Wednesday, October 30, 2019

Conduct a rhetorical analysis of Krishnas replay to Arjuna in The Essay

Conduct a rhetorical analysis of Krishnas replay to Arjuna in The Bhagavad Gita - Essay Example Is it morally right to claim victory over this? As a philosophical poem, Bhagavad-Gita does not provide simple answers to this problem. The story acts as an equipment for the living which rotates on cycle of birth and death. This is because, the philosophy provides some aspect of life which cuts across the universe. Krishna uses dialogue to communicate the Hindu teachings to Arjuna. Arjuna had lost all his will among the Kauravas whereby he was fighting against his family members Johnson, Kathryn Ann. Ethical responsibility is demonstrated here. He favored his family members while in the battlefield. This brings out the tone of being loving and mindful about his own culture and his family. We can call all these as ethic of Divinity, Ethic of community and ethic of autonomy. In conclusion, the rhetoric analysis of this book brings out the tone of war and its cultural aspect. It also brings out the persona and the figurative language used to bring out a concreate message of the Indian

Monday, October 28, 2019

Single parenting households Essay Example for Free

Single parenting households Essay Single-parent families in todays society have their share of daily struggles and long-term disadvantages. The issues of expensive day care, shortage of quality time with children, balance of work and home duties, and economic struggle are among the seemingly endless problems these families must solve. As a subject for my photographic essay, I illustrate the concept of the single-family and their corresponding struggles with daily life. As many single-parent households are female-headed, their economic burden is much greater than that of a single-father family. This issue results from the fact that single women typically do not earn the same income as a single man; thus, there is a consequent economic struggle not experienced in the single-father household. An offshoot of this economic struggle is the balance of work and family duties. Single mothers often must work overtime shifts to compensate for the low salaries, thus taking time away from their children and other domestic chores. This results in a child that is home alone, without adult supervision, or placed in a daycare service for up to 8-10 hours per day. Government subsidized daycare is not yet a realized dream, and many single mothers pay large fees for this service. Also included in this essay is an illustration of the perspectives on child adjustment following a divorce. The photographs incorporate the parental loss, parental adjustment, parental conflict and economic hardships outlined in Newman and Grauerholz (2002). I expect my finished essay to evoke a well-founded respect for single-parent households and enhance a general understanding of the circumstances inherent therein. Two parents are always better than one according to the parental loss perspective. In a two-earner family, one parent may be able to stay at home with the children. But in a single-parent family, the parent rarely has the option of staying home to care for children full-time. Finding affordable, available childcare is likely to be a challenge. According to the parental conflict perspective, children suffer from witnessing spousal abuse. The parental adjustment perspective suggests that children in single parent families suffer because their parents have difficulty adjusting and functioning. According to the economic hardship perspective, children suffer from lower incomes more common among* single-parent families. Children in single-mother households are especially vulnerable because women tend to earn lower pay.

Saturday, October 26, 2019

George Orwells Symbolism and Derivation for Nineteen Eighty-Four (1984

George Orwell's Symbolism and Derivation for 1984 George Orwell's 1984 had a profound effect upon the way people thought during the mid 20th century. The book signified Orwell's most complex novel which told the story of Arthur Koestler and the countless others who suffered because of the totalitarian governments in Eastern Europe (Meyers 114). When 1984 was published in 1949, the Cold War had just begun. The novel's ending was pessimistic and thus seemed as an attack on communism. The novel was also considered to be the prophecy of what would happen to the West if the communist ideology spread. The idea for writing 1984 also came from an American economist named James Burnham. Burnham predicted that if Germany had won the war, the world would be divided into three areas (Meyers 125). This idea is used by Orwell because the society in 1984 is centered around 3 areas- Oceania, Eurasia, and Eastasia. Koestler, a refugee from Fascist and Communist prisons, was the model for protagonist of 1984 - Winston Smith. Orwell chose this name because he felt that the reader could relate to Winston. By using the last name 'Smith' it conveys the universal appeal of everyman. The name Winston was chosen because Winston Churchill ruled England at the time and was seen as a hero. (Gardner 118) From this, Orwell puts forth the idea that anyone can do anything and rise to greatness. The physical setting of 1984 came from the actual way London looked during the war years. The Ministry of Truth, the place where Winston worked was derived British Broadcast Company (BBC) building. Inside the BBC, there was a restaurant that had a dish called 'Victory Pie'. And thus, Orwell used Victory as the word that proceed as all ... ...ements. So far from endeavoring to influence the future, he simply lies down and lets things happen to him." (Bookshelf 1994) In essence Orwell is trying to let people know that they should be aware about what is going on around them. You can't expect everything to fall in your lap, you have to go out and get it, or someday someone will get it for you- and it will be too late to change it. Human nature wants to be passive and have decisions made for them. through this venue, free will and choice is lost and a totalitarian government will prevail causing democracy to be forgotten. Works Cited Gardner, Averil. George Orwell. Boston: Twayne Publishers, 1987. Meyers, Valerie. George Orwell. New York: St. Martin's Press, 1991. "Orwell, George." Microsoft Bookshelf, 1994. Reilly, Patrick.George Orwell, The Age's Adversary. New York: St Martin's Press,1986.

Thursday, October 24, 2019

Damien Cave Summary

COMM200-U406/02/13 Nicole Prince The article â€Å"On Sale at Old Navy: Cool Clothes for Identical Zombies! † written by Damien Cave explains how as a society we are swayed by the flash of big corporations and in turn are loosing what real culture we have left. Damien Cave starts the article off with a scenario showing a man named â€Å"Thomas Frank†. As Frank walks by a heavily decorated Old Navy he shows his disgust saying †Oh God, this is disgusting†. Thomas Frank is a pioneering social critic, writing articles on how businesses adopted â€Å"cool anti-corporate culture†.As the article progresses we find that these businesses offer nothing more than poor quality merchandise at a low price, and the consumer is lured in by the promise of quality for less. Stores such as Old Navy and Ikea use marketing tricks to keep it's customer coming back for more. Ikea sets it's store up like a maze where the exit is placed only at the registers, the room models persuade the consumer they need everything they see. Old Navy hands out extra large shopping bags as a gesture of good customer service but can influence over spending.Damien Cave brings these issues up so that we the reader are aware of such trickery used by certain chain businesses. Society is so accustomed to these marketing schemes we don't realize we are replicating each others homes but in different variations; we can all buy the same sofa and not notice. We are lead to believe that we can find happiness in our belongings but that is far from the truth. This merchandise is poor in quality and can cause us to spend more in the end on replacements and repairs. These companies are scamming the general public into believing they are getting a deal and in return we are getting cookie cutter home decor.

Wednesday, October 23, 2019

Computer Hardware Essay

I. LECTURE OVERVIEW Foundation Concepts: Computer Hardware, reviews trends and developments in microcomputer, midrange, and mainframe computer systems; basic computer system concepts; and the major types of technologies used in peripheral devices for computer input, output, and storage. Computer Systems – Major types of computer systems are summarized in Figure 13.2. A computer is a system of information processing components that perform input, processing, output, storage, and control functions. Its hardware components include input and output devices, a central processing unit (CPU), and primary and secondary storage devices. The major functions and hardware in a computer system are summarized in Figure 13.9 Microcomputer Systems – Microcomputers are used as personal computers, network computers, personal digital assistants, technical workstations, and information appliances. Like most computer systems today, microcomputers are interconnected in a variety of telecommunications networks. This typically includes local area networks, client/server networks, intranets and extranets, and the Internet. Other Computer Systems – Midrange computers are increasingly used as powerful network servers, and for many multiuser business data processing and scientific applications. Mainframe computers are larger and more powerful than most midsize computers. They are usually faster, have more memory capacity, and can support more network users and peripheral devices. They are designed to handle the information processing needs of large organizations with high volumes of transaction processing, or with complex computational problems. Supercomputers are a special category of extremely powerfu l mainframe computer systems designed for massive computational assignments. II. LEARNING OBJECTIVES Learning Objective †¢ Identify the major types, trends, and uses of microcomputer, midrange and mainframe computer systems. †¢ Outline the major technologies and uses of computer peripherals for input, output, and storage. †¢ Identify and give examples of the components and functions of a computer system. †¢ Identify the computer systems and peripherals you would acquire or recommend for a business of your choice, and explain the reasons for your selections. III. LECTURE NOTES Section 1: Computer Systems: End User and Enterprise Computing INTRODUCTION All computers are systems of input, processing, output, storage, and control components. Technology is evolving at a rapid pace, and new forms of input, output, processing, and storage devices continue to enter the market. Analyzing City of Richmond and Tim Beaty Builders We can learn a lot about innovative business uses of PDAs from this case. Take a few minutes to read it, and we will discuss it (See City of Richmond and Tim Beaty Builders in Section IX). TYPES OF COMPUTER SYSTEMS -[Figure 13.2] There are several major categories of computer systems with a variety of characteristics and capabilities. Thus, computer systems are typically classified as: †¢ Mainframe computers †¢ Midrange computers †¢ Microcomputers These categories are attempts to describe the relative computing power provided by different computing platforms or types of computers therefore, they are not precise classifications. Some experts predict the merging or disappearance of several computer categories. They feel that many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks of microcomputers and servers. Most recently, some  industry experts have predicted that the emergence of network computers and information appliances for applications on the Internet and corporate intranets will replace many personal computers, especially in large organisations and in the home computer market. MICROCOMPUTER SYSTEMS Microcomputers are the smallest but most important categories of computers systems for business people and consumers. They are also referred to as personal computers (or PCs). The computing power of current microcomputers exceeds that of the mainframe computers of previous generations at a fraction of their cost. They have become powerful-networked professional workstations for use by end users in business. Microcomputers  categorised by size 1. Handheld 2. Notebook 3. Laptop 4. Portable 5. Desktop 6. Floor-standing Microcomputers  categorised by use 1. Home 2. Personal 3. Professional 4. Workstation 5. Multi-user Systems Microcomputers  categorised by special purpose 1. Workstation Computers 2. Network Servers 3. Personal Digital Assistants Workstation Computers – some microcomputers are powerful workstation  computers (technical work stations) that support applications with heavy mathematical computing and graphics display demands such as computeraided design (CAD) in engineering, or investment and portfolio analysis in the securities industry. Network Servers – are usually more powerful microcomputers that co-ordinate telecommunications and resource  sharing in small local area networks (LANs), and Internet and intranet websites. This is the fastest growing microcomputer application category. Network Computers: †¢ Network Computers (NCs) are a major new microcomputer category designed primarily for use with the Internet and corporate intranets by clerical workers, operational employees, and knowledge workers with specialised or limited computing applications. In-between NCs and full-featured PCs are stripped-down PCs known as NetPCs or legacy-free PCs. NetPCs are designed for the Internet and a limited range of applications within a company. Examples are: Dell’s Webpc, Compaq’s IPaq, HP’s e-PC, and eMachine’s eOne. Network computers (also called thin clients) are low-cost, sealed, networked microcomputers with no or minimal disk storage. Users of network computers depend primarily on Internet and intranet servers for their operating system and web browser, Java-enabled application software, and data access and storage. Main attractions of network computers over full-featured PCs are their low cost to: †¢ Purchase †¢ Upgrade †¢ Maintenance †¢ Support Other benefits to businesses include: †¢ Ease of software distribution and licensing †¢ Computing platform standardisation †¢ Reduced end user support requirements †¢ Improved manageability through centralised management and enterprisewide control of computer network resources. Information Appliances The market is offering a number of gadgets and information appliances that offer users the capability to perform enable host of basic computational chores. Examples of some information appliances include: †¢ Personal Digital Assistants – (PDAs) are designed for convenient mobile communications and computing. PDAs use touch screens, pen-based handwriting recognition, or keyboards to help mobile workers send and receive E-mail, access the Web, and exchange information such as appointments, to-do lists, and sales contacts with their desktop PCs or web servers. †¢ Set-top boxes and video-game consoles that connect to home TV sets. These devices enable you to surf the Web or send and receive E-mail and watch TV programs or play video games at the same time. †¢ Wireless PDAs and cellular and PCS phones and wired telephone-based appliances that can send and receive E-mail and access the Web. Computer Terminals Computer terminals are undergoing a major conversion to networked computer devices. For example: †¢ Dumb terminals are keyboard/video monitor devices with limited processing capabilities, to intelligent terminals, which are modified networked PCs, network computers or other microcomputer-powered network devices. Intelligent terminals can perform data entry and some information processing tasks independently. †¢ Networked terminals which may be Windows terminals that are dependent on network servers for Windows software, processing power, and storage, or Internet terminals, which depend on Internet or intranet website servers for their operating systems and application software. †¢ Transaction terminals are a form of intelligent terminal. Uses can be found in banks retail stores, factories, and other work sites. Examples are ATM’s, factory production recorders, and POS terminals. MIDRANGE COMPUTER SYSTEMS Midrange computers, including minicomputers and high-end network servers, are  multi-user systems that can  manage networks of PCs and terminals. Characteristics of midrange computers include: †¢ Generally, midrange computers are general-purpose computers that are larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframes. †¢ Cost less to buy, operate, and maintain than mainframe computers. †¢ Have become popular as powerful network servers to help manage large Internet websites, corporate intranets and extranets, and client/server networks. †¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. †¢ Data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. †¢ First became popular as minicomputers for scientific research, instrumentation systems, engineering analysis, and industrial process monitoring and control. Minicomputers could easily handle such uses because these applications are narrow in scope and do not demand the processing versatility of mainframe systems. †¢ Serve as industrial process-control and manufacturing plant computers and they play a major role in computeraided manufacturing (CAM). †¢ Take the form of powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications. †¢ Are used as front-end computers to assist mainframe computers in telecommunications processing and network management. †¢ Can function in ordinary operating environments (do not need air conditioning or electrical wiring). †¢ Smaller models of minicomputers do not need a staff of specialists to operate them. MIDRANGE COMPUTER APPLICATIONS Serve as industrial process-control and manufacturing plant computers. Play a major role in computer-aided manufacturing (CAM). Serve as powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications Serve as front-end computers to assist mainframe computers in telecommunications processing and network management. Midrange Computer as Network Server: †¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. †¢ Other applications, like data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. †¢ Serve as powerful network servers to help manage large Internet web sites, corporate Intranets and extranets, and client/server networks MAINFRAME COMPUTER SYSTEMS Mainframe computers are large, fast, and powerful computer systems. Characteristics of mainframe computers include: †¢ They are physically larger and more powerful than micros and minis. †¢ Can process hundreds of millions of instructions per second (MIPS). †¢ Have large primary storage capacities. Main memory capacity can range from hundreds of megabytes to many gigabytes of primary storage. †¢ Mainframes have slimmed down drastically in the last few years, dramatically reducing air-conditioning needs, electronic power consumption, and floor space requirements, and thus their acquisition and operating costs. †¢ Sales of mainframes have increased due to cost reductions and the increase  in applications such as data mining and warehousing, decision support, and electronic commerce. Mainframe Computer Applications: †¢ Handle the information processing needs of major corporations and government agencies with many employees and customers. †¢ Handle enormous and complex computational problems. †¢ Used in organisations processing great volumes of transactions. †¢ Handle great volumes of complex calculations involved in scientific and engineering analyses and simulations of complex design projects. †¢ Serve as superservers for the large client/server networks and high-volume Internet web sites of large companies. †¢ Are becoming a popular business-computing platform for data mining and warehousing, and electronic commerce applications. Supercomputer Systems: The term supercomputer describes a category of extremely powerful computer systems specifically designed for scientific, engineering, and business applications requiring extremely high-speeds for massive numeric computations. Supercomputer Applications: †¢ Used by government research agencies, large