Wednesday, October 30, 2019

Introduction to Communication- Listen to Me-discussion Personal Statement

Introduction to Communication- Listen to Me-discussion - Personal Statement Example In addition, communication is a strong foundation to interactions in social set ups and transfer of information and command in organizational set ups and failure to listen compromises effectiveness of communication. Personal experience and learnt communication skills concur with the author’s opinion that distractions, such as multitasking and lack of sufficient time are key barriers to effective listening and managing these can offer a solution (Cole 61). In addition to the informative scope of the article, it is effective it its content that identifies significance of a problem and offers a solution. It is therefore able influence positive change in people’s communication through helping people to minimize distractions during communication. Developing a link between listening and attention that an individual acquires, when time to be listened to comes, also facilities effectiveness of the article in improving listening effectiveness. The level of simplicity of the article is also commendable because it is neither complicated nor too simple to be boring (Cole 61). Consequently, the author is informative and is an agent of change for effective listening and

Monday, October 28, 2019

Managing Food Allergies and Intolerances in the Hospitality Sector Essay Example for Free

Managing Food Allergies and Intolerances in the Hospitality Sector Essay A food allergy is the response of the body to a food or protein the body perceives as injurious and therefore produces antibodies (Eigenmann, 2009). Highly popular are allergies towards nuts, eggs or seafood. The symptoms can vary from swelling of the throat or mouth, skin reactions, noxious feeling, breathing difficulties or even collapse (Busky, 2012). Intolerance on the other hand is the reaction when the body is not able to deal or digest a kind of food because the body misses or cannot produce certain enzymes. Most commonly known are lactose and gluten intolerances which are coeliac disorders. Triggering a malabsorption of several nutritional ingredients the sufferer has to deal with indigestion, mild abdominal (stomach) pain, bloating, occasional changes in bowel habit, such as episodes of mild diarrhoea or constipation, loss of appetite, weight loss or even vomiting (National Health Services). All these symptoms give high restrictions during daily life and require careful attention. Further the term of anaphylaxis appears quite often in the context of food allergy. Anaphylaxis describes an extreme form of imunsystem reaction to a chemical contact with of a substance of the sufferer within the environment. It impinges on the whole body and can in worst cases lead to an anaphylactic shock which often causes death (National Health Services). The British Allergy Foundation stated that in 2012 up to 21 million people in the UK are affected by food allergies and that almost 10 million of them are suffering from more than one allergy. They further estimated that by the year 2015 almost 50 per cent of the Europeans will suffer from an allergy. These facts are already allowing an insight into the importance of the topic in the hospitality industry and its uprising as a contemporary issue of increasing significance. In the following section some general information and research and three food allergy organizations will be presented more in detail. The topic will be presented with a detailed view on the approach in restaurants. The key findings will be evaluated and summarized in the conclusion. Discussion General Information Allergens in food are not always labelled and indicated on product or menu items. Further as per the findings of Pratten and Towers (2003) there is high education and training for hospitality workers in terms of food hygiene and preparation but with no deeper focus on handling food allergies. Eating out therefore becomes a difficult challenge especially for families. Especially, after reviewing a study of Cathy A. Enz on behalf of the Cornell Hospitality Quarterly in 2004. Her findings show that for restaurant managers and owners the level of concerns regarding food allergies lays only with 3,3 % (out of 100%) and is ranked on the sixed position out of eight criteria (see appendix, exhibit 1). As per Allergykids. com four in ten UK school children have an allergic condition. Hence the parents have to control and watch after their children much more to ensure their well-being. The founder and CEO of Allergyeats. com, Paul Antico states â€Å"First and foremost, I’m a dad of kids who have food allergies. I understand the concerns of parents and know what it’s like to be constantly on guard. † Adding to this statement, seven out of ten sufferers say their allergy has an adverse effect on their lives (Allergykids. com, 2012). This is clearly showing the impact on the hospitality and the need for adaption in the service offer. Within the issue of Food Allergies there have been several approaches to ease and make the topic more valid and accessible on the consumer as well as on the service providers ‘point of view. The Food Allergen Labeling and Consumer Protection Act One step was the Food Allergen Labeling and Consumer Protection Act of the second of August of 2004 which came into effect on the first of August 2006. It obliges manufacturers to label and indicate common allergens like nuts or milk on their product on a clear and comprehensible way (Food and Drug Administration, 2004). Whereas it is questionable if the consumer can be assured by this with correct labeling. The Food and Drug Administration is randomly inspecting different food packaging for the allergen label but it is shady if some products might just slip through and give wrong indications for the consumer. Nevertheless nowadays there is a wide range of products (for example in a supermarket with an average of 50,000 products (Google Answeres)) and most of them are food items. Therefore the control of all packaging becomes a heavy challenge. However the first step is the mplementation of such a law. Regarding the fact that the Act is in effect since 2006 it can be estimated that products have been relabeled over the years and especially new products introduced the allergen label by entering the market. The Gluten Free and Allergy Free Passport The Gluten Free and Allergy Free Passport organization are â€Å"Educating the World about Food Travel since 2005† (GFPassport, 2012). The below graph is showing their approach to necessary communication between restaurant and allergy sufferer: Fig. 1 Gluten Allergy Free Passport, 2012 On both sides, on the guest perspective and the restaurant perspective there should be previous education. The Guest, in this case the allergy sufferer needs to assess his comfort level by for example talking to the wait staff. After identifying the eating options the guest conducts the pre planning and starts the interaction with the restaurant. Communication the guest? s needs and specifications are crucial and the first step in the interaction. Ordering the meal and receiving it, the guest should provide feedback about his experience. At the same time not only the guest has to be cautious, the wait staff and the cooks have to understand the guest needs and facilitate the specification ordered by fully ensuring safety for the guest. After the meal is delivered the staff should follow-up not only for the well-being of the guest but also to apply critical feedback. The Chef? s Card To ease this communication between the customer and the restaurant some organisation like the Allergy Free Table LLC company introduced a useful tool. The company is trying to educate and provide information in that area. But not only the provision of important information about allergies and intolerances, facts and figures, problems and risks is their aim but they also giving solutions to make daily life for allergy sufferers easier. One of their approaches is the Chef? s card. It is similar to a business card indicating the allergy of the consumer, the degree of the allergy and the actions to be taken in case of an allergic reaction. Example of Layout of Chef? s Card: Fig. 2: Allergy Chef? s Card (Allergy Free Table, LLC, 2012) The Allergy Free Table LLC.  Co provides sample cards and individual adjusted templates which are provided for free download and print out on their website. This approach is widely spread and having a look through the World Wide Web a lot of positive comments regarding this idea can be found. On the forum for Food Allergy Support, members are commenting â€Å"We go out eat a lot and we use the Chef? s Card [†¦]†, â€Å"[†¦] the cards are useful [†¦]† or â€Å"[†¦] Im all for chef cards! [†¦]†. Further there can be services found other online services as SelectWisely. com which is providing Chef? Card with the focus on people travelling and therefore translating them in the respective language. From the customer and the restaurants perspective the Chef? s Card is an effective approach to this serious issue. The customer receives the feeling to be taken more serious with the special demand. Further for example the wait staff have something to hold in the hands, which can be handed over to the kitchen staff and results in more security as the level of miscommunications is narrowed. Particularly while travelling the Chef? Card is relieving the customer from feeling stressed eating out as well the restaurant obtains a clear guideline to handle the guest conveniently and most important safely. To sum up the approach of the Chef? s Card is an innovative approach which eases the concern of food allergy issues in restaurant for both parties. The Food Allergy and Anaphylaxis Network Despite many online communities (e. g. the Allergy Free Table LLC. Co) are providing information the most popular one might be the Food Allergy and Anaphylaxis Network. The Food Allergy and Anaphylaxis Network (FAAN) are calling themselves the â€Å"most trusted source of information† and can record over 22,000 memberships in the year 2012 (FAAN, 2012). The network is funded by the annual membership fees, donations and charity events like the yearly FAAN Walk for Food Allergy. They are committed to increase the awareness of the impact and implications of Food Allergies, the provision of education for young and old, advocate further research into the topic. The FAAN offers programs like the â€Å"[emailprotected]† program which is a package including nformation material as well as implementation and management strategies for schools (FAAN, 2012). Moreover they understood that â€Å"Eating away from home can pose a significant risk to people affected by food allergy. Research suggests that close to half of fatal food allergy reactions are triggered by food served by a restaurant or other food service establishment† (FAAN, 2012). So they are approaching restaurateurs directly and are calling up on more training for hospitality staff: â€Å"Education, cooperation, and teamwork are the keys to safely serving a guest who has food allergies. All food service staff – including restaurant managers, servers, and kitchen staff – must become familiar with the issues surrounding food allergies and the proper way to answer guests’ questions. Further, they must know what to do if an allergic reaction occurs. † The network emphasises on cooperation between the restaurants and customers to ease the barriers and to diminish the risks for allergy sufferers while eating out. The handbook for training of hospitality staff is only one of the collections of information which is provided for free on the FAAN? s homepage. Reviewing the amount of information which is available especially online restaurateurs should no longer hesitate to implement the handling of food allergies as an inherent part of their standards and policies. Much information is available for free and some managerial strategies and ,of course training sessions, will cost some money. Nevertheless this undertaking is not too difficult as food safety and hygiene procedures are already applied in gastronomic enterprises. As shown above the need for an extension to allergy concerns from the customers? side is omnipresent. Although that the adaption of this issue will cost time and money in return target markets and customer acquisition will be promoted. The Trend of Labelling Menu Items Food labelling is only mandatory for products coming from the manufacturer, so those which are e. g. bought in supermarkets and grocery shops. This labelling format has been improved by the Codex Alimentarius by the Commission of the Food and Agriculture Organization of the United Nations and the World Health Organization in 2003 also adapted by the European Parliament and one year later in the USA. It regulated that foods triggering ensitive reactions have to be labelled. Current discussions about having restaurants to label their menu items are on-going but â€Å"[†¦] the restaurant industry argued that mandatory labeling would be a significant burden on most restaurants, the majority of which are small businesses that do not have the technical ability and/or knowledge to provide and publish such data† (Pizam, 2011). Restaurants mostly object menu labeling. Small businesses only produce in small amounts and menu items change frequently which would imply additional financial expenditures on the menu design. Further restaurants are arguing that the demand for labeled menus is not high enough. Attempts with calorie and fat indications mostly failed in past years. The demand for low calorie and low fat items in comparison to the conventional products was not high enough (Din, Zahari, Otham, Abas, 2012). It is questionable if this failure of menu indications is significant in the debate about labeling menus for allergy sufferers (Pizam, 2011). The quoted arguments are comprehensible but the extreme defensive attitude should be dropped. The request for menu labeling must not be a generalized demand but a compromise could be formed. Restaurants could have some additional menus indicating a detailed description of the menu ingredients. Other than that the restaurant might be able to guarantee that the cook on shift knows all its products and ingredients. This could be done by narrowing the amount of suppliers, brands and by maintaining the supplier for basic products. Maintaining loyal to a supplier as a plus would reduce purchase costs as restaurants receive better prices with long-term contracts. Conclusion Concluding from the findings the issue of food allergies in restaurants will be of increasing concern in the following years. Therefore there is every indication to find common approaches and standards to build up a convenient interrelation between customers and restaurants. The customer, most of all, needs to develop the trust to the restaurateur of being served in a serious and safe manner. The presented concept of the Chef? s Card is a recommendable and effective way to ease the communication for the special requirements of an allergy sufferer. Further the restaurant can handle the conveyed responsibility with more secureness and assurance. As the research has shown labelling the menu to needs of allergy sufferers is still in heavy discussion. Nevertheless a common standard should be introduced in order for the restaurant to clearly follow any special requests. To conclude in the future an overall standard is required in restaurants. Procedures should be extended and the implementation of allergy handling should be a standard for all gastronomy venues. The load of information is immense and the accessibility is there. Hence restaurants have little excuse too not implement some new strategies in their procedures. Although staff turnover is very high in the hospitality sector which is complicating the demand for additional training, hygiene and food safety instructions are mandatory for all hospitality staff. So why not extend and cover the issue of food allergies at the same time. Consequently restaurants could be labelled as being trained in allergy concerns and customers can easily choose to eat out.

