Wednesday, October 30, 2019

First Team LLC Business Plan Essay Example | Topics and Well Written Essays - 2000 words

First Team LLC Business Plan - Essay Example The company remains controlled by the one entrepreneur and a team of support staff (Folsom, 48) Goals of the company Ease supply of goods and materials to customers in a competent and reliable manner Networking with the surrounding suppliers and storage enterprises to facilitate smooth running and operation of the business Build branches in various parts of the country to facilitate growth of the institution Buy more vehicles to ensure that clients always get services they need on time and efficiently Recruit more staff to improve service delivery and facilitate expansion of the business Increase the revenue base yearly Establish efficient communication channels among the parties involved Fixing the correct programmes which can remain achieved conveniently Employing and maintaining highly qualified and trained staff Trying to precisely understand the client’s needs and help them achieve them (Folsom, 49) Company Description Logistics support company located at the outskirts of the capital city will offer transport and logistics organization solutions for enterprise customers within the region of its location and far. Starting with operations form within the city, the company will transport materials from distributors to manufacturers to wholesalers and retailers, acting in conjunction with supply canters, storage enterprises, and wholesalers. The logistics company remains started by two entrepreneurs who before worked like managers of storage enterprises for a reasonable period. The company will function in the logistics and transportation filed with many services. An extra source of income remains the growth of unique services. This can vary from computer arranging systems to supply services. Cross marketing remains arranged to be one of the key methods in this company, because the whole items remain focused to serve the same requirement and can cheaply remain merged. Synergy in marketing an item across company divisions remains probable to push income further higher. A firm concentration of this company will remain placed on the growth of unique and creative techniques for the clients that offer an important value. A wide variation of customized services will remain provided that will aid make use of the institution and worker potential. A core objective of this suggested business technique remains the growth of a unique corporate personality. Such personality will form client loyalty and aid achieve a competitive advantage. The particular choosing of services and requests provided will remain supervised regularly and differ depending on business requirements. This method offers a competitive border against various businesses in the surrounding and remains anticipated to cause an extra demand and the probability for a cost mark-up (Folsom, 52) Market Analysis This is a big industry with stiff competition from various transport and logistics companies in the region and outside the region. However, the company will battle out in th e market with the medium sized institutions of its kind. It will offer general transport and logistics services to its clients at favorable and affordable costs aiming at minimizing cost but making profits as well. Market Segmentation Raw material distributors They transport huge amounts of materials to big producers in the region. These materials wholly

Monday, October 28, 2019

Fourth Quarter English Interpretive Paper Essay Example for Free

Fourth Quarter English Interpretive Paper Essay A Man for All Seasons, by Robert Bolt illustrates the adult life of Sir Thomas More. In this play, the Common Man portrays man and his vices and sins showing the ordinary man of every age, class, culture, and society. Bolt uses the Common Man in the roles of the steward, boatman, and jailor to show how man can easily sin. Common Man exhibits man’s immorality through the roles of the steward, boatman, and jailor, in A Man for All Seasons. Christian virtues are lacking in the Common Man’s role of the steward. The Common Man’s character, the steward, disrespects Rich by the snubbing manner of which he speaks to Rich. Likewise, when he spies on Thomas More he is being disloyal and dishonest. (pp. 40-42) Furthermore, the steward exhibits greediness by spying on More for Richard Rich, Thomas Cromwell, and Signor Chapuy in exchange for money. (pp.40-42) In addition, pride is conveyed towards Rich by the steward when he behaves as if he superior over Rich. (pp.104-105) Vices are seen in the steward’s behavior. The Common Man in the role of the boatman demonstrates a lack of morality. The boatman displays dishonesty when he tries to overcharge Thomas for his boat ride home. (p. 25) Likewise, he is being greedy as he wants more money than he should receive for giving Thomas a ride home. (p. 25) Moreover, his disobeyed the law by ignoring the fixed boat fares. (p. 25) The boatman’s actions are sinful. Lack of morals can be observed in the Common Man in the role of the Jailer. The vice of greed is seen by the Jailor when he is willing to accept fifty guineas from Cromwell in exchange for information about Thomas More. (p. 135) Likewise, the jailor is dishonest when he is willing to take anything that Thomas says and tell it to Cromwell to use as evidence against Thomas More in court. (pp. 135-136) Lack of charity is exhibited by the jailor when he does not allow Thomas’s family to visit Thomas at the jail. (pp. 145-146) The Common Man, as the jailor, displays vices. The role of the steward, boatman, and jailor played by the Common Man reveal the lack of mans morals in A Man for All Seasons. Disrespect, dishonesty, greed, pride, lack of charity, and disobedience are witnessed in the words and actions of the three characters. The vices represent the basic character of the Common Man who is every person in every age, class, race, and society. Bolt’s play, A Man for All Seasons instructs one to avoid sin and protect his morals and Christian faith. [ 1 ]. Robert Bolt, The Man for All Seasons(New York, NY; Vintage International, 1990),pp. 4-5. All subsequent references will be noted in the text.

Saturday, October 26, 2019

We Must Reform Teacher Tenure Essay -- How Not to Reform Teacher Tenur

Teacher tenure is life-long job protection for teachers who have been employed as a teacher for one or more years depending on the state. The purpose of teacher tenure is to protect teachers from being fired for political or personal reasons. It also prevents school districts from eliminating experienced teachers in favor of less expensive teachers. The fundamental problem with teacher tenure is that it is given to a teacher after only one year on the job and requires little to no additional effort. The increased job security breeds complacency in many teachers who are teaching only to collect a paycheck. There is a need for teacher tenure but the program must be drastically reformed. What is Tenure? Tenure is a policy that basically gives teachers a lifetime contract. It prevents teachers from being fired for something small all the way up to severe misconduct or incompetence. . Tenure began in the early 20th century. It was meant to protect teachers from wrongful termination. In that time race, personal bias, and politics could get even very effective teachers fired. Women were often targeted when they got married or became pregnant. With tenure, even if a school district tries to fire an incompetent teacher or one who is guilty of misconduct it can become very difficult and expensive It also protected teachers whose research or teaching practices might be considered â€Å"out-of-the-box.† The Positive Side of Teacher Tenure Tenure is in place to protect teachers. Many teachers are very dedicated to what they do and go above and beyond what is required regardless of their pay scale; tenure is in place to protect teachers like this. Teachers that have proven that they are in the classroom to make a difference in the life of a... ...1D719E1C22E61225AFDEB326CE13C0_1328848465905&start=1&publicationId=&urn=urn%3Abigchalk%3AUS%3BBCLib%3Bdocument%3B198818676 Garrett, Rose (2010). What is Teacher Tenure? Retrieved from http://www.education.com/magazine/article/what-is-teacher-tenure/ Sawchuk, Stephen (2010). States Strive to Overhaul Teacher Tenure. Retrieved from www.edweek.org Otterman, Sharon (2011). Once Nearly 100%, Teacher Tenure Rate Drops to 58% as Rules Tighten, New York Times, 28 July, 2011. Retrieved from http://search.proquest.com.southuniversity.libproxy.edmc.edu/docview/879455669/fulltext?accountid=13931 Weisberg, D., Sexton, S., Mulhern, J., Keeling, D., (2007). The Widget Effect. Retrieved from http://widgeteffect.org/downloads/TheWidgetEffect.pdf Wolpert-Gawron, Heather (2009). The Truth about Teacher Tenure. Retrieved from http://www.edutopia.org/teacher-tenure-debate