universities, and major corporations. †¢ Are used for applications such as global weather forecasting, military defence systems, computational cosmology and astronomy, microprocessor research and design, large scale data mining, large time-sharing networks, and so on. †¢ Use parallel processing architectures of interconnected microprocessors (which can execute many instructions at the same time in parallel). †¢ Can perform arithmetic calculations at speeds of billions of floating-point operations per second (gigaflops). Teraflop (1 trillion floating-point operations per second) supercomputers, which use advanced massively parallel  processing (MPP) designs of thousands of interconnected microprocessors, are becoming available. †¢ Purchase price for large supercomputers are in the $5 million to $50 million range. Mini-supercomputers: The use of symmetric multiprocessing (SMP) and distributed shared memory (DSM) designs of smaller numbers of interconnected microprocessors has spawned a breed of mini-supercomputer with prices that start in the hundreds of thousands of dollars. TECHNICAL NOTE: THE COMPUTER SYSTEM CONCEPTS – [Figure 13.9] As a business professional, you do not need a detailed technical knowledge of computers. However, you do need to understand some basic facts and concepts about computer systems. This should help you be an informed and productive user of computer system resources. A computer is a system, an interrelated combination of components that perform the basic system functions of input, processing, output, storage, and control, thus providing end users with a powerful information-processing tool. Understanding the computer as a computer system is vital to the effective use and management of computers. A computer is a system of hardware devices organised according to the following system functions: †¢ Input. Examples of some input devices of a computer system include: 1. Keyboards 2. Touch Screens3. Light Pens 4. Electronic Mice 4. Optical Scanners 5. Voice Input They convert data into electronic machine-readable form for direct entry or through a telecommunications network into a computer system. Processing. The central processing unit (CPU) is the main processing component of a computer system. (In microcomputers, it is the main microprocessor). One of the CPU’s major components is the arithmetic-logic unit (ALU) that performs the arithmetic and logic functions required in computer processing. Components of the CPU include: 1. Control Unit 2. Arithmetic-Logic Unit 3. Primary Storage Unit Output. Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users. Examples of output devices include: 1. Video Display Units 2. Audio Response Units 3. Printers Storage. The storage function of a computer system is used to store data and program instructions needed for processing. Storage devices include: 1. Primary Storage Unit (main memory) 2. Secondary Storage Devices (magnetic disk and tape units, optical disks) Control. The control unit of a CPU interprets computer program instructions and transmits directions to the other components of the computer system. Computer Processing Speeds: Operating speeds of computers are measured in a number of ways. For example: †¢ Milliseconds – Thousands of a second. Microseconds – Millionths of a second. Nanoseconds – Billionth of a second Picosecond – Trillionth of a second Other terminology used includes: Teraflop – used by some supercomputers MIPS – Million instructions per second Megahertz (MHz) – Millions of cycles per second Gigahertz (GHz) – Billions of cycles per second Clock Speed – used to rate microprocessors by the speed of their timing circuits and internal clock. Section II: Computer Peripherals: Input, Output, and Storage Technologies INTRODUCTION A computer is just a high-powered â€Å"processing box† without peripherals. Your personal computing needs will dictate the components you choose for our particular computing needs. Analyzing United Technologies and Eastman Kodak We can learn a lot about the business value of consolidating computer operations and systems from this case. Take a few minutes to read it, and we will discuss it (See United Technologies and Eastman Kodak in Section IX). PERIPHERALS Peripherals are the generic name for all input, output, and secondary storage devices that are part of a computer system. Peripherals depend on direct connections or telecommunications links to the central processing unit of a  computer system. Thus, all peripherals are online devices, that is, separate from, but can be electronically connected to and controlled by, a CPU. This is the opposite of off-line devices, which are separate from and not under the control of the CPU. INPUT TECHNOLOGY There has been a major trend toward the increased use of input technologies that provide a more natural user interface for computer users. More and more data and commands are being entered directly and easily into computer systems through pointing devices like electronic mice and touch pads, and technologies like optical scanning, handwriting recognition, and voice recognition. POINTING DEVICES Keyboards are still the most widely used devices for entering data and text into computer systems. However, pointing devices are a better alternative for issuing commands, making choices, and responding to prompts displayed on your video screen. They work with your operating system’s graphical user interface (GUI), which presents you with icons, menus, windows, buttons, bars, and so on, for your selection. Examples of pointing devices include: †¢ Electronic Mouse – A device used to move the cursor on the screen, as well as to issue commands and make icon and menu selections. †¢ Trackball – A device used to move the cursor on the display screen. Pointing Stick – A small buttonlike device, sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Touchpad – A small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Touch Screens – A device that accepts data input by the placement of a finger on or close to the CRT screen. PEN-BASED COMPUTING Pen-based computing technologies are being used in many hand-held computers and personal digital assistants. These small PCs and PDAs contain fast processors and software that recognises and digitises handwriting, hand printing, and hand drawing. They have a pressure-sensitive layer like a graphics pad under their slatelike liquid crystal display (LCD) screen. A variety of penlike devices are available: Digitizer Pen – A photoelectronic device that can be used as a pointing device, or used to draw or write on a pressure-sensitive surface of a graphics tablet. Graphics Tablet – A device that allows an end user to draw or write on a pressure-sensitive tablet and has their handwriting or graphics digitised by the computer and accepted as input. SPEECH RECOGNITION SYSTEMS Speech recognition and voice response (in their infancy) promise to be the easiest method of data entry, word processing, and conversational computing, since speech is the easiest, most natural means of human communication. Speech recognition systems analyse and classify speech or vocal tract patterns and convert them into digital codes for entry into a computer system. Early voice recognition products used discrete speech recognition, where you had to pause between each spoken word. New continuous speech recognition (CSR) software recognises controlled, conversationally paced speech. Examples of continuous speech recognition software include: †¢ NaturallySpeaking by Dragon Systems †¢ ViaVoice by IBM †¢ VoiceXpress by Lernout & Hauspie †¢ FreeSpeech by Philips Areas where speech recognition systems are used include: †¢ Manufacturers use it for inspection, inventory, and quality control †¢ Airlines and parcel delivery companies use it for voice-directed sorting of baggage and parcels †¢ Voice activated GPS systems are being used in advanced car design †¢ Physicians use it to enter and printout prescriptions †¢ Gemmologists use it to free up their hands when inspecting and grading precious stones †¢ Handicapped individuals use voice-enabled software to operate their computers, e-mail, and surf the World Wide Web. Speaker-independent voice recognition systems allow a computer to understand a few words from a voice it has never heard before. They enable computers to respond to verbal and touch-tone input over the telephone. Examples include: †¢ Computerized telephone call switching †¢ Telemarketing surveys †¢ Bank pay-by-phone bill-paying services †¢ Stock quotations services †¢ University registration systems †¢ Customer credit and account balance inquiries OPTICAL SCANNING Optical scanning devices read text or graphics and convert them into digital input for a computer. Optical scanning enables the direct entry of data from source documents into a computer system. Popular uses of optical scanning include: †¢ Scanning pages of text and graphics into your computer for desktop publishing and web publishing applications. †¢ Scan documents into your system and organize them into folders as part of a document management library system for easy reference or retrieval.  There are many types of optical scanners, but they all employ photoelectric devices to scan the characters being read. Reflected light patterns of the  data are converted into electronic impulses that are then accepted as input into the computer system. Optical scanning technology known as optical character recognition (OCR) can read special-purpose characters and codes. OCR scanners are used to read characters and codes on:   Merchandise tags Product labels Credit card receipts Utility bills Insurance premiums Airline tickets Sort mail Score tests Process business and government forms Devices such as handheld optical scanning wands are used to read OCR coding on merchandise tags and other media. Many business applications involve reading bar code, a code that utilises bars to represent characters. One common example is the Universal Produce Code (UPC) bar coding that you see on packages of food items and many other products. OTHER INPUT TECHNOLOGIES Magnetic stripe technology is a familiar form of data entry that helps computers read credit cards. The dark magnetic stripe on the back of such cards is the same iron oxide coating as on magnetic tape. Smart cards that embed a microprocessor chip and several kilobytes of memory into debit, credit, and other cards are popular in Europe, and becoming available in the United States. Digital cameras and digital video cameras enable you to shoot, store, and download still photos or full motion video with audio into your PC. Magnetic ink character recognition (MICR) is machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. OUTPUT TECHNOLOGIES Computers provide information in a variety of forms. Video displays and printed documents have been, and still are, the most common forms of output from computer systems. But other natural and attractive output technologies such as voice response systems and multimedia output are increasingly found along with video displays in business applications. VIDEO OUTPUT Video displays are the most common type of computer output. Most desktop computers rely on video monitors that use cathode ray tube (CRT) technology. Usually, the clarity of the video display depends on the type of video monitor you use and the graphics circuit board installed in your computer. A high-resolution, flicker-free monitor is especially important if you spend a lot of time viewing multimedia on CDs or the Web, or complex graphical displays of many software packages. The biggest use of liquid crystal displays (LCDs) is to provide a visual display capability for portable microcomputers and PDAs. LCD displays need significantly less electric current and provide a thin, flat display. Advances in technology such as active matrix and dual scan capabilities have improved the color and clarity of LCD displays. PRINTED OUTPUT After video displays, printed output is the most common form of output displays. Most personal computer systems rely on inkjet or laser printers to produce permanent (hard copy) output in high-quality printed form. Printed output is still a common form of business communications, and is frequently required for legal documentation. †¢ Inkjet printers – Spray ink onto a page one line at a time. They are popular, low-cost printers for microcomputer systems. They are quiet, produce several pages per minute of high-quality output, and can print both black-and-white and high-quality colour graphics. Laser Printers – Use an electrostatic process similar to a photocopying machine to produce many pages per minute of high-quality black-and-white output. More expensive colour laser printers and multifunction inkjet and laser models that print, fax, scan, and copy are other popular choices for business offices. STORAGE TRADE-OFFS Data and information need to be stored after input, during processing, and before output. Computer-based information systems rely primarily on the memory circuits and secondary storage devices of computer systems to accomplish the storage function. Major trends in primary and secondary storage methods: †¢ Progress in very-large scale integration (VLSI), which packs millions of memory circuit elements on tiny semiconductor memory chips, are responsible for continuing increases in the main-memory capacity of computers. †¢ Secondary storage capacities are also expected to escalate into the billions and trillions of characters, due primarily to the use of optical media.  Storage Trade-offs: Speed, capacity, and cost relationships. †¢ Note the cost/speed/capacity trade-offs as one moves from semiconductor memories to magnetic media, such as magnetic disks and tapes, to optical disks. †¢ High-speed storage media cost more per byte and provide lower capacities. †¢ Large capacity storage media cost less per byte but are slower †¢ Semiconductor memories are used mainly for primary storage, though they are sometimes used as high-speed secondary storage devices. †¢ Magnetic disk and tape and optical disk devices are used as secondary storage devices to greatly enlarge the storage capacity of computer systems. †¢ Most primary storage circuits use RAM (random access memory) chips, which lose their contents when electrical power is interrupted †¢ Secondary storage devices provide a more permanent type of storage media for storage of data and programs. Computer Storage Fundamentals: [Figure 13.20] Data is processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the computer’s circuitry in the media it uses. This is called a â€Å"two-state† or binary representation of data, since the computer and media can exhibit only two possible states or conditions – ON (1) or OFF (0). Computer storage elements: †¢ Bit – is the smallest element of data, (binary digit) which can have a value of zero or one. The capacity of  memory chips is usually expressed in terms of bits. Byte – is the basic grouping of bits that the computer operates as a single unit. It typically consists of 8 bits and is used to represent one character of data in most computer coding schemes (e.g. 8 bits = 1 byte). The capacity of a computer’s memory and secondary storage devices is usually expressed in terms of bytes. ASCII (American Standard Code for Information Interchange) EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced: EB SEE DICK Storage capacities are frequently measured in: Kilobyte = 1,000 bytes Megabyte = 1,000,000 bytes Gigabyte = 1,000,000,000 bytes Terabyte = 1,000,000,000,000 bytes Petabyte = 1,000,000,000,000,000 bytes Exabyte = 1,000,000,000,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes Yottabyte = 1,000,000,000,000,000,000,000,000 bytes Direct and Sequential Access †¢ Direct Access – Primary storage media such as semiconductor memory chips are called direct access or random access memories (RAM). Magnetic disk devices are frequently called direct access storage devices (DASDs). The terms direct access and random access describe the same concept. They mean that an element of data or instructions can be directly stored and retrieved by selecting and using any of the locations on the storage media. They also mean that each storage position (1) has a unique address and (2) can be individually accessed in approximately the same length of time without having to search through other storage positions. Sequential Access – sequential access storage media such as magnetic tape do not have unique storage addresses that can be directly addressed. Instead, data must be stored and retrieved using a sequential or serial process. Data are recorded one after another in a predetermined sequence on a storage medium. Locating an individual item of data requires searching much of the recorded data on the tape until the desired item is located. SEMICONDUCTOR MEMORY The primary storage (main memory) on most modern computers consists of microelectronic semiconductor memory circuits. Plug-in memory circuit boards containing 32 megabytes or more of memory chips can be added to your PC to increase its memory capacity. Specialized memory can help improve your computer’s performance. Examples include: †¢ External cache memory of 512 kilobytes to help your microprocessor work faster †¢ Video graphics accelerator cards with 16 megabytes of RAM are used for faster and clearer video performance †¢ Removable credit-card-size and smaller â€Å"flash memory† RAM cards provide several megabytes of erasable direct access storage for PDAs or hand-held PCs. Some of the major attractions of semiconductor memory are: †¢ Small size †¢ Fast speed †¢ Shock and temperature resistance One major disadvantage of most semiconductor memory is: †¢ Volatility – Uninterrupted electric power must be supplied or the contents of memory will be lost (except with  read only memory, which is permanent). There are two basic types of semiconductor memory: †¢ Random Access Memory (RAM) – these memory chips are the most widely used primary storage medium. Each memory position can be both read and written, so it is also called read/write memory. This is a volatile memory. †¢Ã‚  Read Only Memory (ROM) – Non-volatile random access memory chips are used for permanent storage. ROM can be read but not erased or overwritten. Instructions and programs in primary storage can be permanently â€Å"burned in†Ã‚  to the storage cells during manufacturing. This permanent software is also called firmware. Variations include PROM (programmable read only memory) and EPROM (erasable programmable read only memory), which can be permanently or temporarily programmed after manufacture. MAGNETIC DISK STORAGE These are the most common forms of secondary storage for modern computer systems. That’s because they provide fast access and high storage capacities at a reasonable cost. Characteristics of magnetic disks: †¢ Disk drives contain metal disks that are coated on both sides with an iron oxide recording material. †¢ Several disks are mounted together on a vertical shaft, which typically rotates the disks are speeds of 3,600 to 7,600 revolutions per minute (rpm) †¢ Access arms between the slightly separated disks to read and write data on concentric, circular tracks position electromagnetic read/write heads. †¢ Data are recorded on tracks in the form of tiny magnetized spots to form the binary digits of common computer codes. †¢ Thousands of bytes can be recorded on each track, and there are several hundred data tracks on each disk surface, which provides you with billions of storage positions for software and data. Types of Magnetic Disks There are several types of magnetic disk arrangements, including disk cartridges as well as fixed disk units. Removable disk devices are popular because they are transportable and can be used to store backup copies of your data off-line for convenience and security. Floppy Disks, or magnetic disks, consist of polyester film disks covered with an iron oxide compound. A single disk is mounted and rotates freely inside a protective flexible or hard plastic jacket, which has access openings to accommodate the read/write head of a disk drive unit. The 3-1/2-inch floppy disk, with capacities of 1.44 megabytes, is the most widely used version, with a newer Superdisk technology offering 120 megabytes of storage. Hard Disk Drives combine magnetic disks, access arms, and read/write heads into a sealed module. This allows higher speeds, greater data-recording densities,  and closer tolerances within a sealed, more stable environment. Fixed or removable disk cartridge versions are available. Capacities of hard drives range from several hundred megabytes to many gigabytes of storage. RAID Storage Disk arrays of interconnected microcomputer hard disk drives have replaced large-capacity mainframe disk drives to provide many gigabytes of online storage. Known as RAID (redundant arrays of independent disks), they combine from 6 to more than 100 small hard disk drives and their control microprocessors into a single unit. Advantages of RAID disks include: †¢ Provide large capacities with high access speeds since data is accessed in parallel over multiple paths from many disks. †¢ Provide fault tolerant capability, since their redundant design offers multiple copies of data on several disks. If one disk fails, data can be recovered from backup copies automatically stored on other disks. †¢ Storage area networks (SANs) are high-speed fibre channel local area networks that can interconnect many RAID units and share their combined capacity through network servers for many users. MAGNETIC TAPE STORAGE Magnetic Tape is still being used as a secondary storage medium in business applications. The read/write heads of magnetic tape drives record data in the form of magnetised spots on the iron oxide coating of the plastic tape. Magnetic tape devices include tape reels and cartridges in mainframes and midrange systems, and small cassettes or cartridges for PCs. These devices serve as slower, but lower cost, storage to supplement magnetic disks to meet massive data warehouse and other business storage requirements. Other major applications for magnetic tape include long-term archival storage and backup storage for PCs and other systems. OPTICAL DISK STORAGE Optical disk storage involves technology, which is based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. †¢Ã‚  CD-ROM – A common type of optical disk used on microcomputers. They are used for read only storage. Storage is over 600 megabytes per disk. This is equivalent to over 400 1.44-megabyte floppy disks or 300,000 double-spaced pages of text. Data are recorded as microscopic pits in a spiral track, and are read using a laser device. Limitation: Recorded data cannot be erased †¢Ã‚  CD-R – (Compact disk recordable) is another optical disk technology. It enables computers with CD-R disk drive units to record their own data once on a CD, and then be able to read the data indefinitely. Limitation: Recorded data cannot be erased †¢Ã‚  CD-RW – (CD-rewritable) optical disk systems have now become available which record and erase data by using a laser to heat a microscopic point on the disk’s surface. In CD-RW versions using magneto-optical technology, a magnetic coil changes the spot’s reflective properties from one direction to another, thus recording a binary one to zero. A laser device can then read the binary codes on the disk by sensing the direction of reflected light. †¢Ã‚  DVD – (Digital Video Disk or Digital Versatile Disk) can hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. The large capacities and high- quality images and sound of DVD technology are expected to eventually replace CD-ROM and CD-RW technologies for data storage, and  promise to accelerate the use of DVD drives for multimedia products that can be used in both computers and home entertainment systems. †¢ DVD-ROM is beginning to replace magnetic tape videocassettes for movies and other multimedia products. †¢ DVD – RAM is being used for backup and archival storage data and multimedia files. Business Applications One of the major uses of optical disks in mainframe and midrange systems is in image processing, where longterm archival storage of historical files of document images must be maintained. Mainframe and midrange computer versions of optical disks use 12-inch plastic disks with capacities of several gigabytes, with up to 20 disks held in jukebox drive units. WORM – (Write Once, Read Many) versions of optical disks are used to store data on the disk. Although data can only be stored once, it can be read an infinite number of times. One of the major business uses of CD-ROM disks for personal computers is to provide a publishing medium for fast access to reference materials in a convenient, compact form. These include: †¢ Catalogs †¢ Directories †¢ Manuals †¢Ã‚  Periodical abstracts †¢Ã‚  Part listings †¢Ã‚  Statistical databases of business activity and economic activity Interactive multimedia applications in business, education, and entertainment using CD-ROM and DVD disks. Optical disks have become a popular storage medium for image processing and multimedia business applications and they appear to be a promising alternative to magnetic disks and tape for very large mass storage capabilities for enterprise computing systems. However, rewritable optical technologies are still being perfected. Also, most optical disk devices are significantly slower and more expensive (per byte of storage) than magnetic disk devices. So optical disk systems are not expected to displace magnetic disk technology in the near future for most business applications. IV. KEY TERMS AND CONCEPTS – DEFINED Binary Representation: Pertaining to the presence or absence of electronic or magnetic â€Å"signals† in the computer’s circuitry or in the media it uses. There are only two possible states or conditions – presence or absence. Central Processing Unit (CPU): The unit of a computer system that includes the circuits that controls the interpretation and execution of instructions. In many computer systems, the CPU includes the arithmetic-logic unit, the control unit, and primary storage unit. Computer System: Computer hardware as a system of input, processing, output, storage, and control components. Thus a computer system consists of input and output devices, primary and secondary storage devices, the central processing unit, the control unit within the CPU, and other peripheral devices. Computer Terminal: Any input/output device connected by telecommunications links to a computer. Digital Cameras: Digital still cameras and digital video cameras enable you to shoot, store, and download still photos or full-motion video with audio in your PC. Direct Access: A method of storage where each storage position has a unique address and can be individually accessed in approximately the same period of time without having to search through other storage positions. Information Appliance: Devices for consumers to access the Internet. Laptop Computer: A small portable PC. Liquid Crystal Displays (LCD): Electronic visual displays that form characters by applying an electrical charge to selected silicon crystals. Magnetic Disk Storage: Data storage technology that uses magnetised spots on metal or plastic disks. Magnetic Disk Storage – Floppy Disk: Small phonograph record enclosed in a protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability for microcomputer systems. Magnetic Disk Storage – Hard Disk Secondary storage medium; generally nonremovable disks made out of metal and covered with a magnetic   recording surface. It holds data in the form of magnetised spots. Magnetic Disk Storage – RAID Redundant array of independent disks. Magnetic disk units that house many interconnected microcomputer hard disk drives, thus providing large, fault tolerant storage capacities. Magnetic Ink Character Recognition (MICR): The machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. Magnetic Stripe: A magnetic stripe card is a plastic wallet-size card with a strip of magnetic tape on one surface; widely used for credit/debit cards. Magnetic Tape: A plastic tape with a magnetic surface on which data can be stored by selective magnetisation of portions of the surface. Mainframe Computer: A larger-size computer system, typically with a separate central processing unit, as distinguished from microcomputer and minicomputer systems. Microcomputer: A very small computer, ranging in size from a â€Å"Computer on a chip† to a small typewriter-size unit. Microprocessor: A semiconductor chip with circuitry for processing data. Midrange Computer: Larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframe computer systems. Minicomputer: A small electronic general-purpose computer. Network Computer: A new category of microcomputer designed mainly for use with the Internet and Intranets on tasks requiring limited or specialised applications and no or minimal disk storage. Network Server: A type of midrange computer used to co-ordinate telecommunications and resource sharing and manages large web sites, Intranets, extranets, and client/server networks. Network Terminal: A terminal that depends on network servers for its software and processing power. Off-line: Pertaining to equipment or devices not under control of the central processing unit. Online: Pertaining to equipment or devices under control of the central processing unit. Optical Character Recognition (OCR): The machine identification of printed characters through the use of light-sensitive devices. Optical Disk Storage: Technology based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. Optical Disk Storage – CD-ROM: An optical disk technology for microcomputers featuring compact disks with a storage capacity of over 500 megabytes. Optical Disk Storage – CD-R: Compact disk recordable (CD-R) enables computers with CD-R disk drive units to record their own data once on a CD, than be able to read the data indefinitely. Optical Disk Storage – CD-RW: Compact disk rewritable (CD-RW) enables computers with CD-RW disk drive units to record and erase data by using a laser to heat a microscopic point on the disk’s surface. Optical Disk Storage – DVD: Digital video disk or digital versatile disk (DVD) enables computers with DVD disk drive units to hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. Optical Disk Storage – WORM Disk: Optical disk that allows users to write once, read many times. Optical Scanning: Using a device (scanner) that scans characters or images and generates their digital representations. Pen-Based Computing: Tablet-style microcomputers that recognise hand-writing and hand-drawing done by a pen-shaped device on their pressure sensitive display screens. Peripheral Devices: In a computer system, any unit of equipment, distinct from the central processing unit, that provides the system with input, output, or storage capabilities. Personal Digital Assistant: Handheld microcomputer devices, which are designed for convenient mobile communications and computing. Pointing Devices: Devices, which allow end users to issue commands or make choices by moving a cursor on the display, screen. Pointing Device – Electronic Mouse: A small device that is electronically connected to a computer and is moved by hand on a flat surface in order to move the cursor on a video screen in the same direction. Buttons on the mouse allow users to issue commands and make  responses or selections. Pointing Device – Pointing Stick: A small buttonlike device sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Pointing Device – Touchpad: Is a small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Pointing Device – Trackball: A roller device set in a case used to move the cursor on a computer’s display screen. Primary Storage: The main (or internal) memory of a computer. Usually in the form of semiconductor storage. Printers: Devices that produce hard copy output such as paper documents or reports. Secondary Storage: External or auxiliary storage device that supplements the primary storage of a computer. Semiconductor Memory: Microelectronic storage circuitry etched on tiny chips of silicon or other semiconducting material. Semiconductor Memory – RAM: Also known as main memory or primary storage; type of memory that temporarily holds data and instructions needed shortly by the CPU. RAM is a volatile type of storage. Semiconductor Memory – ROM: Also known as firmware; a memory chip that permanently stores instructions and data that are programmed during the chip’s manufacture. Three variations on the ROM chip are PROM, EPROM, and EEPROM. ROM is a nonvolatile form of storage. Sequential Access: A sequential method of storing and retrieving data from a file. Smart Cards: Cards such as debit and credit cards, which have an embedded microprocessor chip and several kilobytes of memory. Speech Recognition: Direct conversion of spoken data into electronic form suitable for entry into a computer system. Promises to be the easiest, most natural way to communicate with computers. Storage Capacity Elements: Units used for storage capacity and data: bits, bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB). Storage Capacity Elements – Bit: A contraction of â€Å"binary digit†. It can have the value of either 0 or 1. Storage Capacity Elements – Byte: A sequence of adjacent binary digits operated on as a unit and usually shorter than a computer word. In many computer systems, a byte is a grouping of eight bits that can represent one alphabetic or special character or can be â€Å"packed† with two decimal digits. Storage Capacity Elements – Kilobyte (K or KB): When referring to computer storage capacity it is equivalent to 2 to the 10th power, or 1,014 in decimal notation. Storage Capacity Elements – Megabyte (MB): One million bytes. More accurately, 2 to the 20th power, 1,048,576 in decimal notation. Storage Capacity Elements – Gigabyte (GB): One billion bytes. More accurately, 2 to the 30th power, or 1,073,741,824 in decimal notation. Storage Capacity Elements – Terabyte (TB): One trillion bytes. More accurately, 2 to the 40th power, or 1,009,511,627,776 in decimal notation. Storage Media Trade-offs: The trade-offs in cost, speed, and capacity of various storage media. Supercomputer: A special category of large computer systems that are the most powerful available. They are designed to solve massive computational problems. Time Elements: Units used for measuring processing speeds: milliseconds, microseconds, nanoseconds, and picoseconds. Time Elements – Millisecond: A thousandth of a second. Time Elements – Microsecond: A millionth of a second. Time Elements – Nanosecond: One billionth of a second. Time Elements – Picosecond: One trillionth of a second. Touch-Sensitive Screen: An input device that accepts data input by the placement of a finger on or close to the CRT screen. Transaction Terminals: Terminals used in banks, retail stores, factories, and other work sites that are used to capture transaction data at their point of origin. Examples are point-of-sale (POS) terminals and automated teller machines (ATMs). Video Output: Video displays are the most common type of computer output. Volatility: Memory (such as electronic semiconductor memory) that loses its contents when electrical power is interrupted. Wand: A handheld optical character recognition device used for data entry by many transaction terminals. Workstation: A computer terminal or micro- or minicomputer system designed to support the work of one person. Also, a highpowered computer to support the work of professionals in engineering, science, and other areas that require extensive computing power and graphics capabilities. V. DISCUSSION QUESTIONS Do you agree with the statement: â€Å"The network is the computer†?   What trends are occurring in the development and use of the major types of computer systems? Do you think that network computers (NCs) will replace personal computers (PCs) in business applications? Are networks of PCs and servers making mainframe computers obsolete?   What  trends are occurring in the development and use of peripheral devices? Why are those trends occurring? When would you recommend the use of each of the following:   Network computers NetPCs Network terminals Information appliances in business applications What processor, memory, magnetic disk storage, and video display capabilities would you require for a personal computer that you would use for business purposes?   What other peripheral devices and capabilities would you want to have for your business PC?

Tuesday, October 22, 2019

The Assassination of Archduke Franz Ferdinand

The Assassination of Archduke Franz Ferdinand On the morning of June 28, 1914, a 19-year-old Bosnian nationalist named Gavrilo Princip shot and killed Sophie and Franz Ferdinand, the future heir to the throne of Austria-Hungary (the second-largest empire in Europe) in the Bosnian capital of Sarajevo. Gavrilo Princip, a simple postman’s son, probably didn’t realize at the time that by firing those three fateful shots, he was starting a chain reaction that would lead directly to the start of World War I. A Multinational Empire In the summer of 1914, the by now 47-year-old Austro-Hungarian Empire stretched from the Austrian Alps in the west to the Russian border in the east and reached far into the Balkans to the south (map). It was the second-largest European nation next to Russia and boasted a multi-ethnic population made up of at least ten different nationalities. These included Austrian Germans, Hungarians, Czechs, Slovaks, Poles, Romanians, Italians, Croats and Bosnians among others. But the empire was far from united. Its various ethnic groups and nationalities were constantly competing for control in a state that was predominantly ruled by the Austrian-German Habsburg family and the Hungarian nationals- both of whom resisted sharing the majority of their power and influence with the rest of the empire’s diverse population. For many of those outside the German-Hungarian ruling class, the empire represented nothing more than an undemocratic, repressive regime occupying their traditional homelands. Nationalistic sentiments and struggles for autonomy often resulted in public riots and clashes with the ruling authorities such as in Vienna in 1905 and in Budapest in 1912. The Austro-Hungarians responded harshly to incidents of unrest, sending in troops to keep the peace and suspending local parliaments. Nevertheless, by 1914 unrest was a constant in almost every part of the realm. Franz Josef and Franz Ferdinand: A Tense Relationship By 1914, Emperor Franz Josef- a member of the long-standing royal House of Habsburg- had ruled Austria (called Austria-Hungary from 1867) for nearly 66 years. As a monarch, Franz Josef was a staunch traditionalist and remained so well into the later years of his reign, despite the many great changes that had led to the weakening of monarchical power in other parts of Europe. He resisted all notions of political reform and viewed himself as the last of the old-school European monarchs. Emperor Franz Josef fathered two children. The first, however, died in infancy and the second committed suicide in 1889. By right of succession, the emperor’s nephew, Franz Ferdinand, became next in line to rule Austria-Hungary. The uncle and the nephew often clashed over differences in approach to ruling the vast empire. Franz Ferdinand had little patience for the ostentatious pomp of the ruling Habsburg class. Nor did he agree with his uncle’s harsh stance towards the rights and autonomy of the empire’s various national groups. He felt the old system, which allowed ethnic Germans and ethnic Hungarians to dominate, could not last. Franz Ferdinand believed the best way to regain the population’s loyalty was to make concessions towards the Slavs and other ethnicities by allowing them greater sovereignty and influence over the governance of the empire. He envisioned the eventual emergence of a type of â€Å"United States of Greater Austria,† with the empire’s many nationalities sharing equally in its administration. He believed strongly that this was the only way to keep the empire together and to secure his own future as its ruler. The result of these disagreements was that the emperor had little love for his nephew and bristled at the thought of Franz Ferdinand’s future ascension to the throne. The tension between them grew even stronger when, in 1900, Franz Ferdinand took as his wife the Countess Sophie Chotek. Franz Josef did not consider Sophie to be an appropriate future empress as she was not directly descended from royal, imperial blood. Serbia: The Great Hope of the Slavs In 1914, Serbia was one of the few independent Slavic states in Europe, having gained its autonomy piecemeal throughout the previous century after hundreds of years of Ottoman rule. The majority of Serbs were staunch nationalists and the kingdom saw itself as the great hope for the sovereignty of Slavic peoples in the Balkans.  The great dream of Serbian nationalists was the unification of Slavic peoples into a single sovereign state. The Ottoman, Austro-Hungarian, and Russian empires, however, were perpetually struggling for control and influence over the Balkans and Serbs felt under constant threat from their powerful neighbors. Austria-Hungary, in particular, posed a threat due to its close proximity to Serbia’s northern border. The situation was exasperated by the fact that pro-Austrian monarchs- with close ties to the Habsburgs- had ruled Serbia since the late 19th century. The last of these monarchs, King Alexander I, was deposed and executed in 1903 by a clandestine society comprised of nationalistic Serbian army officers known as the Black Hand. It was this same group that would come to help plan and support the assassination of Archduke Franz Ferdinand eleven years later. Dragutin Dimitrijević and the Black Hand The aim of the Black Hand was the unification of all southern Slavic peoples into the single Slavic nation-state of Yugoslavia- with Serbia as its leading member- and to protect those Slavs and Serbs still living under Austro-Hungarian rule by any means necessary. The group relished in the ethnic and nationalistic strife that had overtaken Austria-Hungary and sought to stoke the flames of its decline. Anything that was potentially bad for its powerful northern neighbor was seen as potentially good for Serbia. The high-ranking, Serbian, military positions of its founding members put the group in a unique position to carry out clandestine operations deep within Austria-Hungary itself. This included army colonel Dragutin Dimitrijević, who would later become the head of Serbian military intelligence and leader of the Black Hand. The Black Hand frequently sent spies into Austria-Hungary to commit acts of sabotage or to foment discontent amongst Slavic peoples inside the empire. Their various anti-Austrian propaganda campaigns were designed, especially, to attract and recruit angry and restless Slavic youths with strong nationalistic sentiments. One of these youths- a Bosnian, and a member of the Black Hand-backed youth movement known as Young Bosnia- would personally carry out the murders of Franz Ferdinand and his wife, Sophie, and thus help to unleash the biggest crisis ever to face Europe and the world to that point. Gavrilo Princip and Young Bosnia Gavrilo Princip was born and raised in the countryside of Bosnia-Herzegovina, which had been annexed by Austria-Hungary in 1908 as a means to preempt Ottoman expansion into the region and to thwart Serbia’s aims for a greater Yugoslavia. Like many of the Slavic peoples living under Austro-Hungarian rule, Bosnians dreamed of the day when they would gain their independence and join a larger Slavic union alongside Serbia. Princip, a young nationalist, left for Serbia in 1912 to continue the studies he had undertaken in Sarajevo, the capital of Bosnia-Herzegovina. While there, he fell in with a group of fellow nationalist Bosnian youths calling themselves Young Bosnia. The young men in Young Bosnia would sit long hours together and discuss their ideas for bringing about change for Balkan Slavs. They agreed that violent, terroristic methods would help to bring about a speedy demise of the Habsburg rulers and ensure the eventual sovereignty of their native homeland. When, in the spring of 1914, they learned of Archduke Franz Ferdinand’s visit to Sarajevo that June, they decided he would be a perfect target for assassination. But they would need the help of a highly organized group like the Black Hand to pull off their plan. A Plan Is Hatched The Young Bosnians’ plan to do away with the Archduke eventually reached the ears of Black Hand leader Dragutin Dimitrijević, the architect of the 1903 overthrow of Serbia’s king and by now chief of Serbian military intelligence. Dimitrijević had been made aware of Princip and his friends by a subordinate officer and fellow Black Hand member who had complained of being pestered by a group of Bosnian youths bent on killing Franz Ferdinand. By all accounts, Dimitrijević very casually agreed to help the young men; although secretly, he may have received Princip and his friends as a blessing. The official reason given for the Archduke’s visit was to observe Austro-Hungarian military exercises outside the city, as the emperor had appointed him inspector general of the armed forces the previous year. Dimitrijević, however, felt sure the visit was nothing more than a smokescreen for a coming Austro-Hungarian invasion of Serbia, though no evidence exists to suggest such an invasion was ever planned. Furthermore, Dimitrijević saw a golden opportunity to do away with a future ruler who could seriously undermine Slavic nationalistic interests, were he ever to be allowed to ascend to the throne. The Serbian nationalists knew well of Franz Ferdinand’s ideas for political reform and feared that any concessions made by Austria-Hungary towards the empire’s Slavic population could potentially undermine Serbian attempts at fomenting discontent and inciting Slavic nationalists to rise up against their Habsburg rulers. A plan was devised to send Princip, along with Young Bosnian members Nedjelko ÄÅ'abrinović and Trifko GrabeÃ… ¾, to Sarajevo, where they were to meet up with six other conspirators and carry out the assassination of the Archduke. Dimitrijević, fearing the assassins’ inevitable capture and questioning, instructed the men to swallow cyanide capsules and commit suicide immediately after the attack. No one was to be allowed to learn who had authorized the murders. Concerns Over Safety Initially, Franz Ferdinand never intended to visit Sarajevo itself; he was to keep himself outside the city for the task of observing military exercises. To this day it is unclear why he chose to visit the city, which was a hotbed of Bosnian nationalism and thus a very hostile environment for any visiting Habsburg. One account suggests that Bosnia’s governor-general, Oskar Potiorek- who may have been seeking a political boost at Franz Ferdinand’s expense- urged the Archduke to pay the city an official, all day visit. Many in the Archduke’s entourage, however, protested out of fear for the Archduke’s safety. What Bardolff and the rest of the Archduke’s entourage did not know was that June 28 was a Serb national holiday- a day that represented Serbia’s historical struggle against foreign invaders. After much debate and negotiation, the Archduke finally bent to Potiorek’s wishes and agreed to visit the city on June 28, 1914, but only in an unofficial capacity and for only a few hours in the morning. Getting Into Position Gavrilo Princip and his co-conspirators arrived in Bosnia sometime in early June. They had been ushered across the border from Serbia by a network of Black Hand operatives, who provided them with faked documents stating the three men were customs officials and thus entitled to free passage. Once inside Bosnia, they met up with six other conspirators and made their way toward Sarajevo, arriving in the city sometime around June 25. There they stayed in various hostels and even lodged with family to await Archduke’s visit three days later. Franz Ferdinand and his wife, Sophie, arrived in Sarajevo sometime before ten in the morning of June 28. After a short welcoming ceremony at the train station, the couple was ushered into a 1910 Grf Stift touring car and, along with a small procession of other cars carrying members of their entourage, made their way to the Town Hall for an official reception. It was a sunny day and the car’s canvas top had been taken down to allow for the crowds to better see the visitors. A map of the Archduke’s route had been published in the newspapers prior to his visit, so spectators would know where to stand in order to catch a glimpse of the couple as they rode by. The procession was to move down the Appel Quay along the northern bank of the Miljacka River. Princip and his six co-conspirators had also obtained the route from the newspapers. That morning, after receiving their weapons and their instructions from a local Black Hand operative, they split up and positioned themselves at strategic points along the riverbank. Muhamed MehmedbaÃ… ¡ić and Nedeljko ÄÅ'abrinović mingled with the crowds and positioned themselves near the Cumurja Bridge where they would be the first of the conspirators to see the procession going by. Vaso ÄÅ'ubrilović and Cvjetko Popović positioned themselves further up the Appel Quay. Gavrilo Princip and Trifko GrabeÃ… ¾ stood near the Lateiner Bridge toward the center of the route while Danilo Ilić moved about trying to find a good position. A Tossed Bomb MehmedbaÃ… ¡ić would be the first to see the car appear; however, as it approached, he froze with fear and was unable to take action. ÄÅ'abrinović, on the other hand, acted without hesitation. He pulled a bomb from his pocket, struck the detonator against a lamp post, and tossed it at the Archduke’s car. The car’s driver, Leopold Loyka, noticed the object flying towards them and hit the accelerator. The bomb landed behind the car where it exploded, causing debris to fly and nearby shop windows to shatter. About 20 onlookers were injured. The Archduke and his wife were safe, however, save for a small scratch on Sophie’s neck caused by flying debris from the explosion. Immediately after throwing the bomb, ÄÅ'abrinović swallowed his vial of cyanide and jumped over a railing down into the riverbed. The cyanide, however, failed to work and ÄÅ'abrinović was caught by a group of policemen and dragged away. The Appel Quay had erupted into chaos by now and the Archduke had ordered the driver to stop so that the injured parties could be attended to. Once satisfied that nobody was seriously injured, he ordered the procession to continue to the Town Hall. The other conspirators along the route had by now received news of ÄÅ'abrinović’s failed attempt and most of them, probably out of fear, decided to leave the scene. Princip and GrabeÃ… ¾, however, remained. The procession continued on to the Town Hall, where Sarajevo’s mayor launched into his welcoming speech as if nothing had happened. The Archduke immediately interrupted and admonished him, outraged at the bombing attempt that had put him and his wife in such danger and questioned the apparent lapse in security.   The Archduke’s wife, Sophie, gently urged her husband to calm down. The mayor was allowed to continue his speech in what was later described by witnesses as a bizarre and otherworldly spectacle. Despite reassurances from Potiorek that the danger had passed, the Archduke insisted on abandoning the day’s remaining schedule; he wanted to visit the hospital to check on the wounded. Some discussion on the safest way to proceed to the hospital ensued and it was decided that quickest way would be to go by the same route. The Assassination Franz Ferdinand’s car sped down the Appel Quay, where the crowds had thinned out by now. The driver, Leopold Loyka, seemed to have been unaware of the change of plans. He turned left at the Lateiner Bridge toward Franz Josef Strasse as if to proceed to the National Museum, which the Archduke had planned to visit next prior to the assassination attempt. The car drove past a delicatessen where Gavrilo Princip had bought a sandwich. He had resigned himself to the fact that the plot was a failure and that the Archduke’s return route would have been altered by now. Somebody yelled out to the driver that he had made a mistake and should have kept going along the Appel Quay to the hospital. Loyka stopped the vehicle and attempted to reverse as Princip emerged from the delicatessen and noticed, to his great surprise, the Archduke and his wife only a few feet from him. He pulled out his pistol and fired. Witnesses would later say they heard three shots. Princip was immediately seized and beaten by bystanders and the gun wrested from his hand. He managed to swallow his cyanide before being tackled to the ground but it, too, failed to work. Count Franz Harrach, the owner of the Grf Stift car that was carrying the royal couple, heard Sophie cry out to her husband, â€Å"What has happened to you?† before she appeared to faint and slump over in her seat. (King and Woolmans, 2013) Harrach then noticed that blood was trickling from the Archduke’s mouth and ordered the driver to drive to the Hotel Konak- where the royal couple was supposed to stay during their visit- as quickly as possible. The Archduke was still alive but barely audible as he continually muttered, â€Å"It is nothing.† Sophie had completely lost consciousness. The Archduke, too, eventually fell silent. The Couple’s Wounds Upon arriving at the Konak, the Archduke and his wife were carried up to their suite and attended to by regimental surgeon Eduard Bayer. The Archduke’s coat was removed to reveal a wound in his neck just above the collarbone. Blood was gurgling from his mouth. After a few moments, it was determined that Franz Ferdinand had died from his wound. â€Å"His Highness’s suffering is over,† the surgeon announced. (King and Woolmans, 2013 Sophie had been laid out on a bed in the next room. Everyone still assumed she had simply fainted but when her mistress removed her clothes she discovered blood and a bullet wound in her lower right abdomen. She had already been dead by the time they had reached the Konak. Aftermath The assassination sent shockwaves throughout Europe. Austro-Hungarian officials discovered the Serbian roots of the plot and declared war on Serbia on July 28, 1914 exactly one month after the assassination. Fearing reprisals from Russia, which had been a strong ally of Serbia, Austria-Hungary now sought to activate its alliance with Germany in an attempt to scare the Russians out of taking action. Germany, in turn, sent Russia an ultimatum to stop mobilizing, which Russia ignored. The two powers- Russia and Germany- declared war on each other on August 1, 1914. Britain and France would soon enter the conflict on the side of Russia. Old alliances, which had been dormant since the 19th century, had suddenly created a dangerous situation across the continent. The war that ensued, World War I, would last four years and claim the lives of millions. Gavrilo Princip never lived to see the end of the conflict he helped to unleash. After a lengthy trial, he was sentenced to 20 years in prison (he avoided the death penalty due to his young age). While in prison, he contracted tuberculosis and died there on April 28, 1918. Sources Greg King and Sue Woolmans, The Assassination of the Archduke (New York: St. Martin’s Press, 2013), 207.

