Wednesday, August 26, 2020

Significant Security Event Research Paper Example | Topics and Well Written Essays - 750 words

Huge Security Event - Research Paper Example Mob control police is certainly not an exceptional type of police power. Mob control police incorporates individuals from the police branch of a locale who have been prepared with the information, aptitudes and capacities to manage riots. This paper will inspect why the requirement for revolt control emerges alongside the strategies utilized by to counter revolting individuals with various instances of how mob police have handled mobs. The fundamental reason for revolt control and mob control police is to take gauges so as to control, disband just as capture people who are associated with fights and mobs. If there should be an occurrence of mobs a few measures are executed to end the uproar, for example, arrangements. Be that as it may, in specific situations refutations will in general fall flat. Particularly when there is a gridlock between the revolting people and the individuals who are considered liable for the uproar to happen, extreme estimates should be taken to control riots. Uproars are a serious special issue as if there should be an occurrence of mobs police can't utilize deadly power to prevent the revolting open from dissenting or being savage (ANON, 2014). This is on the grounds that the individuals who are revolting might be revolting for the worthwhile motivation and might be revolting against the individuals who have been chosen by the revolting individuals into the administration. Halting a mob o r a dissent isn't characterized as an every day obligation of the police power. Uproar police is for the most part called upon by the legislature when they neglect to end the mob in a serene way or when the protestors become brutal and disturbed. The motivation behind the mob police is to end the uproar through mighty measures while guaranteeing that the individuals who are fighting are not fatal harmed through the strategies utilized. A large portion of the mobs start at the degree of a group which incorporates a gathering of individuals who accumulate in a specific zone because of a commonly shared intrigue (ANON, 2014). For instance: on account of Ferguson mobs of 2014, the mobs began following a multi year old Black

Saturday, August 22, 2020

The American Christian Holocausts Essay -- Holocaust History

The American Christian Holocausts As a secondary school understudy I was constantly irritated by understudies who might ask: Why do we need to gain proficiency with this stuff [history] at any rate? We learn history so we don't rehash our slip-ups. This is the basic answer that my instructors, my dad, and pretty much some other grown-up would give. This answer sounded good to me at that point, and I handily acknowledged it. In secondary school, understudies find out about the Nazi-Holocaust, and which is all well and good. Data proliferates in regards to this theme. In any case, my instructors never instructed me that our nation has its very own Holocaust (really there are two; one murdering 40 to 60,000,000 Africans, and one executing 100,000,000 Native Red Peoples). Hitler himself frequently communicated his adoration for the practicality wherein the American Christians evacuated the Native Americans and gave them mass graves like the one in Wounded Knee, South Dakota. Have you at any point heard the words American Holocaust(s) previously? As I read about history I was attracted to the Indian Wars. One day I started perusing Dee Brown's book Cover My Heart at Wounded Knee. I was stunned by what I read. I had never been shown these things, yet this history appeared to be so significant and unmatched in American history. As of late, I got Brown's book and perused it a subsequent time. At long last, the words shook me from the rest in which we Americans love to enjoy; the rest of refusal, realism, and gratification. The contemplations and pictures evoked in Brown's book returned and my heart loaded up with an indefinable sentiment of difficult annoyance once more. I contemplated internally, I'm happy that is done with, I don't have the foggiest ide a what I would have done on the off chance that I had been alive, at that point. The expressions of William McPherson of the Washington Post with respect to Brown's book consoled... ...rican banner and harmony awards by Abraham Lincoln and Colonel A. B. Greenwood in Washington just a year sooner and was informed that as long as the American banner was above them, nobody would be hurt). The conquers present encompassed the ladies and youngsters assembled under the banner. At 8:00 am in excess of 700 mounted force men under the order of Colonel John M. Chivington and Major Scott J. Anthony, rode in and terminated on the clustered Indians from two bearings. After the underlying charge the US troopers got off and proceeded with the aimless slaughtering of men, ladies, and youngsters. During the murdering unspeakable abominations and mutilations were submitted by the warriors. Records from two white men, John S. Smith and Lieutenant James Connor, portrayed the demonstrations of dehumanization. As indicated by John S. Smith, Colonel Chivington realized these Indians to be quiet before the slaughter.

Thursday, August 13, 2020

self-assessment, re playwriting

self-assessment, re playwriting Though I’ve thought of myself as a writer for most of my life, I always struggled with fiction writing and long-form storytelling. Writing a news article for the school paper or a personal blog post or a school essay was easyâ€"in fact, fulfillingâ€"but true storytelling blocked me like no other. In high school I became interested instead in poetry; not only writing poetry, but noticing poetry, recognizing symbolism and meaning in the everyday arcs of human experience. But still, I struggled. I felt that I had stories to tell and no means with which to tell them. This was my state entering playwrights’ workshop, with the basic aim of forcing myself to learn to write longform. Poetry taught me how to capture moments, feelings, emotionsâ€"but more complex discussions of the human experience and the sorts of relationships we form necessitate the sort of storytelling ability I felt I lacked. As I began writing plays, I struggled to find ways to drive action, create drama, all in a theatrically compelling way. In particular, I found myself wanting to say big things, philosophical and critical things about the current state of humanity. I would get stuck on creating a story that would make the statements I wanted. The training wheels of the class helped. I learned to think in terms of change, theatrical devices, use of objects, lighting and staged sound, characters’ desires and motivations and raisons d’etre. And as I heard and read and saw more plays, I changed the way I observe and listen. I focused on a particular skill with each play I wrote. One would be about creating vivid dialogue; one about staging and lighting; one about managing large numbers of distinct characters. Most of these were unsuccessful in some way or another, but some were successfulâ€"and as I kept trying, I found myself happier with my results. Curiously, I found myself returning to certain discussions: societal oppression, the ethics of engineering, social awareness. And I drew heavily from poetry (was that cheating?) in attempts to heighten the visual impact of the performance, attempting to pierce the layers and defenses an audience comes armed with and reach into a core, common humanity. It was hard to have the drive to continue writing ten pages a week when life and problem sets got in the way, and alternately inspiring and horrifying to hear my characters brought to life by my classmates. It was ultimately liberating, I think, to have had a supportive space where I could take risks and try my hand at a new craft without too much fear of judgment or failure. I still have stories to tell and questions to pose. Being simultaneously an MIT student and a writer is difficult, but I now know that it’s possibleâ€"and I would say, even necessary: for a fresh perspective, for a new angle, for a different mental dexterity, for getting out of a rut. I have a new confidence and a better understanding of my ability to communicate, to put my mind in ink and text and feed it to another person. So here’s to writing more and writing often, stories told, retold, and as yet untold. Things I wrote this semester, and their prompts: LOSS (the monologue) Soapbox (the play about a box) A Matter of Life and Death (the play about motivation) Unresolved Sexual Tension (the play about context) Ad Astra, Per Aspera (the play about broken rituals) The Elephant in the Cage (the play about a life-changing activity) Institutional Practice (the play about a man whose foot is crushed in a factory accident) Therapy (the play about a boy with glowing eyes) Engineering Ethics (the play that cant be staged) Hearts. Sleeves. (the last play)

Saturday, May 23, 2020

Website Use Greatly Increases Knowledge of Breast Cancer...