Saturday, October 26, 2019

The Contemporary Relevance of Albert Camus Essay -- Albert Camus Essay

The Contemporary Relevance of Albert Camus ABSTRACT: After 350 years of continual social transformations under the push of industrialization, capitalism, world-wide social revolutions, and the development of modern science, what reasonably remains of the traditional faith in divine transcendence and providential design except a deep-felt, almost 'ontological' yearning for transcendence? Torn between outmoded religious traditions and an ascendant secular world, the contemporary celebration of individuality only makes more poignant the need for precisely that religious consolation that public life increasingly denies. People must now confront the meaning of their lives without the assured aid of transcendent purpose and direction. The resulting sense of absence profoundly marks the contemporary world. Confronted with the theoretical problems posed by the absence of absolute values, and the historical problems posed by contemporary social movements, Camus dramatized the urgency of developing guides to humane conduct in a world w ithout transcendence. He continued to believe that only when the dignity of the worker and the respect for intelligence are accorded their rightful place can human existence hope to realize its highest ideals, and our life find the collective meaning and purpose that alone can truly sustain us in the face of an infinite and indifferent universe. Celebrating individuality, our age invites us to express our feelings and realize our goals. It promotes happiness, while seeking to accommodate traditional moral values. But the focus on personal existence only makes the realization of death's inevitability more threatening. Torn between an outmoded religious tradition and a secular world on the ascendency, o... ...was no longer to be a matter of status and deference, but of function and quality of performance. And decisions were to be made by the involved collective, respecting the dignity and legitimate interests of all participants. While not despising the arts of "high culture" — though always quite uncomfortable with their mores — the renaissance always meant for Camus the qualitative transformation of daily life, the creation of dialogic communities at work and at home that gave voice and sustenance to the struggles for dignity of ordinary people. He continued to believe that only when the dignity of the worker and the respect for intelligence are accorded their rightful place can human existence hope to realize its highest ideals, and our life find the collective meaning and purpose that alone can truly sustain us in the face of an infinite and indifferent universe.