Thursday, October 24, 2019

Organisational Behaviour: A Case Study Essay

Question one. Learning is a process of adapting to a change of behaviour or the ability to alter one’s way of acting as a result of influence from constant practice or experiences (Michas and Berry, 2000). Learning can either be viewed as a process or as a product of an already completed process. As a process, learning is viewed as a transformation of behaviour or a change in the mental state of an individual while as a product, learning is studied under the basis of various learning theories. The learning theory seeks to explain how and to what extent such a change is bound to occur. This theory is very essential in organisations because it helps to create high level professionals at the workplace. Depending on the situation and the willingness of the workers, different organisations can apply different learning theories at different times. Three main perspectives of this theory are known. This include behaviourism, cognitivism and constructivism. Behaviourism focuses mainly on the physical aspects of learning. According to Miller and Pace (2006), a change in behaviour is not influenced by the individual’s emotions or personal motives but rather, it is a lasting change in behaviour which occurs when triggered by a change in the surrounding environment. This approach has been found to yield changes such as discrimination, associations among other skills which do not require in depth internal processes. For instance, from the case study given, Diane’s behaviour changed when she started working at La Maison where the environmental factors taught her to be hard working and efficient in her work. Cognitivism perspective deals with matters linked to the brain-system. In this case, a learning process involves the internal processes which includes how the mind receives, organises, stores and retrieves data or any information received. It concentrates on the mental aspect of the the leaner’s thoughts, beliefs, ideas and attitudes towards the organisation. This approach of the learning theory has been in very helpful in explaining the intricate forms of behaviour which involve reasoning, solving problems and processing data to alter ones behaviour (Niederhausler et al, 2002). In the case study, this kind of learning theory is seen when a worker’s behaviour in an organisation are influenced by factors such as manager’s attitude, organisational culture among other factors which are not visible physically. The constructivism approach on the other hand views learning as a process of constructing new ideas and concepts. It is more or less the opposite of behaviorism in that it focuses on how an individual molds a certain form of behaviour emanating from past knowledge or experiences. From the case study, the constructivism kind of learning approach is evident where we see that Diane had learnt from previous experience how to give fast and quality services to the customers by balancing several plates on her arms. This was a positive kind of behaviour which ensured faster delivery much to the satisfaction of her customers. In an organisational concept, there are specific qualities associated with learning or change of behaviour in organisations. This depends on what is learned, how and when it is learned. Different organisations differ in their methods of learning mainly due to the fact that every organisation represents a collective combination of individuals from different backgrounds and more so, it consists of a units which have different roles and values which they use to achieve their future goals (Billett, 2007). According to Prange (1999), it is the individuals who learns and not the organisations which they work for. In this case, he argues that learning is a process which primarily takes place in the human brain. Another argument put forward by Perkins (1997) says that even though learning may take place in organisations, it is not always positive. That is, not all organisations learn well and in a way which is bound to propel their future goals into the right direction. For instance, different workers in an organisation may hold different views concerning the organisation’s future success depending on the kind of leadership style deployed in the organisation by its leaders. The three perspectives of the learning theory, behaviorism, cognitivism and constructivism have several strengths as well as weakness on the workers of an organisation as observed from the case study given. The behaviourism concept of the learning theory has an advantage in that, every worker has a clear and concise goal which he or she is set to achieve and thus any change in the environment can stimulate its achievement automatically. However, this approach has been criticized in that the workers may at times encounter a situation in which the right stimulus do not occur thus hindering the achievement of the desired goals. For instance, if the workers in a hotel are used to responding to a certain stimulus such as tips in order to work effectively, the efficacy would sharply drop ones the tips cease to exist. For the cognitivism approach, the learners are trained to work in a certain way consistently with or without a stimuli. This is advantageous in that it avoids inconsistencies in the work place and ensures customer satisfaction t all times. On the other hand, this may be disadvantageous in that the workers mind may become accustomed to doing the same thing such that it may be very difficult for them to adapt to any slight change in the organisation. The constructivism approach is useful in that the leaner is able to adapt to many changes which may occur in the organisation based on previous situations. However, this approach has a major drawback in that it in some situations, divergent thinking may cause problems in the organisation. From the case study given, Diane the learner has a change of behaviour which is affected by the change in the environment or the climate created by her boss which makes her strive to do every thing in a perfect way. However, when she is quarreled, her attitude changes and she starts to do things in a slow inefficient manner. In this case study, a positive aspect of cognitive learning theory is also seen whereby, Diane’s behaviour is influenced by the high tips she gets from the customers and this motivates her to work harder even when the motivation she is getting from her boss is very minimal. In addition, it can also be deduced from the case study that all the workers at the La Maison where Diane works are taught how to work under pressure and work with excellence. This behaviour has been shaped by the workplace culture of practice from the instructions given by Godot their manager. This reflects a constructive learning approach. Question two. From the case study, the environment and the authoritarian leadership style exercised by Godot the manager of La Maison has a great impact on the behaviour of the workers and Diana in particular. From the organisational culture which emphasises on excellence and team-work, Diane behaviour was immediately inclined towards working to her best potential since the beginning which ensured that she did a good job. However, her behaviour changed when she was quarreled by the boss and she decided to work slowly and her efficiency was greatly reduced. Other factors which helped to shape Diane’s behaviour include the tips she got from the customers which motivated her to work more in order to get more tips. This forced her to go back to her efficient working pace even when her morale had really been put down by her boss. Many positive and negative reinforcements, punishments and extinction forces which may be used by Godot and his customers may be identified from the case study. Among the positive reinforcements used by Godot include his dedicated and industrious attitude towards his work which motivated the workers to put more effort in their work. His vision and the culture of team-work which he emphasised on also made the employees to work together to satisfy all the customers. However, Godot had very bad emotional outbursts and tempers which negatively affected the workers’ efficiency. For instance, after putting so much effort, Diane felt discouraged due to the fact that her boss did not even notice her hard work but instead, he was very quick to quarrel her when she committed a simple mistake. The insults he hauled towards the workers when the restaurant was crowded and they were unable to keep pace with the high number of customers also lowered the workers’ morale. In terms of punishments, Godot believed in punishing the workers when they went wrong by imposing fines to pay the price of their mistakes. This made the workers to feel angry and disappointed thus become less efficient in their work. As a good manager, Godot can improve the worker’s efficiency through complimenting them for their hard work and correcting them in the right way where they go wrong instead of insulting them. In addition, he should strive to improve his relationship with his workers in order to motivate them. The positive reinforcements acquired from the restaurant customers include good compliments to the workers and tips in terms of money for their efficient services. Negative responses such as less tips when the services were less efficient also helped to motivate Diane to work harder in order to please them and get more tips. Thus, by being appreciative, the customers helped to shape the behaviour of the workers in a positive way. Question three. The various reinforcements and punishments discussed above had a positive as well as a negative impact on Diane’s behaviour. For instance, when Diane dropped a bowl of bouillabaisse, she was fined the price of the bouillabaisse and the cost of cleaning the carpet she stained, as a punishment for her mistake. This made Diane feel very angry, disappointed and confused and as a result, there was a visible decline in her performance. This was a very negative impact on Diane’s behaviour. On the other hand, Godot’s industrious and dedicated type of attitude helped to shape Diane’s behaviour in a positive way in that she became very dedicated and efficient in her work much to the satisfaction of the customers and this conferred an overall benefit to the restaurant. The customer’s appreciative nature and the compliments they gave to Diane helped to motivate her more to work with greater efficacy. When the customer’s tips dropped, she was forced to go back to her original working pace in order to please the customers. This positively shaped her behaviour as it taught her to be hardworking and committed in her work at all times regardless of her boss’s attitude. Question four. Hourly pay rates and tips from customers especially in restaurants have proved to be very effective in reinforcing positive behaviour in workers. The hourly pay rates motivate the workers to work for long in order to maximise their pays and thus ensuring that high productivity at the workplace is achieved. The tips on the other hand inspire the workers to work extra hard in order to satisfy the customers who will in return give them larger tips. If the services are of poor quality, the customers are unsatisfied and they thus do not feel obliged to give tips to the workers. In the case of La Maison restaurant studied above, the hourly pay rates of $15. 0 offered plus the tips from the customers proved to be very effective in shaping Diane’s behaviour as well as that of other workers. The tips averaging around 20 percent per day motivated Diane to work harder because she knew that better the services meant more tips for her. When her efficiency in services declined, her tips also went down by almost half and this forced her to step up her pace in order to get back to where she originally was. In this case, it can be deduced that the use of hourly pay rates and tips can help an organisation to make more money because of the high quality services delivered by its workers. Conclusion. From the case study above, it is clear that every organisations has a great role to play in shaping the behaviour of its workers. An organisation can either have a positive or a negative impact on the attitude and behaviour of its workers depending on the kind of leadership style practiced by the leader and also the culture of that particular organisation. It is therefore upon the leaders to adopt the right kind of leadership which is geared towards cultivating a positive attitude in their workers as this will help them to work harder and maximise the profits incurred by the organisation.

