology Essay This documentation has been written and compiled as a representation of our group assignment that has been completes as part of an assessment of the Computer and Information Technology in Workplace (CITW) module. Where by our group has chosen Malayan Banking Berhad (Maybank) as the organization which with a group of three individuals, the three individual topics that we have selected based on the chapters that we have learned to be compared with Maybank are security, enterprise computing and ethical legal issues. Malayan banking Berhad online banking, Maybank2u.com, is the scenario to be discussed on how the computers and information technology are valuable to it. With this current scenario, in a group, we also able to learn on the functions and process, its advantages and disadvantages and the impact towards the organization upon implementing its online banking system. Introduction Maybank is the largest banking and financial group in Malaysia and has been leading the banking industry for over three and a half decades. Malayan Banking Berhad or Maybank was incorporated in Malaysia on 31 May 1960 and commenced operations on 12 September 1960. On 17 February 1962, Maybank was listed on the then Kuala Lumpur Stock Exchange (now known as Bursa Malaysia). Maybank is today among the largest companies by market capitalization on Bursa Malaysia. Maybank vision is to be a regional financial service leader and their mission is humanizing financial services from the heart of ASEAN. Maybank has also won many awards and recognition over the past few years. Maybank is the leading provider of financial services, meeting the different needs of their targeted customers through an efficient and integrated Group. Maybank is Malaysias largest financial services group with total assets exceeding RM350 billion. The Group has an extensive global network of 1,750 offices in 14 countries namely Malaysia, Singapore, Indonesia, Philippines, Brunei Darussalam, Vietnam, Cambodia, China, United Kingdom, U.S.A., Bahrain, Papua New Guinea, Pakistan and Uzbekistan. The first overseas branch is open in Brunei. Maybank offers a comprehensive range of financial services and products ranging from commercial banking, investment banking, Islamic banking, cards issuance, offshore banking, leasing and hire purchase, insurance, factoring, trustee services, asset management, stock broking, nominee services, venture capital and Internet banking. The online banking such as Maybank2U brings a lot of advantages of their customers. Today, the Maybank Group has over 40,000 employees who serve over 18 million customers worldwide, with 9.5 million customers in Malaysia alone. Maybank has been consistently ranked among Malaysias most valuable brands. It is also ranked first among Malaysian banks by Brand Finance in its Global 500 survey and 134th among the top 1,000 banks in the world by The Banker Magazine. Maybank (Online Banking Maybank2U) A current scenario Maybank2U Online Banking Our group has chosen a current scenario which is online banking via internet through maybank2u.com.my website. Technology have improve become better as they help the human to do thing easier, flexible and fast without physically appear in the place. Maybank have come up with these online banking services Now days lot of people prefer to do their bill payment transaction money online banking via online by just click on the website using their input device such as mouse and keyboards which is easier and easier rather than go to the bank queue up in the counter to do billings or transaction. Besides that, most people also own a laptop or smart phone which they can connect internet easily since most of the restaurant or place have WIF connection. It is easier, faster and save more time by doing it via Maybank2u.com rather than physically appears in the bank itself. Maybank2U online banking helps lots of people as it is user friendly and many banking services provided in it. Function of online banking in Maybank2u (M2U) Bills and Statement Customers can pay, view, save and print their bills, credit card and bank statement via online in their M2U account. Besides that, they can also can view, save and print their advices and notices via online rather than receive printed copies. It makes customer easy to manage their bills, bank statement and advice online without any charges. Life and Leisure It helps their customers to get enjoy sweet music by downloading n certain Maybank support website, order their favorite food such as in Pizza Hut, buy tickets such as movie tickets via this Maybank2u.com website. Maybank2u.com Merchant Programme It is a program that lets all the merchants sell their product and collect payment from their customers via online M2U or in the merchants website which Maybank have supported. They can pay their bills online by debating their Maybank savings or by using Maybank credit card. Online banking for business customers Business customers will get some additional services such as cheque service using M2U. They can view stop cheque, cheque status, and request for cheque book via online. They can also view their account summary and transactions history. They can transfer their funds in own accounts, registered third party, registered interbank GIRO, enquire, cancel future transfer and also pay over 500 bills and make future payments. Transfer funds Transfer fund between two accounts can be done in Maybank online banking. For specific transactions, Transactions Authorized Code (TAC) it must be necessary because it gives extra cover of security to protect you against unauthorized access to your account. For TAC we can request 24 hours a day and 7 days a week at maybank2u.com.my or by phone. Advantages of Using Online Banking via Maybank2U.com (M2U) Flexibility We can pay, view, save and print our bills, credit card and bank statement, advices and notices via online in our M2U account anytime and anywhere with the present of internet connection and electronic device that can connect internet such as smart phone and notebook. It is fast and more convenient ways to settle our bills rather then we got to bank. View accounts summary We can check and view your account balance is the maybank2u.com (M2U). We can daily check our account summary by selecting our accounts at Account and banking page in M2U. It makes us easier to view our account anytime. Paperless Paperless are use in online banking. Paperless banking is environmentally friendly, and the support of go green. Users can save all their information, bills statement or others in their hardware or save in their e-mail. They did not need to waste money to buy files to keep all their document and then need of space to keep all those files. It will also be difficult if we wanted to find some bill it takes more time also. Free There are no charges or any fee for this M2U online statement service or use the M2U online banking services. Disadvantages of Using Online Banking via maybank2u.com (M2U) Start-up may take time In order to register for your banks online program, you will probably have to provide ID and sign a form at a bank branch. If you and your spouse wish to view and manage your assets together online, one of you may have to sign a durable power of attorney before the bank will display all of your holdings together Privacy and Security Issue Even though, M2U website are well protected their customer or user information or privacy there are still information being steal or hack by the hacker or computer theft. It is not very secure since the information is passing through the network. The customers or user of M2U will have the probability of losing their privacy. Phishing Phishing activities by irresponsible may occur which the hacker will send e-mail ask to enter your information and then they easily hack into your account. Many customer of M2U or user will be cheat easily because they will thought that the phishing website are the real website. It is not easy for some users of M2U to detect that it is phishing website or the real website since might not know more about security in a website. Complicated when data being hack When someone account are being hack the person have to make do a lot of prevention such as make in order to be safe such as making police report, call to the bank to stop the account and others. It wastes a lot of time if any bad incident had occurred. Technical breakdowns Sometimes M2U website will be down due to some maintenance users have to wait for the website to on back as usually. It might takes a long time from them to recovery back their website if any major issues happen such as then server problem and others. If user in emergency to transfer money or doing some payment via online M2U during website go down , user still have to go to the branch to do it since waiting for the website recover might takes a long time. Impact of the Technology Since the launch of Malayan Banking Berhad Internet Banking (Maybank2u.com), it has impact the organization mostly in good factors. Maybank2u.com (M2U) has an active user with a year-on-year growth which remains as the leader in internet banking. Many customers finds attractive with this product due to its ability to pay for any online purchases, payment of monthly utility bills, electronic billing and online statements. With these functions, the customer can easily made the payment from their home with wasting their time on queuing and travelling just to settle the payment for that particular time. By providing this functions, the bank has taken the step to be as an agent where the payment from the customer for the bills to be paid. Another impact to the organization is by achieving more than RM6 million for non-audited cost saving by eliminating the needs of printing and mailing account statement for customer. Previously M2U user will only have to enter their username and password in order for them to enter the secure site, but for security purposes, M2U has expand its security by making the user to choose any pictures from the listing and create a phrase for the picture selected. Upon login, user only required to enter their username, if user found that the picture and phrase shown is not as per user selection, it is suggested not to continue but if everything is