Thursday, October 24, 2019

What are the scope, breath and units of ethics according to the following theorist: Plato’s Euthypro and Republic

Plato. Scope: The freedom of choice of a man is very dangerous and harmful phenomenon. The man can not choose what is holy and unholy and so the only thing directing the person in life if fear. The fear of the gods would have saved you from the danger of acting wrongly, and you’d have been cursed in front of human beings. Breath: since the essence of every phenomenon, including life of breathing creatures is to fulfill a certain function. In these measures men should fulfill their function – to live proper life for the good of the city-state. But life is not a function of a soul, but its proper quality. Units of ethic: just man is not wise or good, and just man is not supposed to live a long and happy life, while unjust miserable and unhappy? The difference between two is that the man who practices justice does so unwillingly, since he lacks the power to violate it. And in life in general he will walk the only possible road he knows – the just one, while the unjust man will yearn for more, and it doesn’t matter for what exactly, since he has options. Republic. Scope: the freedom of choice or deliberate decision is a punishment for human beings given by gods. And free choice depends on the essence of our soul. Breath: Can evasion or violence be succeeded with the gods? Well, if they don’t exist or don’t involve themselves with human affairs then what’s the point to consider their observation in our deeds? But if they exist, we shall pay a just penalty for our crimes in the place called Hades. The choice is of men or of his destiny†¦ Units of ethic: two people just and unjust given the same opportunities would act the same – temptation would be too strong. And this is the evidence that none are just willingly, but only by compulsion. And they act the very way because everyone thinks that in personal case injustice is much more profitable than justice. If anyone having this licence to refuse to do any injustice, or to posses the property of others, all who were aware of it would consider him a most contradictive and irrational creature, though they would praise him before each other faces, deluding one another through their fear of injustice influence. Euthyphro. Scope: everyone has the choice, and the only difference of a choice is what we should pay for the results of it. Whoever has unjustly killed another should be punished by all means. Breath: Holy is all gods love and people are meant to worship them and follow their will. What is holy and just have to do with the gods, and the rest (unlawful and pious) of it has to do with ministering of human beings. Units of ethic: we shouldn’t get nervous about people laughing at our predictions, the public recognition is of a soon. One must not tolerate a profane man, no matter who he may seem to be (even if it’s your own father).

Wednesday, October 23, 2019

Comparing the Poem “Richard Corey” with Money and Happiness

Do money and happiness go together? In the poem â€Å"Richard Corey ,â€Å" the author wants the reader to think or accept the generalization that money does not bring you happiness. There are different people in the public eye who would make you think, no, money does not make you happy. Then there are people in the public eyes that you would think, yes, money can make a person happy. But, does money really make you happy? Well, personally I have never been rich. I was poor and now I have enough money to save and pay bills so that I am not living pay check to pay check. There are famous people who are wealthy. They have drug problems, alcohol issues, and behavioral issues with the law. They are not happy. When you have a drug or an alcohol problem then you are running from deep-rooted issues. Look at Charlie Sheen, Whitney Houston, Elvis Presley, Kat Williams and many others. These people have either died from overdoses or have been in trouble with the law from either alcohol or drug related problems. I don’t think all the money in the world would have made or make them happy. If anything, money was a short term solution to their problems. Would they act the same if they were poor? There are people like Oprah Winfry, Beyonce Knowles, Jay-z, Michele Obama, and many more that you would think that money made these people happy. They all go on trips, have nice houses, and they are not in the spotlight of the media for any drug, alcohol, or negative publicity. They are always smiling and they are family and friend oriented. So is it the money that makes them happy? I feel we will never know. I am far from having a lot of money. My husband and I live comfortably with the money we make. We work together to bring in the money to support our kids. My husband works really hard at his job. Are we happy? Yes, we are very happy. It’s not because of the money though. We make each other happy. We are surrounded by our family and friends. It’s the love we have for our kids, family, and each other that makes us happy. It was not always like that for me though. With my ex-husband, we were living pay check to pay check. We always were broke and needed help from family all the time. My ex-husband did not want to work and put all the stress to take care of everything on me. Was I happy? No, hence the reason he is my ex-husband. It was not because of the money though. It was because my ex-husband was like black smoke that smothered me and stressed me out so much. In conclusion, I don’t think money can make a person happy for the long haul. I feel that kind of happiness is for that moment. Materialistic things are only there for that moment. All I know is money is not the reason for my happiness. We all have our own reasons for our own happiness. What is yours?