Wednesday, October 23, 2019

Software Testing in Safety Critical Systems

Abstract Today, many safety-critical applications are controlled by computer software. Therefore effective testing tools are required to provide a high degree of safety and to reduce severe failures too minimum. The paper examines existing regulating standards in safety-critical systems. By comparing different software testing methods the requirements and challenges in safety-critical software testing are being evaluated. The QUICKIES standard serves as the mall regulatory framework for all separately systems and provides the basis for the creation of application- and Interdependently tankards.Moreover it defines certain safety integrity levels depending on the field of application and recommends testing methods according to these levels. In model- based safety testing a usage model with restricted space state domain is used to generate representative test cases. Statistical testing is a mathematical approach that uses a high number of test cases to reach a significant result. The ma in challenge of all safety-related testing methods Is to reduce testing time and complexity without distorting the significance of the test.These can for example be transportation systems, power plants, and medical applications. As people's lives depend on the correct function of such control systems and their software, thorough testing is required before they can be admitted to operation. There are many different software testing methods. Most of them only analyze the probability of a failure but do not value its severity. However, in safety-critical systems a failure that has severe consequences, even if it is extremely rare, can not be accepted. Therefore testing in this field has to be adopted accordingly.The purpose of this paper is to find and compare the latest methods for safety-critical footwear testing and to identify the most common industry standard in this field. Moreover the requirements and challenges in safety-critical software testing will be elaborated. At the begi nning the paper will provide definitions that are required for the understanding of the subsequent chapters. After that, an introduction to the JUICE 508 safety standard, which serves as a basis for most industry-specific standards, is given.The chapter â€Å"Testing Methods† will address some of the latest safety-related software testing methods in detail. 5 Definitions 2 Definitions 2. 1 Reliability and Safety In safety critical systems both, reliability and safety are required to achieve the goals of dependability. However, reliability and safety are two different attributes of dependability. The reliability, R(t) , of a system is a function of time. It is defined as the conditional probability that the system will perform its intended function in a defined way over a given time period and under certain specified and assumed conditions.The most used parameter to characterize reliability is the Mean Time To Failure (MATT). The safety, S(t), of a system is defined as the pro bability that a system ill either perform its functions correctly or will discontinue its functions in a way that does not interrupt the operation of other systems or Jeopardize the safety of any people associated with the system [1]. Based on these definitions, in reliability testing all failures are weighted equally, whereas in safety testing the failures are weighted according to their severity.Therefore, a reliable system may be quite unsafe and a safe system may be very unreliable. 2. 2 Safety-critical System States very complex to generate. As many states are unreachable or very difficult to reach hey can be reduced to a relatively small number of representative system states. These states are grouped in three subsets: Normal State Subset (NUNS), Fail-Safe State subset (FPS) and Risky state subset (IRS). Their relationships are: s=Unusualness; 6 Their inter-dependability is described as a Markova chain (see figure 1) [2]. Figure 1 : Three-state Markova Model for Safety-critica l Systems(Source: 2. Markova Chain Usage Model The Markova chain usage model describes the possible usage of a software based on a predicted environment. It can be used to generate statistical test cases and to estimate the software reliability. In an Markova model the transition from operation I to operation J can be denoted by an ordered pair . Let be the transition probability from operation I to operation J, with and EX=I .. N p(is)=1, where n is the number of operations. The transitions and transition probabilities can be represented in the form of a matrix [3].Each specific usage of the program corresponds to a path X=(XI, XX,†¦ Xi) in the Markova chain where Xi corresponds to the I-the operation. P(Xi, X]) determines the next executed operation J after execution of operation I. Since the operations are random rabbles, each path X=(XI, XX,†¦ ) forms a stochastic process. For a particular path x=(ox, XSL ,†¦ ), the corresponding path execution probability is [3]: 7 pox pop , x 3 Standards There exist both national and international standards and guidelines at different depths and classifications which define requirements for safety-related technologies. Yester and provides the basis for the creation of application- and underspecified standards. It includes more than 500 pages of normative and informative specifications and proposals. Nowadays most safety-related standards are based on he JUICE 508 in combination with the previously applicable requirements [4]. The JUICE 508 defines so called Safety Integrity Levels (Sills) which serve as a measure for the safety requirements on a certain system. The following table shows the different SILLS as well as the corresponding probability of failure and application examples.Probability of Failure One Failure in x Years Consequences Application Example The last three parts, are informative and include practical examples which should help to simplify the application of the standard. The ‘CE 61 508 describes the complete life cycle of safety-related systems from planning to decommissioning and refers to all aspects related to the use and requirements for electrical / electronic / programmable electronic systems (E / E / PEE) for separately functions [4]. According to the focus of this paper only the parts relating to software testing are mentioned in the following paragraph. Figure 2 shows the verification and validation process in software development according to the JUICE 508 standard.The E/E/PEE system safety requirements are applied both on the system architecture and the software specifications. Every level in the system architecture verifies if it meets the requirements of the next higher layer (I. E. Coding fulfills module design requirements, module design fulfills software yester design requirements etc. ). Moreover each system architecture layer is tested by a specific test. As soon as the test circuit is closed successfully the software can be validated. The st andard also recommends and rates certain test methods according to the required SILL. In order to meet the requirements of the ‘CE standard a series.Test methods comprised in the ‘CE 61 508 are categorized as follows [6]: Failure analysis (I. E. Cause consequence programs) Dynamic analysis and testing (I. E. Test case execution from model-based test case generation) Functional and black box testing (I. . Equivalence classes and input partition testing, including boundary value analysis) Performance testing (I. E. Response timings and memory constraints) Static analysis (I. E. Static analysis of run time error behavior) 9 Figure 2: ‘CE 61 508-3 Verification and Validation Process(Source: 10 Testing Methods 4 Testing Methods There are many different software testing methods.A detailed introduction to all different methods would be far beyond the scope of this paper. Therefore the author will only mention two methods he deems most relevant in the field of safety-relat ed software testing. Finally both methods are compared and their possible application areas are evaluated. 4. 1 Model-based Safety Testing In model-based testing explicit behavior models that encode the intended behavior of a system and its environment are used. These models generate pairs of inputs and outputs. The output of such a model represents the expected output of the system under test (SOT). Mineral model-based testing method. The system safety-related behavior is defined in the safety requirements specification. Test cases are derived from a safety model that is extracted from the SHUT and from formal safety requirements. This model encodes the intended behavior and maps each possible input to the corresponding output. Safety test selection criteria relate to the functional safety of the safety- critical system, to the structure of the model (state coverage, transition coverage), and also to a well defined set of system faults.Safety test case specifications are used to fo rmalize the safety test selection criteria and render them operational. For the given safety model and the safety test case specification, an automatic safety test case generator and optimizer generates the safety test case suite. Finally, the concreted input part of a test case is submitted to the SHUT and the SOT's output is recorded. The concentration of the input part of a test case is performed by a safety test engine. Besides executing the safety case, it can also compare the output of the SHUT with the expected output as provided by the safety test case [6]. 1 Figure 3: Model-based Safety Testing according Gang You et al. (Source: Test Case Generation One of the most commonly tools for test case generation are model checking techniques. The main purpose of model checking is to verify a formal safety property (given as a logic formula) on a system model. In test case generation, model checking is used in order to find violations of certain formal safety properties. Safety mode ls of safety-critical software systems may have a huge number of states. Therefore the greatest challenge when using a model checker is to cope with the state space explosion.As a countermeasure, Gang You et al. ‘s approach applies the safety model, which is derived from SHUT and certain safety requirements. The model 12 limits the number of states by splitting them into three subsets (NUNS, FPS, IRS) containing only representative states (see 2. X). Moreover the safety model encodes he intended behavior, and from its structure, safety test cases can be derived. It thereby restricts the possible inputs into the SHUT and the set of possible separately behaviors of the SOT.Hence, to reduce the amount of testing and guarantee the quality of testing the model checker will search those most frequently entered states and generate the corresponding safety test cases without searching the whole state spaces. The selection of states is based on the safety requirements (Sills). Generall y speaking, the safety model can be seen as a test selection criterion generate safety-related test cases. Figure 4 shows the corresponding flow chart. 1 . The system safety model in the form of a finite state machine (FSML) is transformed into the input language of the model checker tool (SPIN) 2.Each test requirement of a given safety criterion is formulated as a temporal logic expression (LET). 3. Based on the Markova model of a system, the state space is divided into three subsets. 4. In term of these subsets, the negation of each expression of the formula is verified by the model checker. If there is an execution path in the model that does not satisfy the negated formula then it is presented by the model checker as a counter-example. This path becomes a test sequence that satisfies the original test requirement. 5.The inputs and outputs that form the executable test case are extracted from the counter-example or are derived by a corresponding guided simulation of the model. 13 Figure 4: Test Case Generation Framework according Gang You et al. (Source: 4. 2 Statistical Testing As already mentioned in 2. 1 reliability is defined as the conditional probability that the system will perform its intended function. This chapter will link the reliability of a system with the Markova usage model (see 2. 3). Let f: be a function that shows the failure probability of a software. The argument D represents the possible usage set of the software.Each element AXED is a usage path from quo (initial operation) to send (final operation) The relation between software reliability R and failure probability F is: R=l -F (2). In the assumed model the failure behavior of the software only depends on its usage path X and not on the input. This means that the input domain corresponding to the used X is homogeneous. The simplest way of obtaining unbiased reliability estimation of the software is to select N test paths XSL, XX, †¦ , CNN according to the usage model. The exult of the function f(Xi) is 1 if the path fails and O otherwise.Then the arithmetic 14 mean of f(Xi) is an unbiased estimate PEP(f(X)), which is the mathematical expectation of the software failure probability under transition matrix P. Hence, the software reliability can be expressed as R=l -PEP(f(X)) [3]. Critical operations are infrequently executed in real applications. This generates the problem that development organizations have to spend too much time when performing adequate statistical testing. Although one can overcome these drawbacks by increasing the execution probabilities of critical operations during statistical entire software under test. Yang Going et al. 3] found a possible approach to overcome this problem: Importance Sampling (IS) Based Safety-critical Software Statistical Testing Acceleration. IS Based Safety-critical Software Statistical Testing Acceleration This chapter presents the Is-based software statistical testing acceleration method. It ensures that the cr itical operations tested adequately by adjusting the transition probabilities in the matrix of the usage model, and at the same time, produces the unbiased reliability of the software under test. The IS technique reduces simulation run times hen estimating the probabilities of rare events by Monte Carlo simulations [3].For complex software with a large model matrix, the simulation procedure is often extremely time consuming. To overcome this problem, Yang Going et al. ‘s approach adopts a simulated annealing algorithm to calculate the optimal matrix Q. This widely used optimization method employs stochastic techniques to avoid being trapped in local optimal solution. The 16 exact mathematical explanation of this algorithm is complex and would be out of the scope of this paper. [3] 4. 3 Method Comparison Although model-based and statistical testing follow completely different approaches, the challenges are very similar.Both methods have to limit the extent and complexity of tes ting. Model-based testing reduces the number of test cases by restricting the state space domain of the Markova chain usage model. Whereas statistical testing reduces the number by changing the relation between critical and normal test cases with help off likelihood ratio. 5 Conclusion Today an increasing number of safety-critical applications are controlled by computer software. Therefore effective testing tools are required to provide a high degree of safety and to reduce severe failures to a minimum. The paper focused on

Tuesday, October 22, 2019

Apposition Definitions and Examples

Apposition Definitions and Examples Apposition is the placement side-by-side of two coordinate elements (usually noun phrases), the second of which serves to identify or rename the first. Adjective: appositional. In his study of Apposition in Contemporary English (1992), Charles F. Meyer observes that the relation of apposition is realized by a variety of syntactic forms, noun phrases predominantly but other syntactic forms as well. Although these forms can have a full range of syntactic functions, they most commonly have two: subject and object (p. 10).   Etymology: From the Latin, to put nearExamples and Observations: Gussie, a glutton for punishment, stared at himself in the mirror.(P.G. Wodehouse, Right Ho, Jeeves, 1934)The sidewalk just outside the Casino was strewn with discarded tickets, the chaff of wasted hope.(Jonathan Lethem, Motherless Brooklyn. Doubleday, 1999)Miniver Cheevy, child of scorn,grew lean while he assailed the seasons.(E.A. Robinson, Miniver Cheevy)The undistinguished example that fronts the Duke of Wellington pub is serviced by the pigeon man, an elderly stooped figure entirely in brown: from his flat cap, through his greasy raincoat, to his worn shoes, he is the color of Daddies Own sauce scraped from a formica table.(Iain Sinclair, Lights Out for the Territory. Granta Books, 1997)This was not Aunt Dahlia, my good and kindly aunt, but my Aunt Agatha, the one who chews broken bottles and kills rats with her teeth.(P.G. Wodehouse)This is a valley of ashesa fantastic farm where ashes grow like wheat into ridges and hills and grotesque gardens; where ashes take the forms of ho uses and chimneys and rising smoke and finally, with a transcendent effort, of ash-grey men, who move dimly and already crumbling through the powdery air.(F. Scott Fitzgerald, The Great Gatsby, 1925) It was a bleak period of present privation and threatening disasterthe period of soya beans and Basic Englishand in consequence the book is infused with a kind of gluttony, for food and wine, for the splendors of the recent past, and for rhetorical and ornamental language, which now with a full stomach I find distasteful.(Evelyn Waugh in 1959 on his wartime novel Brideshead Revisited)The sentencethe dread sentence of deathwas the last of distinct accentuation which reached my ears.(Edgar Allan Poe, The Pit and the Pendulum, 1842)Lolita, light of my life, fire of my loins.(Vladimir Nabokov, Lolita) Syntactic Characteristics of Apposition Syntactically, apposition is most commonly a relation between two juxtaposed noun phrases having a syntactic function (such as direct object) promoting end-weight.Although units in apposition can have a variety of different syntactic forms, the majority of appositions in the corpora (66 percent) consisted of units that were noun phrases. (1) Desegregation is beginning in two more important Southern citiesDallas and Atlanta. (Brown B09 850-860) Because appositions are syntactically heavy constructions, most (65 percent) had functions that promote end-weight, most commonly direct object (example 2) or object of preposition (example 3). (2) A plug and a tube with holes in its cylindrical walls divided the chamber above the porous plug into two parts. This arrangement had the purpose to prevent heated gas to reach the thermocouple by natural convection. (Brown J02 900-30)(3) The heart is suspended in a special portion of the coelom, the pericardium, whose walls are supported by cartilage. (SEU W.9.7.91-1) . . . [M]ost appositions (89 percent) were juxtaposed. . . . Even though more than two units can be in apposition, most appositions (92 percent) were single appositions consisting of only two units.(Charles F. Meyer, Apposition in Contemporary English. Cambridge Univ. Press, 1992) An Interrupter Although the appositive does not disturb the natural flow of the sentence as violently as parenthetical expressions do (mainly because the appositive is grammatically coordinate with the unit that it follows), it does interrupt the flow of the sentence, interrupts the flow to supply some gratuitous information or explanation.(Edward P.J. Corbett and Robert J. Connors, Classical Rhetoric for the Modern Student, Oxford Univ. Press, 1999) Appositive Exercises: Practice in Identifying AppositivesSentence Building with Appositives