Website Use Greatly Increases Knowledge of Breast Cancer It is the second leading cause of death in the United States, killing thousands of people each year. Cancer has certainly become a growing epidemic in our society, and breast cancer is one of its most prevalent forms. One in nine women will develop breast cancer in their lifetime, making it the most common form of cancer in women, and for many of them, this will mark the end of their life. This plague clearly needs to be taken under control, and organizations like the National Alliance of Breast Cancer Organizations (NABCO) intend to do just that. NABCO and other similar organizations aim to educate people about breast cancer in order to ultimately†¦show more content†¦The first tab reads â€Å"home,† which is the page that the site opens with, and clicking on this tab will take the user back to this page whenever they have gone elsewhere. Right beneath its name on its homepage, NABCO writes its slogan: â€Å"The more you know, the less you fear.† These words alone really seem to state their goal right away- this is an informative and educational site. Women who are educated about breast cancer are not only more likely to take the necessary precautions to avoid developing the disease, but also are more inclined to know how to deal with it if they do find this disease plaguing their lives. Therefore, educated women have less to fear, making this slogan very accurate to NABCO’s purpose. This slogan also does a lot to establish the site’s pathos appeal. Mentioning such an emo tion as â€Å"fear† in conjunction with breast cancer causes women to want to find out more about the disease in an attempt to avoid this â€Å"fear† invading their own lives. NABCO has been operating for seventeen years now, and, as it states on its homepage, is â€Å"the leading non-profit information and education resource on breast cancer in the U.S.† This statement says a lot about NABCO’s credibility, really developing its ethos appeal. However, it also says a lot about the organization’s purpose. Since it is a non-profit organization, it is truly believable that its sole intent is to educate, rather thanShow MoreRelatedParenthood : A Non Profit Organization That Does A World Of Good?966 Words   |  4 PagesDo you think it’s right to defund a non-profit organization that does a world of good? I most certainly don’t. Planned Parenthood protects, supports, and educates our society greatly from the services they provide. This essay will provide evidence and reasoning that prove that Planned Parenthood is a beneficial necessity for society, proving that it would be a horrific mistake if Congress chose t o defund Planned Parenthood. First things first, it is important to know that Planned Parenthood mainlyRead MoreHigh Energy X Ray Machines881 Words   |  4 Pagesmachines began to be developed and advertised. By 1937 these new machines could achieve one MV of radiation. This greatly improved the success rate of cancer treatments using radiation therapy. Inoperable cancers such as cervical and larynx cancers were now able to be cured by using these high energy x-ray machines (Robison). In less than fifty years a new treatment method for cancer had been invented and it was improving rapidly. Along with this new treatment there would need to be new safety measuresRead MoreAccuracy And Accuracy Of Knowledge1595 Words   |  7 PagesKnowledge is considered accurate when there is sufficient evidence that it is the truth. Over time, methods of verifying the accuracy of knowledge change. As learners, we often equate accuracy with the value of knowledge, however, the value of accuracy is dependent on the area of knowledge under consideration. Today, accuracy in the natural sciences is vital as any error can be catastrophic. In 1986, a flawed reactor and human error caused the Chernobyl disaster that exposed millions to radiationRead MoreEssay on Abortion Needs to be Limited and Regulated1679 Words   |  7 PagesPregnancy can be either wonderful, or terrifying. Complications result in miscarriages and deaths every day, and the weight of that knowledge can drown any expectant mothers joy in anxiety. Fear for the life that the child will lead, or even fear of how the child was conceived can send many to the abortion clinic or the nearest hospital that provides this procedure. However, many women who choose to end their child’s life may not realize the pain they are putting themselves through, and the alternativesRead MoreReducing Client Costs And Client Incentives1682 Words   |  7 Pagesthought the website gave some great and helpful information regarding interventions that can be addressed for cancer. Although, there are certainly some areas I believe that could be addressed better or explored in greater depth. In all three cancers small media, client reminders, and one-on-one education seemed to be the best intervention approach. Brochures, calls, and assistance scheduling are all specific small media that are being utilized to better help and remind people for cancer screeningRead More DNA Chip - Genetic Testing of the Future Essay2397 Words   |  10 Pagessides Public policy pertaining to genetic testing and the use of the DNA chip and My personal opinion regarding the use of the DNA chip. Definition of Genetic Testing Genetic testing is the analysis of human DNA, RNA, chromosomes, proteins, and certain metabolites in order to detect heritable disease-related genotypes, mutations, phenotypes, or karyotypes for clinical purposes (6). There are several genetic tests currently in use which are used to look for a possible predisposition to certainRead MoreThe Internet-a Curse, Not a Blessing1519 Words   |  7 Pagesincluding violence against women. Moreover, even without purposely clicking onto pornography links, unwanted sexually explicit ‘pop ups’ plague the average Internet user’s computer. I remember once doing a research paper on breast cancer, when upon typing in the word ‘breasts’ onto a particular search engine, literally scores of sexually explicit ‘pop ups’ terrorized my computer. They fiendishly popped up, one after the other as I worked feverishly to close those malevolent sites before anyone passRead MoreAnimal Testing Should Be Outlawed17 52 Words   |  7 PagesAnimal testing is abusive, ineffective, and should be outlawed. The use of animals in life sciences has been in laboratories for over a century. The American Medical Society endorses allowing testing of all animals to create new medicine or treatments for humans. Ever since animal testing has been put into action, many people have expressed their ethical and scientific unease about the experiments. Not only does the procedure cause the creature physical pain and psychological distress, but also itRead MoreReflective Practice in Oncology Nursing3668 Words   |  15 Pageshealth and illness and across all setting of care. Nurses assess and plan care to deal with the multidimensional range of needs for those faced with cancer. Nurses have been integrally concerned in efforts focused on cancer prevention, and they also are essential in the emerging area of clinical heredity for prevention and early detection of cancer. I am a staff nurse with more than ten year s of experience in oncology department; I have developed the oncology nursing skill in a one of the privateRead MoreGenetically Modified Foods Should Be Banned2637 Words   |  11 Pagessomething related to seafood be found in a vegetable? This is where genetically modified foods enter the picture. Genetically modified foods are unnaturally produced. Their consumption has been linked with several serious health disorders including cancer. Presence of genetically modified food in the market must be banned. This is a weakly regulated practice and is not only damaging human health but is also slowly but steadily affecting the environment. Genetically modified organisms (GMO) were introduced

Tuesday, May 12, 2020

Argumentative Essay on Fathers Role in Childs Upbringing

Argumentative Essay on Fathers Role in Childs Upbringing Father’s Role in Child’s Upbringing It was always well-known that father is an important and very influential person for everyone, although in the past his role was often underestimated. Why it was so? Why has this situation changed? I will explain my point of view. The standpoint that father is not so important for a child was formed first of all because children from the very moment of their birth are more attached to their mother, as they need their milk, love and care. Moreover, fathers are often busy at work, seeing their children less frequently. But what is peculiar, men often spend the time they have with children not so eagerly, or don’t want to do it at all. I think that one of the main reasons for this lies in their wives. They are somehow sure that their men won’t be able to cope with the kid and will do harm to them. Thus, they limit even that minute amount of time fathers have for children to almost nothing. And men start to think that it is right and that they are not responsible for their children till it is time to take them from some night club. But they can’t be more wrong, as well as their wives. Father is extremely important for successful development of child’s psyche. He can teach his kids so much, and, what is important, his children are eager to receive this knowledge and are always happy to listen to everything their father tells them. And it is so important for each mother to encourage her husband to spend more time with his children, and spend it productively. Fortunately, nowadays the situation I described above happens more and more rarely, and now fathers start to take care of their children from the first days of their life. And I think that it is the best situation that can be. It signifies that our society becomes better and better and the next generations, brought up with more father’s influence than ours, will be much better and happier.