Monday, October 21, 2019

buy custom Systems Development Life Cycle essay

buy custom Systems Development Life Cycle essay The term Systems Development is refers to the creation of new information software or alteration of existing information software, models and the methodologies that are used to develop the software(Blanchard Fabrycky, 2006). It is a process that passes through various stages of development. There are seven main phases of systems development process. Planning Phase This is the phase that is regarded by most systems developers as the first phase of systems development. This phase is sometimes referred to as the feasibility study phase. It is characterized by the determination of organizational goals in relation to the system that is being developed. During this phase, the systems developers allocate the budgetary requirements and time schedule for the project. Other requirements for the project such as equipment and personnel are also established and put in place. A quick ex ante evaluation is also done at this stage to establish the likelihood of the success of the success of the project. Other factors that are considered by an organization during this phase is the knowledge of the employees and their ability to use the new system. If the employees are not able to use the new system then the organization should examine their ability learn new skills at this phase. System Analysis Phase Systems Design Phase This phase is important in the systems development cycle because it is characterized by documentations which are used in the succeeding phases as reference. The desired feature and operation are described exhaustively. This description involves outlining each component of the system including its nature and how it is going to contribute towards achieving the goals of the system being developed. The components may include screen layouts, business rules, process diagrams and other documentation. Implementation Phase This is the most technical phase of systems development cycle. It is during this phase that the real coding of the system takes place. The knowledge of high level programing languages such as java, and Pascalisdirely needed in this phase. In addition there should be high level of competency and experience of systems development among the technical team at this phase in order to ensure confidence in the outcome (Beynon, 2009). Integraation and Testing Phase In this phase, the different components and features of the components are assembled together and tested to determine if they can really work. Evaluation is done to establish changes,bugs and errors that may have occurred accidentally. Corrections are then made. Acceptance and Installation Phase This phase appears to be the last stage of the initial development of the software. The software is put in actual use at this stage. The actual business activity is carried out using the software and the intended organizational goals are achieved. Maintenance Phase This very last phase of systems development cycle is probably not the last one. It is the most important phase since it continues throughout the lifetime of the software unlike the other phases which takes short periods of time. It involves administration of adjustments such as changes, additions and corrections that makes the system more adaptable and efficient in its functions (Cummings, 2006). The phases of systems development are not as distinct as they appear in this essay. These phases usually overlap and sometimes the activities that are expected to be done in one phase may be done in a preceding or subsequent phase. At some point it might be required that all the phases be repeated again thus the name cycle (Blanchard Fabrycky, 2006). Buy custom Systems Development Life Cycle essay

Sunday, October 20, 2019

The Evolution of the First Mammals

The Evolution of the First Mammals Ask the average person on the street, and he or she might guess that the first mammals didnt appear on the scene until after the dinosaurs went extinct 65 million years ago, and, moreover, that the last dinosaurs evolved into the first mammals. The truth, though, is very different. In fact, the first mammals evolved from a population of vertebrates called  therapsids (mammal-like reptiles) at the end of the Triassic period and coexisted with dinosaurs throughout the Mesozoic Era. But part of this folktale has a grain of truth. It was only after the dinosaurs went kaput that mammals were able to evolve beyond their tiny, quivering, mouselike forms into the widely specialized species that populate the world today. These popular misconceptions about the mammals of the Mesozoic Era are easy to explain. Scientifically speaking, dinosaurs tended to be very, very big and early mammals tended to be very, very small. With a couple of exceptions, the first mammals were tiny, inoffensive creatures, rarely more than a few inches long and a few ounces in weight, about on a par with modern shrews. Thanks to their low profiles, these hard-to-see critters could feed on insects and small reptiles (which bigger ​raptors and tyrannosaurs tended to ignore), and they could also scurry up trees or dig into burrows to avoid getting stomped on by larger ornithopods and sauropods. The Evolution of the First Mammals Before discussing how the first mammals evolved, its helpful to define what distinguishes mammals from other animals, especially reptiles. Female mammals possess milk-producing mammary glands with which they suckle their young. All mammals have hair or fur during at least some stage of their life cycles, and all are endowed with warm-blooded (endothermic) metabolisms. Regarding the fossil record, paleontologists can distinguish ancestral mammals from ancestral reptiles by the shape of their skull and neck bones, as well as the presence, in mammals, of two small bones in the inner ear (in reptiles, these bones constitute part of the jaw). As mentioned above, the first mammals evolved toward the end of the Triassic period from a population of therapsids, the mammal-like reptiles that arose in the early Permian period and produced such uncannily mammal-like beasts as Thrinaxodon and Cynognathus. By the time they went extinct in the mid-Jurassic period, some therapsids had evolved proto-mammalian traits (fur, cold noses, warm-blooded metabolisms, and possibly even live birth) that were further elaborated upon by their descendants of the later Mesozoic Era. As you can imagine, paleontologists have a hard time distinguishing between the last, highly evolved therapsids and the first, newly evolved mammals. Late Triassic vertebrates like Eozostrodon, Megazostrodon  and Sinoconodon appear to have been intermediate missing links between therapsids and mammals, and even in the early Jurassic period, Oligokyphus  possessed reptilian ear and jaw bones at the same time as it showed every other sign (rat-like teeth, the habit of suckling its young) of being a mammal. If this seems confusing, bear in mind that the modern-day platypus is classified as a mammal, even though it lays reptilian, soft-shelled eggs rather than giving birth to live young! The Lifestyles of the First Mammals The most distinctive thing about the mammals of the Mesozoic Era is how small they were. Although some of their therapsid ancestors attained respectable sizes. For example, the late Permian Biarmosuchus was about the size of a large dog. Very few early mammals were larger than mice, for a simple reason: dinosaurs had already become the dominant terrestrial animals on earth. The only ecological niches open to the first mammals entailed a) feeding on plants, insects and small lizards, b) hunting at night (when predatory dinosaurs were less active), and c) living high up in trees or underground, in burrows. Eomaia,  from the early Cretaceous period, and Cimolestes,  from the late Cretaceous period, were fairly typical in this regard. This isnt to say that all early mammals pursued identical lifestyles. For example, the North American Fruitafossor  possessed a pointed snout and mole-like claws, which it used to dig for insects. And, the late Jurassic Castorocauda  was built for a semi-marine lifestyle, with its long, beaver-like tail and hydrodynamic arms and legs. Perhaps the most spectacular deviation from the basic Mesozoic mammalian body plan was Repenomamus, a three-foot-long, 25-pound carnivore that is the only mammal known to have fed on dinosaurs (a fossilized specimen of Repenomamus has been found with the remains of a Psittacosaurus in its stomach). Recently, paleontologists discovered conclusive fossil evidence for the first important split in the mammal family tree, the one between placental and marsupial mammals. Technically, the first, marsupial-like mammals of the late Triassic period are known as metatherians. From these evolved the eutherians, which later branched off into placental mammals. The type specimen of Juramaia, the Jurassic mother, dates to about 160 million years ago, and demonstrates that the metatherian/eutherian split occurred at least 35 million years before scientists had previously estimated. The Age of Giant Mammals Ironically, the same characteristics that helped mammals maintain a low profile during the Mesozoic Era also allowed them to survive the K/T Extinction Event that doomed the dinosaurs. As we now know, that giant meteor impact 65 million years ago produced a kind of nuclear winter, destroying most of the vegetation that sustained the herbivorous dinosaurs, which themselves sustained the carnivorous dinosaurs that preyed on them. Because of their tiny size, early mammals could survive on much less food, and their fur coats (and warm-blooded metabolisms) helped keep them warm in an age of plunging global temperatures. With the dinosaurs out of the way, the Cenozoic Era was an object lesson in convergent evolution: mammals were free to radiate into open ecological niches, in many cases taking on the general shape of their dinosaur predecessors. Giraffes, as you may have noticed, are eerily similar in body plan to ancient sauropods like Brachiosaurus, and other mammalian megafauna pursued similar evolutionary paths. Most important, from our perspective, early primates like Purgatorius were free to multiply, populating the branch of the evolutionary tree that led eventually to modern humans.

Saturday, October 19, 2019

Analyse and research a complete full length documentary film (from the Essay

Analyse and research a complete full length documentary film (from the list); be sure to cite specific examples from within the film - at least two major scenes should be analysed in detail - Essay Example In this film, Morris deviates from the usual features of a documentary and uses a non-narrator approach and a dramatic technique, so that he can depict the thin blue line between appearance and truth, a line that can either result to justice or injustice. Morris diverges from the usual norms of documentary films and follows an expressionistic rendering of the testimonies. First, in this film, a clear narrator does not exist, and instead, Morris relies on his viewers to digest the testimonies fed to them, so that they can ascertain the truth. He prefers to call his film a â€Å"non-fiction feature† than a documentary (Hunter 1995, p.65). The viewers become the narrator, because they have to sift through the material of testimonies provided to them (Hunter 1995, p.65). Chapman (2009) believes that this self-reflective nature of the film helps viewers to find the truth (p.p.24). Second, the film is constructed using dramatic techniques. Williams (1998) asserts that Morris abandoned â€Å"cinema verità © realism† for â€Å"studied, often slow-motion, and highly expressionistic re-enactments of different witnesses’ versions of the murder† (p.383). These re-enactments define the difference between the truth and biases. The editing and sequencing, using cuts and diverse symbolic items, such as newspaper clippings, the Dallas map, â€Å"Voluntary Statement† and the TV schedule, depict meaning through what these objects mean and how people use them to attain their purposes. When Adams signs the â€Å"Voluntary Statement,† he believes he offered the truth. For the homicide detectives, this statement, however, becomes a confession for his crime. Ponech (2005) believes that the map stands for the inability of Adams to understand the corruption of the justice system (p.85). The map stands for the irony of being lost in a society, where deception and scapegoating undercut

Friday, October 18, 2019

Knowledge, Innovation and New product Development Essay

Knowledge, Innovation and New product Development - Essay Example rowth rate as compared to the already developed markets; and the economically developed countries like US and Germany are facing greater heat of recession with surging economic crises. Therefore one can think of investment in either India or China. I took India as the country to develop new product because cosmetic, especially 100% herbal and vegetarian Lipstick with variety of shades can be a new product that can be developed in an Indian Market. The increasing urbanization and a growth in the number of office workers have resulted in a strong focus on grooming in that country. 65% of the total population of India is below 35 years of age but only around 30% of the women use lipsticks in India, so there is a wide scope to flourish in India. The USP (unique selling proposition) of this product is its attribute of being 100% Herbal and Vegetarian as almost 40% of the total population in India is vegetarian and till now no other company has launched this type of product in the Indian M arket. Cosmetics and toiletries have seen tremendous growth in 2007. Growth was partly due to high levels of inflation but volume sales also saw dynamic growth. Rising income levels resulted in lower-income groups being able to afford more cosmetics and toiletries and also saw many trading up from unpackaged to packaged products. Meanwhile, mid- and high-income consumers in urban areas began to seek out value-added mass brands and premium products. India can be taken as the country to sell the product as Indian females are considered an epitome of beauty and they are more and more becoming beauty and fashion conscious. The product that can be marketed is a wide range of cosmetics (100%Vegetarian) especially lipsticks and it can be launched in the Indian market by the name: This indeed is true because people will not normally forget the hospitability offered at the service based organization like restaurant, beauty parlor, consultancy firm etc and especially the cosmetic

United Nations Essay Example | Topics and Well Written Essays - 500 words - 1

United Nations - Essay Example and Social Council (ECOSOC), the General Assembly, the Security Council, the Secretariat, and the International Court of Justice (Banerjee and Sharma 2007 p.35). The UN fulfils its role of peace keeping by sending its troops to keep peace in areas of antagonism. ECOSOC is responsible for ensuring social and economic development among UN’s member states. In a bid to fulfil its objectives, ECOSOC has formed several agencies such as UN Development Program (UNDP) the Food and Agriculture Organization (FAO), the UN Children’s Fund (UNICEF). UNDP’s functions include publishing the UN Human Development Index and offering grant based technical assistance. Through the UN Human Development Index, much has been done in eradicating poverty, illiteracy and improving development in some of the badly hit countries. One of FAO’s tasks is promoting agriculture and in doing so, some of the food problems in developing countries have been solved. UN has also played an important role in preventing child abuse and fighting for children’s rights across the globe through UNICEF. UN has other agencies such as the World Bank, the International Monetary Fund (IMF), and the World Health Organization (WHO). Through the World Bank many countries have accessed development loans thereby reducing the levels of under development especially in the developing countries. In times of disaster and emergencies the UN has been on the forefront of resolving the crisis by offering funds via the IMF. WHO is responsible for eradicating diseases and offering solutions for international health problems. For instance, WHO was responsible for eradication of smallpox, polio, leprosy and just recently almost came up with a cure for the Ebola pandemic. WHO is also responsible for distributing vaccines across the world such as the tetanus vaccine. UN is on the forefront of fighting the AIDS epidemic through the Joint United Nations Program on HIV/AIDS (UNAIDS). In addition, UN’s WFP provides 26 % of

Thursday, October 17, 2019

Motivation in the Workplace Research Paper Example | Topics and Well Written Essays - 750 words

Motivation in the Workplace - Research Paper Example According to Maslow’s theory on the five levels of employee’s needs, these would be physiological, safety, social, ego, and self-actualizing. In this theory, he put emphasis on the need to satisfy the lower level needs first before the higher levels to get utmost motivation at work (K., & of, y. t. (1987)). Thus, this goes to show that one needs to work on physiological needs first before one reaches self-actualization which is the highest motivational factor in the workplace. To be able to understand the theory more, let us apply this in a more practical term by getting to know what really is one’s goal for work. Practically, people work to earn money (Heathfield, M.(n.d.)). This is because of the fact that to be able to get motivated at work, one needs to see how work provides for their family and loved one’s such as food, home, leisure, and etc which are physiological needs that man need to be satisfied with. However, though this is one thing that easil y motivates one to go on each day working, making money as your center inspiration for work will not get you motivated for long especially when things go wrong at work or you feel like you are not getting the compensation that you deserve which is unavoidable in the work place. That is why, the key to getting a more powerful motivation at work is from something that you would not rely on anyone to give you, such as perhaps your passion and love for what you do or the self-fulfillment you get from doing what you do best at work. Thus, this goes to show that motivation in the workplace really begins with self, loving the career path you have chosen which is something that will give you every reason to go to work every day. However, there are other factors that would contribute to being motivated at work which will enable you to stay happy in your chosen job. Some of which are to feel belongingness with your peers at work and to have a great relationship with them which will make work seem a lot lighter, the opportunity of growth and learning, and leadership opportunities where you are able to set goals and have a team support it (Heathfield, M.(n.d.)). We all know that a part of man’s nature is to be able to feel belongingness to a group, have that certain kind of support system, and to be less of an island at work which will make more of an interesting routine. Indeed, aside from relying on self to get you motivated at work by choosing to do something that you love is to get motivation from your work environment and the people that surrounds you. Another side of the work towards getting utmost motivation on the so called job routine everyone is in would now rely on one’s boss or manager. This is because of the fact that one of the people in the workplace that really has an effect to every employee’s performance and attitude towards work is the boss (Employee motivation: Motivation in the workplace- theory and practice. (n.d.)). We all know that each boss would give you a distinct kind of relationship and training which would affect greatly on how you are at work. Thus, we get to know the reality of the need to have motivation programs in the workplace to help people work altogether for a certain goal where the best way to start for bosses to be able to do so is to understand human nature itself. How? Well, as human needs are a huge part of human nature, one