Monday, October 21, 2019

Two-Digit Multiplication Lesson Plans

Two-Digit Multiplication Lesson Plans This lesson gives students an introduction to two-digit multiplication. Students will use their understanding of place value and single digit multiplication to begin multiplying two-digit numbers. Class: 4th grade Duration: 45 minutes Materials papercoloring pencils or crayonsstraight edgecalculator Key Vocabulary: two-digit numbers, tens, ones, multiply Objectives Students will multiply two two-digit numbers correctly. Students will use multiple strategies for multiplying two-digit numbers. Standards Met 4.NBT.5. Multiply a whole number of up to four digits by a one-digit whole number, and multiply two two-digit numbers, using strategies based on place value and the properties of operations. Illustrate and explain the calculation by using equations, rectangular arrays, and/or area models. Two-Digit Multiplication Lesson Introduction Write 45 x 32 on the board or overhead. Ask students how they would begin to solve it. Several students may know the algorithm for two-digit multiplication. Complete the problem as students indicate. Ask if there are any volunteers who can explain why this algorithm works. Many students who have memorized this algorithm dont understand the underlying place value concepts. Step-by-Step Procedure Tell students that the learning target for this lesson is to be able to multiply two-digit numbers together.As you model this problem for them, ask them to draw and write what you present. This can serve as a reference for them when completing problems later.Begin this process by asking students what the digits in our introductory problem represent. For example, 5 represents 5 ones. 2 represents 2 ones. 4 is 4 tens, and 3 is 3 tens. You can begin this problem by covering the numeral 3. If students believe that they are multiplying 45 x 2, it seems easier.Begin with the ones:45x 32 10  (5 x 2 10)Then move on to the tens digit on the top number and the ones on the bottom number:45x 3210 (5 x 2 10) 80 (40 x 2 80. This is a step where students naturally want to put down â€Å"8† as their answer if they aren’t considering the correct place value. Remind them that â€Å"4† is representing 40, not 4 ones.)Now we need to uncover the numeral 3 and remind students tha t there is a 30 there to consider:45x 321080150 (5 x 30 150) And the last step:45x 3210801501200 (40 x 30 1200)The important part of this lesson is to constantly guide students to remember what each digit represents. The most commonly made mistakes here are place value mistakes.Add the four parts of the problem to find the final answer. Ask students to check this answer using a calculator.Do one additional example using 27 x 18 together. During this problem, ask for volunteers to answer and record the four different parts of the problem:27x 18 56 (7 x 8 56)160 (20 x 8 160) 70 (7 x 10 70)200 (20 x 10 200) Homework and Assessment For homework, ask students to solve three additional problems. Give partial credit for the correct steps if students get the final answer wrong. Evaluation At the end of the mini-lesson, give students three examples to try on their own. Let them know that they can do these in any order; if they want to try the harder one (with larger numbers) first, they are welcome to do so. As students work on these examples, walk around the classroom to evaluate their skill level. You will probably find that several students have grasped the concept of multi-digit multiplication fairly quickly, and are proceeding to work on the problems without too much trouble. Other students are finding it easy to represent the problem, but make minor errors when adding to find the final answer. Other students are going to find this process difficult from beginning to end. Their place value and multiplication knowledge are not quite up to this task. Depending on the number of students who are struggling with this, plan to reteach this lesson to a small group or the larger class very soon.

Sunday, October 20, 2019

Composing With an Implied Audience in Mind

Composing With an Implied Audience in Mind Definition The term implied audience applies to readers or listeners imagined by a writer or speaker before and during the composition of a text. Also known as a  textual audience, an implied reader, an implied auditor, and a fictional audience. According to Chaim Perelman and L. Olbrechts-Tyteca in Rhetorique et Philosophie (1952), the writer predicts this audiences probable response to and understanding of a text. Related to the concept of implied audience is the second persona. See Examples and Observations below. See also: AudienceAudience Analysis  and  Audience Analysis ChecklistAdaptationEssayImplied AuthorNew RhetoricPersonaReading Examples and Observations Just as the speaker need not be, and usually is not, identical with the author, so the implied audience is an element of the poem itself and does not necessarily coincide with a given chance reader.(Rebecca Price Parkin, Alexander Popes Use of the Implied Dramatic Speaker. College English, 1949)Just as we distinguish between a real rhetor and rhetorical persona, we also can distinguish between a real audience and an implied audience. The implied audience (like the rhetorical persona) is fictive because it is created by the text and exists only inside the symbolic world of the text.(Ann M. Gill and Karen Whedbee, Rhetoric. Discourse as Structure and Process, ed. by Teun A. van Dijk. Sage, 1997)[T]exts not only address concrete, historically situated audiences; they sometimes issue invitations or solicitations for auditors and/or readers to adopt a certain perspective for reading or listening. . . . Jasinksi (1992) described how The Federalist Papers constructed a vision of an impartia l and candid audience that contained specific prescriptions for how the real audience should evaluate the arguments being addressed during the constitutional ratification debate.(James Jasinski, Sourcebook on Rhetoric. Sage, 2001) Every reading of an argument yields an implied audience, and by this, I mean the audience on whom the claim is understood to be made and in terms of which the argumentation is supposed to develop. In a charitable reading, this implied audience is also the audience for whom the argument is persuasive, the audience which allows itself to be influenced by reasoning.(James Crosswhite, The Rhetoric of Reason: Writing and the Attractions of Argument. University of Wisconsin Press, 1996)Readers and Mock ReadersI am arguing . . . that there are two readers distinguishable in every literary experience. First, there is the real individual upon whose crossed knee rests the open volume, and whose personality is as complex and ultimately inexpressible as any dead poets. Second, there is the fictitious readerI shall call him the mock reader whose mask and costume the individual takes on in order to experience the language. The mock reader is an artifact, controlled, simplified, abstracted out of t he chaos of day-to-day sensation.The mock reader can probably be identified most obviously in subliterary genres crudely committed to persuasions, such as advertising and propaganda. We resist the blandishments of the copywriter just in so far as we refuse to become the mock reader his language invites us to become. Recognition of a violent disparity between ourself as mock reader and ourself as real person acting in a real world is the process by which we keep our money in our pockets. Does your toupee collect moths? asks the toupee manufacturer, and we answer, Certainly not! My hairs my own. Youre not talking to me, old boy; Im wise to you. Of course, we are not always so wise.(Walker Gibson, Authors, Speakers, Readers, and Mock Readers. College English, February 1950) Real and Implied ReadersIn Wayne Booths terms, the implied author of a text is the creator of an implied reader. But one does not need to agree with Booths conclusion that the most successful reading is the one in which the created selves, author, and reader, can find complete agreement (Rhetoric of Fiction). On the contrary, the pleasure of the text may arise from the readers refusal to play the role sketched out by the implied author. Viewed in this way, the rhetorical drama of the essay resides in the conflict between the conceptions of self and world that the reader brings to a text and the conceptions that the persona attempts to arouse.(Richard Nordquist, Voices of the Modern Essay. University of Georgia, 1991)

Saturday, October 19, 2019

Age discrimination in employment (especially for older people) Research Paper

Age discrimination in employment (especially for older people) - Research Paper Example Policies and procedures for the company should be written clearly in an employee manual. This should include how promotions, salary increases/decreases and reduction in work force will occur. Having clearly written policies and procedures will benefit the employee and the company in age discrimination cases. These laws fall under the federal United States Equal Opportunity Employment Commission, although state governments also have their own laws regarding age discrimination (eeoc.gov). Age discrimination can be defined as when either an employee or an applicant who is over the age of 40, experiences unfair treatment when it comes to anything related to employment including hiring and dismissal, pay, job assignments, layoffs, work hours, promotions, etc. (eeoc.gov). Although there are many reasons for age discrimination, insurance companies are primarily to blame. Harassment relating to age occurs when supervisors, other employees or even clients continually hassle or badger someone. The law does not cover light hearted teasing or occasional off handed remarks, but when the situation escalates to create a hostile work environment for the employee it could be an issue of age discrimination (eeoc.gov). Keep in mind that the law pertains to people over the age of 40. According to U.S. News Money, people in the United States are retiring later than in previous years. This can be attributed to a lack of employer sponsored retirement benefits, reduction in Social Security benefits, longer life expectancy, improved health as people age and the coordination of retirement between wives and husbands when statistically, wives are three years younger than their husbands (money.usnews.com). Increased career length leads to an increase in age discrimination instances. With the recent downfall of the United States economy beginning in 2008, it has become more important for people to continue to work past typical retirement age. Since that time, age

Anthropological gender and sexuality and how cultural relativism Essay

Anthropological gender and sexuality and how cultural relativism - Essay Example He died in 2004 after committing suicide. Anthropologists’ analysis reveals that money has been used to change gender identities in the history as well as today. This approach to intersex has been widely used in the developed world such in treating children with sex anatomy problems. Gender roles vary across culture, in that, women perform domestic works while men work in offices, provide security and indeed provide for their families (Visvanathan et al. 78). In the Medline articles, a study conducted in Namibia, Africa shows how men are given priorities to practice polygamy. In the seventeenth century, men and women were assigned with different tasks in the American society. In a family, men provided security and wealth while women performed the domestic works as well as raising the children (Visvanathan et al. 79). Nowadays, the women are working in offices as men, providing for their family as well as having several sexual partners. In some African communities, women still perform the home tasks despite the current civilization. Gender inequalities have been caused by some ideologies that give men more power over women (Visvanathan et al. 90). In African communities, the fact that women are exchanged with money or other forms of wealth such cattle have created gender inequalities for the past years. With the civilization, men are still not ready to support ideologies advocating for gender equality since this would lead to culture crash. Some ideologists advocate for the protection of cultures, beliefs and traditions. In most societies, however, sexual violence against women has been observed (Visvanathan et al. 128). The women’s occupational and educational status remains low since the culture is protected against intervention by foreign parties. However, with the introduction of international human rights commissions and

Friday, October 18, 2019

Implications of Automating the Seat Switch Substrate Production Assignment

Implications of Automating the Seat Switch Substrate Production Process - Assignment Example The purpose of this report is to analyze the benefits that would accrue to the firm when it adapts automation process in the production of seat switch substrate. Advantages of adopting automation will see a reduction of cost and an ease in the achievement of demand. After reviewing whether to outsource a manufacturing company for automation or use our own team for the automation, it was found that our own team is the best in terms of value for money. The investigation of automating seat switch substrate production process considered the merits and demerits that will accrue to the incorporation, the cost of automating and implications to the employees. The automotive industry has experienced numerous changes over the years. Until the mid-1970s, North America vehicle assemblers designed the whole product, including parts and some of the machinery used to produce them. There was a very minimal role played by external players in parts design and testing. Factors such as increased competi tion, globalization, and popularity of foreign vehicles led the automobiles to rely on suppliers. Polymer Technologies Inc. was started in1985 as a tool and die shop, in 1996 it was struggling financially and could make annual sales of $9 million and was losing money. This prompted Polymer to change its strategy and began making integrated metal and plastic to produce higher margin switches, relays, electromechanical products and decorative products for the automobile industry. The company worked closely with its customers, and the company’s automation group has been a key player in making test equipment which was crucial in quality control. Seat switch is an integral component of power automobile seats, the product controlled seat movements by translating instructions from the driver-or passenger –controlled switches into a signal to motors which moved the seat.