matched, user is safe to proceed. The features, layout structure and content must be updated from time to time. It must be straight forward and user friendly so that it will be a peace of mind for the user when they use this product. Individual Topic Ethical and Legal Issues This refers to the rules and standards that should be followed and standardize to everyone. Malayan Banking Berhad (Maybank) has their own ethical and legal issues. When compare to the slides, all the sub-topic is used but they actually have other that not cover in the slides such as the ethical and legal issues for banking industries. Unauthorized Access Use Maybank, as a custodian of public funds, has a responsibility to safeguard its integrity and credibility. It is on this understanding that the organization sets out clearly the code of ethics and conduct for its staff. The code stipulates the sound principles that will guide all Maybank staff in discharging their duties. It sets out the standards of good banking practice. Malayan Banking Berhad (Maybank) having many branches mainly covering the Asian countries. With the banking system connects to a particular server, each staff is holding their own unique identification and password. This will enable the staff to use any company computers in any branches. The banking software that the staff should be using will be enabled by the IT Department people. By this, not all staff has the access to all the banking software or system throughout the bank. Every computer in the organization is monitored. The group whom in-charge in monitoring the use of the organization computer will be able to see who are the particular users that login to the system and the location of the user. For any unusual event during the monitoring, it will be triggered and person who at that time was monitoring will be aware of the situation. This is one of the protections against the hackers. Other than access control and monitoring, each members of staff login into the organization network will be audited. Some higher personnel are allowed to access the organizations network from outside the organizations area. Hardware Theft Vandalism It is the act of stealing or defecting any computer equipment. Every personnel in the organization are in-charge of looking after the companys property especially that was given to them to perform their task. All equipments belong to Maybank has its own tagging number which able to track of the items and equipment. Software Theft It is the act of stealing software or illegally duplicating of software for distribution. In this organization, all the software are legally purchased and only be enable to the user upon request or instruction given to the IT Department. The software own by the organization is kept only by this department. Any duplication made, can only be made by the personnel under this department. Any software that are installed to any Maybanks computer will have the license agreement that the user need to agree during installation without any other safeguard due to the product activation was done earlier by the IT personnel. For normal software, the organization will purchased for multiple user and in some cases, the organizations will have to purchase only for single user. This will depends on the quantity of user whom will be using the software. Most of the software license is only valid for one year maximum this is to ensure that any illegal copy made will only valid for one year. Information Theft To safeguard against the information theft is by encryption. Encryption is the process of converting readable to unreadable. Maybank prevent from information theft not only by encryption but by having a password to decrypt the information. This password is between the person who encrypt it and the person who will decrypt it. IT Code of Conduct It is the written guideline that helps to determine whether computer action is ethical. People might think that this code of conduct will only give and apply by the people who are working under IT Department. In Malayan Banking Berhad (Maybank), this code of conduct is included in their organizations code of conduct. This means that it will not only apply to people who are working under IT Department. Information Privacy In any banking industries, it is difficult to control especially the customer information privacy. Not only due to the leak of information by the staff but it also because of the information is stored online. Maybank only required their staff and customer to fill in their particulars in the forms provided which are necessary. This is to ensure that their necessary information is only for the use of within the organization. The computer that connects to the organizations network will automatically clear the history of cache and cookies upon either shutting down or logout from the computer. Most of the machine in the organization are blocked from other website and forward email, there are still some unwanted email that might be unblock due to internal issues. In the organizations code of conduct also mention that the staff is restricted to view other website that not related to their task given. Although there are sites which are not blocked, there will still be a monitoring from other department on the site that the personnel visit. The organizations also equipped their machine with auto spam program which will delete most of the spam that detected by this program. Content Filtering This is a process of restricting access to certain material. This system has been mention in the above topic that this organization is using it. This is to block the websites which are listed to be blocked. It will be based on the Internet Content Rating Association (ICRA). Another software that was used is to set what the user can only browse to. Some user in the organizations only allowed browsing through their intranet sites. Other user can browse through the internet but either with or without limitation is depends on their positions level and task. Security Issues Computer security is a protection of information and property from theft, natural disaster or corruption, while allowing the information or property to remain accessible to all the users. Security issues are the ways on how the information is protected or being hacked. Similarity of the security issues in Maybank The similarities of security issue in the security slide with Maybank such as the security method use are the same. Secure Sockets Layers (SSL) Malayan Banking Berhad (Maybank) has used the Secure Sockets Layers (SSL) in all their websites which same as in the security slide module. SSL is web addresses beginning with https indicate secure connections in the website. We can see the Maybank web address begins with https when their user uses the Maybank website to login. They use SSL to ensure data integrity and data confidentiality. All the data that passes between client and Internet server will be encrypted by using 128 bits SSL protocol from VeriSign Certificate Authority. SSL is a secure way of transferring information or data between two computers through the Internet using encryption methods which it will encrypted all the data and the information become human unreadable or cant understand the data and information. The encryption method that Maybank use is end to end encryption which is adopted within the banks computer networks and resources. Digital Certificate Malayan Banking Berhad (Maybank) has Digital Certificate in all their websites which same as in the security slide module. Maybank website and its other website such as Maybank2u.com all are WebTrust certified. WebTrust is one of the Certificate Authority (CA) program. It is an independent corporation that monitors and tests all the facilities to assure that Maybank maintain the highest and most current standards in Internet information security and exchange. This proves that Maybank compliance with leading international security standards and the commitment to maintaining a secure environment in all Maybank websites in which the confidentiality, authentication,  integrity, and  nonrepudiation  are vitally important. Firewall Malayan Banking Berhad (Maybank) has used Firewall System in all their computers which same as in the security slide module. Firewall system is used in all Mayabank websites for system security and to monitor the measures for online users to do their transaction in Maybank website. Besides that, it is to detect, prevent and protect the networks from unauthorized access while permitting legitimate communications to pass on Maybank network systems. Maybank also recommend their user to have a firewall installed in their computer. This is because of safety in terms of their personal information such as their password from being hack by other people or by hacker. Antivirus Malayan Banking Berhad (Maybank) has used Antivirus Program in all their computers which same as in the security slide module. Antivirus is software that used to identify removes and protect against malware or malicious attack such as computer viruses, worms, Trojan horse, adware, and spyware. It is also used to reduce the risk of loss information, repair expense, cost and time taken. Maybank recommended its customer to purchase automatic upgrades your virus protection. Besides that, they also recommended not to open any attachment from unknown people via e-mail. Maybank has also used antivirus program in its entire company computer. Disaster Recovery Plan Malayan Banking Berhad (Maybank) has applied Disaster Recovery Plan in its company which same as in the security slide module. Disaster Recovery Plan is the emergency plan to be taken right after disaster occurs at the particular place. In conjunction, Maybank disaster recovery plan takes a long time to recover and they have found some alternative solution in order to recovery the data faster when natural disaster occurs. Differences of the security issues in Maybank The difference of security issue in the security slide with Maybank such as the security method use is the different to protect their property. Results-Driven Computing (RDC) framework Malayan Banking Berhad (Maybank) has applied Results-Driven Computing (RDC) framework in its company for backup purpose which different from the security slide