Tuesday, October 22, 2019

God Clockmaker Vs Chess Player Religion Essay Essays

God Clockmaker Vs Chess Player Religion Essay Essays God Clockmaker Vs Chess Player Religion Essay Paper God Clockmaker Vs Chess Player Religion Essay Paper With the Reformation in the sixteenth century, a new faith emerged. Protestantism, a faith based more on the reading and personal reading of the Bible, attracted many followings. Naturally, every person s reading was non the same. Sects formed within the Protestant faith, one of which was the Puritans. The Puritan religion revolved around the position of God as a vengeful, unforgiving cheat participant who controlled every facet of his followings lives. These more extremist Protestants besides viewed human nature as of course iniquitous and evil. Many of the Puritans were unhappy with the manner the Church of England was learning the Christian religion, and moved to the New World to put up churches and spread out Puritanism. As more and more of the population began to read the Bible and construe it in different ways, a more scientific and sensible religion surfaced. Termed Deism, the new faith attracted some of the greatest heads of the English settlements, most notably Benjamin Franklin. Franklin viewed God as more of an all-knowing clocksmith and human nature as inherently good. These positions differed greatly from those of the Puritans. While the Puritan beliefs towards God and human nature required a more pious attack to life, the Deist rules of Franklin called for a more hands-off, self dependent manner of life. : The Puritan God s intercession was non limited to those who had evidently sinned though. Mary Rowlandson, a devout Puritan, was kidnapped when Indians raided her small town of Lancaster. She watched as most of her household and townsfolk were slaughtered, and so taken prisoner for an drawn-out period of clip. During her parturiency, she saw some of her household being traded or yielding to the changeless menace of decease. Rowlandson viewed the full episode as a Job-like spiritual test, and afterwards felt that she genuinely knew what sorrow and affliction was ( 8 ) . Rowlandson ended the history of her narrative by saying that she learned to look beyond present and smaller problems, and to be quited under themaˆÂ ¦stand still and see the redemption of the Lord ( 8 ) . Her experience brought her closer to God and made her more aware of his changeless presence. Puritans and Deists were genuinely similar in merely a individual manner: both believed in the being of a Supreme Being. Benjamin Franklin begins his booklet with There is said to be a First mover, who is called GOD, Maker of the Universe ( Franklin 6 ) . Not merely does Franklin admit to the obvious being of a Higher Being, he implies that this Maker of the Universe is more of an perceiver of life, when he calls God the first mover. Where the two beliefs differed was in the function of this divinity. Unlike the Puritans, Deists like Benjamin Franklin believed that God took a more removed attack to regulating His Creation. Although Franklin s parents raised him as a rigorous Genevan, he began to oppugn his religion every bit early as 15. Franklin states that after doubting by bends of several points, as I found them disputed in the different books I read, I began to doubt of Revelation itself ( Franklin 5 ) . Franklin came to see the Bible as no less than a book of fabrication s, and questioned whether Jesus was genuinely a divinity. This belief was true for all Deists. To those who practiced this religion, God was non a Christian cheat participant, who controlled the actions of all, but more of a clocksmith, who created adult male, so took a measure back into a more experimental function. The positions of the Puritans and Deists differ on more than merely the function of a higher being. Their several beliefs about the position of human nature were complete antonyms. Puritans, through reading of the narrative of Adam and Eve in the book of Genesis, believe that worlds are born of course iniquitous. In a 1645 reference to Massachusetts legislative assembly, Governor John Winthrop states that our [ People s ] nature is now corrupt ( because all people are evildoers ( Winthrop 1 ) . Winthrop was discoursing natural autonomies, which he described as the freedom to make whatever one wants. He goes on to state that when given free reign to exert this autonomy, work forces turn more evil and in clip to be worse than beast animals ( Winthrop 1 ) . This public reference exemplifies the Puritan take on human nature. All people are evildoers and when left to make what they want, will perpetrate beastly acts. To forestall this, the settlers needed an elective authorities under the authorization of Christ. As New England Minister Thomas Shepard stated, good workss can non acquire anyone into heavenaˆÂ ¦human Black Marias are disgusting sinks of all godlessness, buggery, blasphemy, slaying, prostitution, criminal conversation, enchantress trade [ and ] sodomy ( Wigglesworth 4 ) . He subsequently says, [ people s ] best responsibilities are tainted, poisoned, and mingled with some wickedness and hence are most abominable in the eyes of a holy God ( Wigglesworth 4 ) . Shepard s statements once more represent the Puritan belief of corrupt, built-in human nature. He is connoting that no affair how good one s actions are, they are stained by the crud of original wickedness. He besides hints at the thought of predestination, connoting that if one who has non been granted redemption efforts to derive it through good workss, he or she is dissing the Lord through their actions. The Deist position of human nature is the complete antonym. While the Puritans argued that God was holy and vindictive, Franklin stated that the expostulation that God permits evil actions to be done, for Wise terminals and intents destroys itself. He argues that whatever an boundlessly good God [ creates ] must be good, is thereby made good, and can non be otherwise ( Franklin 6-7 ) . In other words, because God is an all-good being, his Creation can be nil less than this ; human nature is inherently good. This belief wholly contradicts that of the Puritans. Of class, this does non intend that Franklin did non acknowledge that worlds are capable of morally evil workss. In order to battle any human desire to perpetrate bad workss, Franklin set up a list of 13 virtuousnesss to help him in his quest to make moral flawlessness ( Franklin 12 ) . He boldly declares that he wished to populate without perpetrating any mistake at any clip ; I would suppress all that either natural disposition, usage, or company might take me into ( Franklin 12 ) . Franklin recognizes that there are built-in human desires to perpetrate morally incorrect workss and sets up a program to control said desires. His principles were placed in an order for him to make them and included moderation, silence, order, declaration, frugalness, industry, earnestness, justness, moderateness, cleanliness, repose, celibacy and humbleness. The simple fact that Franklin was on a pursuit for moral flawlessness illustrates his Enlightened, Deist believing. Franklin sought to go the best that he could be through a set of criterions that he had created himself. This self dependent manner of t hought was rather contrary to that of Puritans at that clip. Puritans did non believe in the simple construct of moral flawlessness and if they did, it surely could non be achieved without monolithic aid from Christ. Alternatively, Puritans were much more dependent on the word of God to help them in life and assist do of import determinations. This is apparent in both the narratives of Mary Rowlandson and John Dane. In Dane s autobiography, he recalls picking up a Bible and turning to a random poetry to assist him make up ones mind whether or non he should travel to America. The first 1 he finds reads Come out from among them, touch no dirty thing, and I will be your God and you shall be my people ( Dane 6 ) . Dane interprets the optimistic tone of the transition to be a clear mark from God stating him to travel to New England. Dane s Puritan parents rapidly agree and help him travel. Like Dane, Rowlandson used a Bible poetry to help her in her battle as an Indian prisoner. When all seemed lost, she read Psalm 94:18, which read when my pe s slipped, thy clemency, O Lord, held me up ( Rowlandson 7 ) . After happening new hope in the Psalm, Rowlandson finds out that she is shortly to be released. Her religion in God gave her the aid and inspiration needed to maintain traveling. The Puritan religion and the Deist religion were merely genuinely similar in one manner: the belief in a Higher Power. The two faiths differed in every other manner, including the good or immorality of human nature, and most significantly, the function of God in mundane life. To Deists like Franklin, God was merely the first mover, a clocksmith, who created adult male, so took a measure back. To Puritans like Rowlandson, Dane, Winthrop and Wigglesworth, God was involved in every facet of human life, and interfered when He felt fit. To them, God was an almighty cheat participant.

Monday, October 21, 2019

Interest Groups that Support Capital Punishment essays

Interest Groups that Support Capital Punishment essays Interest groups dealing with Capital Punishment Interest groups lobbying hard in Congress play an important role in determining how our society views the term capital punishment. Most people come to know the term capital punishment as the death penalty. Here is a little background information on what the underlying principle is behind this type of execution for criminals. It first got established in 18th century BC down in Babylonia. This tribe had punished those by death from about 25 different crimes. The death sentences were enforced upon by drowning, crucifixion, stoning or by burning the offender alive. By the turn of the 16th century, some of the more common methods of execution ranged from boiling, stake burning, hanging and beheading. Times have changed though and much of society has turned against this form of cruel punishment. There are human rights group fighting day in and day out to abolish this principle. The more common methods presently are by lethal injection, gas chamber and electrocution. The issue surround capital punishment will be mainly focused here in the United States. Not all states agree in using capital punishment. Hawaii, Alaska, Minnesota and Michigan are some states that refuse to incorporate the death penalty in their legislature. It seems like many more interest groups are against the death penalty rather than for it. There is an internet site which showed a few of the groups who were anti-death penalty. (www.deathpenaltyinfo.com) Amnesty International was established in 1961 by an English lawyer. Peter Benenson initially opposed capital punishment for reason that a person should never be tortured or executed because of their extreme religious or outside opinions against the government. By 1971, they took a stance whereas opposing any type of sentence towards death. In 1989, they organized a worldwide campaign to stop this cruel and unusual punishment and teamed up ...