AI Week 13 Eye moving DB 153 Essay Example | Topics and Well Written Essays - 250 words

AI Week 13 Eye moving DB 153 - Essay Example Various governments have limited fiscal budgets and pressure (Feldstein, 2011). This is because it has to take care for the health of the aging population. Shifting the cost to the public only increases the level of taxes and affects the finances of various households. Such costs could be unsustainable for the lower and average income earners. There are disparities in the level of income for different household individuals. The public consists of a majority of average income earners. If the cost of health care for high-risk employees shifts to the public, then high-income earners should make the biggest contribution. Genetic factors cause most affected employees to inherit some chronic diseases. Such health care plans make the employees feel some form of discrimination from their employers. Employers should treat all the employees with equality regardless of their health background. The employers should instead make health care policies affordable for all the employees. Relevant authorities need to regulate insurance companies in the creation of their health care policies (Feldstein, 2011). The regulations should require the companies to provide insurance covers at normal charges. The employees should seek routine checkups from their healthcare providers to put their condition under control. The employers should avoid any form of discrimination in the determination of the health benefits. Shifting the public health care cost to the public could be unfair for both low and average income

Thursday, October 17, 2019

How do breakfast show presenters create a lively and engaging Coursework

How do breakfast show presenters create a lively and engaging atmosphere on their radio shows - Coursework Example Steve Price Breakfast Show on the subject of carbon tax legislation illustrates the key features of spoken language that distinguishes it from written language. The topic of the subject focused on the divisions within the ranks of the Australian Labor Party (ALP), environmental activists, and the public. The breakfast show presenter was Luke Grant. The guest of the breakfast show was Greg Hunt, who plays the role of shadow spokesperson on the matter of climate change. The unique features of spoken language that make it possible for the discussants to explore the different perspectives of the subject matter enhance the discussion between the two. The show is interactional in nature and addresses itself to the subject of environmental conservation policies in Australia. Naturally, the primary target audience is the Australian public. This show captures their interest because of the growing concern on matters of environmental conservation. The different policies taken by the government and other interested parties have both long-term and short-term effects on the general population. The secondary audience includes the political class, the business community, and the wider global citizenry because the subject matter is both global and local in nature. The interactional language employed in the show engages the mind of the audience in the sense that they are able to apply their analytical skills in real-time as the show progresses. They are also able to discern the merits of the arguments by pointing out the logical and illogical parts within the debate. At the beginning of the show, the presenter introduces the subject matter through questions: â€Å"Where are we in terms of this debate? It does look a little like game over, doesn’t it?† (Latest News, 2011). These two questions have the effect of attracting the keen interest and concern of the audience. The questions, in their spoken context, imply the possibility of some form of a crisis. Although wr itten language also employs the use of questions, their import, when assessed in the context of spoken language produces a more dramatic effect. This is because questions are rendered in a regulated volume, pitch, and tone. These qualities are very significant in enhancing the meaning-making process. The questions also prepare the audience for the debate since the rest of the debate becomes an effort to resolve the two questions at the beginning. A second sentence by the presenter is equally significant in the context of the spoken language. Grant interrupts the guest with the sentence, â€Å"Glad to hear that, by the way†¦Ã¢â‚¬  (Latest News, 2011). The value of this sentence could be seen both in terms of its interruptive nature and in terms of its ungrammatical form. The sentence interrupts the initial statement made by Hunt. Interruptions are common features in spoken language in the sense that they enable the clarification of matters or change of focus towards the matter s pertinent to the discussion. It is possible to perceive the value of interruptions as a strategic tool for enhancing the rules of logic as understood within the framework of the discussion. The same sentence is grammatically incorrect. In both form and structure, spoken language tends to assume different aspects from written language. This is because

Proposal Essay Example | Topics and Well Written Essays - 3000 words - 1

Proposal - Essay Example However, due to the high stress level in the hospital environment where pain and agony abound from the patients, workers are usually left with no choice but to concentrate on their own discipline in providing therapy, care or help for their patients. Add to that, the obligatory meetings set up by management to ensure that things are flowing smoothly, create resistance among the staff, as they are anxious to be questioned about their cases in detail. Such a scenario prevents effective communication to flow within the workers, staff and management of the hospital. This is a cause for concern, as the situation may bring about more problems that can affect the quality of treatment afforded to the patients that has gained recognition for Pinewood Hospital. The clinical director, Dr. Baxter has hired an internal consultant to help improve communication within the hospital. The following are proposed steps the consultant may make to gain a better understanding of the problem and to find appropriate solutions for it. The consultant needs to be immersed in the hospital to get a better perspective of the culture of the organization and the flow of movement and communication. He needs to attend all meetings himself to keep track of the agenda and see if there is overlapping information and investigate how these may be minimized to save time and effort. As a consultant, he is available to anyone who would be in need of his advice regarding concerns about communication, be they rank and file or in the administrative staff. Being so, he would have access to information that may able to help the organization. Another way to gather information is to conduct a survey on communication among all the hospital workers from the management to the professionals to the staff. â€Å"Staff surveys that provide a thorough understanding of staff attitudes and perceptions

Wednesday, October 16, 2019

How do breakfast show presenters create a lively and engaging Coursework

How do breakfast show presenters create a lively and engaging atmosphere on their radio shows - Coursework Example Steve Price Breakfast Show on the subject of carbon tax legislation illustrates the key features of spoken language that distinguishes it from written language. The topic of the subject focused on the divisions within the ranks of the Australian Labor Party (ALP), environmental activists, and the public. The breakfast show presenter was Luke Grant. The guest of the breakfast show was Greg Hunt, who plays the role of shadow spokesperson on the matter of climate change. The unique features of spoken language that make it possible for the discussants to explore the different perspectives of the subject matter enhance the discussion between the two. The show is interactional in nature and addresses itself to the subject of environmental conservation policies in Australia. Naturally, the primary target audience is the Australian public. This show captures their interest because of the growing concern on matters of environmental conservation. The different policies taken by the government and other interested parties have both long-term and short-term effects on the general population. The secondary audience includes the political class, the business community, and the wider global citizenry because the subject matter is both global and local in nature. The interactional language employed in the show engages the mind of the audience in the sense that they are able to apply their analytical skills in real-time as the show progresses. They are also able to discern the merits of the arguments by pointing out the logical and illogical parts within the debate. At the beginning of the show, the presenter introduces the subject matter through questions: â€Å"Where are we in terms of this debate? It does look a little like game over, doesn’t it?† (Latest News, 2011). These two questions have the effect of attracting the keen interest and concern of the audience. The questions, in their spoken context, imply the possibility of some form of a crisis. Although wr itten language also employs the use of questions, their import, when assessed in the context of spoken language produces a more dramatic effect. This is because questions are rendered in a regulated volume, pitch, and tone. These qualities are very significant in enhancing the meaning-making process. The questions also prepare the audience for the debate since the rest of the debate becomes an effort to resolve the two questions at the beginning. A second sentence by the presenter is equally significant in the context of the spoken language. Grant interrupts the guest with the sentence, â€Å"Glad to hear that, by the way†¦Ã¢â‚¬  (Latest News, 2011). The value of this sentence could be seen both in terms of its interruptive nature and in terms of its ungrammatical form. The sentence interrupts the initial statement made by Hunt. Interruptions are common features in spoken language in the sense that they enable the clarification of matters or change of focus towards the matter s pertinent to the discussion. It is possible to perceive the value of interruptions as a strategic tool for enhancing the rules of logic as understood within the framework of the discussion. The same sentence is grammatically incorrect. In both form and structure, spoken language tends to assume different aspects from written language. This is because

Tuesday, October 15, 2019

Schwarz Leadership Programme at Moog Case Study

Schwarz Leadership Programme at Moog - Case Study Example This section will describe in some detail the research methodology used for this report. This report utilises both inductive and deductive methodologies for the research. The findings from a deductive approach are more likely to be accepted by the Senior Management, but consideration must be given to the appropriateness of the method in context to the research question. Using an inductive approach for this research allows the research to focus on why people behave in particular way once they have undertaken the Schwarz leadership training. For this report a combination of the two will be used, including a mixed method approach as the deductive research will be quicker to complete whilst the inductive approach will allow for analysis and reflection on the data. Moog operates in various locations throughout the world, so there will be a cross-sectional study in order to assess if the Schwarz training is perceived in the same way in Europe and the Americas region. Although this type of study only allows for a snapshot in time, the data acquired will enable the comparison of behaviours between the various regions. A key benefit of using a cross-sectional study for this research as it will enable the assessment of respondents within the different regions of the company and not just concentrate on one particular group. This research involved respondents from a focus group and there has been an effort to have a mixture of respondents, some of whom did not actually participate in the questionnaire. This style of group interviewing is particularly desirable, as it is not necessary to have one particular structure to how the group will be facilitated and the session was not intended to appear overly formal. A lot can be learned through the focus group meeting, and also about the participant's opinions towards the Schwarz training. This generated a lot of discussion, and can be seen as being 'information rich'. It certainly was information rich as the participants came across extremely enthusiastic about the discussion on Schwarz training to the point that the meeting had overrun by thirty minutes. This session allowed the participants to become more empowered and able to comment in their own words and at the same time being stimulated by thoughts and comments of others in the group A major disadvantage of the focus group meeting is that confidentiality can be a problem between the participants and although I had communicated to the group that what had been said in the session would remain confidential, I was concerned this might not be shared by the entire group. I would have liked to include participants from the overseas sites however this was not practical to do. Previous situations have shown that the engagement of overseas participants through conference call is quite limited when focus group meetings are facilitated with overseas participants. In terms of research strategy Saunders et al., 2007 puts forward the case that strategy can be used for exploratory, descriptive and explanatory research. With this in mind I shall be using a case study and survey, as the survey strategy fits in very well with the deductive approach, and furthermore it is easy to explain and understand for communication purposes, which is particularly important as English is not always the first language for many of the people who work at Moog. Therefore for the purposes of this research, a