module. RDC is a data centre which can store a huge number of data in it. Maybank combine RDC and disaster recovery plan to get fast delivery of data, better and cheaper computing across the mid-range, grid and mainframe environment. Besides that, Maybank wanted to full fill it requirement for world class disaster recovery. They have set up a different data centre to store the entire fully replicate banks critical data across the entire platform. They ran both method of backup simultaneously. Username and Password Malayan Banking Berhad (Maybank) has use username and password to login or access the system which different from the security slide module. In Maybank website its company has use password and username in order to prevent unauthorized access to its company financial services. It is one of the security issues in Maybank to protect the customer information and privacy. Username can be in alphanumeric and alphabetical where else password must be and alphanumeric. The username must be between 6 to 16 characters and the password must between 8 to 12 characters. All the password and username are case sensitive. Closed Circuit Television (CCTV) Malayan Banking Berhad (Maybank) has use Closed Circuit Television (CCTV) in all its company and branches which different from the security slide module. CCTV is place in the many places in the building such as in every Maybank counter, Asynchronous Transfer Mode (ATM) machine, and other places. It is to protect and detect in case any crime or bad incident happen such as robbing, snatching and others all will be recorded as prove by using CCTV. It is also will be tightly being monitor if required. Fire alarm and Intruder Alarm Systems Malayan Banking Berhad (Maybank) has use Fire alarm and Intruder Alarm Systems in all its company and branches which is different from the security slide module. Fire alarm helps Maybank in case of be caught by fire it will alert all the people in that particular building. Intruder alarm system is help to alert people around the particular place if any incident happens such as robbing and quickly informs police and to alert the customer and staff to beware. It is important to have fire alarm and intruder alarm system in a company. Enterprise Computing Enterprise computing is a large organization such as Maybank that requires special computing solutions because if its size and use of computers in networks that encompass variety of operating systems, protocol, and network architectures. Similarities of Enterprise Computing with Maybank. The below are some similarities of the enterprise computing in the slide that apply in Maybank. Enterprises. Maybank is well organized as shown in the hierarchy below that show the similarities of enterprises. Figure Organization Chart of Maybank Four Management Activities. The four management activities are the similarities in Maybank. The four management activities are planning, organizing, leading and controlling. Planning is setting the objectives and strategies tactics by the executive management such as Tan Sri Dato Megat Zaharuddin Megat Mohd Nor, Chairman of Maybank. Next is the organizing that concerns more on the people and the management structure by the middle management. Leading is important in Maybank. This is because communication between customers is important to prevent misunderstood and those leader such as the supervisor will have to give proper instruction to their subordinates and motivate them to maintain the best service provided by Maybank to their customers. Controlling and monitoring have to be done every time to make sure good performance , take measurement on any matter and take corrective action to improve the quality and services provided by Maybank. Functional Unit. The similarities of Maybank company with the slide note is they have functional unit. Maybank have divided to several department for example Maybank do have human resources(HR), customers service department to help their customer if there is any enquiry. Maybank also have several centers and divisions as well such as the financial services, insurance takaful, enterprise transformation global wholesale banking, group Islamic banking corporate affairs and communication and also customer feedback management. Online Banking. Besides that, online banking is one of the similarities. Maybank provided online banking to their customer. As the trend nowadays most of the people use technology and internet to do all their things via internet, Maybank has provide the online banking services so that their customer do not need to go to the Maybank to pay their bill. In addition, the customers can also view their bank account and statements online without going to the Maybank or the ATM machine. This can save the customer times as they do not need to queue at the counter to pay their bill or bank in their money into their account. Transaction Processing System (TPS). Maybank also do use Transaction Processing System (TPS) in their system. This Transaction Processing System captures and processes data from day to day transactions. TPS is use in ATM machine, credit card and also in Touch n Go. Customers can easily pay their things using their credit card rather than bringing a lot of cash with them which is dangerous. Customer Relationship Management (CRM). Customer Relationship Management (CRM) manages information about customers, interactions with customers, past purchases and interest. Maybank uses CRM to attract more customers to use their bank services as it is crucial in the financial services industry where competition is intense. At Maybank, CRM is treated as a core function, reflecting their customer-centric business approach. Maybank have invested in an Analytical Customer Relationship Management (aCRM) system to transform the business fully and drive business by leveraging on the strategic use of information about our customers. Portal. Besides that, the similarities is Maybank do also provide portal for their customers. Portal is collection of links, content and services presented on Webpage. Maybank had Launches Countrys First Internet Financial Portal in the year of 2000. This service enables customers to conduct a host of financial services via internet. These include opening of account, balance enquiry, funds transfers, cheque status enquiry, stop payment of cheque, bill payment, online stock investment, insurance application and renewal, online shopping and electronic procurement (B2B). In addition, Maybank also have eProcurement Portal to acquire goods and services efficiently and effectively for both internal and external customers. It is design to enable Maybank and its suppliers to reduce transaction and handling costs, and to automated timely information exchange. Data Warehouse. Data warehouse is a huge database that stores data required to analyse historical and current transaction. In 13 August 2002, Maybank has sign agreement with Oracle for data warehouse to provide business intelligence for business needs and also to improve high value customer relationship and services. With better and quicker access to required information, their staff will be empowered with better decision making in their relationship with the customers. Web Services. Web services are also one of the similarities. The conversion to online processing and payment will revolutionise the business-to-business (B2B) receivable management processes eliminating many of the issues associated with manual processing of invoices and payments. With online processing, those who enrol in the programme will gain operational efficiency as invoicing and payments are all electronically processed. Online access will also increase productivity and financial management for customers. Maybank will continue to assist businesses to transform their B2B processes particularly for receivables and payments. Maybank will continue to collaborate with our partner American Express to offer innovative global B2B corporate solutions to promote cashless transactions particularly to the small-medium enterprises (SMEs). With more business adopting cashless payment solutions this will increase the volume of online payments Virtual Private Network (VPN). Virtual Private Network (VPN) provides secure connection for user connecting to company network server using internet. Telekom Malaysia (TM) had provided IP VPN services for Maybank to replace their analogue network which serves their off-bank ATM machine. This service allows their customers to make use of internet communications in a private and highly secured environment and improved system availability and response time. Differences The below are some differences of the enterprise computing in the slide that apply in Maybank. Enterprise Hardware. Maybank use Mobius Viewdirect Total Content Management to store their critical information rather than using the enterprise storage medium such as CD-ROM server or DVD-ROM server. Recommendations/Proposals Maybank2U online banking should increase more on their security to prevent other people to hack their customer account. Maybank2u online banking can ask more verification of their customer before doing any online banking using the Maybank2U website. They can improve their question and answer (QA) in their website. They should provide more questions, answer and the solution on how to use their website and how to handle the problem if they faced some problem while using Maybank website. They also can show few examples or some tutorial on how to register as a member and how to use the Maybank website or the services provided in their website. It will attract more and more user or customer to use the online banking system. They can also try to filter the phishing website which acts like Maybank website. To save its customer and users from being hack any lost their privacy. Conclusion Based from what we have learned and our researched, not all of what we have studied is applied directly in the working world. With the technology in the banking industries now, it makes our life easy. Back then, it is impossible if we say that money can be transfer from wherever we are but now with the help of technology, not only we able to transfer funds but we also able to make a purchase from other area or country without us bein