Sunday, October 20, 2019

Choose the Best Time to Study for Finals

Choose the Best Time to Study for Finals With finals coming up in just a couple weeks, a lot of students start planning their studying schedules. However, theres an important factor to take into consideration when making a plan: when do you study best? Youve heard of â€Å"morning† and â€Å"night† people, right? Some people simply function better in the morning than at night while others struggle to get out of bed in the morning but have no problem burning the midnight oil. Each individual has times during the day when their brain is more alert and theyre able to assimilate and process information as well as create and produce. Trying to push through during the other hours can not only be unproductive, it can also be counter-productive. Thats because the study session wont have been successful, leading to burn-out and discouragement. Finding out the best time to study can help you make the most of your limited time during finals season. Why It Matters During Finals During finals period, this concept is particularly relevant. By identifying when youre most alert, you can plan a study schedule that allows you to maximize your productivity. You can choose to rest or do other activities during your less productive hours to make sure you can make the most out of your â€Å"on† time. How To Identify Your Most Productive Time Most people have an instinct for when theyre most productive. If you tend to be bright and ready for the day in the morning but hit a slump after lunch, and tend to knock off early, falling asleep while reading at 9p.m., you can assume that mornings are your best time. If mornings are tough for you and you generally need a landslide of caffeine to get you moving, slowly working your way up to speed as the day wears on and peaking at night after dinner, then your nights will be your most productive times. Some people have slow mornings and early nights but tend to burst with energy in the afternoons. In that case, your most productive time will be during the afternoon. Of course, the best way to be sure is to test this theory out. Choose to study in the morning, afternoon and night and see which one works best for you. If you have the chance to give this a test drive before the finals season hits, it could really help you make the most out of your study time. How Can You Maximize Your Productive Hours? Once you discover your best working time, you should find ways to guard that precious time. Eliminate or at least limit your distractions as much as possible. A quiet, isolated place to study would be ideal so you dont run the risk of friends or family members interrupting you. Turning off phones or putting them on silent or vibrate is also a helpful way to keep distractions to a minimum. Dont tempt yourself with social media during these hours, either. Leave that for another time. Create a Pattern If you can create and stick to a schedule, it will be even more beneficial to your productivity. Adhering to a specific plan every day helps trigger the brain into â€Å"work mode† when its time for serious studying and can enhance your productivity even more. The more consistent you are, the better your work sessions will be. Dont just be consistent with your work, though. Being consistent with the things you do outside of your studying hours is also important. Exercise, eating, and sleeping routines also help keep the brain and body in top running condition. Many successful writers keep consistent schedules. Acclaimed author Haruki Murakami keeps a rigorous schedule of waking at 4am, writing for five or six hours, running or swimming or both and then reading and listening to music. Bed-time is 9:00pm. He describes this process of bringing himself into a kind of a trance with a repetitive pattern that he can rely on every day. Whichever time of day is best for your studies, make sure to get the most out of it by limiting distractions and making the most of your â€Å"off† time as well.

Saturday, October 19, 2019

Management Essay Example | Topics and Well Written Essays - 1250 words - 2

Management - Essay Example Therefore the relationship between product-mix flexibility and capacity utilization is that the two factors are directly related. A higher degree of product-mix flexibility leads to a higher degree of capacity utilization. Because the company is able to vary output according to demand, idle capacity is minimized. As a result capacity utilization is maximized. By implementing the strategy of product-mix flexibility, the company is able to manufacturing a range of different products by using the same equipment. As a result the management is able to recoup the maximum return from the investment made in the equipment. In this manner the utilization rate of the production line is maximized. Thus product-mix flexibility is directly related to capacity utilization. Higher levels of product-mix flexibility reduce the production lines’ sensitivity to demand fluctuations. By implementing a flexible manufacturing system (FMS), the production line is able to maintain a mix of products tha t is able to adapt to any changes in the demand structure. In order to implement the strategy of product mix flexibility, the management has to introduce the technology of the flexible manufacturing system. The FMS facilitates the building of a production line that can produce a range of different products with minimal changes required in the same. ... This was the innovation introduced by Fiat’s management. By implementing the Robogate technology, Fiat aimed to create a flexible production system which would be able to achieve product-mix flexibility according to market demand. The technology was developed in-house. It was deployed in the spot-welding shop and was so named because the nine welding stations were called gates. The deployment of Robogate signaled Fiat’s quest for increasing production flexibility. The production limit for Robogate technology deployed at Rivalta and Cassino was set at 1400 cars per day. However it could vary the output levels between different models, Uno and Ritmo at Rivalta, Regata and Ritmo at Cassino. By allowing production managers to process a range of cars in a random sequence, the Robogate technology aimed to incorporate market-driven fluctuations into capacity utilization. However whether this innovation enabled the company to maximize capacity utilization is questioned by the a uthor in this article. The technology was certainly able to minimize the cycle-time of finishing but capacity utilization still fluctuated as before in the traditional system. The problem with implementing the technology was that the production philosophy was still defined according to the traditional system of cycle-time minimization rather than flexibility maximization. As a result, the Robogate technology failed to increase the rate of capacity utilization. But aside from that question, the superiority of the Robogate technology over other techniques was overwhelming. The Robogate itself was flexible. However because the platform and body welding lines upstream were still

Policy and Strategic Management Assignment Example | Topics and Well Written Essays - 500 words

Policy and Strategic Management - Assignment Example These features add on value to its low cost proposition as ticketing process through automates system reduces the cost incurred in staffing. They remain focused on a specific class of passengers so that standardized service can be provided to them. Minimizing on personalization, extra meals and keeping the services to its minimum makes the integrated service delivery concept of Southwest Airlines intact with its differentiation strategy (Appendix 1). From intangible perspective, its service value chain and freedom provided to its employees to remain innovative and empowered in their decisions supplies profitable operations and competitive edge to it which counts into its core competence (Appendix 2). The distinctive factor of southwest airlines is its unique combination of resources which its competitors are unable to imitate. For example, faster turnarounds of planes, leaner crews, use of websites to sell ancillary products, et cetera. As a result of its core competencies and value added services, southwest airlines had been able to achieve the much needed customer satisfaction levels along with financial stability and increased revenues (Appendix 3).

Friday, October 18, 2019

Contemporary Issues Concerning Security Issues as A Profession Assignment

Contemporary Issues Concerning Security Issues as A Profession - Assignment Example Rather, it is said that liberalism thrives on the wings of security rather than liberty and that if the people are guaranteed of their security, they can champion the possibility of liberalism. The second issue, on the other hand, happens to be a more tangible and practical phenomenon that happens to be with us as a people on a constant basis. This is the issue of natural disasters and how the country has often been taken unawares by the magnitude and breadth of these natural disasters. In the news item, there is a reflection on one of the major hurricanes that was recorded in the history of the United States and this was Hurricane Katrina. Generally, there are questions about the role that the security professional can play in risk mitigation associated with such natural disasters. Arguing that the mere identification of the disasters and the warning of citizens to stay off are not enough, detailed remarks are given on how the issue impacts security operations and how it can be handled well in future. On the issue of balance between liberty and security, there can be several implications drawn on the impact that it has on security operations, though this contemporary issue is highly academic. In the first place, the vivid realization that the very liberties and freedoms of the people rest with the degree of security they have implies that security operations hold, and is responsible for the fundamental protection of the practice of liberalism in the country. If this is so, then there is the need to equip the security forces, and for that matter the security professional with adequate contingency preparations that will ensure that they are able to give maximum protection to the liberties of the collective people of the country. By this, an advocacy for people-centered security operations is admonished.