Wednesday, May 6, 2020

Ethics in Social Work Free Essays

In psychology and social work, dual relationships and clinical boundaries are often common. They are often unclear and most times the professional has a difficult time noticing them developing. Ethical dilemmas are found in all professions, but are often different in type and solutions. We will write a custom essay sample on Ethics in Social Work or any similar topic only for you Order Now They are hard to identify and even harder to make a clear decision. Dual relationships and clinical boundaries are one of the biggest ethical dilemmas social workers face because of the difficulties of finding the line between the professional role and the empathetic role a social worker plays. Social work is a profession that helps to solve complex human problems and create a more just and caring society. One of the foundations of social work is the focus on the strengths, as opposed to the shortcomings, of individuals, families and communities so that creative solutions for complex social problems can be found. The profession is characterized by a steadfast commitment to social justice in the service of empowering individuals, families and communities to meet their needs. Few professions offer many different types of employment opportunities. Social workers serve as counselors, in adoption, domestic violence, rehabilitation, hospice, mental health, youth, community development workers, public policy analysts, global rights workers; and in juvenile and adult justice systems, just to name a few. However, the main job of a social worker, however, is to help the client to reach a more stable environment, but to go about it a specific way dependent on the job the social worker held. Each job might come with different ethical problems, but social workers have to follow a strict code of ethics that have guidelines to help them make the correct decisions. The NASW, National Association of Social Work, is the largest group of professional social workers. It is the group that wrote the NASW code of ethics, which are followed by all social workers across the United States (NASW, 2008). Ethics are the underlying rules put in place to help society better function. Usually, they are hard to identify and can be interpreted in many different ways. Each person has their own ethical standards, which is why it’s necessary to have ethical codes that make it more general and help each professional make his or her own ethical decision. Ethics play a huge role into social work. Without an ethical background or a code of ethics it could harm not only a client, but also the social worker himself. The biggest struggle that comes along with ethics is the fact that each individual usually interprets them differently. Ethics is two things. First, ethics refers to right and wrong that advise what humans should do, in terms of rights, obligations, benefits to society, fairness, or specific virtues. Ethics can refer to those standards that make humans refrain from rape, stealing, murder, assault, slander, and fraud. Ethical standards also include ideals relating to rights, such as the right to life, the right to freedom from injury, and the right to privacy. Secondly, ethics refers to the study and development of one’s ethical standards. As mentioned above, feelings, laws, and social norms can deviate from what is ethical; therefore it is necessary to constantly examine one’s standards to ensure that they are reasonable. The NASW Code of Ethics was written to serve as a guide to the everyday professional conduct of social workers. It includes four sections. The first section, â€Å"Preamble,† summarizes the social work profession’s mission and core values. The second section, â€Å"Purpose of the NASW Code of Ethics,†Ã‚  provides an overview of the Code’s main functions and a brief guide for dealing with ethical issues or dilemmas in social work practice. The third section,  Ã¢â‚¬Å"Ethical Principles,† presents broad ethical principles, based on social work’s core values, that inform social work practice. The final section, â€Å"Ethical Standards,†Ã‚  includes specific ethical standards to guide social workers’ conduct and to provide a basis for adjudication. The Code of Ethics, as used today, was approved  by the 1996 NASW Delegate Assembly and revised by the 1999 NASW Delegate Assembly. (NASW, 2008) The NASW code of ethics is used to help guide social workers when it comes to making ethical decisions in the field. It is used to help give every therapist and client the same treatment and ethical decisions. Usually, each profession has a different code of ethics due to the fact that each profession has a diverse set of ethical issues that come with it. Dual relationships or multiple relationships are interactions in which a client is treating a patient, but is also interacting with them in some other way. It can also be if a therapist is in a professional role with a person and promises to enter into another relationship in the future with that person or someone closely related to the individual. Dual roles refer to two different roles and multiple roles are when more than two overlapping roles exist. For example if a therapist is treating their child’s teacher, their child’s friend, having sexual relations with the client, or are close to the client in some way. Dual relationships are against the APA ethics code and can cause harm to the patient in some cases. A therapist should never work with people who he or she might have to interact with on a causal level instead of a patient-therapist level, not only for the patient’s confidentiality, but also to help keep the therapist from giving preferential treatment (Barnett, Vasquez, Moorehead-Slaughter, Johnson, 2007) Dual relationships can also allow a therapist to misuse their power and influence. The practitioner is in a position to exploit the client for his or her own personal gain. The problem of the dual relationships and the second relationship, the counselor is now susceptible to other interests (personal, financial, or social) that he or she may put before the best interests of the client. Problems that arise usually occur when the professional boundaries are not clear to begin with. Therefore, boundaries should be included as part of the intake paperwork. The wording should be clear and specifically state the therapist’s intentions. The therapist-client relationship is one that does not permit contact in a casual manner outside the therapy session. This includes work relationships, social conversations or any type of romantic or sexual contact. † The therapist can state something about not giving personal information to a client, as there is no need for them to know this kind of thing. If the client signs the consent form, a contract is in effect and should not be breached by either party. Not only does the therapist have to gauge the client and the way he or she processes things, but also what the client could take inappropriate. Although it may seem appropriate in a therapist’s eyes it could be inappropriate in the client’s eyes and vice versa. (Syme, 2003) The therapist has to keep a close eye on their actions and make sure their client is not seeing it differently than they are. There are three factors that counselors should consider. First, there is a greater risk of harm when the expectations of client and counselor are mismatched. When clients have one set of assumptions about the ground rules of the relationship, and the professional has a different set of assumptions, there is an increased chance of susceptibility. Another factor is that there is potential for divided loyalties and an associated loss of objectivity. Counselors who have personal, social or business relationships with their clients, are at risk because their self-interest may be involved and thus compromise the client’s best interest. Finally, by the very nature of the counselor/client relationship, clients are more dependent, have less authority and are vulnerable. Due to this power differential, it is the responsibility of the professional to ensure that the client in the relationship is not harmed. One key feature of boundary issues is a conflict of interest that harms clients. Conflicts of interest occur when professionals find themselves in a relationship that could prejudice or give the appearance of prejudicing their decision-making. Thus a counselor who provides services to a client with whom he would like to develop a sexual relationship faces a conflict of interest; the professional’s personal interests collide with his or her professional duty to avoid harming his or her client. Zur, American Psychological Association, 2007) Social workers should be alert to and avoid conflicts of interest that interfere with the exercise of professional discretion and impartial judgment. Social workers should also inform clients when a real or potential conflict of interest arises and take reasonable steps to resolve the issue in a manner that makes the clients’ interests primary and protects clients’ interests to the greatest extent possible. In some cases, protec ting clients’ interests may require termination of the professional relationship with proper referral of the client (standard 1. 6[a]), NASW, 2008). The code goes on to say that â€Å"social workers should not engage in dual or multiple relationships with clients or former clients in which there is a risk of exploitation or potential harm to the client† (standard 1. 06[c], NASW, 2008). While treating someone in therapy, a counselor has to be careful about how their patient is going to interpret their actions and words. When a patient is in therapy, a lot of times they don’t have anyone around to support them and help them overcome their obstacles. That being said, it’s the job of the therapist to be that person for their client and help them to succeed. As a client gets closer to his or her therapist, sometimes the slightest of things can be taken in the wrong way. For example, as trust is built the slightest of things can trigger a client to see their therapist in a different light. As a counselor, a pat on the back, hand touch, ect can seem like nothing to you, but to the client can seem like a sexual advance. This an be detrimental to a client and can break all the trust the therapist had built up, putting the patient back to the beginning of the process (Smith, Fitzpatrick, 1995) When the psychologist and the patient develop an extracurricular relationship, this dual relationship can threaten the psychologist’s ability to act impartially as a therapist and the patient’s ability to receive proper treatment in their vulnerable state. If psychologists are not held accountable to prevent this type of behav ior, they can harm the reputation of all clinical psychologists. Personal relationships imply a bias and the private relationship can cross over into therapy and treatment. The term â€Å"conflict of interest† applies to dual relationships because no matter how objective a psychologist tries to be, their own emotions may taint their trained perceptions. Conflict of interest can be applied to a variety of situations, such as the psychologist should not treat a family member or close friend due to the possibility of favoritism or being non-objective, and could interfere with the treatment being given and received. The psychological ethical codes clearly prohibit the interaction of a personal relationship between the psychologist and the client. Dual relationships and clinical boundaries are one of the biggest ethical dilemmas social workers are faced with; trying to find the line between the professional role and the empathetic role a social worker plays. This being said, as a social worker it is important to distance the client, but also to build trust. It takes time to learn the boundaries and how to avoid crossing them. This is just one of the biggest challenges social workers have to overcome in their field. Reference Page: Barnett J, Lazarus A, Vasquez M, Moorehead-Slaughter O, Johnson W (2007) Boundary Issues and Multiple Relationships: Fantasy and Reality; Professional Psychology: Research and Practice, 38 (4) 401-410 doi: 10. 1037/0735-7028. 38. 4. 401 Herlihy, B and Corey G. (1992) Dual Relationships in Counseling. Alexandria, VA: American Association for Counseling Development Reamer, G. F. PhD (2011, October 13). Eye on Ethics Social Work Today, retrieved from http://www. socialworktoday. om/news/eoe_101311. shtml Smith, D. and Fitzpatrick, M. (1995) Patent-Therapist Boundary Issues: An Integrative Review of Theory and Research, Professional Psychology: Research and Practice, 26 (5), 499-506 doi: 10. 1037/0735-7028. 26. 5. 499 Syme, G (2003) Dual Relationships in Counseling and Psychotherapy: Exploring the Limits, London: Sage Publications Zur, O and American Psychological Association (2007) Boundaries in Psychotherapy Ethical and Clinical Explorations. Washington, DC : American Psychological Association http://www. socialworkers. org/pubs/code/code. asp How to cite Ethics in Social Work, Essay examples

Sunday, May 3, 2020

Cash Flow Analysis free essay sample

Several factors have made Interco an attractive takeover target: 1) Interco’s stock is undervalued due to poor performance in the apparel and general merchandising divisions, which have weakened Interco’s valuation as a whole. 2) As stated by the equity analysts, Interco is an over capitalized company with potential to grow, which makes an acquisition easy to finance. 3) Interco is also a cash generative target for a potential acquirer as it generates approximately $0. 10 of operating cash flow for every dollar of sales. ) The company is also structured in a way that it could be broken up and sold into its constituent parts, which could prove to be worth more than the whole. 2. As a member of the Board of Interco, neither the Premiums Paid Analysis nor the Comparable Transaction Analysis is very convincing. ?Premiums Paid Analysis – At first glance, the premiums paid analysis indicates that the Rales Proposal undervalues the stock relative to other recent transac tions. We will write a custom essay sample on Cash Flow Analysis or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page However, this measure has limited reliability in that it is not directly related to the company’s financial outlook. Additionally, this analysis does not indicate which industries are being used as comps, so it is impossible to tell how relevant this data really is. ?Comparable Transaction Analysis – Since Interco is a conglomerate, no one industry segment will provide an accurate measure of the effectiveness of the Rales Proposal in the aggregate. Also none of the comps are even close in size to the aggregate valuation range of the Rales Proposal. Therefore, thee comps may not be relevant as smaller companies may have different growth and profitability dynamics. . See Discounted Cash Flow Analysis #1 for a discounted cash flow analysis using Wasserstein’s assumptions, which support their proposed valuation range. As a member of the Board we would question the following assumptions: †¢Assumptions related to the apparel division seem higher than warranted: oThe projected growth rate of 7. 1% is significantly higher than the recent historical performance of -10% and -. 5% for the l ast two years, respectively. oThe projected operating margin of 6. 4% is much higher than the recently declining trend of 7. %, 5. 5% and 2. 5% for the last 3 years, respectively. †¢Footwear division’s projected growth rate of 6. 3% is significantly lower than the recent performance of 19% and 34% over the last two years respectively. Also, it is projected to be the lowest of the four divisions despite being the best performer recently. †¢Terminal value multiples of 14x-16x seem high. The Board should ask for additional support to validate these assumptions †¢Discount rate of 10-13%. 10% seems low given the corporate bond rates and the risk free rates given in Exhibit 14. We should also perform a Weighted Average Cost of Capital calculation based on the desired equity return of the investors and the potential Debt/Equity ratio. A preliminary estimate assuming a 60%/40% D/E ratio, a required equity return of 20%, a required debt return of 10% and a 41% tax rate would require a minimum discount rate of 11. 5%. 4. Given the information provided, $70 seems like a reasonable offer worthy of consideration. The $70 offer is in range based of the Wasserstein analysis and Rales has indicated its willingness to increase the bid if supported by further due diligence. There is no reason to believe that Interco could potentially get a higher bid given that no other suitors exist and also given the recent performance of the stock prior to the news of the initial takeover offer. The stock was trading in the $32. 25-$53. 25 range over the last 2 ? years with an average trading price $41. 50. Additionally, if the management team rejects the bid, it still must execute a restructuring plan in order to unlock the true value of the firm. Given the risk involved with this strategy it is uncertain that they would be able to actually increase Interco’s value. Upon further analysis, whereby we adjusted for the appropriate growth rate and profit potential of the Apparel division, we have determined that a more accurate valuation range for Interco is $61 $70/ share. See Discounted Cash Flow Analysis #2 for a revised discounted cash flow analysis and stock value range. As a result, we would advise the board to accept City Capital’s offer based on (i) our revised analysis, (ii) due to the fact that there are no alternative bids for the company and (iii) the risk associated with management’s restructuring plan. 5. The Board When the Board hired Wasserstein, Perella, Co. to stop the Rales brothers it appears it neglected its fiduciary responsibility of the shareholders and worked instead in its own best interests. Instead of attempting to understand the reason for the takeover and analyzing the pros and cons of a potentially friendly merger, the Board threw up an automatic roadblock. The Board is primarily comprised of Intercos top executives out of the 14 named directors, only seven are independent shareholders who are not employed by Interco or one of its subsidiaries or divisions. The Board initially instituted certain poison pill provisions to prevent a takeover. This alone is not indicative of a breach of fiduciary duty to the shareholders, but on August 8, 1988 the Board approved golden parachute protections for Intercos senior executives which would be triggered on acquisition by a third party. The total value of these agreements was $16. 3M. At this time all directors, nominees and officers of Interco (not just those on the Board) beneficially owned only 1. 14% of all outstanding shares of Interco. After receiving the Rales Proposal, the Board attempted to determine the value of Interco based on a third party analysis. This analysis was biased, though, as Wasserstein’s compensation was based on the wrong incentive whereby they receive an additional $3. 8 million fee if they got City Capital rescind the offer and successfully recapitalized the Company. As a result, the Wasserstein analysis was not truly objective. Further, the Board could (and probably should) have made a counter offer to the City Capital proposal rather than rejecting it outright. Wasserstein, Perella, Co Wasserstein faces conflict of interest due to the structure of its compensation agreement. Wasserstein gets a bonus if the takeover does not occur. With this type of perverse incentive, Wasserstein’s objectivity is impaired and its valuation is unreliable. The Rales Brothers The Rales Brothers appeared to correctly identify a target whether for friendly merger or hostile takeover. The Rales are acting deliberately and seriously to acquire Interco. They have filed with the SEC and have arranged financing. They have made two firm offers and have indicated willingness to increase their bid should Interco provide empirical support to justify a higher stock price. The Rales appear to be behaving deliberately, but fairly, as they have announced their intention to potentially break up the company. Drexel Burnham Obviously Drexel is fully on board with this deal. They are highly confident that Drexel could raise up to $1. 375B in capital with an additional $1. 1B in debt commitments from Chase.