Thursday, September 19, 2019

An Analysis of Moll Flanders Essay -- Moll Flanders Essays

An Analysis of Moll Flanders    The novel is about the realistic experiences of a woman in the underworld of 18th century London. She is anonymous, Moll Flanders being a pseudonym which she adopts when she needs an alternative identity for her criminal life.    She has no family, having been abandoned by her own mother - a transported felon, and her upbringing, education, social position and material well - being are all constantly precarious.    She lives in a hostile, urban world, which allows for no weakness. Social position and wealth are the dominant factors for survival. She has neither and her life is a struggle to achieve both. She is clever and persevering, always alert to opportunity and she survives and becomes rich, although after a life fraught with difficulty, much of it of her own making.    Defoe's novel gives us a clear sense of daily life and the anxieties attendant on economic and social uncertainty and he displays a clear understanding of female specifics, in a criminal world. Defoe himself was an 'outsider'. A Londoner who often had to live by his wits, pursued by creditors and spending time in Newgate prison for debt. His own honesty was at times rather dubious.    He writes accurate social history in a fictional form. The social details in 'Moll Flanders' are very accurate, even those set in Virginia and the novel is also politically and economically structured.    The themes of the novel, in part, are transgression, repentance and redemption, which are to be expected, given Defoe's Dissenting background. Moll's fortunes do not prosper in the 'Babylon' of London, but in Virginia, in the 'New' world. Perhaps Defoe was suggesting, like hi... ...ly innocent, despite her adventures and her chosen lifestyle as a master criminal. Defoe shows us the two sides of her character in constant opposition. On the one hand, she can be thrifty, cold and efficient and on the other, reckless, excited and bold. She is never dull. Again, Defoe makes no moral judgement, but leaves the reader to make his own.    The novel is structured so that we see a series of parodies of tragic situations, which often become almost bizarre in their comic absurdity. Moll sometimes behaves insensitively, or even in a completely callous way, but Defoe's heroine is never contemptible, eagerly thrusting from one experience to the next. The novel has a deep intensity of experience. Moll's emotions, too are mixed and unstable, but she always recognises and articulates them, even if she does not show complete understanding of them.

Wednesday, September 18, 2019

Athletes and Anabolic Steroids Essay -- Women Athletics Essays

Women Athletes and Anabolic Steroids I. Introduction Anabolic steroids have been around since the 1930s. While they started out solely for medical purposes, they have now become widely accepted for recreational endeavors and heightened athletic performance. Though highly accepted, they are still very illegal without a written prescription. While they have surpassed their medical uses and found their way into top athletes and body builders, they have also crossed the gender barrier. Men are not the only users anymore. More and more women have felt the effects of anabolic steroids and before you think they are the thing for you maybe you should read this first. I. What are Anabolic Steroids? Anabolic steroids are synthetic substances that mimic the male sex hormones known as androgens. This is where the true name anabolic-androgenic steroid is derived, but for familiarity purposes they are referred to only as anabolic steroids (no purely anabolic agent has ever been synthesized). Specifically, they are synthetically produced to act as the male hormone testosterone. Testosterone has a 17-carbon core, like its replication- the anabolic steroid, and is credited for the promotion of growth of skeletal muscles and the development of male sexual characteristics. It has both androgenic (masculinization) and anabolic (tissue-building) effects in the human body. Functions of testosterone include increased numbers of red blood cells, improved calcium deposition in the bones, muscle enlargement, increased body hair, thickening of vocal chords, and growth and development of the prostate gland (Hickson, Ball, Falduto; 1989). Women have naturally occurring testosterone already present in their bodies, but in such sm... ...g women rape victims. Comprehensive Psychiatry, 40, 273-277 Hickson, R.C., Ball, K.L., Falduto M.T. (1989) Adverse effects of anabolic steroids. Med Toxicol Adverse Drug Exp, 4, 254-271 Hughes, T.K. Jr., Rady, P.L., Smith, E.M. (1998) Potential for the effects of anabolic steroid abuse in the immune and neuroendocrine axis. Journal of Neuroimmunol, 83, 162-167 Malarkey, W.B., Strauss, R.H., Leizman, D.J., Liggett, M., Demers, L.M. (1991) Endocrine effects in female weight lifters who self-administer testosterone and anabolic steroids. American Journal of Obstetrics and Gynecology, 165, 1385-1390 Strauss, R.H., Liggett, M.T., Lanese, R.R. (1985) Anabolic steroids use and perceived effects in ten weight-trained women athletes. JAMA, 253, 2871-2873 Wu, F.C. (1997) Endocrine aspects of anabolic steroids. Clinical Chemistry, 43, 1289-1292