Multiple Topics to Choose from Essay Example | Topics and Well Written Essays - 750 words

Multiple Topics to Choose from - Essay Example Violence and powerful resistance were not uncommon; however, non-violent sources of opposition to slavery were always more efficient than a physical attack. In Narrative of the Life of Frederick Douglass, Incidents in the Life of a Slave Girl, and Blassingame’s The Slave Community, cultural efforts, education, folk songs, beliefs, and ceremonies exemplify the most efficient instrument of resisting slavery, creating â€Å"self† and developing an â€Å"underground culture†. That slaves continuously oppressed and tried to improve their position in the American society cannot be denied. The instruments they used to withstand the pressure of slavery were numerous and varied. Slaves were not willing to tolerate violence, humiliation, and abuse. They were not willing to accept their inferior position in the society. In her Incidents in the Life of a Slave Girl, Harriet Ann Jacobs describes her childhood and adolescence. She witnessed how different slaves fought with slavery – at times, their decisions went beyond the boundaries of reason, e.g., murdering a slave master (Jacobs 182). Jacobs herself rarely engaged in active opposition but chose to tolerate her master’s abuse silently (183). Once she observed â€Å"a woman rush wildly by, pursued by two men. She was a slave the wet nurse of her mistress’s children. For some trifling offence her mistress ordered her to be stripped and whipped. To escape the degradation and torture, she rushed to the river, jumped in and ended her wrongs in death† (Jacobs 184). However, not all slaves had sufficient courage to sacrifice their lives for the sake of avoiding penalties and physical violence. Nor did all slaved had instruments and resources needed to openly fight against the oppression. Culture and songs became the principal way of resisting slavery, which created a collective picture of social oppression in the American society. Folk songs, ceremonies, and beliefs were among the key elements of resisting

Thursday, October 17, 2019

Module 2 Case Assignment Coursework Example | Topics and Well Written Essays - 1000 words

Module 2 Case Assignment - Coursework Example This paper examines the strategic analysis of Kraft Foods Group using Porter’s five forces and PEST to examine the company’s external environment. Kraft Foods Inc. (NYSE:KFT) corporation specializes in marketing and manufacturing of food products such as the snacks, cheese, beverages, convenient meals and among various types of the packaged grocery products. The company has its branches in approximately more than 155 countries worldwide. Its three main segments include; Kraft Foods Europe, Kraft Foods North America, and Kraft Foods Developing Markets. Kraft Foods Inc. is the second largest foods and Beverages Company in the globe after Nestle. Its brands includes: Nabisco, Oreo, and LU biscuits; Cadbury and Milka chocolates; Jacob and Maxwell house coffees, Trident gum; Philadelphia cream cheese; Oscar Meyer meats; Kraft cheeses. The PESTEL analysis is a sort of analysis that looks at the political, economic, social, technological, environmental and legal environments of the country with particular reference to a certain company (â€Å"PEST Analysis†, 2009). PESTEL analysis is presented below: The political environment favors the development and growth of the Kraft Foods Inc. This is due to the fact that the company has long been involved in the various community based and political initiatives. Some of this includes: supporting of the candidates that comprehends and appreciates the public policies that greatly impacts on the business, brands and the employees (Carnegie Research Inc., 2009). Additionally, the company Kraft Foods has started the political action committee called the Kraftpac that is aimed at making funding to the U.S. Federal, candidates, committees, and the state political parties. In strengthening its political base, the company also takes reasonable steps in making corporate contributions to the political parties, committees, and among others. Its key consideration for the

Bergen-Belsen Camp Assignment Example | Topics and Well Written Essays - 250 words - 6

Bergen-Belsen Camp - Assignment Example As the paper outlines, the gas chambers were designed in such a way that they were not isolated from the inmate barracks and they operated day and night. For instance, Auschwitz-Birkenau was positioned parallel to one of the gas chambers where the inmates could have a clear view of the operations taking place inside the chambers. This led to psychological distress, agony, and trauma among the prisoners considering that children, women and the aged were among the captives. The effects that resulted from the free-standing chimney are not different from the gas chamber as they both symbolized the untimely destruction of the captives (Piper 13).  The Phil Donahue interview brings to light what exactly happened in Auschwitz by distinguishing facts from fictions. During Phil’s interview, Cole contradicts various issues given in his initial report. For example, Cole changes the number of the total deaths from six million to four million, and also states that he did not see any gas chimney in Auschwitz, contradicting his first account. Cole’s second narration explicit a huge difference, therefore, rendering his original report prejudiced. Consequently, Phil Donahue’s interview develops a new angle into the Holocaust story by David Cole’s that demands a keen study and a new analysis with an independent investigative body (Rabbitoflnle 17). Both articles observed give an account of the remains of the dead bodies, clothes, shoes and the remains of the Barracks where the captives were sheltered. This is a clear sign that at least people were confined under poor conditions in Bergen- Belsen.

Wednesday, October 16, 2019

Module 2 Case Assignment Coursework Example | Topics and Well Written Essays - 1000 words

Module 2 Case Assignment - Coursework Example This paper examines the strategic analysis of Kraft Foods Group using Porter’s five forces and PEST to examine the company’s external environment. Kraft Foods Inc. (NYSE:KFT) corporation specializes in marketing and manufacturing of food products such as the snacks, cheese, beverages, convenient meals and among various types of the packaged grocery products. The company has its branches in approximately more than 155 countries worldwide. Its three main segments include; Kraft Foods Europe, Kraft Foods North America, and Kraft Foods Developing Markets. Kraft Foods Inc. is the second largest foods and Beverages Company in the globe after Nestle. Its brands includes: Nabisco, Oreo, and LU biscuits; Cadbury and Milka chocolates; Jacob and Maxwell house coffees, Trident gum; Philadelphia cream cheese; Oscar Meyer meats; Kraft cheeses. The PESTEL analysis is a sort of analysis that looks at the political, economic, social, technological, environmental and legal environments of the country with particular reference to a certain company (â€Å"PEST Analysis†, 2009). PESTEL analysis is presented below: The political environment favors the development and growth of the Kraft Foods Inc. This is due to the fact that the company has long been involved in the various community based and political initiatives. Some of this includes: supporting of the candidates that comprehends and appreciates the public policies that greatly impacts on the business, brands and the employees (Carnegie Research Inc., 2009). Additionally, the company Kraft Foods has started the political action committee called the Kraftpac that is aimed at making funding to the U.S. Federal, candidates, committees, and the state political parties. In strengthening its political base, the company also takes reasonable steps in making corporate contributions to the political parties, committees, and among others. Its key consideration for the

Tuesday, October 15, 2019

Proposal assignment Essay Example | Topics and Well Written Essays - 750 words

Proposal assignment - Essay Example The current learning support services offer two kinds of tutoring the drop in/ walk in tutoring and the group tutoring services. These two types of tutoring services have been very beneficial to students. However, there is need to establish peer guided group tutorial program. In this type of tutorial the instructor is a student that has gone through the same class and excelled. More than 600 college campuses around the world have registered success when using this type of tutoring around the world. Peer tutoring benefits both the tutor and the person receiving the tutoring. The student tutor will understand the subject or concept better, increasing confidence on the subject and the desire to learn other subjects. It also develops leadership skills. Peer guided tutoring helps the students being tutored be more at ease helping them concentrate more and understand better than when with a professional tutor (Falchikov and Blythman.21). Content related tutoring is another type of tutoring that can be integrated into the tutoring program. This type of tutoring involves a one on one discussion instead of group discussion. Unlike the walk in / drop in type of tutoring that is available in the university, I suggest a more elaborate program where the student makes an appointed with an assigned tutor and give the tutor the concept, topic or subject that he needs further instructions on. This ensures that the tutor prepares on the topic in advance has researched on it to ensure that the student is completely satisfied at the end of the session. Assignments are important part of course work. They help the lecturers asses if the student understood the important concepts taught in class. The aim of homework help sessions is not to do the homework for the student but to discuss the concept that the homework addresses. These help sessions are particularly helpful for mathematical