Monday, October 14, 2019

Bilingual Education Essay Example for Free

Bilingual Education Essay Now, it seems to be universally accepted that increased education is a good thing. Thousands of colleges and millions of students spend vast amounts of time and money chasing pieces of paper. But what is the value of these qualifications? This essay will discuss whether education has been devalued. Supporters of education (usually teachers or educators, or those who have an interest in stopping people thinking for themselves) say that increased levels of education will open doors for students. Certificates, diplomas, and degrees are held up as a status symbol, a passport to a private club of money and power. However, the truly powerful are not those who have taken degrees, but people who have stood back and looked at what is really important in life. They have seen opportunity and followed dreams. These people are found in every part of society. Like many brilliant people, Einstein was a weak student at math. Like many successful businessmen, Bill Gates never completed college. Like many inventive and creative people, Edison never went to school. The greatest religious teachers do not have letters after their name, but have looked into their hearts for meaning. Similarly, the worlds political leaders do not have masters degrees or doctorates. These are the people who shaped our century, and they are too busy with real life to spend time in the paper chase. Students in college are being sold an illusion. They are made to believe that self-understanding and society approval will come with the acquisition of a piece of paper. Instead of thinking for themselves, and finding their own personality and strengths, they are fitted like square pegs into round holes. The role of education is to prepare masses of people to operate at low levels of ability in a very limited and restricted range of activities. Some of these activities are more challenging than perhaps the assembly lines of the past, but still the ultimate purpose is equally uninteresting. More worryingly, despite the increased level of education, people are still not genuinely expected to think for themselves. In fact, the longer years of schooling make the job of brainwashing even easier. There is still a role for study, research, and education. However, we need to examine our emphasis on education for the sake of a piece of paper, and to learn the real meaning and revolutionary challenge of knowledge. mean by education from the outset. That might make it easier for you to sharpen your arguments against it. You need to better deal with the opposing arguments. It is true of course that some people become millionaires by dropping out of school to become entrepreneurs. But, if one looks at the average income of dropouts compared to the average income of people who graduate high school, and then compare those rates to the average income of people who graduate from university, we see quite clearly that better education leads, on average, to greater career success (you could even do research and cite sources, using empirical evidence to back up your points! ) Also, education, especially liberal arts (or even liberal science) tends to improve people, giving them a capacity for critical thought that makes them more interesting and worth listening to. You even seem to acknowledge, in your conclusion, that people who do well without formal education may yet be considered self-educated. So, perhaps you should define what you mean by education from the outset. That might make it easier for you to sharpen your arguments against it. I am not sure that I am following your argument here. Education is devalued because it is akin to brainwashing and drains people of the ability to think for themselves. Truly powerful people have never been to college. The role of education is to transform people into automatons performing a limited range of activities. As an argumentative essay, youll need to back up those opinions. Your examples can help, but Einstein did attend university and had a doctorate degree from the school of mathematics and natural sciences at Zurich University. I dont think you can make the claim that Einstein had difficulty with math he was studying calculus at the age of twelve but he did have trouble with speech. Edison did not attend university, but at that time a mere 1% of the population attended college so the example loses impact. Bill Gates attended Harvard. He didnt graduate, but he still considers his Harvard experience valuable (it is where he learned that there are people smarter than he is and met business partner Steve Ballmer). Besides, Harvard gave Gates an Honorary Degree in 2007. Gates also blows the theory that brilliant people struggle with math he scored near perfect on the SAT. Steve Jobs quite college after a semester (I know that you didnt use him as an example, but I thought it was interesting Michael Dell is another computer guru who never finished college). Who are the worlds religious teachers and political leaders that you are referring to?. Heres an article that I found interesting: http://www. msnbc. msn. com/id/29445201/ It talks about different things than your essay, but I can see where everyone getting a college degree would devalue those degrees . . . forty is the new thirty and a college degree is the new high diploma, blah, blah, blah. With 68% of high school graduates in the US enrolling in collage (2008), do we have a future with an over-educated, under-employed workforce? I could also see the argument that not everyone is suited for college life and we, as a society, need auto mechanics, plumbers, and grocery store clerks.

Sunday, October 13, 2019

Why Is English Considered a Global Language?

Why Is English Considered a Global Language? Abstract This project aims to show us why the English known as a global language and why other languages do not have this ability. Also introduce some other languages such as Chinese that can be replaced with English and their capability of being a global one. Key words: english , global , language , capability. Introduction We all are able to communicate freely with one language to people all around the world. A single language would help to reduce misunderstanding and miscommunication. People will need to learn this one world language, whichever that may be, but we will also never forget older languages completely. It means that we can use both of them at same time for the several reasons. We use our mother tongue in our country (home town) and use second language (global language) for communicate with people that don’t know anything about our mother tongue or for some other reason like job, travel, migration and †¦. . Global language A language is called a â€Å"global language† when it achieves the official position and education preference in every nation, that language will finally come to be used by more people than any other language. The essential reason to make a language global or international is the power of its people. The power includes the power of military, politic and economic. Military power, political power and economic power are the three essential factors to make a language global and to keep its status (Culpepper, 1997). What does the global language do? When a new language is introduced to new communities, and a new better life is achieved by the new language, it makes people prefer to use the language than their own language. In turn, the low frequency of using particular language may cause the language to disappear. This was true when English was introduced to academic life (Kaplan, 2000). If the language is no longer the key in communication, it will not live anymore. People will forget it. Many factors cause to the death of the languages that cannot known as global language like War, revolution, economic development or urbanization (Kaplan, 2000). But the development of some areas, like aviation, tourism and banking can be help to be as a global. English English is universal language. It is the worlds second native language, the formal language in 70 countries, and English-speaking countries are accountable for about 40% of worlds total GNP. English can be used everywhere with educated people around the world. It can be used in media, cinema, pop music, TV and †¦for anyone who knows English (Bond, Michael, 1751). From Old and Middle English, English was spoken early in the last one thousand years. Examples of language written at that time, such as the works of Chaucer (mid to late 1300s) are useful in supervising linguistic evolution over the last thousand years. In these works, often spellings will be indistinguishable, but once pronounced phonetically, are understandable to modern English speakers (Sapir, Edward, 1871). Why English is the Most Widely Used Language in the World? 1-Some people may disagree that â€Å"English is the world’s most important language.† It is definitely the world’s most widely used language. It is spoken by a number of people 800,000,000 by a conservative appraise 1,500,000,000 by a liberal appraise. It has official status in over 60 countries. 150 million people use English fluently as a foreign language. English is also the language of international air traffic control, and the principal language of world publishing, science and technology (Crystal 2001). 2- In the postcolonial world, English is often used outside the domestic area, discussions of the links between English and Anglo culture may even seem repulsive. Speakers of English—in Britain, the United States, and elsewhere—discussions of possible links between English and Anglo culture may also seem to be best avoided (Quirk et al. 1985). 3- English is also important in business. 84% of companies want English as a foreign language; only 32% require French (Felberbauer 1996). In the Austrian job market, English is pay heed to as a basic qualification; therefore not knowing English may be a conclusive deficit. In Austrian businesses which operate internationally the internal use of English is not so much a feature as it is in Scandinavia (Dension 1981). According to research conducted by Stockinger, secretaries, for instance, are expected to be able to hold telephone conversations in English while technicians have to be able to read technical literature in English (Stockinger 1995). The Significance of Learning English: English may not be spoken language in the worlds, but it is an official language in a large number of countries. It also very important for whom works in global workforce because English is the language of business in world, so it had become necessary for people to speak English. Another reason for learning English is that many of the worlds top films, music and books are published and produced in English. Therefore by learning English, you will be able to have a great understanding. And also most of the content produced on the internet is in English. So knowing English will allow you access amount of information which may not be otherwise available. Chinese The Chinese language is the oldest language in the world with six thousand years of history. Chinese character inscribing has been found in turtle shells dating back to the Shang dynasty(Reid, Thomas, 1890). Chinese phonetics is very complex, making the learning of the language a far more difficult role than learning English (Simon-Vandenbergen, Anne-Marie, 1937). The written language is a common form of communication. Even though people are not able to orally communicate in different district, they are able to understand each other in writing (Saltman, Michael, 1903). Chinese is already the most widely spoken language in the world, but that is because of the large population of China (Aleksandr, 2001). Chinese is not suspended to pass English as a global language. The Chinese economy is strong enough to raise the cause and popularity of its language, just like the English did. But, it is possible that China economy is a result of its ability to conform to others’ languages and way of work rather than the task of the Chinese language on other countries (Spevack, Marvin 1985). In business, Chinese is the most useful language like English. Transacting business matters using a common language is essential for camaraderie building but also for the speed and effectiveness of your negotiations (Thompson, 1998). France French represents different cultures around the world. It is used on five continents, in more than fifty countries. French is one of the six official languages of the United Nations and the official language of the Olympic Games (Vera. 2004). It provides the base for more than 50% of the modern English vocabulary, which improves presentation on standardized tests. French is supported by over 35 years of research and has been proven to be successful with students of all races, economic status and levels of English expertise (Quinn, Naomi. 2002). The importance of French has economic importance for major economies in the world, For example, French is the official global language of Canada, which performs major trade deals with the US. The knowledge of French for traders to such countries becomes all the more important (Jeremy. 1999). Being the second most taught language after English and having a readership and with the number of its students, French is absolutely the language to know these days. With English, French is the only other international language; being spoken in 5 continents (Steven. 2002).France has not lost its level of development in language. France is still a highly respected country, and still one of the top romantic languages in western civilization. The United Nations communicates have only two languages: French, and English. There are parts of Africa where French is still the native language, along with several islands. Test: I did a test on two groups. Group 1, who decided to learn English as second language Group 2, who decided to learn French as second language. I asked same question from two groups. Here are the questions and answers: Question 1: why are you choosing this language to learn? Group 1 à ¯Ã†â€™Ã‚ ¨ we choose this language because it is an international language and is more important than other language to learn. Group 2 à ¯Ã†â€™Ã‚ ¨ because nowadays some other language such as French comes to high level in international position and it may know as global language instead of English. So we try to learn it to be modern and update with worlds language changing. Question 2: How much do you want learn this language? Do you want to learn just for being good at conversation or more than it? Group 1 à ¯Ã†â€™Ã‚ ¨ No, not just for conversation. We try to use it in our daily life such as reading English books, articles and watching English movies. Looking for medicine news in the internet and †¦ Group 2 à ¯Ã†â€™Ã‚ ¨ yes actually we learn it to make conversation, greeting and understand what people say. Result à ¯Ã†â€™Ã‚ ¨ nowadays we choose language instead of English just because of communicating, making conversation and understanding what other says. But we choose English to learn for several important reasons. As I mentioned before, we use English to being able to surf the internet, read the international book and magazine, being aware of news around the world and †¦ Conclusion We result that it is no surprise that English is becoming the language for international communication. English is the most widely spoken language of the world because of the power the United States in economic and politic. English is the mother tongue of 380 million people, and it is used worldwide by the newspapers, magazines, scientists, businessmen, and politicians. One billion to 1.5 billion people around the world presently speak English. It is the most widely language in 70 countries (J. Draper. 1994).Globalization at the end of the twentieth century is occurring through the media, and technology, thus affecting languages worldwide (Sebesta , 1996). In my idea, languages have fallen and risen with the military and economic growth of a nation. Western culture has a large influence to keep it raise and use these power to impose the word for being as a global language. References STIG HJARVARD (2008). How the Media Contribute to the Spread of English. The Globalization of Language. Cambridge: Cambridge university press. Nguyen Thuy Nga (2008). English A global language. Hanoi University press. Journal of Science, Foreign Languages 24 (2008) 260-266. Woody Allen (1968). Language is acquired, whining is learned. Second language acquisition. Harlow: Pearson. David Crystal (2003). English as a global language. Cambridge: Cambridge university press Zuliati Rohmah (2000). English as a global language. Tierney, J (2009). Language diversity and its importance for cognitive science. The myth of language universals. 32, 429–492 Jean Aitchison (2001).progress or decay? Language change. Bambridge: Cambridge university press (2001).5, 3-20 Danie Spich tinger (2003). The Spread of English and its Appropriation. Wien university press. (2003). Cornelia Hamann (1986). How Language comes universal. Language Acquisition. Journal of Memory and Language 33, 19-38. Pinker, S. Bloom, P. (1990). Natural language and natural selection. Behavioral  And Brain Sciences 13 (4): 707à ¢Ã¢â€š ¬Ã‚ 784.

Saturday, October 12, 2019

Medicare In The 96 Elections :: essays research papers fc

Medicare in the '96 Elections Among the many differences between President Bill Clinton (Democrat) and Presidential Candidate Bob Dole (Republican), lays a common debate topic, Healthcare. The issue is the fact that funding in Medicare's budget will not last but another four years. Both Republicans and Democrats have ideas on how this budget should be reformed, but the two have not yet come to a median resolution. In the beginning of the Presidential campaign Medicare was a hot topic. It will be shown that as Election Day drew nearer Republicans were forced to attack President Clinton's policy because they had no substantial plan of their own. Prior to 1965, payment for a particular medical service was paid for either directly by the recipient of the care or by the recipient's insurance company. Usually to get full coverage or even coverage with a low premium the rates are outrageous. For this reason many poor, elderly and severely disabled Americans were unable to receive proper medical treatment. Then, in 1965, Lyndon B. Johnson proposed one of his Great Society programs, Medicare. Medicare would allow those who were severely disabled, elderly or poor to receive quality medical treatment without worrying about the cost . This government funded program would subsidize the service of physicians, inpatient hospital care and some limited home care. The money would come from that money set aside for Social Security. Medicare, along with its sister program, Medicaid, allow broad access to physician and hospital care to all disabled Social Security recipients, most all elderly and some of the poor. Medicare has two parts, A and B. Part A, which covers all enrollees, covers hospital costs only. Part B, also known as Supplementary Medical Insurance (SMI), is an optional plan for which a premium is charged. The SMI plan covers 80 percent of office visits, preventive medicine, surgery and diagnostic specialties (x-rays, etc.). What Medicare does not cover include: hospital stays over 60 days, extended nursing-home care, or the cost of lengthy illnesses. In the cases where Medicare will not cover costs, recipients usually use secondary retirement programs either from pension plans or retirement programs such as AARP (American Association for Retired People). Those who do not have such plans, are forced to drain their assets until they qualify for the sister program Medicaid. Medicaid is a program set up the same as Medicare but primarily for those who fall short of the state-specified income level. Costs covered by Medicaid are close to those covered by Medicare differing only by nursing-home care and treatment in state mental hospitals . In 1965, at the same time the

Friday, October 11, 2019

Basic Parts of Computer Essay

Introduction Almost everyone uses a computer daily, but many don’t know how a computer works or all the different individual pieces that make it up. In fact, many people erroneously look at a computer and call it a CPU or a hard drive, when in fact these are just two parts of a computer. When these individual components are connected together they create a complete and working device with an all encompassing name of computer. As a computer user it is important that you have a basic understanding of the core components that make up your computer. This knowledge will prove invaluable if you decide to upgrade your computer or if a piece of hardware breaks and you need to purchase a replacement. The purpose of this is to discuss the basic pieces in every computer and their function. HISTORY OF COMPUTER The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into three generations. Each generation lasted for a certain period of time,and each gave us either a new and improved computer or an improvement to the existing computer. First generation: 1937 – 1946 – In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic computer name the Colossus was built for the military. Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is said that this computer weighed 30 tons, and had 18,000 vacuum tubes which was used for pr ocessing. When this computer was turned on for the first time lights dim in sections of Philadelphia. Computers of this generation could only perform single task, and they had no operating system. Second generation: 1947 – 1962 – This generation of computers used transistors instead of vacuum tubes which were more reliable. In 1951 the first computer for commercial use was introduced to the public; the Universal Automatic Computer (UNIVAC 1). In 1953 the International Business Machine (IBM) 650 and 700 series computers made their mark in the computer world. During this generation of computers over 100 computer programming languages were developed, computers had memory and operating systems. Storage media such as tape and disk were in use also were printers for output. Third generation: 1963 – present – The invention of integrated circuit brought us the third generation of computers. With this invention computers became smaller, more powerful more reliable and they are able to run many different programs at the same time. In1980 Microsoft Disk Operating System (MS-Dos) was born and in 1981 IBM introduced the personal computer (PC) for home and office use. Three years later Apple gave us the Macintosh computer with its icon driven interface and the 90s gave us Windows operating system. As a result of the various improvements to the development of the computer we have seen the computer being used in all areas of life. It is a very useful tool that will continue to experience new development as time passes. The Outside of your Computer When you look at your computer what you are seeing is actually the computer case. Inside the case are all of the individual components that when connected together create your computer. On the outside of the case you will see various external ports that you can plug devices into as well as the ability to access your optical devices such as your CD and DVD drives. Front of a Dell Inspiron DesktopBack of a Dell Inspiron Desktop On the front of the computer you will commonly find a CD or DVD drive that can be opened by pressing a small button near the door of the drive. This will eject the drive tray where you can place a CD or DVD disk. When you press the button again, the tray will slide back into your computer so that you can access it from within your operating system. On the front of the case, you will also typically find USB ports and media readers. A USB port is a small opening on the front of your computer that allows you to plug a USB device or cable into it. You can usually determine if a port on your computer is USB as it will have the logo next to it. Common devices that you would plug into USB ports are iPod and iPads, flash drives, and external hard drives. The other common ports that you can find are for camera memory media. These media readers allow you to remove the memory card from your camera and insert it into the computer so you can access the images stored on it. On the back of the case are connectors that are typically only used when you assemble your computer for the first time. These connectors allow you to connect external devices such as your printer, monitor, mouse, keyboard, and speakers. The back connections will also include an Ethernet port that will allow you to connect your computer to your network. Last, but not least, there will also be more USB ports available in the event that you need more USB connections than are available on the front of your computer. The Inside of your Computer Now that you know how to connect your various external components to your computer case, let’s take a look at the inside of a computer as this is where the magic really happens. To open your case, you will need to typically unscrew a side panel or press a button on the bottom of the computer to open the computer like a clamshell. Once you can see inside a computer, you will see various individual components connected via cables or plugged directly into a large board attached to the side of the case. This board is the motherboard and is used to connect all the individual devices inside your case into a single computer. These individual devices and the motherboard they plug into can be seen in the image below. As you can see from the image above, there are various components all connected to each other. Every device must be connected to the power supply unit , which provides electricity to various components. The add-on cards, each performing their own function, are inserted to the motherboard so that they can communicate with it. When all of these components are properly connected to each other, they can then communicate with each other and the computer will operate properly. In the next section we will discuss each individual component and what function they serve. The individual parts of your computer As already stated, a computer is nothing more than various individual hardware components connected to each through cables and the motherboard. These devices are then given electricity by the power supply unit so that they can function. In this section we will discuss the individual components and the function that each performs. * Computer Case The computer case, also called a chassis, houses and protects other core parts of the computer. Computer cases come in different sizes and shapes in order to accommodate the various environments that they will be stored in. These shapes are: * Tower – A tower case is vertical and usually sits on the floor. A tower case comes in a mini, mid, and full size, with the larger sizes being able to hold more components. * Desktop – A horizontal case that is designed to rest on a shelf or sit on your desk with the monitor on top of it. * Rackmount – Rackmount cases are horizontal and are typically used for servers. These servers will then mount in a rack so that there are stacks of computers in one computer rack. Full Tower CaseRackmount Case Computer cases also need to support the largest component that resides inside it, which is typically the motherboard. The motherboard can come in many different shapes and sizes, called form factors, and the specifications on a computer case will state which form factors can fit inside it. Virtually all modern cases have: * Power switch * Indicator lights such as disk activity or network activity. * Back panel that contains holes to expose external ports. * Metal framework to house the PSU and hard disk/optical drives * Mounting points to secure the motherboard * Vented panels to allow airflow through the case Depending on the model, some cases have other features as well such as headphone jacks or USB ports. * Motherboard The motherboard, or mobo for short, is perhaps the most critical piece of the computer. It is a relatively large, rectangular board filled with various circuits, chips , and slots that you plug things into The motherboard serves two functions. First, the motherboard is home to a number of chips that dictate how the various components of the computer will talk to each other. It also has special slots that allow you to plug expansion cards in that add new or improved functionality to your computer. Secondly, and perhaps most importantly, the motherboard is the connecting point for all of the other pieces of the computer. Without the motherboard, the different parts cannot communicate with each other, and the computer cannot function. Computer Motherboard Motherboards come in a variety of sizes, or form factors, such as ATX or micro ATX. Generally speaking, the larger the form factor the more devices can be attached to it. Motherboards connect with the other devices in your computer using a set of special slots and connectors called ports that are located on the top and back edge of the motherboard. The ports on the back edge of the motherboard protrude out of the back panel of the computer case and allow you to connect external devices to the computer. Virtually all modern motherboards have one or more USB ports and an Ethernet port mounted externally to allow connection to the internet and external devices. Additionally, all modern motherboards contain at least one IDE or SATA port to allow the connection of a hard drive. * Central Processing Unit(CPU) The central processing unit, or CPU, is at the core of every computer. Functioning as the â€Å"brain† of the computer, the CPU performs basic mathematical and logical functions as instructed by a computer program. The CPU is located on the motherboard and is connected to it through a special port called the CPU socket. When the CPU is in use it generates heats, which must be transferred away from CPU chip so that it is not damaged. This is accomplished through the use of a heat-sink and fan which draws the heat out of the CPU chip and transfers it into the case instead. computer’s CPU A CPU has a maximum speed at which it can safely process instructions. This speed is called the clock rate and is measured in hertz (Hz). Some CPUs will allow a user to raise the clock rate beyond the speed at which the CPU is safely rated. This is called overclocking, and can provide increased computer performance at the cost of potential system instability or damage. Due to the complexity of overclocking and the potentially destructive side effects it can cause, overclocking is a technique not recommended for average or professional computer users. A relatively recent development in the field of CPUs is the multi-core processor. Having many processing cores in the CPU effectively multiplies its potential by allowing the CPU to simultaneously process as many instructions as it has cores. However, the OS must be designed to make use of multiple cores for this ability to take effect. The CPU of a modern PC will likely have anywhere from two to eight cores * Power Supply Unit All parts of a computer require electricity in order to operate. The part of the computer that provides this electricity is called the power supply unit, or PSU. The PSU receives electricity from an external source, which is usually a wall outlet, and changes it into power that the other parts of the computer can use. Power Supply A PSU is necessary for two reasons. First, computers require direct current, or DC, power. However, electricity is supplied by power companies in alternating current, or AC, form. The PSU takes the AC electricity and converts it into a DC form so that the computer can use it. The second reason is that computer components use electrical power of relatively low voltage, while the electricity that comes out of a wall socket is of a significantly higher voltage. The PSU converts the higher voltage energy into a low voltage form that the computer can properly use. Power supplies are classified by the maximum amount of watts, such as 500 or 650 watts, which can be supplied to your computer system. The amount of electricity that is required to power a computer depends on what components the computer is using. For example, if you are using a high-end processor and a high-end video card your power you may need a more powerful PSU to support these power hungry devices. Therefore, when buying n ew components for a computer you should always look at the specifications for these devices to determine how much power they need and whether or not your PSU can support it. * Hard Disk Drive The hard disk drive, or HDD, is the primary source of secondary storage in modern computers. Secondary storage is any device where information is stored when it is not needed for immediate use. An HDD uses magnetism to record information on a rotating disk of magnetic material. It uses a moveable arm containing a device called a drive head to read from and write to different portions of the disk.. Since the disk remains magnetized even after power is removed, information is not lost when you turn off the computer. One downside of HDDs is that they are very slow compared to other devices in the computer. This is because the drive must position the arm and disk in the correct position in order to retrieve a particular piece of information. Hard Disk Drive Modern HDDs have three major variables. The first is the drive capacity. This is how much information the drive can hold. Drive capacity is measured in either gigabytes (GB) or terabytes (TB). One terabyte is equal to one thousand gigabytes. The second variable is the rotation speed. This is how quickly the disk inside the HDD can rotate, and is measured in rotations per minute (RPM). The faster the disk spins, the more quickly information can be retrieved from it. The final variable is the type of interface the HDD uses. The interface is the part of the HDD that connects to the motherboard and is how the HDD sends and receives information. Most modern HDDs use SATA or SAS interfaces, although HDDs using IDE interfaces are still somewhat common. It is important to know which interfaces your motherboard supports when purchasing a new HDD. A recent addition to the personal computer market is a technology called a solid state drive, or SSD. While not technically an HDD, SSD’s fill the same functions. The difference between HDDs and SSDs is that while an HDD uses a spinning disk to store data, an SSD uses special microchips. Due to this, SSD’s are less susceptible to physical shocks such as impacts and falls compared to a HDD. Additionally, SSDs run silently and can access data more quickly. However, SSDs have a higher cost per gigabyte than their HDD cousins do. * Optical Disk Drives An optical disk drive is a component that uses a laser to read from or write to an optical disk. Examples of optical disks include CDs, DVDs, and Blu-Rays. An optical disk drive writes to a disk by using a laser to etch tiny grooves into the surface of the disk. The disk is read by using a different, low-power laser to detect those grooves. Modern optical disk drives usually have reading and writing (burning) capability. Additionally, most optical drives are backwards compatible, which means that a new technology can read the media from an older technology. For example, a Blu-Ray drive can also play DVDs and CDs. Optical Drive Optical disk drive speed is measured differently than HDD speed. While HDD speed is measured in the number of RPMs, optical drive speed is measured by the maximum rate at which data can be read from the disk. For each technology (CD, DVD, Blu-Ray) there is an industry-wide standard data rate that serves as a benchmark by which drive speeds are measured. The speed listed is put in terms of multiples of that base speed. For example, the base speed for Blu-Ray technology is 6.74 megabytes per second. Therefore, a drive rated at 52x can read data at a maximum rate of 52 x 6.74 = 350.48 megabytes per second. * Cooling Devices As a computer runs, it generates a lot of heat. One or more cooling devices are part of any modern computer in order to keep the machine from overheating. The two types of cooling devices that are in almost every modern computer are heat sinks and cooling fans. Heat sinks are small metal structures that conduct heat well. They function by absorbing the heat produced by a component and efficiently releasing it into the air, or a liquid in certain special situations, similarly to how the radiator in your car works. Cooling fans work by removing warm air from components or heat sinks and pulling in cool air to replace it. Fans are available in a variety of sizes that determine how much air they can move within your case. When adding a fan, it is important to ensure that you purchase a fan that is compatible with your motherboard, since different fans have different kinds of power connectors. CPU Heat Sink and Fan Some extremely high-end PCs have liquid cooling systems which use tubes of flowing water or coolant instead of or in addition to cooling fans. These systems are more effective, quieter, and more efficient than air cooling systems. However, they are complex, expensive, and carry the danger of a coolant leak which can damage the system. For a typical PC, air cooling systems are sufficiently effective. * Memory Random Access Memory, or RAM, is the part of the computer where information is stored while it is being used by the computer’s processor, operating system, programs, and other devices on your computer. RAM is designed so that any of the information stored on it can be read in any order without losing performance. This makes RAM faster and more efficient to store data compared to slower devices such as an HDD or CD-ROM. Computer Memory When you are using your computer it copies information that it is currently using, such as parts of the operating system or currently running programs, into RAM so that it can work faster. The more RAM that the computer has, the less often it needs to get information off of the much slower HDD. To use a comparison, think of your HDD as a well. The information on the HDD is the water in the well, and the RAM is a bucket. The bigger your bucket, the fewer trips you have to make to the well to get the water you need. One characteristic of RAM is that it is volatile. This means that when you turn off the computer, any information in the RAM is erased. To protect against loss of information, an operating system will copy any data that it needs to the HDD so that it is available the next time you start the computer. RAM comes in different speeds and types. When you upgrade your computer’s memory, it is important that you ensure that you choose a speed and type of RAM that is compatible with a computer’s motherboard. A great tool for finding out what kind of memory your computer uses is Crucial’s Memory Advisory. * Expansion Cards An expansion card is a device that is inserted into special slots on the motherboard and provides the computer with additional functions, resources, or features. There are a number of different kinds of expansion cards available; two of the most common being video cards, which provide increased graphics processing ability, and sound cards, which enhance the audio ability of the computer. Some expansion cards such as video cards also include their own processor, memory, and even cooling devices such as fans or heat sinks. When purchasing expansion cards there are a number of important factors to consider. First and foremost is the type of connection that the expansion card requires. There are a number of different standards for expansion slots, and motherboards have only a limited number of each kind of slot. Before purchasing you need to ensure that your motherboard has the required slots available for use. Another important factor is the size of the expansion card. The card needs to be able to fit inside your computer case, and should not make contact with any other parts of the computer except for the motherboard. Finally, you should ensure that your PSU can output enough power to support all your connected expansion cards. If the PSU cannot supply the computer with enough electricity then one or more of your devices will fail to function. Two common types of expansion cards are sound and video graphic cards * Sound Cards Sound cards are a kind of expansion card which deals with audio input and output. Sound cards generally fill two functions. First, sound cards enhance the sound processing capability of the computer, allowing for the creation and output of more complex sounds. Secondly, sound cards often possess input and output ports that allow for other audio devices such as microphones or speakers to be connected to it. Sound Card * Video Cards A video card is a type of expansion card which increases the computer’s ability to handle different kinds of visual output. Video cards have two main functions. First, while nearly all modern motherboards have some basic graphics capabilities built in, a video card can handle graphics issues much more effectively than the graphic chips built into the motherboard. As a result, a video card allows for the creation and display of more complex and detailed images without putting an additional strain on the CPU. Additionally, since many video cards have their own memory, this leaves more of the general computer memory available for other purposes. Second, many video cards add additional functions to the computer such as video capture, a TV-tuner which allows you to watch TV on your computer, or the ability to connect multiple monitors to the computer. Video Graphics Card * External Ports As mentioned above in the motherboard section, a number of connectors on the motherboard are accessible from the back panel of the computer case. These connections are called external ports because they can be accessed from outside the computer case. There are a number of different kinds of connections available that include: * VGA or DVI Connector- These ports are used for connecting a monitor or other display device to your computer. * Ethernet Port – This port allows you to connect your computer to a network or the Internet. * HDMI – Allows you to connect your computer a High Definition display or TV. * eSATA – These ports allow you to connect an external SATA hard drive to your computer. * USB Port – A common connector for external devices. More information about USB ports can be found below. External Ports on the back of a computer Virtually every modern PC also includes one or more USB, or Universal Serial Bus, ports. There are two primary kinds of USB ports in use right now: USB 2.0 and USB 3.0. USB 3.0 ports can move data much more quickly than USB 2.0 ports. However, the connected device must be designed to take advantage of USB 3.0 technology in order to use the increased speed. USB ports and devices are both backwards and forwards compatible. This means that you can plug any standard USB device into any standard USB port, and the device will function. However, if the USB version of the device and the port do not match then the device can only transfer data to and from the PC at a maximum rate set by the lower of the two versions. For example, if you connect a USB 3.0 device to a USB 2.0 port, the device will only transfer data at a maximum rate of 60 megabytes per second, which is the maximum rate for USB 2.0 technology. When purchasing an external device such as a monitor, keyboard, mouse, or printer it is important to ensure that you have the correct kind of port available for use. Otherwise you will be unable to use the device. Conclusion As you can see, a computer is more than that box sitting on the side of your desk. In fact it is a very complex machine comprised of numerous parts, cables, and devices that all need to properly work together in order for the computer to operate correctly. Having this basic understanding of the parts of your computer is important for any computer user. Whether you need to purchase a new one, upgrade an existing one, or repair a broken one, you now have the knowledge to understand what you are looking at.