Tuesday, September 17, 2019

Border Music by Robert James Waller :: essays research papers

Border Music by Robert James Waller 1.) Title: Boarder Music Published: Warner Books Inc. Author: Robert James Waller Where book was acquired: WBHS Library 2.) What type of book: Fiction 3.) Characters: 1986 1.) Jack Carmine- Is a 48-year-old man who lives an independent life style. Everything he does is a spur of the moment thing. He works all the time, and his jobs are as unpredictable as he is. He originally is from Alpine Texas, but he goes north for the summer. All he wants is to live his life the best he can, and do as much as he can. He also wants to keep Linda with him. 2.) Linda Lobo- She is a 37-year-old single woman with a four-year-old daughter. She was married twice, and both failed to last. She was a dancer at a nightclub in Minnesota, but she is from Iowa. She wants to find a man that will be faithful to her, and support her and her daughter. 3.) Sara Margaret- She is Linda’s four-year-old daughter who lives with Linda’s mother. She gets to be very fond of Jack, but is too young to understand what is going on around her. 4.) Earl- He is Jack’s best friend and houseguest. When Jack is gone, Earl lives in his house for him, and takes care of the farm. He becomes good friends with Sara Margaret, and Linda. He just wants to live his life like any other hard working man. 1993 5.) Vaughn Rhomer- He is Jack’s uncle in his early 60’s. He loves army trinkets and anything to do with the Vietnam War. He worked in the produce section of a grocery store for his whole life, and his son, Nathan, was ashamed of him for this. He lost his nagging wife, Marjorie, a few years earlier, and just wants to finds someone to live the rest of his life with. 6.) Marjorie Rhomer- She was Vaughn’s wife, and was very cranky and bossy. She disliked Jack very much, and didn’t want anything to do with him. All she ever wanted was for her son, Nathan, to never meet Jack. 4.) Two main conflicts: 1.) Jack vs. Self. Jack had episodes, where he couldn’t control what he was doing. He would be back in Vietnam with the other soldiers, and he would relive the day his friends died. He had to over come this, by becoming stronger. When he first started to be with Linda they didn’t happen, but as they grew apart, the episodes became more frequent.

Monday, September 16, 2019

Anselm’s Monologion

Anselm’s Monologion is at first a detailed expansion of his more famous ontology – the proof of the existence of God – as expressed elsewhere. In this proof God is first equated with the most perfect being, and then it is demonstrated that such a being necessarily exists. The Monologion is concerned more with the nature of the most perfect being, and what else can be predicated about it, in relation to itself, and to created beings. The same line of argument is followed, where the oneness and the perfection of the Supreme Being are emphasized, but after a point we notice that the effort is diverted into explaining the Christian doctrine of the Trinity, so that God is said to be three persons in one substance, and yet indivisibly one. It needs to be remembered that Anselm does not attempt to ‘prove’ the doctrine of the Trinity. Therefore the latter part of the Monologion is really persuasive rather than demonstrative. The aim is to convince us of the reasonableness of the doctrine of the Trinity. It will be instructive to recall Anselm’s ontology here. In order to divert any suspicion of sophism, Anselm introduces the argument as taking place in the head of a fool. This fool denies the existence of a Supreme and Perfect Being. But when he tries to imagine something of the kind in his head, he cannot. Whatever great thing he imagines, it is not final, because the mind soars inexorably past it and imagines something even greater. The mind tries to grasp perfection, but cannot do so. Anselm argues that if there were no perfect being, then the mind chases after nothing, which cannot be so. So there must be a thing called Perfection, at least as an idea. Next he supposes the case where the Perfection is only in the mind and not in reality. If this were the case then it would not be the most perfect thing, because being only in the mind, the mind would then try to imagine something even greater than it. Therefore the Perfect Being has real existence. The Monologion opens with a variation on this ontology, postulating that all things that are good, or great, or virtuous in any way, are so due to the goodness, greatness or virtue of the Supreme Being, which must necessarily exist as the abode or perfection and being whereby everything else derives its qualities and its existence. It then tries to fix the nature of this Supreme Being, and concludes that whatever qualities it possesses it does so by itself, from itself, and through itself. And at the same time all created beings possess their qualities and their existence by, from and through the Supreme Being. So that a person can be said to be just, which implies a comparison. He is just because he has more justice in him then the next person. But with God there is no comparison, so that He is Justice itself. He is said to exist in all places and in all times, and this sense exists in the truest sense. In comparison all created being can be said not to exist at all, and at best that they exist in a limited sense. They are mutable, so that whatever existence they have is fleeting – nothing is ever what it was a moment ago. Therefore, the Supreme Being not only brings them into existence, but sustains their existence too. These are things demonstrated in the first part of the Monologion, and all the arguments follow the same pattern as in the ontology, i. e. it employs the oneness and perfection of God. But then Anselm comes to consider the Expression of the Supreme Being. All created existence is but a manifestation of the Expression. We must next consider whether this Expression is also a creature. But it cannot be so, because all creatures come to existence through the Expression, and the Expression cannot come into being through itself. If it is not a creature then it can only consubstantial with the Supreme Being. Here it is established that the Expression of the Supreme Being cannot be anything distinct from it. It must therefore be sufficient in itself, and need not depend of created beings, having existence before creating things came into being, and even after the final dissolution of things. So we need to find a way to describe the Expression to relation to God alone. Anselm describes it as the understanding of God. It can be seen as a means by which God comes to understand Himself. It is plain that God cannot be in the dark about his own nature, says Anselm, and he points out that even the human mind understands itself. The mind is conscious of itself, can remember itself, can reason with itself. This is but the mind understanding itself. If the mind can understand itself to some extent, there is no doubt that the Supreme Being understands itself, and does so not partially, but wholly. It is indeed the aspect we know as divine wisdom. The next step is to equate the Expression with the Word. In truth, an analogy is here being drawn between â€Å"words†, which are the units of human language, and the essence of expression. In a word is the image of the thing as we sense it. Therefore, in words are the expressions of all things, and as words all things are represented in the human mind. There are, no doubt, other carriers of expression, for example, pictures, sculptures, tastes, smells, etc. But the word is the purest and most powerful medium. It is the building block of language, and thus is the bearer of culture and civilization. We have many words, and these exist so that all things may be represented in the mind, and even then it is inadequate to bring the whole diverse splendor of the universe to us. Anselm asks the question whether the divine expression employs many words. But quickly demonstrates that such diversity would detract from the perfection of the divine expression. If the Expression is one, and the word is made consubstantial to it, then the word is also one, and this is the Word. It is the supreme image of the divine, but it also forms an identity with the divine. From it is derived all other words, and indeed all other images. Since all things are created in the image of the divine, the Word is indeed the source of all Creation. Anselm thus far has arrived at the Biblical assertion, as found in the Gospel of John: â€Å"In the beginning was the Word, and the Word was with God, and the Word was God† (John 1:1). Anselm points out a possible difficulty at this point. If it is true that the Word brings all things into existence in the manner of lending to them its own image, then it must be somehow like the things which are created, being in its own image. He considers the three mutually exhaustive cases. Either the likeness is (1) exact, (2) partial, or (3) non-existent. It is obvious that there cannot be an exact likeness, because created things are mutable, and the Word is not. A partial likeness implies that some aspects of the creating being do not derive from the Word, which is also plainly false. If there no likeness at all then there is no creation either. Anselm suggests that we come over this difficulty by using the comparison the other way. This means that we should compare created beings to the Word, and not the other way round. All created things must compare to the Word is some degree. And the degree to which they do compare is the degree of their existence. To elaborate on the theme of ‘degrees of existence’, Anselm asks us to consider the gradated nature of all created things. The rational human mind is certainly superior to the sensual human body; the sensual animals are certainly superior to the non-sensual plants; the sentient plants are superior to the non-sentient and material substances. Each created being is an effulgence of the Word, and it must necessarily be so, because the Word is the expression of the divine. But there seems to be a gradation that rises to make the image of the divine truer and truer. When we arrive at the rational human mind we have self-reflexive understanding, which is an attribute we apply properly only to the divine mind. But then, human reason does not comprehend itself finally, and neither can it come to an understanding of what it sees as God and the universe. On the other hand, the Spirit that is God comprehends itself fully, and this through the means of the Word. Therefore we must conclude that the human mind is an effulgence of the Word, but it is not the Word itself. Through a multiplicity of ‘words’ the human mind can grapple with the infinite expanse that it finds before it, and can come to know of the existence of the Word, thus of God, though it cannot know the Word itself. We may assert that the rational mind is the greatest among all created things, and therefore bears the greatest likeness with the Word, and consequently possess more reality that anything else in the phenomenal world. Though none can deny that it is a created, and thus limited thing. This much Anselm attempts to prove. Much of the latter part of the Monologion is not proof but suggestion. The starting point of such suggestion is when Anselm insists that the Expression be construed as something distinct from the Supreme Being. Having already proved that there cannot be any distinction, Anselm seems to be taking liberties now. He wants to be reasonable instead of rational. It is as if he is encountering God as a person instead of a matter of logic. In the sense that we would not mistake the expression of a person with the person himself, so Anselm describes the Word as distinct from the Supreme Being, And further on he will give the description a more personal character by saying that the Word in begotten by the Supreme Being in the way that the son is begotten of the father. He is at pains to point out, though, that it is an â€Å"ineffable plurality. To be sure, ineffable—because although necessity compels that they be two, what two they are cannot at all be expressed† (Anselm 53). In the end it is an article of faith that he is espousing. To think in this way is to gain a glimpse into the deepest mysteries of the divine, and this is what increases devotion and strengthens faith. Once we admit two distinct beings in God, there issues by necessity a third, with is Love, which is that by which the Son is united with Father and the Father with the Son. This is the doctrine of the Trinity, that which Anselm has been aiming at from the beginning. We draw the following conclusion. In the Monologion it is Anselm’s task to prove the existence of God and to elaborate on the perfection of His nature. The proofs that he provides for the existence and perfection of God are thorough and irrefutable. He elaborates on the Expression of God as the source of all created existence. But even though he establishes that, in a strictly logical sense, we cannot apply predicates to God, he nevertheless goes on espouse the Christian doctrine of the Trinity. He is careful to point out that this latter assertion is not a proof, but is rather the most reasonable predicate that can be applied to God.

The Qualities of a Prince by Niccolo Machiavelli

In The Qualities of a Prince, Niccolo Machiavelli discusses the attributes that he believes make for a good leader. Although Machiavelli wrote The Qualities of a Prince centuries ago, some of the qualities he advises a prince to have can be adapted to the leaders of today. Some of these qualities include being generous and being feared by the public. Machiavelli claims that if â€Å"generosity is used in such a manner as to give you a reputation for it will harm you. † Today, this advice is completely useless.Pope Francis of the Catholic Church is a prime example of how being generous is, in fact, a good quality of a leader. Recently, the pope has been venturing out of the Vatican at night to help the homeless men and women. Due to his generosity, people have grown fonder of Pope Francis, making him a better leader with loyal followers. Pope Francis breaks bread with the homeless and sits with them to show them that they are loved. These generous acts make him more of a lovabl e leader, and show the people of the Catholic Church that they are in good hands.Machiavelli also states that â€Å"it is much safer to be feared than to be loved when one of the two must be lacking. † This advice, on the other hand, is reliable today. A recent leader who is feared by the public is Kim Jong-Il of North Korea. Kim Jong-Il is known for being a totalitarian dictator, giving his people little to no political rights or civil liberties. He has also forced women into marriage, mandated abortions, tortured his people, executed citizens publicly, and used forced labor in prison camps.The fear of Kim Jong-Il and his incredibly strict and derogatory regulations allowed him to rule over North Korea without being assassinated by his people. Kim Jong-Il proves that being feared can be more effective than being loved by the people. Today, there must be an equal balance between generosity and being feared. Pope Francis and Kim Jong-Il prove that both tactics are effective in leading, but the situations in which they are effective vary. Therefore, Machiavelli was correct in that being feared is a quality of a good leader, but was mistaken in believing that being generous did not make for an effective leader.

Sunday, September 15, 2019

Cypriot Banking Crysis Scr

CY ————————————————- [ ] ————————————————- CSR essay Kozhevnikova E. , Sadokhina A. , Yatisyshina P. [ ? . . ] The problem2 Time-line2 Reasons of crisis in Cypriot banking sector:4 Moral Dilemmas4 The problem The current crisis of banking system in Cyprus had raised difficult moral dilemmas for Cypriot government, members of Euro Union and other affiliated governments.Cypriot banks became unable to secure the deposits due to several reasons: the Greek crisis, crisis in real estate sector. It provided relatively high income on deposits, which is always associated with risky investments. The macroeconomic situation in the world only worsened the situation. To sum up, the some of the banks simply lost the money of the depositors. In this case, the problem o f allocation of losses appeared. Who should bear the losses for the mistakes made by Cypriot banks, which were aggravated by the multiple unfavorable circumstances?The depositors who brought their money to banks? All of them? Prosperous European countries? We should remember, that the ones who are in charge of this situation simply can’t cover that costs (banks have no liquid assets cover the losses). In this paper we discuss the impacts of different possible solutions of this problem from the point of ethics theories. We start we describing the background of the problem including time-line of facts, the reasons for crisis of Banking System, than we move on to reviewing different options of how to save Cypriot economy using theories of ethics.Time-line * 14-15 March – EU-summit as a result of which was reaching the deal between Cyprus Euro Zone and IMF (International Monetary Fund) for a 10 billion Euro bailout on condition that Cyprus imposes a one-off levy of 6,75% t o insured deposits (under 100 000 Euro) and 9,9% to uninsured deposits (over 100 000 Euro). So that Cyprus will provide 5,8 billion Euros to secure the 10-billion bailout. * March 16 – first day of Cyprus Bank closure after the government announced Bank holidays. The idea of imposing a tax on ordinary depositors resulted in mass protest-demonstration of Cypriots, citizens also protested against Germany dictating such hush conditions. It had also caused anxiety in other countries – for setting such an extraordinary and threatening precedent. * March 19 – the Cyprus Parliament rejects a 10 billion Euro bailout package (lawmakers voted 36 against 19 abstaining) arguing that it is unacceptable to take money from regular account holders.The chairmen of the Cyprus Investor Association said Parliaments’ rejection of the deal  «will buy us some time to see if we can come up with a better agreement » * The President of Cyprus Nicos Anastasiades proposed to mak e an exception for deposits with less that 20 000 Euros to calm the public, but that didn’t work out either * The failed vote intensified the relationship between Cypriot government and EU. Cypriots accused EU for pressing them to accept an unacceptable deal that heats ordinary savers and pensioners.In return, German officials and IMF stated that they didn’t force Cypriot government to impose the deposit on depositors but that one way or another the country must come up with the rest 5,8 billion Euros to secure the bailout. * The next step included testing to which extent Russia would be willing to assist Cyprus in this difficult situation. Investments of Russian depositors accounted for about 20 billion Euros in Cypriot banks, so Russia is for sure an affiliated party.Russian officials reacted furiously to the proposed tax deposit bank * March 22 – Cyprus adopted legislation that allows the government to split the Cypriot lenders into good banks and bad banks a nd creates resolution framework to wind down banks. * March 24 – a new bailout deal between Eurozone and Cyprus. Cyprus will get a 10 billion Euro bailout on condition that Laiki (Popular) Bank, the second largest bank in Cyprus will be wound down.The deposits under 100 000 Euros will be fully compensated by the government, the depositors with more than 100 000 Euros on their accounts will face extremely huge losses. In this case Cyprus successfully avoided being excluded from EU, which occurred to be highly probable. What is more, this solution pensioners and clients with small deposits (which mean with low income level) won’t be affected, so the anger of the public will be reduced. Finally, two biggest Banks will be restructured: Laiki Bank will be wind down, Bank of Cyprus will capitalize at the expense of it’s clients; insured deposits of Laiki Bank will be transferred to Bank of Cyprus, owners of uninsured deposits of Laiki Bank will lose up to 80% of their deposits; 37,5% of uninsured deposits of Bank of Cyprus are transferred into stocks of Bank of Cyprus which actually cost nothing, 22,5% will be frozen so clients have no right to use that sums of money.In this case the costs of bank mistakes lay down on clients with deposits over 100 000 Euros. By the way, most of such clients are Russian (Russian investments in Cypriot bank sector are estimated 26 bn Euro, they exceed Cypriot GDP which is around 18 bn Euro). Russians were happy to use Cyprus as an offshore – due to double taxation agreement. This was a place where nobody asked where that money came from. At the same time EU and Cyprus were happy to transfer the costs to Russian depositors by expropriating their depsits.Is it ethical? Not the easiest question to answer One more concerning fact: . ? 1 15 ( ) ? . , ? . , . ? ? . - - ? . - Reasons of crisis in Cypriot banking sector:The Greek financial crisis had put in danger the stabil ity of all Eurozone. But the greatest impact was imposed on Cyprus due to their strong economic and financial bonds. Cyprus's banking sector was affected the most. It became quite clear that banking system of Cyprus is in danger a couple of years ago. Stavrakis   -the Finance Minister of Cyprus said:  «We are a small country and most importantly, we have a banking system which has invested heavily in Greek bonds ». Nevertheless, the minister assured that Cypriot anking system was safe and sound, that it had a strong capital base and that there was a huge inflow of foreign deposits which helped to stabilize the situation. Anyway, the prime reason of crisis in Cypriot banking sector is cancellation of Greek bonds. It was not a secret that Cypriot banks invested heavily in long-term Greek bonds, so when a default in Greece was announced and it was stated that Greece is not going to fulfill its bonds obligations, and, as a result, the trust in Cypriot banks declined. As the trust in banks decline, depositors tend to take back their money.But this is a trap: something happens in the banking industry, depositors leave, at the same time a lot of bank assets are frozen in long-term obligations. Theoretically, the bank has or practically has enough assets to return everything to clients, but these assets are not liquid, so at the moment when clients start to panic and claim for their money, the bank is under threat of running out of liquid assets to pay to clients. This can happen to any bank, even the most reliable one. The moment panic begins – the bank is under great threat.This is why laws that don’t allow taking back deposits at any moment may be quite reasonable. Here is a breath summary of reason of Cypriot banking sector crisis: * Huge investments of Cypriot banking sector in Greek default economy =; sufficient losses and asset write-downs of Cypriot banks * A strong offshore orientation of Cypriot economy: total sum of deposits heavily exce ed GDP * As a result the government (does it have to? ) is not able to compensate the losses of depositors * Unfavorable macroeconomic situation in EU and world The fact that Cypriot banks haven’t revalued their assets for a long time, so the assets were overestimated * And many other reasons that we will understand 20 years after Moral Dilemmas Here is a list of moral dilemmas occur in such a complicated situation: 1) Who should bear the risk of bank bankruptcy? Government/all customers/the richest customers/other countries’ governments/†¦ 2) Can expropriation be ethical? 3) 4) ——————————————– [ 1 ]. http://online. wsj. com/article/SB10001424127887323605404578384331402208120. html [ 2 ]. http://www. nytimes. om/2013/03/20/business/global/cyprus-rejects-tax-on-bank-deposits. html? _r=0 [ 3 ]. http://www. bbc. co. uk/news/world-europe-21916102 [ 4 ]. http://lent a. ru/news/2013/03/25/threat/ [ 5 ]. http://somo. nl/dossiers-en/sectors/financial/eu-financial-reforms/newsletter-items/issue-17-march-2013/innovative-approach-in-cyprus-bailout [ 6 ]. http://www. cyprusnewsreport. com/? q=node/4239 [ 7 ]. http://www. mondaq. com/x/231362/Financial+Services/The+Latest+Developments+In+The+Cyprus+Banking+Sector [ 8 ]. http://www. reuters. com/article/2013/03/22/us-column-cyprus-investing-saft-idUSBRE92L0UV20130322