Thursday, March 26, 2020

The History and Art of Music an Example of the Topic History Essays by

The History and Art of Music by Expert Dr Olivia | 27 Dec 2016 History of Music Music has been used in history even earlier than language has been used. Among others, if all cultures had something in common, it was that music had been a part of their history, has been known to influence and shape different cultures and have been part in the development of the society. Reciprocally, the cultures music is heavily influenced by many aspects about the society such as the pervading culture itself, the socio-economic situation, the environment, as well as the technology (History of Music, 2006). Need essay sample on "The History and Art of Music" topic? We will write a custom essay sample specifically for you Proceed Music is influenced by the environment because the composers as part of the society cannot be separated from the context in which they belong. Thus, it can be said that music has been influencing and at the same time, is being influenced by the many factors that shape the society. This can be illustrated by most periods in history starting from the prehistoric to the present. People Very Often Tell EssayLab specialists: How much do I have to pay someone to make my paper in time? Essay writer professionals propose: Academic Paper Writing Services Professional Writers For Hire Write My Essay For Me Cheap Custom Essay Company The prehistoric times can be said to be the period when man was most unified with nature and it is not surprising for historians to theorize that music during that period was influenced by natural sounds such as birdsongs, wind blowing, and the rustles of leaves (Music, 2006). For civilization to proceed there must be a way of communication among men and in the prehistoric times, and historians believe that men use sounds imitated from nature to communicate with others. Music predating language is referred to as prehistoric music. Examples of such music include the Native American Music, Aboriginal Music and what non-European continents call folk, indigenous, or traditional music (History of Music, 2006). The term Ancient music refers to the music that followed Prehistoric. Their only difference is that ancient music existed in a period when man had become more civilized antedating the beginning of language (History of Music, 2006). As the different societies develop and as men became more civilized, so did the music and its purpose. But to all societies, the purpose of music was and is still among entertainment, celebration and religion. In Asia, particularly in China and Japan for example, music had been a part of court entertainment. Japan had religious songs, gathering songs and childrens songs. India, in its classical times used music as a religious inspiration addressed to their religious deities, as a form of cultural expression or pure entertainment (History of Music, 2006). History may show that music had similar purposes for different societies but the development of music in history has always been tracked through its evolution in the West, particularly, in Europe. Very little is known about the perse musical traditions of not only in other parts of the world but particularly in medieval Europe where as said earlier, was the point of reference in describing the history of music. It was only during the Middle Ages, when the power of the Roman Catholic Church was at its peak that these various musical traditions were unified (History of Music, 2006). During this time, musical development centered on the Church and very few music emerged that was not influenced by religion. This was because the Roman Catholic Church then was as powerful as to suppress any music that was not religiously inspired to favor liturgical music on the other hand. It is during this time that liturgical music, most popular at present as the Gregorian Chant started. It is thought that it was Pope Gregory I himself who had been the composer of the liturgical music. In addition, it was also during this period that polyphonic music was sung and notation was reinvented. The invention of polyphonic music and the reinvention of notation allowed many schools of music to flourish. Among which include the St. Martial School, Notre Dame School, Santiago de Compostela and the English School. With the rise of these schools was the development of secular songs which include the music of the troubadours, trouveres and Minnesanger from which evolved the early Renaissance musical forms (History of Music, 2006). Renaissance in Music began in Northern Europe. The early Renaissance music is said to be a reaction against the technicalities imposed by the previous styles. Music during this period contained balanced and less complex melody and balanced polyphony in all voices. From then, composers and musicians began spreading in Europe to be employed by the Church and the Aristocratic society such as the Medici, Este and Sforza. Several musical styles developed afterwards: there were styles of simplicity in sacred music which was developed by the Council of Trent; styles directed towards complexity which was best exemplified by the avant-garde style of the Venetian School. After revolutionary movements in music, which aimed to restore the music of the Ancient Greeks, monodic acts were developed. These monodic acts were what are now called the opera which beginning defined the end of the Renaissance and the beginning of the Baroque from which, Instrumental music started its dominance (History of Music, 2006). During the Baroque period, the traditional Church music continued but it was secular music that became dominant. Sonatas and concertos were developed. The most dominant musical instruments during this period were the harpsichord and a bass instrument, either viola or bassoon. Baroque music was known for its improvisation (Merker, 2000). It was during this period that prominent composers like Johann Sebastian Bach, George Frederic Handel and Antonio Vivaldi arose. After Baroque was the Classical period o music which was characterized by singable melodies with an accompaniment and a homophonic texture. The voice-like melodies during this period allowed the replacement of singers in operas by instrumental music (Merker, 2000). Musical forms such as sonata, symphony and concerto then dominated the musical scenes. The most prominent musician during this period was Wolfgang Amadeus Mozart (Merker, 2000). Dramatical musical representations became popular during the Romantic period of music. This allowed the expansion of the orchestra as well as made popular concerts. Among the prominent figures in this period were Chopin, Johann Strauss II, Tchaikovsky, Verdi, and Wagner (History of Music, 2006). As technology developed, and as different cultures merge, so was the role of music. With globalization allowing its easier dissemination, music was not limited to clubs and concerts. Types of music became perse and music became more visual. The modern music allowed more freedom and experimentation in terms of musical styles (History of Music, 2006). Music as an Art Art is defined as mans way communicating or expressing himself to attain beauty and/or understanding of both himself and the things around him. This means that music, when used by man for expression is controlled by the composer, who is then controlled or influenced by the society, environment or context in which he belongs. This means, music as a form of art is influenced by the context in which it belongs to. Music as an art form is influenced by history and has the power to change or sway history as well. Music as a form of expression is controlled by man using its different elements and aspects of sound. These elements include melody, harmony, rhythm, tone and form. Sound aspects include pitch, timber, loudness and duration (Music, 2006). These elements and sound aspects are controlled by both the composer and the performer. During the composition and production of music, it is the composer who has the power to input his creativity towards the certain work. He or she can control almost all elements. But once the music is performed, it is the performer who has the control over the musics form. The performer could change the melody, loudness and pitch of a composition, different from what the composer may have intended, depending on what the performer chooses or how the performer wants to express the composition. During the performance, everything about how the composition is to be performed is the performers decision to make and the composer would not have any control however precise the composition is. This is termed as the interpretation. In terms of expression, art genres such as jazz and blues could be considered more artistic as it gives the artist more freedom to improvise. In these genres, artists have more control the melody, harmony and the rhythmic framework of the composition (Owen, 2000). Among all types, it is that with the most freedom of improvisation that is considered of greatest artistry and this involves of course the spontaneity of thought during the performance itself. This is art in music with the performer in focus (Owen, 2000). If the composers art is to be emphasized, the music should be looked at in terms of its processes. These processes are what create the music that the performer is to make. This is what involves the elements of music which creates the sounds. To understand more effectively the art and construction of music, the elements and sound aspects are used. The most common tool used in judging the quality of a musical composition is rhythm which is the process in which music occurs in time (Music, 2006). The creation of sounds varies from composer to composer depending on their styles, tastes and their own personal biases and influences. But usually, the process or composition of music is judged based on the examination of the elements of music as described in the practice in Western Classical music, now involving more common methods such as the African Jazz and rap music (Music, 2006). The Art in music is in musics nature itself. As a form of expression, the art in music is in its elements and in the processes in which the artists, particularly the composers and performers are able to manipulate it for their own purposes. Summary Different cultures had different variations in musical styles. Other than the cultural aspect, music also varied from different periods from the use of instruments and techniques to the use of music as well. Music has been shaped by mans history and culture and likewise, it has contributed to the development of mans culture as well especially since it has been considered not only as a form of entertainment and ceremonies but for propaganda as well. We can see this particularly in the medieval times when the power of the Roman Catholic Church was at its peak and even in the modern times when it is being used in political campaigns and in music videos promoting pop culture and sometimes subtly implying idealism and reform. These have been entirely possible since undoubtedly, music is a mode of expressionan art form where each element could be manipulated to produce a certain effect and meaning. Today, its influence cannot be denied given the technology and ease in which it can be disseminated. Works Cited History of music. (2006, December 6). In Wikipedia, The Free Encyclopedia. Retrieved 02:04, December 10, 2006, from http://en.wikipedia.org/w/index.php?title=History_of_music&oldid=92546657 Merker, Brown, Steven, eds. (2000). The Origins of Music. US:The MIT Press. Music. (2006, December 10). In Wikipedia, The Free Encyclopedia. Retrieved 00:08, December 11, 2006, from http://en.wikipedia.org/w/index.php?title=Music&oldid=93358182 Owen, Harold (2000). Music Theory Resource Book. UK: Oxford University Press.

Friday, March 6, 2020

Free Essays on Music And Sex

The notion of â€Å"going too far† when it comes to the producer including sexual imagery in music videos has become more and more apparent as the years go by. Sex and its glamorized portrayal have become a major component in the creation and production of music videos everyday. The role taken by the government in the amount of sexual imagery and vulgar lyrics that is permitted to be included is one that is not taken seriously, or to great lengths. Today’s typical music video is one that uses shocking sexual imagery and vulgar lyrics to break through the clutter and grab the full attention of the viewer since the notions of sex and anti-establishment are so appealing to the target audience. According to the Record Industry Association of America, studies have been conducted by professors to reveal whether sexual images were randomly placed in videos on MTV, or if the pattern of their appearance was consistent. Results showed that â€Å"sexual images alone appeared in more than one in four videos†. Among these videos images of dating, provocative clothing, kissing, suggestive movements, pursuit, physical contact, sexual bondage and sadomasochism appeared. Since almost all music videos are directed by men, the music videos today depict their so-called â€Å"sexual dreamland†. Some common themes that tend to appear within these typical videos are those that include older men with younger women, strippers, schoolgirls, and mainly nude and available women in great numbers. Since it is made to show that the man controls the female’s sexuality and makes it into what they want, the women and their actual feelings on sexuality have no voice in these music videos. This similar theme holds true on television, in magazines, movies, commercials, and in virtually all other types of media. The role of the woman in music videos is not one that holds much importance. The main purpose they hold is always to be looked at. Only those women... Free Essays on Music And Sex Free Essays on Music And Sex The notion of â€Å"going too far† when it comes to the producer including sexual imagery in music videos has become more and more apparent as the years go by. Sex and its glamorized portrayal have become a major component in the creation and production of music videos everyday. The role taken by the government in the amount of sexual imagery and vulgar lyrics that is permitted to be included is one that is not taken seriously, or to great lengths. Today’s typical music video is one that uses shocking sexual imagery and vulgar lyrics to break through the clutter and grab the full attention of the viewer since the notions of sex and anti-establishment are so appealing to the target audience. According to the Record Industry Association of America, studies have been conducted by professors to reveal whether sexual images were randomly placed in videos on MTV, or if the pattern of their appearance was consistent. Results showed that â€Å"sexual images alone appeared in more than one in four videos†. Among these videos images of dating, provocative clothing, kissing, suggestive movements, pursuit, physical contact, sexual bondage and sadomasochism appeared. Since almost all music videos are directed by men, the music videos today depict their so-called â€Å"sexual dreamland†. Some common themes that tend to appear within these typical videos are those that include older men with younger women, strippers, schoolgirls, and mainly nude and available women in great numbers. Since it is made to show that the man controls the female’s sexuality and makes it into what they want, the women and their actual feelings on sexuality have no voice in these music videos. This similar theme holds true on television, in magazines, movies, commercials, and in virtually all other types of media. The role of the woman in music videos is not one that holds much importance. The main purpose they hold is always to be looked at. Only those women...

Wednesday, February 19, 2020

Civil Engineering Structural Concentration Essay

Civil Engineering Structural Concentration - Essay Example Basically, the properties and characteristics of a polymer depend upon its structure. The strength of the plastics can be determined from a measurement known as the Young’s modulus. Young’s modulus is the ratio of stress over strain, i.e. elasticity and is measured in units of Pascal (Pa). Unfilled plastics usually have a Young’s modulus of less than 3.5 GPa at room temperature (â€Å"Characterization and Failure Analysis of Plastics†, 53). Their strength is also temperature sensitive and can be affected by environmental factors as well. The strength can be improved by using fillers and fibers as reinforcements in order to enhance the mechanical properties of the plastic. The tensile strength of most plastics is less than 35 MPa. A lesser tensile stress means a lesser rigidity (MatWeb, n.pag.) but this can be increased by using resin of higher Young’s modulus so as to provide with better reinforcements. The designing of the plastic also has a signif icant role in improving the strength of the plastic (â€Å"Characterization and Failure Analysis of Plastics†, 53). Lower quality or recycled plastics have a lower tensile strength and can break at a very low magnitude of stress. This is because after recycling the plastics are â€Å"down cycled† causing them to become less rigid and more amorphous thereby causing them to break at a lower stress level. The load on the above hanger is caused by hanging clothes. In this case the force or load is caused by the weight of the clothes which depends upon the thickness of the fabric. On average clothes weigh about 2 to 5 pounds (lbs) with the weight being centered at the middle point of the hanger. Continuous weight on one point of the hanger results in breakage. The fracture shown in Figure 1 illustrates that breakage has occurred midway along the length of the hanger leaving 18.5 cm on both sides. The hanger being

Tuesday, February 4, 2020

Q1 Essay Example | Topics and Well Written Essays - 500 words

Q1 - Essay Example The management system of the hospitals needs change to work efficiently. Lean can be defined as a toolset, management system or a philosophy that keeps the capability of transforming the method of organizing and managing the hospitals. The hospital system involving patients, employees and physicians can be improved in terms of management and health care by adopting the lean methodology. Overall, lean can be defined as a management system that is supportive for hospital management and health care profession reducing errors and maximizing efficiency. Value added activities in lean can be defined as those activities due to which, products or process get better, however, non-value added activities are those who have no participation to the products or process and can be removed as waste. For example, generating a printed slip of emails of the orders is a waste and should be eliminated while generation of a printed slip for required items is value added activity. A value stream can be defined as a sequential set of activities that are needed to generate a particular product or service. It is related to sub-optimization as sub-optimization occurs when the outputs are less than expected because of some lacking work from some business entity. Sub-optimization puts a negative impact on value stream as the outputs of products and services are flawed. The three forms of process from a lean perspective are about waste and they are muri, mura and muda. Muri is wasteful design, mura is wasteful implementation while muda is wasteful action. These forms are important as lean works towards elimination of wastes to make the activities value

Monday, January 27, 2020

Non-standard English: Usage and attitudes

Non-standard English: Usage and attitudes Introduction Spoken language is a powerful method of communication that conveys more than intended referential information. Depending on the listeners attitude, a speakers accent or dialect may imply a number of characteristics such as social class and professionalism. Examples of non-standard linguistic features are discussed under Task 1; followed by summaries of two studies under Task 2, which focus on attitudes towards West Indian Patois (Edwards, 1986) and the Cockney accent (Giles Sassoon, 1982). Task 1 Thats the girl he gave the bracelet to. This sentence contains a grammatical, non-standard linguistic feature because it ends with the preposition to. In Standard English, a preposition usually proceeds a noun, hence the sentence should read: Thats the girl to whom he gave the bracelet. However, there are cases where sentences sound unnatural if they are arranged in a way that avoids a final proposition. This is usually seen in conversational English, for example: in relative clauses and questions which feature phrasal verbs, passive constructions, and short sentences which feature an infinitive or verbal noun. Nonetheless, in formal writing, it is considered better practice to avoid placing a preposition at the end of a sentence where it may seem stranded. (Preposition, 2008) Buffy the vampire slayer is dead cool. This sentence contains a lexical, non-standard linguistic feature because dead functions as an adverb of degree, such as very; the sentence should read, Buffy the vampire slayer is very cool, or of a similar effect. Dead typically functions as an adjective, meaning no longer alive, and is used in contexts such as a dead bodyor a dead issue. It has therefore undergone semantic change, and its meaning has been broadened. (Dead, 2017) My old man gave me a set of wheels for my birthday. This sentence contains lexical, non-standard linguistic features because slang is used. My old man is a colloquial, informal noun phrase meaning ones father or a womans husband or boyfriend; set of wheels is also a colloquial, informal noun phrase meaning a motor vehicle, as opposed to a literal set of wheels. According to Standard English, the sentence should read: My father gave me a motor vehicle for my birthday. The phrases have thus undergone semantic change. (Old man, 2017) The guy that works in the bar is really nice. This sentence contains a lexical, non-standard linguistic feature due to the use of the informal noun, guy, meaning man (Guy, 2017). There is also a grammatical, nonstandard linguistic feature because, in Standard English, that should not be used as a relative pronoun when the antecedent is personal. A human antecedent is typically proceeded by who in a defining clause. An inanimate antecedent or a human but representative of a class is followed by that; for example, the chair that collapsed / the baby that laughed. In Standard English, the sentence should therefore read: The man who works in the bar is really nice. (That, 1998) Who did you see? This sentence contains a grammatical, non-standard linguistic feature because who is used in place of whom. In Standard English, who is a relative pronoun or an interrogative when it refers to the subject (who is there?). Whom is the objective form, hence the sentence should read: Whom did you see? However, the use of whom is declining and is often replaced by who in modern usage. (Who and whom, 2017) Task 2 A study of West Indian Patois, conducted by Viv Edwards (1986) A study of 45 British-born black adolescents in a West Midlands community (Edwards 1997: 409) reveals the attitudes of teachers and pupils towards West Indian Patois. Attitudes to Patois in the educational world are generally negative. The Association of Teachers of English to Pupils from Overseas (ATEPO 1970) describe West Indian language as babyish and lacking proper grammar (Edwards 1986: 25); the National Association of School Masters (1969) refer to West Indian language as a plantation English which is socially unacceptable and inadequate for communication (Edwards 1986: 25). These negative attitudes reflect some of the findings of Edwards (1986) West Midlands study. Conducted in Dudley, the study consisted of a judgement sample and comprised of 3 measures which were applied to the speech of 21 women and 24 men, aged between 16 and 23: frequency of Patois features, competence in Patois, and patterns of Patois usage. (Edwards 1997: 410). The studys findings are presented in 3 sets of interactions, as summarised below: Classroom Interaction, Pupil-Pupil Interactions and Pupil-Teacher Interactions. Classroom Interaction The stereotype that Patois speakers are limited to monolingualism was opposed by recordings of Black pupils using different language patterns in the classroom. Pupil-Pupil Interactions Contrary to the beliefs of the White community, Black pupils, who reduced the frequency and range of their nonstandard linguistic features, made a marked choice not to speak Standard English (despite their competence to speak both varieties). The use of Patois in the classroom was rare but virtually all black pupils could understand it, and used features in at least some situations. Within Black peer groups, it marked solidarity and acceptance; in mixed-raced groups, it functioned to exclude the White outsider. However, a few White pupils sought acceptance from Black friendship groups by using Patois, but their degree of competence varied. Some Black pupils responded with amusement and approval; most responded negatively to the White community for using a variety of English that was distinctively Black. Pupil-Teacher Interactions Black pupils used Patois to exclude their White teacher as means of defiance. Teachers then felt threatened when Patois was used in a confrontational way. Teachers who responded punitively elicited negative attitudes towards Patois. Other reports of teacher responses included learning nonstandard linguistic features in an attempt to understand Black dialect. Edwards (1997) concludes that teachers punitive responses and the use of Patois to exclude the White community are a reflection of the issues caused by negative attitudes towards nonstandard varieties of English. A study of Cockney, conducted by Howard Giles and Caroline Sassoon (1982) A study of a speakers accent and social class reveals the attitudes of 120 undergraduate listeners towards Cockney, in comparison to Received Pronunciation (RP). Based, on Ryan Sebastians (1980) study of the attitudes of middle class listeners towards Mexican-American in the USA, both studies were reminiscent of Lamberts (1967) matched-guise test and consisted of a tape-recording, followed by a questionnaire. Ryan Sebastian (1980) found that by disconfirming the listeners assumption of the accented speakers social class, their evaluations improved. Giles Sassoon (1982) referred to this as the Ryan Sebastian effect, which they later opposed in their hypothesis: awareness of a Cockney speakers social class would not attenuate significantly the unfavourable status associations commonly levied against nonstandard speech (pp. 306). The participants of the study (Ss) consisted of 63 males and 57 females, aged between 18 and 23. Ss heard 1 combination of a male students voice and social class information who was recorded reading two stimulus passages using RP and Cockney accents. The legitimacy of his bidialectal skills was assessed in a pilot study by 24 undergraduates. The studys dependant measures involved 5 small questionnaires, each consisting of 7-point rating scales and instructions. The questionnaires were: measures of Ss perception of the speakers social class, accent and formality of speech; social evaluation scales based on the speakers intelligence, success, friendliness and trustworthiness; belief similarity items which measured the extent that Ss agree[d] with the speaker on social issues such as the legislation of marijuana; social distance items which measured how close a relationship Ss were willing to have with the speaker; and social role items which determined Ss willingness to work with the speaker as subordinate to, superior over, or colleague with them (pp. 307). Ss were recorded in groups of up to 6 other undergraduates; they were handed the 5 questionnaires in the format of a response booklet with the social class information facing upwards. Once they had completed the task, they were debriefed and engaged in discussion. The results proved Giles Sassoons hypothesis; the awareness of the speakers middle class background did not prevent Ss from perceiving him as a low status evaluation when he used Cockney. Accent influenced the ratings on only 1 of 4 social issues; listeners shared more beliefs on the legislation of marijuana with the speaker when he used an RP accent; accent had no effect on social distance items; but the findings from the social role items showed that Ss preferred an RP speaker as their superordinate, and as a subordinate too (pp. 311). Giles Sassoon conclude that the awareness of a Cockney speakers middle class background does not prevent the stereotyped negative attitudes towards low status ratings (pp. 311). Conclusion The nonstandard linguistic features in Task 1 and the studies summarised in Task 2 portray several varieties of English. The mixed attitudes towards the widespread use of nonstandard linguistic features are a clear reflection of an ever-changing language. Word count: 1500 words References Allen, R. Fowler, H. (2008). Preposition. Pocket Fowlers Modern English Usage. Oxford: Oxford University Press. Retrieved from http://www.oxfordreference.com.idpproxy.reading.ac.uk/view/10.1093/acref/9780199232581.001.0001/acref-9780199232581-e-3016?rskey=4f5JCxresult=1 Allen, R. Fowler, H. (2008). Who and whom. Pocket Fowlers Modern English Usage. Oxford: Oxford University Press. Retrieved from http://www.oxfordreference.com.idpproxy.reading.ac.uk/view/10.1093/acref/9780199232581.001.0001/acref-9780199232581-e-4155?rskey=ducoglresult=2 Dead. (2017). Oxford English Dictionary. Oxford. Retrieved from https://en.oxforddictionaries.com/definition/dead Edwards, V. (1986). Language In A Black Community. Clevedon: Multilingual Matters Edwards, V. (2007). Patois and the Politics of Protest: Black English in British Classrooms. In Coupland, N. Jaworski, A. Sociolinguistics: A Reader and Coursebook. (408-415). London: MacMillan Press. Fowler, H. Burchfield, R. (1998). That. The new Fowlers Modern English usage. Oxford: Oxford University Press. Giles, H. Sassoon, C. (1983). The effect of speakers accent, social class background and message style on British listeners social judgements. Language Communication, 3(3), 305-313. http://dx.doi.org/10.1016/0271-5309(83)90006-x Guy. (2017). Oxford English Dictionary. Oxford. Retrieved from https://en.oxforddictionaries.com/definition/guy Lambert, W. E. (1967). A social psychology of bilingualism. Journal of Social Issues. 23, 91- 109. Old man. (2017). Oxford English Dictionary. Oxford. Retrieved from https://en.oxforddictionaries.com/definition/old_man

Saturday, January 18, 2020

Management Information System Questions

————————————————- MANAGEMENT INFORMATION SYSTEM Question 1(10 Marks) Discuss five (5) challenges of Management Information System (MIS). Answers Introduction A Management Information System (MIS) provides information which is needed to manage organizations effectively. Management information systems involve three primary resources such as people, technology and information or decision making. Management information systems are distinct from other information systems in that they are used to analyze operation activities in the organization.Academically, the term is commonly used to refer to the group of information management methods tied to the automation support of human decision making, e. g. decision support systems, expert systems and executive information systems. The Challenge of Management Information System (MIS) Although information technology is advancing at a bli nding pace, there is nothing easy or mechanical about building and using information systems. There are five major challenges confronting managers: 1. The information systems investment challengeIt is obvious that one of the greatest challenges facing managers today is ensuring that their companies do indeed obtain meaningful returns on the money they spend on information systems. It’s one thing to use information technology to design, produce, deliver, and maintain new products. It’s another thing to make money doing it. How can organizations obtain a sizable payoff from their investment in information systems? How can management ensure that information systems contribute to corporate value?Senior management can be expected to ask these questions: How can we evaluate our information systems investments as we do other investments? Are we receiving the return on investment from our systems that we should? Do our competitors get more? Far too many firms still cannot answ er these questions. Their executives are likely to have trouble determining how much they actually spend on technology or how to measure the returns on their technology investments. Most companies lack a clear-cut decision-making process for eciding which technology investments to pursue and for managing those investments. 2. The strategic challenge What complementary assets are needed to use information technology effectively? Despite heavy information technology investments, many organizations are not realizing significant business value from their systems, because they lack—or fail to appreciate—the complementary assets required to make their technology assets work. The power of computer hardware and software has grown much more rapidly than the ability of organizations to apply and use this technology.To benefit fully from information technology, realize genuine productivity, and become competitive and effective, many organizations actually need to be redesigned. T hey will have to make fundamental changes in employee and management behavior, develop new work models, retire obsolete work rules, and eliminate the inefficiencies of outmoded business processes and organizational structures. New technology alone will not produce meaningful business benefits. 3. The globalization challengeHow can firms understand the requirements of a global economic environment? The rapid growth in international trade and the emergence of a global economy call for information systems that can support both producing and selling goods in many different countries. In the past, each regional office of a multinational corporation focused on solving its own unique information problems. Given language, cultural, and political differences among countries, this focus frequently resulted in chaos and the failure of central management controls.To develop integrated, multinational, information systems, businesses must develop global hardware, software, and communications stan dards; create cross-cultural accounting and reporting structures; and design transnational business processes. 4. The information technology infrastructure challenge: How can organizations develop an information technology infrastructure that can support their goals when business conditions and technologies are changing so rapidly? Many companies are saddled with expensive and unwieldy information technology platforms that cannot adapt to innovation and change.Their information systems are so complex and brittle that they act as constraints on business strategy and execution. Meeting new business and technology challenges may require redesigning the organization and building a new information technology (IT) infrastructure. Creating the IT infrastructure for a digital firm is an especially formidable task. Most companies are crippled by fragmented and incompatible computer hardware, software, telecommunications networks, and information systems that prevent information from flowing freely between different parts of the organization.Although Internet standards are solving some of these connectivity problems, creating data and computing platforms that span the enterprise—and, increasingly, link the enterprise to external business partners—is rarely as seamless as promised. Many organizations are still struggling to integrate their islands of information and technology. 5. Ethics and security challenge: The responsibility and control challenge: How can organizations ensure that their information systems are used in an ethically and socially responsible manner?How can we design information systems that people can control and understand? Although information systems have provided enormous benefits and efficiencies, they have also created new ethical and social problems and challenges. A major management challenge is to make informed decisions that are sensitive to the negative consequences of information systems as well to the positive ones. Managers face an ongoing struggle to maintain security and control. Today, the threat of unauthorized penetration or disruption of information systems has never been greater.Information systems are so essential to business, government, and daily life that organizations must take special steps to ensure their security, accuracy, and reliability. A firm invites disaster if it uses systems that can be disrupted or accessed by outsiders, that do not work as intended, or that do not deliver information in a form that people can correctly use. Information systems must be designed so that they are secure, function as intended, and so that humans can control the process. QUESTION 2 (10 Marks)Explain with example (s) one (1) of the following Enterprise Applications: a) ERP b) SCM c) CRM Answers a) ERP Introduction In 1990, Gartner Group first employed the acronym ERP as an extension of material requirements planning (MRP), later manufacturing resource planning and computer-integrated manufacturing. W ithout supplanting these terms, ERP came to represent a larger whole, reflecting the evolution of application integration beyond manufacturing. Not all ERP packages were developed from a manufacturing core.Vendors variously began with accounting, maintenance and human resources. By the mid-1990s, ERP systems addressed all core functions of an enterprise. Beyond corporations, governments and non-profit organizations also began to employ ERP systems. Enterprise Resource Planning (ERP) Enterprise Resource Planning (ERP) systems integrate internal and external management information across an entire organization, embracing finance or accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application.Their purpose is to facilitate then flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. ERP systems can ru n on a variety of computer hardware and network configurations, typically employing a database as a repository for information. Characteristics ERP systems typically include the following characteristics:- * An integrated systems that operates in real time (or next to real time), without relying on periodic updates. * A common database, which supports all applications. * A consistent look and feel throughout each module. Installation of the system without elaborate application/data integration by the Information Technology (IT) department. Examples: * Finance/ Accounting : General ledger, payables, cash management, fixed assets, receivables, budgeting and consolidation. * Human Resources : payroll, training, benefits, 401K, recruiting and diversity management. * Manufacturing : Engineering, bill of materials, work orders, scheduling, capacity, workflow management, quality control, cost management, manufacturing process, manufacturing projects, manufacturing flow, activity based cost ing, product lifecycle management. Supply chain management : Order to cash, inventory, order entry, purchasing, product configurator, supply chain planning, supplier scheduling, inspection of goods, claim processing, commissions. * Project management : Costing, billing, time and expense, performance units, activity management. * Customer relationship management : Sales and marketing, commissions, service, customer contact, call center support. * Data services : Various â€Å"self–service† interfaces for customers, suppliers and/or employees. * Access control : Management of user privileges for various processes. Components:- * Transactional database Management portal/dashboard * Business intelligence system * Customizable reporting * External access via technology such as web services * Search * Document management * Messaging/chat/wiki * Workflow management Connectivity to Plant Floor Information ERP systems connect to real–time data and transaction data in a v ariety of ways. These systems are typically configured by systems integrators, who bring unique knowledge on process, equipment, and vendor solutions. Direct integration—ERP systems have connectivity (communications to plant floor equipment) as part of their product offering.This requires the vendors to offer specific support for the plant floor equipment that their customers operate. ERP vendors must be expert in their own products, and connectivity to other vendor products, including competitors. Database integration—ERP systems connect to plant floor data sources through staging tables in a database. Plant floor systems deposit the necessary information into the database. The ERP system reads the information in the table. The benefit of staging is that ERP vendors do not need to master the complexities of equipment integration. Connectivity becomes the responsibility of the systems integrator.Enterprise appliance transaction modules (EATM)—These devices commu nicate directly with plant floor equipment and with the ERP system via methods supported by the ERP system. EATM can employ a staging table, Web Services, or system–specific program interfaces (APIs). The benefit of an EATM is that it offers an off–the–shelf solution. Custom–integration solutions—Many system integrators offer custom solutions. These systems tend to have the highest level of initial integration cost, and can have a higher long term maintenance and reliability costs. Long term costs can be minimized through careful system testing and thorough documentation.Custom–integrated solutions typically run on workstation or server class computers. Implementation ERP's scope usually implies significant changes to staff work processes and practices. Generally, three types of services are available to help implement such changes—consulting, customization, and support. Implementation time depends on business size, number of modules, customization, the scope of process changes, and the readiness of the customer to take ownership for the project. Modular ERP systems can be implemented in stages. The typical project for a large enterprise consumes about 14 months and requires around 150 consultants.Small projects can require months; multinational and other large implementations can take years. Customization can substantially increase implementation times. Process preparation Implementing ERP typically requires changes in existing business processes. Poor understanding of needed process changes prior to starting implementation is a main reason for project failure. It is therefore crucial that organizations thoroughly analyze business processes before implementation. This analysis can identify opportunities for process modernization. It also enables an assessment of the alignment of current processes with those provided by the ERP system.Research indicates that the risk of business process mismatch is decreased by: * linking current processes to the organization's strategy; * analyzing the effectiveness of each process; * understanding existing automated solutions. ERP implementation is considerably more difficult (and politically charged) in decentralized organizations, because they often have different processes, business rules, data semantics, authorization hierarchies and decision centers. This may require migrating some business units before others, delaying implementation to work through the necessary changes for each unit, possibly reducing integration (e. . linking via Master data management) or customizing the system to meet specific needs. A potential disadvantage is that adopting â€Å"standard† processes can lead to a loss of competitive advantage. While this has happened, losses in one area are often offset by gains in other areas, increasing overall competitive advantage. Configuration Configuring an ERP system is largely a matter of balancing the way the customer wants t he system to work with the way it was designed to work. ERP systems typically build many changeable parameters that modify system operation.For example, an organization can select the type of inventory accounting—FIFO or LIFO—to employ, whether to recognize revenue by geographical unit, product line, or distribution channel and whether to pay for shipping costs when a customer returns a purchase. Customization ERP systems are theoretically based on industry best practices and are intended to be deployed â€Å"as is†. ERP vendors do offer customers configuration options that allow organizations to incorporate their own business rules but there are often functionality gaps remaining even after the configuration is complete.ERP customers have several options to reconcile functionality gaps, each with their own pros/cons. Technical solutions include rewriting part of the delivered functionality, writing a homegrown bolt-on/add-on module within the ERP system, or int erfacing to an external system. All three of these options are varying degrees of system customization, with the first being the most invasive and costly to maintain. Alternatively, there are non-technical options such as changing business practices and/or organizational policies to better match the delivered ERP functionality.Key differences between customization and configuration include: * Customization is always optional, whereas the software must always be configured before use (e. g. , setting up cost/profit center structures, organizational trees, purchase approval rules, etc. ) * The software was designed to handle various configurations, and behaves predictably in any allowed configuration. * The effect of configuration changes on system behavior and performance is predictable and is the responsibility of the ERP vendor. The effect of customization is less predictable, is the customer's responsibility and increases testing activities. Configuration changes survive upgrades to new software versions. Some customizations (e. g. code that uses pre–defined â€Å"hooks† that are called before/after displaying data screens) survive upgrades, though they require retesting. Other customizations (e. g. those involving changes to fundamental data structures) are overwritten during upgrades and must be re-implemented. Customization Advantages: * Improves user acceptance * Offers the potential to obtain competitive advantage vis-a-vis companies using only standard features. Customization Disadvantages: * Increases time and resources required to both implement and maintain. Inhibits seamless communication between suppliers and customers who use the same ERP system un-customized. * Over reliance on customization undermines the principles of ERP as a standardizing software platform Extensions ERP systems can be extended with third–party software. ERP vendors typically provide access to data and functionality through published interfaces. Extensio ns offer features such as:- * archiving, reporting and republishing; * capturing transactional data, e. g. using scanners, tills or RFID * access to specialized data/capabilities, such as syndicated marketing data and associated trend analytics. advanced planning and scheduling (APS) Data migration Data migration is the process of moving/copying and restructuring data from an existing system to the ERP system. Migration is critical to implementation success and requires significant planning. Unfortunately, since migration is one of the final activities before the production phase, it often receives insufficient attention. The following steps can structure migration planning: * Identify the data to be migrated * Determine migration timing * Generate the data templates * Freeze the toolset Decide on migration-related setups * Define data archiving policies and procedures. Comparison to special–purpose applications Advantages The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expense. Decisions can be made more quickly and with fewer errors. Data becomes visible across the organization. Tasks that benefit from this integration include: * Sales forecasting, which allows inventory optimization * Chronological history of every transaction through relevant data compilation in every area of operation. Order tracking, from acceptance through fulfillment * Revenue tracking, from invoice through cash receipt * Matching purchase orders (what was ordered), inventory receipts (what arrived), and costing (what the vendor invoiced) ERP systems centralize business data, bringing the following benefits: * They eliminate the need to synchronize changes between multiple systems—consolidation of finance, marketing and sales, human resource, and manufacturing applications * They bring legitimacy and transparency in each bit of statistical data. They enable standard product naming/coding. * They provide a comprehensive enterprise view (no â€Å"islands of information†). They make real–time information available to management anywhere, any time to make proper decisions. * They protect sensitive data by consolidating multiple security systems into a single structure. Disadvantages * Customization is problematic. * Re–engineering business processes to fit the ERP system may damage competitiveness and/or divert focus from other critical activities * ERP can cost more than less integrated and or less comprehensive solutions. High switching costs associated with ERP can increase the ERP vendor's negotiating power which can result in higher support, maintenance, and upgrade expenses. * Overcoming resistance to sharing sensitive information between departments can divert management attention. * Integration of truly independent businesses can create unnecessary dependencies. * Extensive training requirements take resources from daily operations. Due to ERP's architectur e (OLTP, On-Line Transaction Processing) ERP systems are not well suited for production planning and supply chain management (SCM) The limitations of ERP have been recognized sparking new trends in ERP application development, the four significant developments being made in ERP are, creating a more flexible ERP, Web-Enable ERP, Enterprise ERP and e-Business Suites, each of which will potentially address the failings of the current ERP. QUESTION 3 (18 Marks) Describe with example all stages of System Development Lifecycle.Answers Introduction The Systems development life cycle (SDLC), or Software development process in systems engineering, information systems and software engineering, is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling th e creation of an information system: the software development process.Software development contains set of activities which when performed in coordination and in accordance with one another result in the desired result. Software development methodologies are used for the computer based information systems. The growth of the information’s has to pass through various phases or stages these stages are known as System Development Life Cycle (SDLC). The SDLC follows a well defined process by which the system is conceived, developed and implemented. To understand system development, we need to recognize that a candidate system has a life cycle, much like a living system or a new product.Systems analysis and design are based to the system life cycle. The stages are described below. The analyst must progress from one stage to another methodically, answering key questions and achieving results in each stage. Figure 1 : System Development Life Cycle (SDLC) Stages Step 1: Recognition of Need – What is the Problem? One must know what the problem is before it can be solved. The basis for a candidate system is recognition of a need for improving an information system or a procedure. For example, a supervisor may want to investigate the system flow in purchasing.Or a bank president has been getting complaints about the long lines in the drive – in. This need leads to a preliminary survey or an initial investigation to determine whether an alternative system can solve the problem. It entails looking into the duplication of effort bottlenecks, inefficient existing procedures, or whether parts of the existing system would be candidates for computerization. If the problem is serious enough, management may want to have an analyst look at it, such an assignment implies a commitment, especially if the analyst hired from the utside. In larger environments, where formal procedures are the norm, the analyst’s first task is to prepare a statement specifying the scope and objective of the problem. He/she then reviews it with the user for accuracy at this stage, only a rough â€Å"ball parle† estimate of the development cost of the project may be reached. However, an accurate cost of the next phase – the feasibility study – can be produced. Step 2: Feasibility Study Depending on the results of the initial investigation, the survey is expanded to a more detailed feasibility study.As we shall learn, a feasibility study is a test of a system proposal according to its workability impact on the organization, ability to meet user needs, and effective use of resources. It focuses on their major questions: * What are the user’s demonstrable needs and how does a candidate system meet them? * What resources are available for given candidate systems? Is the problem worth solving? * What are the likely impact of the candidate system on the organization? How will it fit within the organization’s master MIS plan?Each of these questions must be answered carefully. They revolve around investigation and evaluation of the problem, identification and description of candidate systems, specification of performance and the cost of each system, and final selection of the best system. The objective of a feasibility study is not to solve the problem but to acquire a sense of its scope. During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined. Consequently, costs and benefits are estimated with greater accuracy at this stage.The result of the feasibility study is a formal proposal. This is simply a report – a formal document detailing the nature and scope of the proposed solution. The proposal summarizes what is known and what is going to be done. It consists of the following. 1. Statement of the Problem – a carefully worded statement of the problem that led to analysis. 2. Summary of Findings and Recommendations – a list of the major findings and recommendations of the study. It is ideal for the user who required quick access to the results of the analysis of the system under study.Conclusions are stated, followed by a list of the recommendations and a justification for them. 3. Details of Findings – An outline of the methods and procedures undertaken by the existing system, followed by coverage of objectives ; procedures of the candidate system. Included are also discussions of output reports, file structures, and costs and benefits of the candidate system. 4. Recommendations and Conclusions – special recommendations regarding the candidate system, including the personal assignments costs, project schedules, and target dates.Three key considerations are involved in the feasibility analysis: economic, technical, behavioral. Let’s briefly review each consideration and how it relates to the systems effort. * Economic Feasibility: Economic analysis is the most frequently use d method for evaluating the effectiveness of a candidate system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system.Otherwise, further justification or alterations in the proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. * Technical Feasibility: Technical feasibility centers around the existing computer system (hardware, software etc. ) and to what extent it can support the proposed addition. For example, if the current computer is operating at 80 per cent capacity – an arbitrary ceiling – then running another application could overload the system or require additional hardware.This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not feasible. * Behavioral Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have towards the development of a computerized system. It is common knowledge that computer installations have something to do with turnover, transfers, retraining, and changes in employee job status.Therefore, it is understandable that the introduction of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. After the proposal is viewed by management it becomes a formal agreement that paves the way for actual design and implementation. This is a crucial decision point in the life cycle. Many projects die here, whereas the more promising ones continue through implementation. Changes in the proposal are made in writing, depending on the complexity, size, and cost of the project. It is simply common sense to verify changes before committing the project to design.Step 3: Analysis It is a detailed study of the various operations performed by the system and their relationship within and outside of the system. A key question is – what must be done to solve the problem? One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate system should consider other related systems. During analysis, data are collected on available files, decision points, and transactions handled by the present system. We shall learn about some logical system models and tools that are used in analysis.It requires special skills and sensitivity to the subjects being interviewed. Bias in data collection and interpretation can be problem. Training, experience and common sense are required for collection of the information needed to do the analysis. Once analysis is completed the analyst has a firm understanding of what is to be done. The next step is to decide how the problem might be solved. Thus, in the systems design, we move from the logical to the physical aspects of the life cycle. Step 4: Design The most creative and challenging phase of the system life cycle is system design.The term design describes both a final system and a process by which it is developed. It refers to the technical specifications (analogous to the engineer’s blueprints) that will be applied in implementing the candidate system. It also includes the constructions of programs and programme testing. The key question here is – How should the problem be solved?. The first step is to determine how the output is to be produced and in what format. Samples of the output (and input) are also available. Second, input data and master files (data base) have to be designed to meet the requirements of the proposed output.The operational (processing) phase are handled through programme constru ction and testing, including a list of the programmes needed to meet the system’s objectives and complete documentation. Finally, details related to justification of the system and an estimate of   the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation. The final report prior to the implementation phase includes procedural flowcharts, record layouts, report layouts, and a workable plan for implementing the candidate system.Information on personnel, money, hardware, facilities and their estimated cost must also be available. At this point, projected costs must be close to actual costs of implementation. In some firms, separate groups of programmer do the programming whereas other firms employ analyst programmers who do analysis and design as well as code programs. For this discussion, we assume that analysis and programming is carried out by two separate persons. There are certain functio ns, though, that the analyst must perform while programs are being written operating procedures and documentation must be completed.Security and auditing procedures must also be developed. Step 5: Testing No system design is ever perfect. Communication problems, programmers negligence or time constraints create errors that most be eliminated before the system is ready for user acceptance testing. A system is tested for online response, volume of transactions, stress, recovery form failure and usability. Then comes system testing, which verifies that the whole set of programs hangs together, following system testing is acceptance testing or running the system with live   data by the actual use.System testing requires a test plan that consists of several key activities and steps for programs, string, system and user acceptance testing. The system performance criteria deal with turnaround time, backup, file protection, and the human factor. Step 6: Implementation This phase is less c reative than system design. It is primarily concerned with user training, site preparation, and file conversion. When the candidate system is linked to terminals and remote sites the telecommunication network and tests of the network along with the system are also included under implementation.During the final testing, user acceptance is tested, followed by user training. Depending on the nature of the system, extensive user training may be required, conversion usually takes place at about the same time the user is being trained or later. In the extreme, the programmer is falsely viewed as someone who ought to be isolated from other aspects of system development. Programming is itself design work, however. The initial parameter of the candidate system should be modified as a result of programming efforts. Programming provides a â€Å"reality test† for the assumptions made by the analyst.It is therefore a mistake to exclude programmers from the initial system design. System te sting checks the readiness and accuracy of the system to access, update and retrieve data from new files. Once the programmes become available, test data are read into the computer and processed against the file(s) provided for testing. If successful, the program(s) is then run with â€Å"live† data. Otherwise, a diagnostic procedure is used to local and correct errors in the program. In most programs, a parallel run is conducted where the new system runs simultaneously with the ‘old’ systems.This method, though costly, provides added assurance against errors in the candidate system and also gives the user-staff an opportunity to gain experience through operation. In some cases, however, parallel processing is not practical. For example, it is not plausible to run two parallel online point-to-sale (POS) systems for a retail chain. In any case, after the candidate system proves itself, the old system is phased out. Step 7: Evaluation During systems testing, the sy stem is used experimentally to ensure that the software does not fail.In other words, we can say that it will run according to its specifications and in the way users expect. Special test data are input for processing, and the results examined. A limited number of users may be allowed to use the system so that analyst can see whether to use it in unforeseen ways. It is desirable to discover any surprises before the organization implements the system and depends on it. Implementation is the process of having systems personnel check out and put new equipment into use, train users, install the new application and construct any files of data needed to use it.This phase is less creative than system design. Depending on the size of the organisation that will be involved in using the application and the risk involved in its use, systems developers may choose to test the operation in only one area of the Firm with only one or two persons. Sometimes, they will run both old and new system in parallel way to compare the results. In still other situations, system developers stop using the old system one day and start using the new one the next.Evaluation of the system is performed to identify its strengths and weaknesses. The actual evaluation can occur along any one of the following dimensions: * Operational Evaluation: Assessment of the manner in which the system functions, impact. * Organizational Impact: Identification and measurement of benefits to the organisation in such areas as financial concerns, operational efficiency and competitive impact. * User Manager Assessment: Evaluation of the attitudes of senior and user manager within the organization, as well as end-users. Development Performance: Evaluation of the development process in accordance with such yardsticks as overall development time and effort, conformance to budgets and standards and other project management criteria. Step 8: Post – Implementation and Maintenance Maintenance is necessary to eli minate errors in the working system during its working life and to tune the system to any variations in its working environment. Often small system deficiencies are found as a system is brought into operation and changes are made to remove them. System planners must always plan for resource availability to carry out these maintenance functions.The importance of maintenance is to continue to bring the new system to standards. After the installation phase is completed and the user staff is adjusted to changes created by the candidate system, evaluation and maintenance being. Like any system there is an ageing process the requires periodic maintenance of hardware ; software. If the new information is inconsistent with the design specifications, then changes have to be made. Hardware also requires periodic maintenance to keep in time with design specification. The importance of maintenance is to continue to bring the new system to standards. BIBLIOGRAFIGordon b. Davis ; Margrethe H. Ols on. (1985). Management Information Systems : Conceptual Foundations, Structure and Development. New York : McGraw-Hill. Lucey. T. (1987). Management Information Systems. 5th Ed. Eastleigh, Hants : D. P Pubns. O’Brien, James A. (2002). Management Information Systems : Managing Information Technology in the E-Business Enterprise. Boston : McGraw-Hill. Robert C. Nickerson, Saravanan Muthaiyah. (2004). Introduction to Information Systems. Petaling Jaya : Prentice Hall. McLeod Raymond, P. Shell George. (2004). Management Information Systems. N. J. : Pearson Prentice Hall.