Monday, October 14, 2019

The Spread of Islam in the Middle East Essay Example for Free

The Spread of Islam in the Middle East Essay The Muslim Perspective   Islam is the religion of all prophets of God, including Adam, Abraham, Lot, Moses, Jesus, and Muhammad.   Born in Mecca, Muhammad is known among Muslims as the final messenger of God to have brought a divine book on earth for the guidance of humanity.   Moreover, he is the reviver of Islam, rather than its founding father.   Ã‚  Ã‚  Ã‚   At the time of Muhammad’s birth in Mecca, Arabia was going through a period called the Age of Ignorance.   The followers of Abraham’s faith had turned to idol worship, and turned the Holy Ka’aba into a house of idols which they circumambulated naked.    Tribal feuds were very common; bloodshed was not rare.   Moreover, the society of Arabia at the time looked down upon women so much so that its people buried their baby girls alive.   Crime flourished, and there was no hope of bringing justice into the existing order.   Ã‚  Ã‚  Ã‚   Muhammad grew up among idol worshippers, who referred to him as Sadiq (Truthful) and Amin (Trustworthy).   At the age of forty, the man was visited by Archangel Gabriel who informed me about the new message of God to be revealed to Muhammad in order to revive the faith of Abraham once again. This message was the same as that received by the messengers before Muhammad.   The most important tenet of the faith was that there is no god except Allah (translated in Arabic as The God); and nobody else has any right to be worshipped.   The rest of the Ten Commandments were also included as the basic principles of faith.   Humanity, through Muhammad’s revival of Islam, was reminded to do good deeds, to stop killing unlawfully, to honor the parents, to stay away from adultery and fornication, and to expect final judgment and the afterlife in either heaven or hell.   Ã‚  Ã‚  Ã‚   With its social ills, the society of Arabia required reform at the time that Muhammad received the message of God.   Many people, upon hearing Muhammad’s message in Mecca, embraced Islam.   The prophet also sent some of his followers to other cities of Arabia in order to spread the message.   Once again, he was joined by a lot of people who embraced the faith and accepted him as a God-sent guide on earth.   Ã‚  Ã‚  Ã‚   Muhammad was also visited by some of the people from Medina, previously known as Yathrib.   These people wholeheartedly accepted Islam, before Muhammad moved to their city faced by severe trials in Mecca.   Such trials were posed by the idol worshippers of Mecca who insisted on continuing to worship idols as well their practices from the Age of Ignorance.   Even when Muhammad had moved to Medina, the idol worshippers of Mecca kept on harassing him and his followers.   This led to various battles between the forces of God and Muhammad, and those of the infidels.   Ã‚  Ã‚  Ã‚   Muhammad and his followers were often victorious on the battlefield.   Although they lost much at the same time, their main force was Allah who never let them give up in the face of trials.   By the time Muhammad conquered Mecca, the Muslims alongside Muhammad had become a tremendous power. As a matter of fact, the prophet of God conquered Mecca without bloodshed.   The awe that he had inspired in his enemies was enough to allow him and his followers a peaceful reentry into the city of the Ka’aba.   Many of Muhammad’s enemies also embraced Islam.   Historians inform us that even his enemies were thoroughly impressed by Muhammad’s personality, and especially his sense of forgiveness.   Ã‚  Ã‚  Ã‚   Muhammad expired soon after the conquest of Mecca.   His followers, having spent time with a great role model, continued to fight battles against the infidels who provoked them.   Furthermore, the prophet’s followers continued to move to far and distant places to spread the message of Islam.   Ã‚  Ã‚  Ã‚   Muhammad’s followers entered many lands in the Middle East as conquerors and rulers.   After settling in new lands in the Middle East, they showed by example the humane treatment of peoples that Muhammad himself had shown them.   Countless people embraced Islam in the Middle East, although they were never forced to do so, given that Islam prohibits the use of force to spread the message of God.   Ã‚  Ã‚  Ã‚   Muslim conquests were always for the cause of God’s faith.   Hence, Umar, one of the four chiefs or caliphs of Islam after Muhammad, took Muslim armies to invade Palestine and Mesopotamia.   Muslim armies under Umar also won a crushing victory over the Byzantines.   This paved the way for them to conquer Egypt and Syria.   Following a victory over the Sassanid Empire, Umar and his followers also overwhelmed the Persians in Mesopotamia. The Non-Muslim Perspective Although Muhammad had a great personality, his faith was essentially spread by the sword.   Muhammad only claimed that he was God’s messenger by taking notes from the Holy Bible.   Moreover, his followers conquered many lands because they were greedy for power.   People in the Middle East who came to be ruled by Muslim invaders had no choice but to accept Islam, given that the Muslims inspired fear into the non-Muslims.

Sunday, October 13, 2019

A Comparison of McDonalds and Foxs Diner :: comparison compare contrast essays

McDonald's and Fox's Diner       McDonald's and Fox's Diner are two of the restaurants in Lake City, Tennessee. But even though they both sell hamburgers in the same town, they don't have anything else in common. They cater to different types of customers, there is a noticeable difference in service speed, and every facet of doing business is handled differently. Even the atmosphere of these two places is in contrast.    These two restaurants do not compete for the same customers. McDonald's is located just off the interstate, so many of their patrons are not local residents. Another reason is that they are universally known. Fox's is further away from the interstate. Aside from the over-the-road truck drivers who know the area, most of the Diner's customers are local residents. As well as targeting different customers from Fox's Diner, McDonald's also places more emphasis on speed. McDonald's makes job specialization an integral part of their operation. They crank meals out on an assembly line. They use computers to take orders, automatic timers to assist in cooking, and radio headsets to communicate. Even the color scheme used by McDonald's promotes speed. Studies show that loud colors like red and yellow increase customer turnover. With the exception of handling money, tasks are shared by the staff at the diner and there isn't anything high-tech about the operation.    Fox's Diner is a world away from the bland, impersonal McDonald's just a few miles north. It sits on the right side of a two-lane highway leading into town. The Diner serves both as a truck stop and as the restaurant for a small motel next door. The parking lot looks vacant until about five in the morning because it is large enough to accommodate a dozen tractor trailers. Years of use have left potholes and a patchwork of asphalt that resembles a moth-eaten quilt.    The diner itself is a doublewide   trailer set high on a five foot, cinderblock foundation. An aluminum awning extends outward about six feet along the front of the building. Underneath the awning, yellow fluorescent lights, which theoretically do not attract bugs, glow at night. They are mounted over a row of metal framed, screened-in windows.