Saturday, September 14, 2019

Macbeth and Animal Farm Essay

Both Shakespeare and Orwell present rivals as threats to their leaders’ power. Shakespeare introduces this threat through the Witches in Act 1, scene 3 when the third witch announces that Banquo ‘shall get kings’. In Macbeth’s soliloquy in Act 3, scene 2, the audience is reminded that he is predisposed with maintaining his power, now that he has become king, and illustrates that Banquo was announced as a ‘father to a line of kings’. The audience assumes that Macbeth is infertile as he feels he is unable to produce an heir as he expresses his ‘fruitless crown’ and his ‘barren sceptre’ and seems quite indignant that Banquo’s will profit from ‘the  gracious Duncan’ that he has murdered. It appears that Shakespeare is justifying Macbeth’s ruthless ambition and want to maintain power, which puts Macbeth into darker depths by having Banquo and Fleance murdered, by his lack of an heir. Similarly, the audience is provided by Snowball as the rival to Napoleon’s absolute power in his introduction to the character in Chapter 2. Orwell tells the reader he ‘was a more vivacious pig than Napoleon’, setting him up immediately in competition His description goes on to describe him as ‘quicker in speech and more inventive ‘. This is proven when he emerges later in Chapter 4 as the brave hero of the Battle of the Cowshed after which we see him awarded with the military decoration of ‘Animal Hero First Class’ while the reader realizes Napoleon seems to be conspicuous in his absence. Moreover, Snowball invents plans for the windmill and Orwell outlines all his creative ideas in his committees and therefore Napoleon clearly makes plans to expel him from the farm. The key difference between Shakespeare and Orwell’s presentations is that we witness Macbeth’s thought processes and plans while Orwell keeps the reader in the dark yet offers them clues that Napoleon is not to be trusted. It comes as no surprise to the reader in Chapter 5 when Napoleon unleashes his personally educated dogs, who represent Stalin’s secret police, on Snowball. Both leaders maintain power by eradicating any competition. http://www.enotes.com/homework-help/compare-contrast-impact-conflict-napoleon-macbeth-372660 http://www.gradesaver.com/animal-farm/q-and-a/explore-the-ways-george-orwell-and-william-shakespeare-present-conflict-in-animal-farm-macbeth-51453/ http://prezi.com/f41ewhbheqdv/animal-farm-vs-macbeth/ Comparisons between characters: Lady Macbeth, Macbeth and Napoleon all use others to further themselves. Lady Macbeth takes advantage over Macbeth by persuading him to kill Duncan so she can have more power. Napoleon uses Squealer to take advantage of the other animals by making them their slaves and being made to believe all Napoleon’s decisions are best for the farm. Both Napoleon and Macbeth become power hungry which turns into a negative effect, both use violence to gain power by installing fear into people Macbeth’s hunger for power causes him to  murder many innocent people and eventually leads to him downfall. Napoleon’s hunger for power causes him to use excessive force and make the animals do slave labor. -both Napoleon and Macbeth represent Stalin Differences: One is a play, one is a novel M written in 1606 when James 1 was in power in England (birth of the Stuart regime) AF was published in August 1945 after the Russian Revolution of 1917 + predicted the Cold War. Throughout both ‘Macbeth’ and ‘Animal Farm’ the audience can see a large amount of deceit, treachery and a lack of trust between the leaders’ and their followers. Shakespeare shows this deceit in Macbeth’s relationship with other characters where he hides his true feelings and ‘is here in double trust’. However, the audience is privy to the true thoughts of Macbeth and his wife due to their plotting in Act 1, scene 5 where Lady Macbeth tells Macbeth to ‘look like th’innocent flower/ But be the serpent under’t’ and which creates dramatic irony during the play. Similarly, Orwell’s novella ‘Animal Farm’ uses dramatic irony as the audience can see that the pigs are manipulating the animals into slave labor and although the audience is not made privy to Napoleon’s innermost thoughts, we can still see past the animals’ lack of intelligence to see the pigs are re-writing the 7 C ommandments.

Friday, September 13, 2019

Bonuses for senior executives in the banking sector should only be Essay

Bonuses for senior executives in the banking sector should only be paid for genuine excellence - Essay Example For example, a Sales Director will earn bonuses if turnover targets are met and exceeded (Nkomo, Fottler and McAfee, 2010: 85-93). Recent years have been characterized by an outcry against paying of bonuses to senior corporate executives. This is mainly due to malpractices by top executives to ensure they earn high salaries with little regard to how the company is performing or stockholder value. These malpractices include accounting fraud. Bonuses remain popular with firms because in today’s world of heightened competition and reduced profitability, bonuses represent a variable rather than fixed cost (Murphy, 2005: 110-117). It is also widely believed that bonuses create motivation, which leads to organizational performance. Bonuses help to attract and retain managerial talent and motivate executives to perform to the best of their abilities and prevent executive dissatisfaction. It has been argued that rather than incentivizing executives to raise shareholder returns, bonuses have been turned into rent-seeking avenues by self-interested executives. This defeats the main logic behind paying of bonuses, which is to tie executive pay closely to organizational performance (Kieff and Paredes, 2010: 44-49). At the same time, it has been argued that executive bonuses affect firms negatively. Performance-based bonuses foster individualism, business aggression and uncertainty. Bonuses create competitiveness among the executives which hurts cooperation. Bonuses encourage executives to take unreasonably high risks and make short-sighted decisions that may not be good for the firm’s long-term prospects. It is also argued that senior executives spend a great deal of time and focus on their past and expected bonuses than on the returns of shareholders. Bonuses also foster bad relations and resentment between the executive and the lower ranking staff (Marchica, 200 4: 8-15). Bonuses are rooted in two theories; the Expectancy theory and Agency