Saturday, October 12, 2019

Mini-ethnography On Gamer Culture Essay -- essays research papers

â€Å"Man, Fragged by the LPB Sniper again!!!† That may sound like nonsense to the average person but to the seasoned Counterstrike veteran it speaks volumes. Today, millions of people of all ages are coming together on the Internet to compete against each other in a variety of online games. The most popular of which is an online modification of the game Half-life entitled Counterstrike. Counterstrike itself is comprised of players broken up in to two teams, terrorists and counter terrorists, who then compete against each other to achieve a range of goals in a variety of levels. People from anyplace in the world can log in to one of the hundreds of Counterstrike servers running on the Internet and team up with and play against anybody anywhere. To play the game players manipulate their characters movements inside the simulated scenario they see on their monitor. They do so by using the keyboard and mouse in tandem to move around the level, find opposing players and then â€Å"frag† or kill them with whatever weapon they currently have, there by eliminating them for the remainder of the round. However, in most cases the teams’ goals are more complex than just eliminating the other team. For instance, in one level one player assumes the role of the V.I.P. and his counter terrorist teammates try to escort him to a helicopter on the other side of the level. The terrorist teams objective is to find and assassinate the V.I.P. before he is able to escape. This and other missions like it create an exciting and adrenaline filled environment that are part of the reason gamers just can not quit. For the most part people team up with and compete against people they haven’t met and probably never will meet in a face-to-face manner. This yields some very interesting results. I was able to observe two peers of mine playing Counterstrike online in the same room on their separate computers on several occasions for extended periods. Also, I installed Counterstrike on my computer here in my dorm room and played online myself a number of times. The first thing that I noted and the first I am going to talk about is the player’s ability to create and maintain their own online identity. Every player in an online game of Counterstrike or any other game for that matter has his or her own handle or call sign. They are nicknames that the players come up with themselves and adopt as names ... ...10 dollars to gain access to an online server that acts as a simulated finite world for each person to place their character in. Players manipulate their character and basically live that person’s live in that finite simulated world that contains other players. They buy property, get a job and interact with other players. I was unable to actually observe anyone playing Everquest or play it myself. However it seems to take the level of interaction to new levels. For obvious reasons I find that a little unsettling. I think that is safe to say that many people actually prefer their simulated online personas and friends to their real life ones. That may pose new problems in the future. At the pace that technology is currently developing I think that soon the number of people who find more satisfaction and fulfillment in their â€Å"cyber lives† will only grow. Also, to speculate a little I think that in the future it will probably be possible to immerse yourself in a to tally simulated environment. Will be people totally isolate themselves and spend years inside life simulations oblivious to the real world but still perfectly content to live out their days in a Matrix like cyber dreamscape?

Friday, October 11, 2019

Mindset Case Study Essay

I read the Mindset book by Carol S, Dweck. This book really made me think and reflect about what kind of person I am. It focuses mostly on the benefits of having a growth mindset and the downside of having a fixed mindset. I learned a lot about how you can grow as a person instead of failing and giving up. Most of the most successful people are people with the growth mindset who learn from their mistakes and apply it to their career or everyday life. I use to believe that some peoples born talents are better than those who work harder but are not as naturally good. For example Michael Jordan got cut from his high school basketball team. Instead of giving up after he was told he wasn’t good enough that motivated him more and he worked hard and improved and eventually became one of the most talented basketball players in NBA history. One thing that I disliked was that the writer focused on the positive of the growth mindset when sometimes the fixed mindset can be useful. It sounds like common-sense but it is in how it carefully uses both biographical data and scientific research to strengthen the reader’s understanding of the true implications of this finding. After I read ‘Mindset’, I understood much better why John McEnroe was famous for his tantrums (he had a very fixed mindset, a tennis loss meant that he was inherently worthless, that he was, permanently and in all aspects of life, a ‘loser’), as well as why a four-star chef like Bernard Loiseau committed suicide. I learned that Chinese students who think that intelligence is unalterable don’t follow remedial English courses, but also that American medical students who believe in innate ability flunk chemistry much more often than students who consider early failure as a sign that they haven’t worked hard enough or that they should try other learning strategies. I also learned some things that are counterintuitive, such that you should never praise children for being smart or talented. I knew I liked the book from the beginning because it had situations I could relate to and made me actually think about my life and how I can become the best I can be.

Thursday, October 10, 2019

Management and Co-ordination

Coordination Definition of Coordination Co-ordination is the unification, integration, synchronization of the efforts of group members so as to provide unity of action in the pursuit of common goals. It is a hidden force which binds all the other functions of management. According to Mooney and Reelay, â€Å"Co-ordination is orderly arrangement of group efforts to provide unity of action in the pursuit of common goals†. According to Charles Worth, â€Å"Co-ordination is the integration of several parts into an orderly hole to achieve the purpose of understanding†. Management seeks to achieve co-ordination through its basic functions of planning, organizing, staffing, directing and controlling. That is why, co-ordination is not a separate function of management because achieving of harmony between individuals efforts towards achievement of group goals is a key to success of management. Co-ordination is the essence of management and is implicit and inherent in all functions of management. Ingredient of all the Managerial Functions A manager can be compared to an orchestra conductor since both of them have to create rhythm and unity in the activities of group members. Co-ordination is an integral element or ingredient of all the managerial functions as discussed below: – 1. Co-ordination through Planning – Planning facilitates co-ordination by integrating the various plans through mutual discussion, exchange of ideas. e. g. – co-ordination between finance budget and purchases budget. 2. Co-ordination through Organizing – Mooney considers co-ordination as the very essence of organizing. In fact when a manager groups and assigns various activities to subordinates, and when he creates department’s co-ordination uppermost in his mind. . Co-ordination through Staffing – A manager should bear in mind that the right no. of personnel in various positions with right type of education and skills are taken which will ensure right men on the right job. 4. Co-ordination through Directing – The purpose of giving orders, instructions & guidance to the subordinates is served only when there is a harmony between sup eriors & subordinates. 5. Co-ordination through Controlling – Manager ensures that there should be co-ordination between actual performance & standard performance to achieve organizational goals. Differences between Co-ordination and Co-operation |Basis |Co-ordination |Co-operation | |Meaning |It is an orderly arrangement of group efforts in |It means mutual help willingly. | | |pursuit of common goals. | | |Scope |It is broader than co-operation which includes as well|It is termed as a part of co-ordination. | |because it harmonizes the group efforts. | | |Process |The function of co-ordination is performed by top |The functions of co-operation are prepared by persons at | | |management. |any level. | |Requirements |Co-ordination is required by employees and departments|Co-operation is emotional in nature because it depends on | | |at work irrespective of their work. |the willingness of people working together. |Relationship |It establishes formal and informal relationships. |It establishes informal relationship. | |Freedom |It is planned and entrusted by the central authority &|It depends upon the sweet will of the individuals and | | |it is essential. |therefore it is not necessary. | |Support |It seeks wholehearted support from various people |Co-operation without co-ordination is fruitless & | | |working at various levels. therefore it may lead to unbalanced developments. | Therefore, existence of co-operation may prove to be effective condition or requisite for co-ordination. But it does not mean that co-ordination originates automatically from the voluntary efforts of the group of members. It has to be achieved through conscious & deliberate efforts of managers, therefore to conclude we can say that co-operation without co-ordination has no fruit and co-ordination without co-operation has no root.

Unknown

B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu & Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on In dia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and th eir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse & A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers & workstations, process control & real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals & Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW & HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies & Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis & Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language & Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O'Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves & Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles & Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell & Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich & Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder & Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley & Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 Unknown Life is an experience that comes along with failure. Have you ever had the feeling like you haven't done your best at something or the feeling that you're disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. Failure to me is being unhappy with yourself and not doing what you believe in.My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today.In middl e school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can't do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed.Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Midd le school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships.