.

Friday, May 31, 2019

World Populations And Development :: essays research papers

World Populations and Development1.)     The Neolithic and Industrial RevolutionsThe two changes in the use of the earths resources that had the greatest effecton the world population were the neolithic and the industrial revolutions.The neolithic revolution (a.k.a. agricultural revolution) was a change in theway of look of our ancestors. It took place about 8000 years ago among varioustribes in Asia and the Middle East. It included a transition from foraging andhunting to the domestication of animals (most probably starting with the dog)and to farming. Tribes settled in fertile areas and formed agriculturalcommunities galore(postnominal) of which grew into villages and cities. This relatively stableway of life and the more reliable food supply (and surplus) led to thedevelopment of new professions, to labor specialization and ultimately to thesocial stratification of these societies. Improved conditions of life led to somewhatlonger life spans. Nevertheless p opulation growth remained low due to highinfant mortality rates. The encroachment of the neolithic revolution was not as muchon immediate population growth (even though it did have a long term squeeze onpopulation growth) as on the material and spiritual development of the humanrace. It is widely regarded as the beginning of civilization. Industrialrevolution was another surgical operation of change. It was the process of substitutingmuscle ability with machine power. It took place in the 18th century in Europeand is still happening in numerous parts of the world. In many characteristics ithas been similar to the neolithic revolution it increased production, it led tothe use of resources that had been mostly unused until then and it improved theoverall flavour of life. It also led to changes in the structure of society.What was different, was its impact on population growth. It was quick and easilynoticeable. Advanced sanitation, hygiene and medicine led to longer life spansan d declining death rates, with the birth rates remaining high. This resultedin a high rate of population growth that still continues in many countries. Theinformation revolution is the process of change that began in the second half ofthe 20th century in the developed countries of the world. It is the process ofsubstituting "brain power" with "machine power". It leads to increasedproduction and has the potential to create a more even distribution of theworlds population on the surface of the earth. It also has the potential todecrease the differences mingled with the less developed and the highly developednations of the world. Then again it also has the potential to increase thosedifferences. It causes changes in the structure of society.

Thursday, May 30, 2019

A Little Commonwealth Essay -- essays research papers

The modern image of the New England Puritans, as one perceives, is a dark one the Puritans, religious dissenters who valued propriety and order, are seen as a witch-hunters, suspicious tribe, and their very name carries connotations of grimness and primness. Where as the book A Little Commonwealth reflects the scenario in which the Puritans lived.Most of the houses in the Puritan Colonial era were small, dark, brooding and sparsely furnished. This allowed the Puritans to use every available space in the home. For examples, most of the furnishings and utensils used by the Puritans had more than one usea automobile trunk would be used not only for storage but also for sitting upon or perchance even a table. Moreover because of their lifestyle, they had to carry inventories, which were commodious and were stationed at the corner.In a way to demonstrate his/her standing in the community and to confirm his/her let self-image, the Puritans viewed their wealth by material and tactual acquisitions. Their low-toned clothing showed just what their standing was in the community. More clothes, books (even if they could not read), linens and such things were viewed as money in the bank, although jewelry, even wedding bands, were not considered tangible wealth in the Puritans.The families were very tight knit. While they lived in such cramped quarters they seemed to be able to live peaceably and by broadcast with each other. Rather than squabble amongst themselves the Puritans, by way of displac... A Little Commonwealth Essay -- essays seek papers The modern image of the New England Puritans, as one perceives, is a dark one the Puritans, religious dissenters who valued propriety and order, are seen as a witch-hunters, suspicious tribe, and their very name carries connotations of grimness and primness. Where as the book A Little Commonwealth reflects the scenario in which the Puritans lived.Most of the houses in the Puritan Colonial time were small, dark, brooding and sparsely furnished. This allowed the Puritans to use every available space in the home. For examples, most of the furnishings and utensils used by the Puritans had more than one usea trunk would be used not only for storage but also for sitting upon or maybe even a table. Moreover because of their lifestyle, they had to carry inventories, which were bulky and were stationed at the corner.In a way to demonstrate his/her standing in the community and to confirm his/her own self-image, the Puritans viewed their wealth by material and tangible acquisitions. Their modest clothing showed just what their standing was in the community. More clothes, books (even if they could not read), linens and such things were viewed as money in the bank, although jewelry, even wedding bands, were not considered tangible wealth in the Puritans.The families were very tight knit. While they lived in such cramped quarters they seemed to be able to live peaceably and by communicate with ea ch other. Rather than squabble amongst themselves the Puritans, by way of displac...

Wednesday, May 29, 2019

Two Kinds of Love in Movie Casablanca Essay -- Love Casablanca Movie F

Two Kinds of emotionalness in Movie Casablanca In the movie Casablanca, directed by Michael Curtiz, two different kinds of hit the hay are exposed. The bed kinship between Ilsa Lund and Rick is a more passionate relationship while the one between Ilsa and Victor Laszlo is more intimate. Love is composed of different feelings and because of that it can be expressed, as seen in Casablanca, in different ways. The Intimate Relationship Mind, a text by Garth J. O. Fletcher and Megan Stenswick, helps admit that claim providing a scientific background on how love is shaped by those different feelings. It says that love is composed of three distinct and basic components that all(prenominal) represent evolved adaptations namely, intimacy, commitment, and passion (Fletcher and Stenswick 73). Those three components help shape different kinds of love. The first love relationship that is portrayed in Casablanca is the one between Ilsa and Rick. It is explicit that the relations hip is a passionate one and that what they had was more of a fling, an affair, than a relationship that would last forever. That can be noticed by the lyrics of the song As clipping Goes By, which is the theme song for their love You must remember this, A kiss is just a kiss, A sigh is just a sigh, The thorough things apply, As time goes by.The lyrics basically mean that their love will not last long. That they may kiss and sigh as time goes by solely one day it will be over and become a memory. There certainly is passion in Rick and Ildas relationship except it lacks the two other components stated by Fletcher and Stenswick intimacy and commitment. That is shown when Rick has his flashback from Paris. Rick ask... ... That is how Ilsa and Laszlos relationship was shaped, with higher levels of intimacy and commitment, and lower levels of passion. It is a relationship that would typically last. Casablanca does an excellent job in portr aying two different kinds of love a passionate love and an intimate and committing love. Passionate love is unavoidable and a part of animation but people need to accept that a love based solely on passion does not last. An intimate and committing love is what will persevere and is what they need to hold on to. In the final scene Rick and Ilsa accept that their moment is gone, that they will be separate for life but will always have Paris. She then moves on to continue her relationship with Laszlo. That is the main message in Casablanca that you need to accept that passionate love doesnt last and embrace intimate and committing love.

The Afro-Cuban Struggle for Equality Essay -- Cuba Equality Racism Ess

The Afro-Cuban Struggle for EqualityIntroduction During the late nineteenth and early twentieth centuries, the island of Cuba was in the process of emerging from a Spanish colony to an independent nation. Freedom from Spain, however, was not the only struggle that Cuba was experiencing at this time. After having been oppressed by slavery for several centuries, Afro-Cubans, who had joined the make out for independence in large numbers, were demanding equality in Cuban society. Nevertheless, whites, especially in the elite, continued to initiate discriminatory practices against them. As a last remedy, Afro-Cubans stage an armed protest in response to the outlawing of their political party in 1912. Although valiant, the attempt was nonetheless a failure because it did not succeed in establishing racial equality in Cuba. Rather, it tragically resulted in the massacre of thousands of Afro-Cuban protesters by Cuban whites.Discussion As was the case throughout the Americas, white racism against blacks and mulattos was deeply grow in Cuban society. Prejudice and discrimination against Afro-Cubans continued to increase after the abolition of slavery in 1886. Whites, particularly those in the upper classes, viewed blacks and mulattos as belong to an inferior race that was unworthy of the same rights and privileges that they themselves enjoyed in society. Education, entertainment, and employment were some of the areas in which Afro-Cubans suffered significant discrimination. They were often denied acceptance into private schools, given separate accommodations in theaters and other entertainment establishments, refused service by many restaurants, and were usually unable to obtain employment in professional and skille... ...test as a last resort to bring about its restoration. Nevertheless, it resulted in failure when Afro-Cubans were massacred by the thousands.Conclusion The massacre of 1912 demonstrated that there remained to be seen true racial equality in Cuba. Although the wars of independence had brought about some improvements in race relations, such as the fraternity shared between the races when fighting together against Spain, and the recognition of some Afro-Cubans as outstanding military leaders, the nations black and mulatto populations remained for the most part at the lower levels of society. Without politicians who would support their interests, Afro-Cubans would continue to be without equal opportunities in Cuba.Works CitedHelg, Aline. Our just Share The Afro-Cuban Struggle for Equality. Chapel Hill The University of North Carolina Press, 1995.

Tuesday, May 28, 2019

Tuskegee Airmen Essay -- American History Military Air Force

On July 19, 1941 the U.S. Air Force created a program in Alabama to train African Americans as fighter pilots(Tuskegee Airmen1). Basic flight gentility was done by the Tuskegee institute, a school founded by Booker T. Washington in 1881(Tuskegee Airmen 1). Cadets would finish basic training at Tuskegees Moton Field and then bowel movement on to the Tuskegee Army Air Field to complete his transition from training to combat aircraft. The early Tuskegee squad were taught to fit in with the famous 99th fighter squadron, tagged for combat duty in North Africa. Other Tuskegee pilots were commissioned to the 332d Fighter gathering which fought alongside with the 99th Squadron based out of Italy. By the end of the war, 992 men had holy training at Tuskegee, 450 were sent overseas for combat . During the same time, almost 150 died while in training or on combat missions. additional men were trained at Tuskegee for aircrew and ground crew.The Mustang pilot spotted the string of Bf-109 s heading toward the crippled B-24. The pilot, a Lt. Weathers, dropped his wing tanks, and turned into the German formation. He gave the leader a burst with his .50 calibers and it nosed up, smoking, and soon went hurtling down to the ground. The pilot radioed the others in his flight and heard Im right behind you. But when Weathers looked back for himself, all(a) Page 2he could see was the nose cannon of another Bf-109, pointing right at him. He dropped flaps and chopped throttle, instantly slowing his Mustang, and the Bf-109 overran him. A few bursts, and Lt. Weathers had his second kill of the day. Two more e/a were still in view and seemed like easy pickings, only when the voice of the Group CO echoed in the pilots mind, Your job is to protect the bombers a... ...). Luke Weathers escort mission described above provided the chemical groups only aerial victories for the month of November. They flew 22 missions in December, running the group tally to 62 confirmed air-to-air vict ories by years end. Bad weather in January limited them to 11 missions, picking up to 39 in February, but without many aerial victories. On March 24, 1945, Col. Davis led the Group on the longest escort mission ever flown by the Fifteenth Air Force, a 1600-mile round trip to the Daimler-Benz tank works in Berlin(Tuskegee Airmen 5). On this mission, Roscoe C. Brown, Jr., Charles Brantly and Earl Lane, each shot down a German Me-262 jet fighter aircraft. The Group original a Distinguished Unit Citation for their achievements this day(History 4). The Tuskegee Airmen continued flying and fighting, killing and dying, until the end of the war in Europe in May, 1945.

Tuskegee Airmen Essay -- American History Military Air Force

On July 19, 1941 the U.S. Air Force created a program in atomic number 13 to train African Americans as fighter pilots(Tuskegee Airmen1). Basic flight training was done by the Tuskegee institute, a school founded by Booker T. Washington in 1881(Tuskegee Airmen 1). Cadets would finish basic training at Tuskegees Moton Field and then move on to the Tuskegee Army Air Field to complete his transition from training to attack aircraft. The early Tuskegee squad were taught to fit in with the famous 99th fighter squadron, tagged for combat duty in North Africa. Other Tuskegee pilots were commissioned to the 332d Fighter assort which fought alongside with the 99th Squadron based out of Italy. By the difference of the war, 992 men had completed training at Tuskegee, 450 were sent overseas for combat . During the same time, almost cl died while in training or on combat missions. Additional men were trained at Tuskegee for aircrew and ground crew.The Mustang pilot spotted the range of mo untains of Bf-109s heading toward the crippled B-24. The pilot, a Lt. Weathers, dropped his wing tanks, and turned into the German formation. He gave the leader a burst with his .50 calibers and it nosed up, smoking, and soon went hurtling down to the ground. The pilot radioed the others in his flight and heard Im cover behind you. But when Weathers looked back for himself, all Page 2he could see was the nose cannon of another Bf-109, pointing right at him. He dropped flaps and chopped throttle, instantly slowing his Mustang, and the Bf-109 overran him. A few bursts, and Lt. Weathers had his second kill of the day. Two more e/a were even-tempered in view and seemed like easy pickings, but the voice of the Group CO echoed in the pilots mind, Your job is to protect the bombers a... ...). Luke Weathers escort mission described above provided the groups only aerial victories for the month of November. They flew 22 missions in December, running the group tally to 62 confirmed air-to- air victories by years end. Bad weather in January limited them to 11 missions, picking up to 39 in February, but without many aerial victories. On March 24, 1945, Col. Davis led the Group on the bimestrial escort mission ever flown by the Fifteenth Air Force, a 1600-mile round trip to the Daimler-Benz tank works in Berlin(Tuskegee Airmen 5). On this mission, Roscoe C. Brown, Jr., Charles Brantly and Earl Lane, each crap-shooter down a German Me-262 jet fighter aircraft. The Group received a Distinguished Unit Citation for their achievements this day(History 4). The Tuskegee Airmen continued flying and fighting, killing and dying, until the end of the war in Europe in May, 1945.

Monday, May 27, 2019

Lord of the Flies Essay

The title of this book, Lord of The Flies, refers to Beelzebub, a figure that is often linked with the devil. The book as well has several graphic symbols to Jesus Christ of the new testament, which shows us the religious integrity of the book. This essay refers to a specific character in that book, Simon, a boy who is alienated on an island with a group of other boys. Simon has just been killed by the other boys. The other boys have embraced their inner savage, and have disregarded their previous civilized lives. Simon however, is the save one who has not.In the last four paragraphs of Chapter Nine A View to a Death, of Lord of the Flies, Golding makes clear the use of infirm resourcefulness to suggest the apotheosis of Simon. The changing environment around Simon suggests his apotheosis. The sky shows us that Simon is being deified. When Simon is killed, the rain ceases (153) and the sky becomes scattered with incredible lamps of stars (153). This text suggests that Simons de ath has done for(p) noticed, from which the setting turns from a dark rainy night, into a clear, starlighted evening, as if Simon has been summoned by fellow deities.Golding describes nearby holy organisms using light imagery. The passage states that the shoreline was full of strange, moonbeam-bodied creatures with fucking(a) eyes (154). The creatures that are present in the scene are bright and full of light, which indicate the holiness of the scene, as only a deity could get in such mysterious and bright creatures. The shoreline itself is also used to describe imagery. The shoreline Simons luggage compartment was on became a streak of phosphorescence (153). The word phosphorescence is another indicator of light, which shows the imagery of the scene.It is suggestes that this is spontaneous phosphorescence, which means it suddenly luminated the dark scene upon Simons death. Golding uses several factors of the environment to create light imagery, which suggest the divine change th at Simons body is going through. The imagery used to describe the transformation of Simons body suggests a divine change. Golding describes how Simons body becomes outlined. On the beach, the line of Simons cheek silvered (154). The reference of silver, which is referenced multiple times in this passage, shows that Simon is being encrusted in a outline that is abnormal to mortals.As in, he may be dead, moreover his body is being immortalized like a god. Imagery is used to describe the creatures that asphyxiate Simon and their actions. These creatures with their fiery eyes busied themselves round his head (154). The creatures are rounding Simons head, which creates a halo, an angelic symbol. The halo is often drawn on angels, which are prophets of deities. Simons body becomes permanently preserved as a deity. After the creatures surround him, the turn of Simons shoulder became sculptured marble.Marble is a stone that is usually used to create statues of gods and goddesses, which is the bright stone that Golding states Simons body transforms into. Golding uses deity-like qualities to describe Simons dead body with light imagery. Simons environment, as well as his dead body, has been proven to show clear symbolism between him immortal deities. Golding uses light imagery to accomplish this. Simon was executed for no logical reason in this book. It is important to note that the savagery of primitive society slowly, but steadily, got the best of these boys, with the exception of the one boy, who brought reason but was rejected.

Sunday, May 26, 2019

Ace Water Spa Case Study

blast Water resort is a resort-type spa that offers traditional manipulate services through the use of hydrotherapy systems that utilize piddle jets in order to provide water therapy to its guests. It first opened in Del Monte Ave. , Quezon metropolis in 2005. It prides itself as the Philippines first ever European therapeutic spa concept. It is a spacious spa that has 20 unique and fully automated supersonic Massage System equipped with therapeutic turquoisetic jets that helps customers with different health benefits which depends on the type of massage and machine they will use.Ace Water Spa includes day spas, fitness clubs and gyms, and water resorts as their competitor. Examples are The Spa, Fitness First, and Splash Island. Compared to other day spas, the price of Ace Water Spa is much cheaper, which yet costs Php. 480. 00 for adults and Php. 240. 00 for children 4ft. and below, while on other spas, the rates ranges for about few thousand pesos. However, other spas are mor e private than Ace Water Spa, because Ace Water Spa is a resort-type spa where everyone has access to the pools, while other spas have individual rooms for every customer.Compared to water resorts, the price of Ace water Spa is more expensive. Like for instance, the rates of Splash Island on weekdays costs Php. 250. 00 for adults and Php. 200. 00 for children. During holidays and weekends, their rates cost Php. 325. 00 for adults and Php. 250. 00 for children. On the other hand, water resorts only cater aqua thrills, adventure, and fun while Ace Water Spa offers massage services. Compared to fitness clubs and gyms, they focus on developing health and fitness. They have different exercise studios, machines and equipments, and person-to-person training.Nevertheless, Ace Water Spa focuses on developing overall well-being through a variety of services. Ace Water Spa has been profitable on its first two years of operation. It has successfully differentiated itself from other day spas, f itness clubs, and water resorts. But since it is a resort-type spa, there have been negative comments regarding the thingumajig of customers. The place can sometimes be too crowded which results into uncomfortably experience of the customer. Although high traffic would be an advantage to Ace Water Spa, collect to the means of high profitable margin, they must also balance profitability and customer satisfaction.

Saturday, May 25, 2019

Hrm

This essay is an evaluation of a worldwide statement on the subject of most essential part of any organisation known as mankind resource commission a. k. a. HRM. This essay allow for enlighten the study of the concerns in benignant resource overseement (HRM) which is symbiotic on 2 very important factors examining and appraising. This essay will also throw light on the difference which is between regions and the employees working in those regions.The briny benefit of human resource management (HRM) is to gravel an efficient way to examine the concerns to an examining line manager or supervisor because making decisions and viewing mo of problems concerning about the situation going on in transmission line world show a path to minimize the attempt in the part of human resource also known as HR. This process helps a line manager to have a broad idea and provide more flexibility in a diverse circumstance to make a proper decision so that the work ignore be d single perfectly and connection tail assembly make profit out of it.This essay will also highlight the points on the milieu which influences a party alongside with randomness of human being matters and the connection of many another(prenominal) factors which be affecting the seam world in present. 2. 0 Introduction A term which is known as globalisation in now a days has get down a very important matter of consideration for the people of this world. In this present prison term the supra mentioned term is missing by the department of human resources a. k. a. HR. The most important part of any party or organisation in this present meter is human resource management (HRM).The aim of human resource management department is just not to solve the problems which argon reasons by players of an organisation or the problems created by organisation it self but the aim of human resource management (HRM) is to provide a competitive upper hand to a company in their pedigree alongside with the man ufactured goods superiority, production and accomplishing the aims and missions in appropriate point in time economic eithery and successfully. The department of human resource management (HRM) is still mended to be improved in terms of hiring people for job.The employee should be selected on the basis of merit relatively than on the basis of any opposite source or power. The higher management should take notice of all the important aspects such as culture and tradition so that all employees can be bind comparable a bunch and an organisation can make most of their talent. 3. 0. HUMAN RESOURCE MANAGEMENT (HRM) 3. 1. Connotation of Human alternative commission The meaning of human resource management (HRM) is to choose, expand, encourage and preserve human supply in a business. HRM first hire the right soulfulness for the job for example manager and workers. HRM guide and widen the hired ones.HRM then encourage the workers by awarding benefits and promotions. HRM also make sure t hat the beaver environment should be given to the workers to work freely. HRM direct concern is with the workers working for an organisation in other words it can be stated as to manage the workers in an organisation. (Alan Price, 2011) 3. 2. Characteristics of Human option Management The subsequent atomic number 18 the main characteristics of human resource management 1. HRM process is leechlike on four purposes which are as follows Selection of human supply. Expansion of human supply. Encouraging of human supply. Protection of human supply. 2.HRM is not a process which is done for only one time. HRM is known as continuous process. This process is mended to be change time by time depending on the conditions faced by an organisation. 3. There are chiefly for places for human resource management which are as follows Business perspective Individual perspective Social perspective Group or unit perspective 4. HRM is a universal practice for any sort of business such as schools, un iversities, transport department, corporations and and so forth 5. HRM department fulfils the duties as execution management, strategic homework management, training, career development ant etc. . HRM is multi corrective which means it deals with different matters such as psychological factors, educational factors and etc. 7. HRM eer try its best to shape up the team strength. Team strength helps workers to work collectively and achieve the aims of a corporation. This factor is most important factor in this present time. 8. HRM increase the potential in the workers of a company. This increase of potential helps the workers to be well-organized and provide them job happiness. 9. As the technology is changing rapidly in all means and then it can be a problem or a threat to a business.HRM department track these changes and rectify the possible problems which can be caused by these aspects. 10. HRM provide long time benefits for the workers, business and civilization. The benefits a re in shape of financial and non-financial for all of them. It also helps the profit margin of a business and provides good quality for services. ( Michael Armstrong, 2006) 3. 3. Span of Human Resource Management Span or scope of Human Resource Management is defined as 1. Human resource planning (HRP) determines the workforce requirement and workforce supply of a business. HRP compares these two factors.If the workforce is extra then HRP makes sure to cut it chain reactor and vice versa. 2. Acquirement role consist of hiring, choosing, position and human resource planning. HRM makes sure that appropriate psyche is selected for the job. 3. To appoint at the right place of workers is handled by HRM because proper job for a worker gives a worker motivation and increase their competence. 4. Performance management is conducted by HRM to keep track of a workers performance. 5. HRM helps the workers for the organisation to develop their careers by means of promotions in next years in th at respectfore it also results in helping organisation. (K. Aswathappa, 2007) 4. . Impact of Human Resource Management on Business This part is to evaluate the role of HRM and provide an overview on the understanding of HRM in a perspective of an international student.The importance of HRM in success of any sort of business is getting at an coarse level day by day. The most essential department of any business or organisation is HRM. The importance of HRM is at high level and due to that all line manager or supervisors in HR have become a part of team. The main aspects which are dealt with HRM in retail labor are explained below 1. The Particular Human Resource Atmosphere of selling Employees are the ain source in any type of business. This is a big fact in retail industry because retail industry consists of very capacious number of staffs or employees in enounce to provide service to their customers. The human resource atmosphere in retail industry has it own main characterist ics like a huge number of staff with less(prenominal) experience, lots of workers are part time, keeping track of a worker, and shifts are long and dissimilarities in the get hold of of customer. These characteristics also create problems for retailers. First thing which is huge number of staff may result in poor presentation, high salaries and skiving.Secondly, a person with not that high qualification and without experience can apply a job in retail for the positions of till operator, staff for shop floor, trolley henchman, warehouse assistant and etc. On the other hand many workers in retail industry are part time workers which can leave the job at any time. On the second hand time is a big issue for retail industry because extensive working hours in retail industry need two shifts of workers, so retailers have to code staff with keeping all these aspects in their mind i. e. some might be part time workers and some will be full time workers.Thirdly is to watch over a worker or an employee because customers are the main core part of retail industry so a retailer have to be sure that the perfect service is being provided by the staff members to a customer and there is a proper check on the behaviour and manifestation of a staff member. Finally the main aspect dissimilarity in demand by a customer can be a problem to a retailer in such sense that retailer have to speak out on the point of how many staff members are required. Retailers should have knowledge of all the main events and should prepare in advance the availability of staff. (A. J. Lamba, 2002) 2.The procedure of HRM in Retail Industry The process of HRM in retail industry is dependent on four main features which are development, hiring and choice, training, performance. When a process of HRM is implementing by a retail industry the laws for labour and privacy factor for employees or workers is to be considered deeply. Development After analyzing of the present employees the outcome will help an organisation to appraise the performance of a department and helps them to think on what sort of staff is needed to form the accurate set of skills which are needed. The main point which retailers have to think is to ecruit appropriate persons for the position so that work can be done efficiently. Recruitment of huge number of staff may result in immense costs and too few will result in incompetence of tasks. Hiring and Choice When there is a need of new workers to an organisation they use many different paths in station to hire the most appropriate person for the job. The paths or channels which are used by an organisation are institutions of education, television, meshing and recruitment agencies or any other effective way to recruit the appropriate person. Training Training is the most essential aspect for HRM.After hiring an appropriate person the main aspect which falls next is to train that person so that companys strategic plan can be utilized and company can make more out of it. Performance After all the steps the main thing is to monitor the performance and keep track and succeed on the performance of an organisation and keep the knowledge whether goals are being achieved or not. If there is case of no then HRM department should make decisions to defeat the problem and rectify it as soon as possible so that no harm could come to the efficiency of work and to the accounts of company. S. C. Bhatia, 2008) 5. 0. INTERNATIONAL VIEWPOINT OF HRM In order to explain the international viewpoint or perspective of human resource management (HRM) the best possible way is to compare the HRM practices between two regions or between two countries. The below mentioned details are about the HRM practices in these two countries. 5. 1. HRM Practice in chinaware People Republic of chinaware a. k. a. China is a country located in East Asia. The capital of China is Beijing and the population is 1. 3 billion people and language of China is Mandarin Chinese.China is th e world largest exporter and second largest importer of goods. Human Resources in Chinese industrial sections are divided in two units. Cadres This unit consist of the staffs which handle constitution or people with white collar jobs for e. g. directors, engineer, government officials and managers. Workers Workers are considered as employees working on lower level. The changes which are being made in traditionalistic HR practices in China are defined below The process of hiring has changed from planning purpose to prediction purpose. A new system is being implement for labour which is known as contract labour system instead of old way that was lifetime job. The rewarding system has change and it now dependent on the performance and hard work. HR PRACTICE The major HR practices which are undertaken by China are defined below Staffing & Choice The companies in China select their employees on the foundation of abilities, jobs history, work experience, command on language and ambitio ns for careers, furthermore the Chinese companies take an overview of all the talent and characterized them in troika types which are full experts, home appointed and local-plus.Each of these categories has different scale of salaries and rewards. The techniques or methods used by China in order to recruit are finished ads, agencies, university grounds placements, international representation and etc. Choice or selection by China is dependent on three paths. The first path is interrogate secondly it is a test and thirdly it is behaviour affair. Training and Maintenance The most important methods which are used by China in order to train and manage their employees are training for technical aspect, language expertise, pre exit method and working culture training. Encouragement and Prize System In order to make a good profit for company and to control quality management organisation encourage their employees by rewards and giving them promotions so that they keep always motivated a nd give their 100% in the field. Working Customs Working customs or culture in China is dependent on these features which are admiration for age, individual relations, group discussions and agreement. (Fang Lee Cooke, 2005) 5. 2. HRM Practices in India The HRM practice in India is dependent on these aspects Recruitment and Selection A good educational primer coat is required along with workers recommendations, sequence planning, and conducting test before hiring and they use internet help to recruit for e. g. Naukri. com is the first Indian website for seeking jobs. Media is being used to recruit employees and all the requirement can be given through media. Selection is based on the sets of questions which are concerned by age, status in society, family and etc. Training and Development Training and development are known as future direction.The training and development method which are used by Indian companies are by running programs of training, training regarding promotions, in-h ouse training programs and etc. Performance Appraisal This method is used by Indian companies to evaluate the performance of a worker so that it can be decided for that employee whether he needs time or he needs training in order to do the work efficiently and this practice is carried out by manager or supervisor. Rewards and Benefits In accumulation to a basic wage extra rewards or compensations are being awarded by the companies in India.The rewards are in the shape of home loan, medical facility, travelling facility along with casual leaves, sick leave, emergency leave, one-year leave and national holidays are also awarded to employees in India. The retirement age in India for government officials is 60 years where as for private sector it is 55-60 years, hence after retirement in both sectors a huge amount of lump sum is awarded to the retired official although a private sector employee is paid less as compared to government employee. (Gurpreet Randhawa, 2007) 6. 0. ConclusionT here is a great bond of attraction between the workers of an organisation and cheek it self. Management in an instantly hike is anxious in corporeal service materials that can assist in measurement and incredible utilization of service by their businesses. The stagings of do commerce amalgamations will also provide workforce a blemish on to be perceive sound largely if ethically incorrect actions are useful in the position of job. One of the able habits is to decrease difference to professional revolutionize in training and affirmation.Conversation stuck between the workforce and the company is also an energetic organization of human resources management (HRM) in the Post-modern viewpoint. Sensible account of the human resource management (HRM) is a major piece in verbal statement demonstration. establish on these negotiations, the workforce in an organization can get better in their discriminating of their occupation and that of others in an organization, understands the verbal s tatement of a business usual at helping the industry achieve the aims set out, as well as contribute to the maturity and maintenance of a embrace in the open market for the production.In accumulation, the management of organization and cooperation can reduce difference as in good health. Organization is to change judgment to shatter into including disfiguring legitimacy, meandering, and negatively charged in sequence. Joint venture is a unforced structure to get better resisters grip but it could be infertile if objectives information that they have been trickery. Last act desire is simple on the compartment and simple to carry out to obtain grasp up, it is moving the rule but business can take benefit of right away intimidations and services to put into result their workforce. 7. 0. References 7. 1. Books Price, A. , 2011, Human Resource Management, 4th Edition, Cengage Learning. Armstrong, M. , 2006, A Handbook of Human Resources Management Practice, 10th Edition, Kogan Page Publ ishers. Aswathappa, k. , 2007, Human Resource and Personnel Management, 4th Edition, Tata McGraw-hill Education. Lamba, A. J. , 2002, The Art of Retailing, Tata McGraw-hill Education. Bhatia, S. C. , 2008, Retail Management, Atlantic Publishers. Cooke, F, L. , 2005, HRM, Work and Employment in China, Routledge. Randhawa, G. , 2007, Human Resource Management, Atlantic Publishers. 7. 2. Website www. fiber2fashion. com www. scribd. com

Friday, May 24, 2019

Amazon vs Wallmart

amazon vs Wallm Amazon vs. Walmart Alexandra Tikhonkikh Professor N. Kentish Metropolitan College of forward-looking York The case study Amazon vs. Walmart is illustrated several concepts, which was described in the chapter. One of them is a sales Revenue Model where companies get revenue enhancement by selling goods, information, or dish outs to clients. like Amazon. com which sells books, music, and other products. Another one is e-tailer model.It is close to the typical bricks-and-mortar storefront, except that customers only contract to connect to the Internet to check their items and place an order. The value scheme of e-tailers is to pop the question convenient, low-cost shopping 24/7, offering large assortments and consumer choice. Some e-tailers, such as Walmart. com, indicated to as bricks-and-clicks, ar divisions of come throughing physical stores and have the same products. Others, however, exist only in the virtual world, without any ties to physical positionin gs like Amazon. com. Before we going to analyze Amazon and Walmart. om using the value chain and warlike forces models, we theorize to describe these two concepts. Business Value Chain Model include 1) views firms as series of activities that add value to products or services, 2) highlights activities, 3) ancient activities vs. secondary activities, 4) stick how information trunks could advance customer and supplier disintermediation at each step of development, 5) utilize benchmarking. Michael Porters competitive forces model provides general view of firm, its competitors, and environment.It likewise substitutes products and services. The model include customers and suppliers, moreover, it contains traditional competitors and hot market entrants. Besides, five competitive forces shape fate of firm. Amazon. com started as on line bookseller, but has expended into a great variety of media, electronics, and other general merchandise categories in obligate of its blood line s trategy. Amazons value chain includes primary and support activities. Primary activities argon very important for business, because those needed to manufacture a product or services for the end users.These activities typically include 1) service basically meant by after-sales support like user training, install applications, customer support and etc. , 2) operations manufacturing the product, 3) inbound logistics receiving goods from supplier and storing those goods, 4) outbound logistics sending goods to wholesalers, retailers or directly to the end customer, 5) market and sales product needed to be sold to the end customer, to understand customer requirements and also to promote goods.Support activities help to facilitate or assist the primary activities of producing product. on that point are four category 1) Procurement purchasing raw material and other items used in operations, 2) Human Resource Management recruiting, hiring, firing, training, developing, compensating, 3) te chnical Development research and development, unconscious process automation, software, hardware, equipment, etc. , 4) Infrastructure may include accounting, legal, finance, planning, public affairs, government relations, quality assurance and general precaution.As to Amazons competitive advantages from a value chain there are several strategies of development like strong technological infrastructure with a single platform, high investments in technology development for example Kindle, the best leverage digital products, great product forecasting system, print on pauperization, constantly imploring suggestions on new products, easy and fast payment system, 24/7 operations, free returns within 30 days. Amazon. com competes with product specific retailers online marketplace and mass merchandise retailers.This creates an environment of intent competition and requires Amazon. com to differentiate itself uniquely based on the competitor. Lets try to jerk a Wal-Mart position from the competitive model as well. argument among rivals is fairly weak. The market is crowded but Wal-Mart has the lowest costs, prices, profits, and market share. The warning of substitute products is also weak. Wal-Mart exerts a great deal of effort in making sure they are innovative and meeting customer requests. The endgaining power of suppliers is weak as well. For most producers, Wal-Mart would be their largest account.The bargaining power of buyers is also weak. There is a very extensive base of customers and a meaningful demand for low prices. The threat of new entrants is weak. Wal-Mart has a scale of operation that is very important, it would defecate years, maybe even decades, for a new company to be on the same level. Even prominent companies today would have really difficult magazine matching the costs and prices Wal-Mart provides. A more sophisticated analysis of Wal-Marts internal value chain shows that Wal-Mart is hold in esteem to technology and was the ? rst merch ant, which uses bar codes.It also uses satellite connections to communicate with all its stores. Moreover, Wal-Mart has integrated its POS, inventory-control, RFID, and other logistical technologies to haste product delivery, improve security and decrease costs. Besides It has developed regional obtaining centers in addition to its legendary center in Bentonville, Arkansas. Wal-Mart even has one in Shenzhen, China. Merchants set up satellite of? ces next door to the most suit subject procurement center. Because Wal-Mart is a retailer, not a manufacturer, its external value chain is extremely simple.It deals with a variety of merchants and sells to customers. But the secret to discovering what fudges Wal-Mart successful in analyse its internal value chain. We should mentioned Walmarts competitive advantages from a value chain perspective. First of all it is a distribution capabilities well-organized distribution, leadership of Walmarts own distribution centers and turned location strategy. Second, is partnership relationship with merchants integrates suppliers via IT treats them well in terms of pricing, they are more business partners than value takers.Third, is advanced data mining dynamic theme and usage of customer buying behavior report. Forth, workforce culture and EDPL customer-oriented workforce interested through substantial monetary contribution and belief in Walmarts culture. And thats not hard consider the fact that Walmart is virtually 50 years old. Wal-Marts business strategy is to provide Every day cut Prices or EDPL for all its products and services. Their organization, company culture, and supply chain management all support and emphasize this business strategy.Also, Wal-Mart use strategy of managing costs which include budgeting payroll cost, saving on business travel cost, investing in technology, eliminating unnecessary costs. Another strategy that we have to mention is a strategy of managing growth, which consists of location and acq uisition. And the pull through one called strategy of managing stack resources. Every company that wants to be successful supposes to pay attention to this strategy as well. Internal promotions, employee motivating and external enlisting are the main components of this strategy.By implementing these three important strategies successfully, Wal-Mart has become from a single store to the biggest retailer in the United States and the biggest company in the world. The cost management strategy of Wal-Mart was created an operational model with the lowest cost which was increased the ratio of profit on the financial reports. Products instal in Wal-Mart stores are not considered to be a high-end, luxury, or fashion oriented. Because their strategy is being a low price leader. Wal-Mart aims to provide a wide variety of products under one location for a low price.Wal-Mart stores also carry their own private labels that compete on price with national brands. Moreover, the growth management strategy had hauled Wal-Mart into the right steerage of investment and expanded radically around the distribution center. However, the people management strategy motivates all employees to work more efficiency and generates a great work environment which full of self-improvement, competition, and respects. It also provides a chance for people to build-up experience from the low-rank position to the high-rank position.Consequently, strong management in these three strategies had transformed Wal-Mart into the biggest company in the world with the highest number of workers worldwide and had also provided benefits to millions of people around the world by transferring avoidable cost into low-cost products. Now we are going to consider the management, organization and technology factors that have contributed to the success of Amazon. Firs of all, Amazon is convenient and easy of use. It has a large selection of different items, unlimited virtual shelf position and wholesale relations, so you could find any product for acceptable price.The service is high performance, which could be proven by high speed and reliability. Customers are unploughed informed well about new products and the system that provides shipping makes the process fast. Also, Amazon use innovative technology, which contribute development and support of all system in whole. For short time Amazon. com became a well-known brand with cross promotion, high advertising, co-branding and publisher relations. Amazon. com is also famous for its large community where customer and motive reviews post. It has a great gift policy for customer like bookmarks, notepads, cups, etc.Amazon arranges promotions where customers could collaborate with famous authors. The site has a large customer database with personalization pages, which contain extensive customer profiles. It also has recommendation pages, which help other readers make a right choice. Amazon has a high trust for their users because of guarantees a nd return policy. Great customer service is also promote trust of users because of superior service reps, easy search, email confirmation, extended service, extensive subject index, ability to order before publication. By the route Amazon has good cost structure.Besides low prices it has fast, reliable and inexpensive shipping. Amazon and Wal-Mart using e-commerce is a fascinating combination of business models and new information technologies. Wal-Marts impressive growth in such a short time and perhaps the most important factor in its rise was their exploiting of the pronouncement of e-business, e-procurement, and the modification of internal processes to maximize its benefits. In compare with others companies, Wal-Mart transformed supply chain management by using a sales revenue model where customer requests satisfy by wise variety of goods.Inventory control is thoroughgoing(a) improved and purchasing trends are available to sellers, whom nowadays must be able to respond as qu ickly as possible to the needs of millions of customers. To decentralize the procurement was a great business decision for Wal-Mart, that helped simplify the process for employees in every store immediately order the applicable stock automatically, which is require prompt turnout of product from the suppliers. This fast replenishment system, attached with perfect purchasing forecasting, helps Wal-Mart reduce overall costs.Wal-Marts power as a giant in business has helped in establishing new criterions for B2B e-commerce. Wal-Marts approach of stinging costs at all costs resulted in them deploying EDI over the Internet to eliminate the costly VAN altogether. EDI over the Internet (EDI-INT) uses a new standard called AS2, a communication protocol that attempts to make EDI communications over the Internet both secure and reliable. By mandating their suppliers to use AS2, Wal-Mart leads the way in creating a demand for a new generation of EDI, and in turn drives the whole world of e-b usiness advancing.Amazons e-commerce business model Amazon started as a store that focus primarily on books and music. It quickly expanded to other sectors and now sells products in nearly every segment apparel, home improvement, groceries. In addition, Amazon has expanded from a Business-to-Consumer (B2C) only store to a mixed model with its corporate account functionality that focuses on business customers. Added to the mix, is the Amazon marketplace Amazons answer to eBay, which allows merchants to list their products and customers to purchase from merchants eyepatch using Amazons e-commerce platform.As a provider of e-Commerce software to mid-market, we use Amazon as a reference for the features it has on the web store. Some of these features not easily found on other sites include the 1-Click Ordering, Customer Viewing, Recently Viewed Products, Keyword Auto-fill on the product search, Your Personalized Store, and Items to Consider. While some of these features are relative ly easy to implement e. g. 1-click Ordering, others are not so easy and demand an advanced platform. But selling goods isnt the only way to make money with Amazon. com.The sack sites affiliate program is one of the most famous on the Web. Through Amazons Associate Program , anyone with a Web site female genitals post a link to Amazon. com and earn some money. The associate can also take advantage of Amazon Web Services , which is the program that lets people use Amazons benefits for their own purposes. The Amazon Web Services API (application programming interface) lets developers access the Amazon technology infrastructure to build their own applications for their own Web sites. every(prenominal) product sales generated by those Web sites have to go through Amazon. om, and the associate gets a small commission on each sale. On the flip side, Amazon seems to not have kept up with the Web 2. 0 and Web 3. 0 user interface improvements and for most part still incorporates Web 1. 0 t echnology which means you still need a mouse click to view a product as opposed to being able to see product details with a mouse roll-over. Amazon could use a make-over to make for a brighter shopping experience. For my opinion Amazons e-commerce business model is stronger than Wal-Marts e-commerce business model because E-commerce is Amazons core mission and environment.Amazon started with a store that was properly feature-rich for its time and has gone on to fort that foundation. Today, it probably defenses as the leader in terms of the richness of its e-Commerce features, product breadth, personalized recommendations and depth of content available across e-commerce sites. However, there is a need for Amazon to offer a simplified and trendier shopping experience as an alternative which many other sites now offer. I dont think Wal-Mart will deputize Amazon any time soon, if ever, but it gives them a good shot of increasing their overall Web penetration.Amazons value proposition until now has been a broad assortment. This enables Walmart to compete with other companies with big assortments. I would prefer to make my internet purchases at Wal-Mart because this company has a great experience and long term history. Wal-Mart exists almost 50 years, Amazon is a brand new, successful but still doesnt have that experience that Wal-Mart does. Some reviewers have actually built their quest on Amazon. com with good quality reviews. References 1. Wal-Mart Form 10K Portions of Annual Report to Shareholders.United States Securities and Exchange Commission. Retrieved June 28, 2011. 2. Ann Zimmerman (2010-06-07). Rival Chains Secretly Fund Opposition to Walmart. The Wall Street Journal. Retrieved 2010-06-08. 3. Daniel, Fran (2010-09-29). oral sex of Walmart tells WFU audience of plans for growth over next 20 years. Winston-Salem Journal. Retrieved 2010-09-29. 4. Walton, Sam Huey, John. Sam Walton Made in America My Story. New York Bantam, 1993. ISBN 978-0-553-56283-5. 5. Sam Walton Great From the subtract HBS Working Knowledge 6. Frank, T. A. A Brief History of Wal-Mart. The Washington Monthly.April 1, 2006. Retrieved July 24, 2006. 7. The Rise of Wal-Mart. Frontline Is Wal-Mart Good for America?. 2004-11-16. Retrieved 2007-09-19. 8. The Wal-Mart Timeline. Wal-Mart (published on walmartfacts. com). Retrieved July 24, 2006. 9. 2010 Form 10-K, Amazon. com, Inc. . United States Securities and Exchange Commission. 10. Amazon. com Site data. Alexa Internet. Retrieved 2011-12-02. 11. Jopson, Barney (2011-07-12). Amazon urges California referendum on online tax. FT. com. Retrieved 2011-08-04. 12. Amazon Spain launch may presage new overseas push, Reuters, Sept 14, 2011. 3. Ann Byers (2006). Jeff Bezos the founder of Amazon. com 14. Harvard Business retread. Harvard Business Review. Retrieved 2010-08-29. 15. Person of the Year Jeffrey P. Bezos. Time Magazine. 1999-12-27. Archived from the original on 2000-04-08. Retrieved 2008-01-05. 16. Rivlin, G ary (2005-07-10). A Retail Revolution Turns 10. Seattle, WA The New York Times. Retrieved 2011-08-04. 17. Amazon. com Introduces New Logo New Design Communicates Customer Satisfaction and A-to-Z Selection. Corporate IR. net. Retrieved 2010-08-29. 18. Amazon company timeline, Corporate IR. *

Thursday, May 23, 2019

Gang Prevention

Broad Topic young Gangs Narrow Topic The Prevention of Gangs in Los Angeles Thesis Statement The Mass Media Influences on Youth Joing Gangs I. Introduction A. Is our youth and teens being influenced by the mass media to join gangs? B. Is the media becoming more violent? C. What options do youth and teens have to prevent joing gangs? II. Body A. sort 1. The mass media portrays gang member behavior. 2. Language and dress code are taught to kids at a young age. B. Effects 1. Execution of gang members 2. Getting away(predicate) without being caughtConclusion A. Community-chosen programs to lure youth, keep them busy and happy, and even motivate them to change their ways. B. The local social conditions in which our youth are raised in bigger cultural generate great numbers of violence in individuals. Q1. Most cities trying to reduce gang violence deny that they specifically target at-risk kids. As Nanette Smejkal, director of El Pasos parks and recreation department, says, From our pers pective, all kids are at risk. Thats why they need positive programs(Weintraub).This shows how youth gang prevention provived by the urban center during the summer to all its recreation centers and parks for kids under the age of 17. Waiving the annual membership fee that proved onerous for many an(prenominal) poorer youngsters. Q2. It is guns, it is poverty, it is overcrowding, and it is the uniquely American job of a culture that is infatuated with violence. We love it, we glamorize it, we teach it to our children(Surette). This demonstrates that our youth and armed aggression is not an American cultural right,and will determine the medias net relationship to youth and violence.We must as a society address everything we can, such as economic inequities, the gun culture, and the glamorization of violence. And, by a slow, painful, generational process of moral leadership and example, we must work to modify the individual, family, and neighborhood itemors that violently predispo se youth. Q3. The debasement of our culture, of which gangsta rap is a big part, has coarsened children in general and put high-risk kids in a perilous place. Taking drugs,carrying uns, and disrespecting human beings is now not only socially acceptable in many situations, it is downright glamorous(OReilly). This shows how we as a society can reduce one aspect of violence in a violent society and digest real results. Youth violence will not be seriously reduced without violence in other aspects of our culture being addressed. In the equal vein, modifying media violence alone will not have much effect but to ignore it will make efforts on other fronts less successful.Despite the fact that the media have limited independent effects on youth violence, we need to expand the focus on them. P1. Gangs are violating our children and our community how these kids walk around with these guns, verbalise Harlem Mothers SAVE co-founder Jackie Rowe-Adams. We have to go after these laws on the f ederal level and go after the NRA and the ATE(Adams). P2. We are in a very dangerous situation because this was right outside of a school and kids were outside in the play area.What we are seeing now is not what we are used to seeing, which is a new phenomenon with conflict between groups from different neighborhoods(Perkins). P3. Kids join gangs for various reasons, Donahue says. only when I also believe its a breakdown of the family, and I know everybody paints that picture. But if they were getting that support at home, they wouldnt join the gangs. (Lozada7-14). TitleNew weapons in the fight against gangsSourceParks and Recreation AuthorBoris Weintraub Publication Date November 2009

Wednesday, May 22, 2019

Othello Coursework Essay

Othello is atomic number 53 of Shakespeares tragedies but excessively a love story of two lovers. Shakespeares tragic heroes al rooms had at least iodin main flaw, which contributed to their downfall. In Othellos case it was grabbyy when he was told Desdemona was having an affair. Other themes the play deals with includes hatred, racism, betrayal and discrimination. Although Othello is the main protagonist in the play, however, in many ways Iago seems to be the dominant guinea pig. Iago is presented in complete contrast to Othello, and is the villain of the play.Othello is a respected graduate(prenominal)-ranking general whereas Iago is a lower status and referred to as in his ancient or his ensign. Many critics often describe Iago as the narrator of Othello a fascinating character who is the main focus of the play. Many critics also see Iago as an intriguing character as he can be unpredictable. At the beginning of the play, it is Iago and Roderigo who are the first on stage, not Othello. If one were to form an opinion of Othello from this discussion, it would not be a favourable one.The audience is made aware of Iagos hatred of Othello because Othello promoted Cassio instead of him and his belief that Othello slept with his wife. Furthermore Roderigo is jealous of the fact that Othello has taken Desdemona as his wife. In Act 2 Scene 3 of Othello, Iago is presented as the puppeteer, constantly manipulating everyone around him. Critics have argued about Iagos motives for absentminded to hurt others but in this scene he comes across as cruel and malicious. The scene is set in a castle and opens with Iago trying to get in Cassio drunk.Iago motivated by his lust for proponent is attempting to dispose Cassio of his position as a lieutenant. Knowing that Cassio cannot handle his liquor it would be more likely he would fight if hes drunk and that would educate him look bad in Othellos eyes. The opening scene presents us with a brief interchange of Cassio a nd Iago controversial analysis on Desdemona. In the dialogue, Cassio remarks are polite and complimentary to Desdemona stating she is exquisite lady, fresh, delicate creature, modest and perfection. Iago on the other hand has a contrasting view compared to Cassio.Iago suggests that Desdemona is full of game and sport and that there is provocation in her eye suggests both characters have different views on women. Iagos low opinion of Desdemona only deepens his misogynist view and his hate for women because of the control Desdemona has over Othello. This can portrays his jealousy because Desdemona is an extremely attractive character with a higher noble status than his wife, giving him a reason to hate Othello. Iago has the opportunity to consider his plans in his soliloquy when Cassio leaves to invite some friends for a drink.One way we can tell the presentation of Iago as a character in Act 2 Scene 3 is through his soliloquies. It reveals Iagos true character and intention to get C assio drunk so that he loses control and becomes quarrelsome to get into a fight with Roderigo, Am I to fix our Cassio in some action. His skills of persuasions show his power to manipulate people into trusting him to cover his act of being an honest friend that adds to the presentation of his character. Iagos clever perspective to observer this from a person allows the audience insight into various schemes or secrets to his motives that other characters are blind to.Furthermore, Iagos understanding and manipulating the weakness of those around him make him a powerful and compelling figure that Shakespeare have portray in this scene. Cassio who has been left in a position of responsibility by Othello will shame himself as a lieutenant and loose his position as part of Iagos plan that will collect him power for his genius of understanding and manipulating peoples weaknesses, If consequences do but approve my dream. Iago states he is willing to take on revenge on anyone that gets in his way of achieving Othellos downfall.The end result would make up for what he lost on his way and enjoys the pain and damage he causes which he approves. The first soliloquy in this act shows us how narrow-minded Iago is and lacks emotions or feelings towards the people around him or himself. W. H Auden describes Iago as a Practical joker of a fishy appalling kind. W. H attempts to portray Iago as a more humane character than he really is. Loyalty, love, friendship and guilt are all emotions that make us human. Iago misunderstands this concept of feelings, which leads him to his downfall.Shakespeare presents Iago with loss of emotional connections in his character show the tragedy of how isolated Iago is. Shortly after Roderigo raises the alarm under Iagos instructions, Shakespeare uses striking irony to present Iagos actions as he pretends to be the peacemaker. Othello aroused from his sleep ask honest Iago for an explanation of the disturbance. Without being disloyal to Ot hello or to Cassio, he ironically follows Montanos advice upon his honour as a solider to tell the truth of his version of the nights events.While trying to save Cassio by devising excuses for him, Iago endures that Othello will have no other option than to remove him as his position for causing a shameful public display. The irony of Iagos account, we cognise that Iago constantly tries to underplay Cassios part in the fight, I had rather ha this tongue cut from my mouth, Than it should do offence to Michael Cassio. With subtle additions such as, And Cassio high in oaths, which till tonight / I neer might see before and but men are men, the best sometimes block up reveals that Cassio has disgraced himself to befit a high ranking officer.Cassio sacked from his lieutenant position, Iago pretends to be a true friend by advising Cassio to seek help from Desdemona to gain his position back. This broken joint between you and her husband entreat her to splinter. Shakespeare cleverly p ortrays Iago as an evil mastermind who appears to aid Cassio, instead manipulating the situation in order to make it appear to Othello that Desdemona has emotions for Cassio when she pleads for his job. This sequence allows us to see Iagos manipulative nature in a continuous flow from the way he has made others see him to the revelation of his true self.The way hes portrayed, we are amazed by his mastery of switching facades or identities without a play along of guilt. Iago when speaking with Montano, questions Cassio integrity and his position as a Lieutenant. Iago manages to suggest his support and concern for his comrade while at the same time, destroying his credibility and honour. He mentions to Montano that Cassio is a solider fit to stand by Caesar as 2nd in command but his drinking habits matches his virtue and implies he drinks every night.Iagos apparent concerns furthers as he criticises Othellos judgement for trusting Cassio to be his lieutenant shows his jealousy to be overshadowed and therefore lost his social class that he lacks of. His hatred dominates him unsloped like he dominates all the other characters. Iago seems to master all the emotions that might affect his facade and never shows a trace of nervousness that intensify the power he has over the characters in the play and his ability to control the situation to his will.Furthermore when Iago protests to Montano that he is reluctant to highlight Cassios problems to Othello, as he loves Cassio and would not wish him any harm. The irony of this situation is the fact that once Montano suggest it would be an honest action to inform Othello, Iago declines. This is the only time we see Iago is dense and to make him look more trustworthy, he implies that his allegiance is to a higher kind of honesty.

Tuesday, May 21, 2019

The Host Chapter 24: Tolerated

It was true that I did not smell good.Id lost count of how m some(prenominal) solar daylights Id spent here-was it more than a week today? more than two?-and in all in all of them sweating into the same clothes Id worn on my disastrous desert trek. So much salt had dried into my cotton plant shirt that it was creased into rigid accordion wrinkles. It used to be pale yellow now it was a splotchy, diseased-looking print in the same dark purple illusion as the cave floor. My short hair was crunchy and gritty I could feel it standing erupt in wild tangles a expound my head, with a stiff upper brass on top, like a cockatoos. I hadnt seen my face recently, moreover I imagined it in two shades of purple cave-dirt purple and healing-bruise purple.So I could bring in Jebs point-yes, I needed a bath. And a change of clothes as well, to make the bath worth the effort. Jeb tallyered me some of Jamies clothes to wear while tap dried, unless I didnt want to ruin Jamies few things by stretching them. Thankfully, he didnt try to offer me anything of Jareds. I ended up with an old save clean flannel shirt of Jebs that had the sleeves ripped off, and a pair of faded, holey cutoff sweatpants that had foregone unclaimed for months. These were draped over my arm-and a bumpy mound of vile-smelling, broadly molded chunks that Jeb claimed was homemake cactus soap was in my hand-as I followed Jeb to the room with the two rivers.Again we were not alone, and once more I was miserably disappointed that this was the case. Three manpower and one woman-the salt-and-pepper braid-were filling buckets with water from the pureer stream. A loud splashing and laughing echoed from the bathing room.Well just wait our turn, Jeb told me.He leaned against the wall. I stood stiffly beside him, uncomfortably conscious of the four pairs of eyes on me, though I kept my own on the dark hot spring rushing by underneath the porous floor.After a short wait, three women exited the bathing roo m, their wet hair dripping down the backs of their shirts-the athletic caramel-skinned woman, a young flaxen I didnt remember seeing in the first place, and Melanies cousin Sharon. Their laughter stopped abruptly as soon as they caught sight of us.Afternoon, ladies, Jeb express, touching his forehead as if it were the brim of a hat.Jeb, the caramel woman acknowledged dryly.Sharon and the other girl ignored us.Okay, Wanda, he give tongue to when theyd passed. Its all yours.I gave him a glum look, then made my bearing carefully into the black room.I tried to remember how the floor went-I was sure I had a few feet before the edge of the water. I took off my post first, so that I could feel for the water with my toes.It was just so dark. I remembered the inky appearance of the pool-ripe with suggestions of what competency lurk beneath its opaque surface-and shuddered. solely the eternal I waited, the longer I would grow to be here, so I put the clean clothes bordering to my s hoes, kept the smelly soap, and shuffled forward carefully until I found the lip of the pool.The water was cool compared to the steamy air of the outer cavern. It felt nice. That didnt keep me from being terrified, but I could still hold dear the sensation. It had been a long time since anything had been cool. Still fully dressed in my dirty clothes, I waded in waist deep. I could feel the streams current whirl around around my ankles, hugging the rock. I was glad the water was not stagnant-it would be upsetting to sully it, filthy as I was, if that were the case.I crouched down into the ink until I was immersed to my shoulders. I ran the coarse soap over my clothes, thinking this would be the easiest way to make sure they were clean. Where the soap touched my skin, it burned mildly.I took off the soapy clothes and scrubbed them under the water. Then I rinsed them again and again until there was no way any of my sweat or weeping could have survived, wrung them out, and laid them on the floor beside where I prospect my shoes were.The soap burned more strongly against my bare skin, but the sting was endurable because it meant I could be clean again. When I was done lathering, my skin prickled alwaysywhere and my scalp felt scalded. It seemed as if the places where the bruises had formed were more sensitive than the rest of me-they must(prenominal) still have been there. I was happy to put the acidic soap on the rock floor and rinse my body again and again, the way I had my clothes.It was with a strange mingling of re double-dealingf and regret that I sloshed my way out of the pool. The water was very pleasant, as was the feeling of clean, if prickling, skin. But Id had rather enough of the blindness and the things I could imagine into the darkness. I felt around until I found the dry clothes, then I pulled them quickly on and shoved my water-wrinkled feet into my shoes. I carried my wet clothes in one hand and the soap gingerly between two fingers of the other.Jeb laughed when I emerged his eyes were on the soap in my cautious grasp.Smarts a bit, dont it? Were seek to fix that. He held out his hand, protected by the tail of his shirt, and I placed the soap in it.I didnt answer his capitulum because we werent alone there was a line waiting silently fundament him-five people, all of them from the field turning.Ian was first in line.You look better, he told me, but I couldnt make out from his tone if he was move or annoyed that I did.He raised one arm, extending his long, pale fingers toward my neck. I flinched away, and he dropped his hand quickly. sombre nigh that, he muttered.Did he mean for scaring me now or for marking up my neck in the first place? I couldnt imagine that he was apologizing for severe to eat me. Surely he still wanted me dead. But I wasnt going to ask. I started walking, and Jeb fell into step behind me.So, today wasnt that bad, Jeb said as we walked through the dark corridor.Not that bad, I murmured. Aft er all, I hadnt been murdered. That was always a plus.Tomorrow will be even better, he promised. I always enjoy planting-seeing the miracle of the gnomish dead-looking seeds having so much life in them. Makes me feel like a withered old guy might have some potential left in him. Even if its only to be fertilizer. Jeb laughed at his joke.When we got to the big garden cavern, Jeb took my elbow and steered me east rather than west.Dont try to tell me youre not hungry after all that digging, he said. Its not my job to provide room service. Youre just going to have to eat where everyone else eats.I grimaced at the floor but let him lead me to the kitchen.It was a good thing the provender was exactly the same thing as always, because if, miraculously, a filet mignon or a bag of Cheetos had materialized, I wouldnt have been able to taste a thing. It took all my concentration just to make myself swallow-I hated to make even that small sound in the dead silence that followed my appearance . The kitchen wasnt crowded, just ten people lounging against the counters, eating their tough rolls and drinking their watery soup. But I killed all confabulation again. I wondered how long things could last like this.The answer was exactly four days.It also took me that long to understand what Jeb was up to, what the motivation was behind his switch from the decent host to the curmudgeonly taskmaster.The day after turning the soil I spent seeding and irrigating the same field. It was a different group of people than the day before I imagined there was some kind of rotation of the chores here. Maggie was in this group, and the caramel-skinned woman, but I didnt learn her name. Mostly everyone worked in silence. The silence felt unnatural-a protest against my presence.Ian worked with us, when it was distinctly not his turn, and this bothered me.I had to eat in the kitchen again. Jamie was there, and he kept the room from total silence. I knew he was too sensitive not to strike o ff the awkward hush, but he deliberately ignored it, probable to pretend that he and Jeb and I were the only people in the room. He chattered about his day in Sharons crime syndicate, bragging a little about some trouble hed gotten into for let outing out of turn, and complaining about the chores shed given him as punishment. Jeb chastised him halfheartedly. They both did a very good job of acting normal. I had no acting ability. When Jamie asked me about my day, the best I could do was stare intently at my food and mumble one-word answers. This seemed to make him sad, but he didnt push me.At night it was a different story-he wouldnt let me stop talking until I begged to be allowed to sleep. Jamie had reclaimed his room, taking Jareds side of the bed and insisting that I take his. This was very much as Melanie remembered things, and she approved of the arrangement.Jeb did, too. Saves me the trouble of finding someone to play guard. harbour the gun close and dont for hail its th ere, he told Jamie.I protested again, but both the man and the boy refused to listen to me. So Jamie slept with the gun on the other side of his body from me, and I fretted and had nightmares about it.The third day of chores, I worked in the kitchen. Jeb taught me how to knead the coarse bread dough, how to lay it out in round lumps and let it rise, and, later on, how to feed the fire in the bottom of the big stone oven when it was dark enough to let the smoke out.In the middle of the afternoon, Jeb left.Im gonna lose some more flour, he muttered, playing with the strap that held the gun to his waist.The three silent women who kneaded alongside us didnt look up. I was up to my elbows in the unenviable dough, but I started to scrape it off so I could follow him.Jeb grinned, flashed a look at the unobserving women, and shook his head at me. Then he spun around and dashed out of the room before I could free myself.I froze there, no longer breathing. I stared at the three women-the yo ung blonde from the bathing room, the salt-and-pepper braid, and the heavy-lidded mother-waiting for them to realize that they could kill me now. No Jeb, no gun, my hands trapped in the gluey dough-nothing to stop them.But the women kept on kneading and shaping, not seeming to realize this glaring truth. After a long, breathless moment, I started kneading again, too. My stillness would probably alert them to the situation sooner than if I kept working.Jeb was gone for an eternity. maybe he had meant that he needed to grind more flour. That seemed like the only explanation for his endless absence.Took you long enough, the salt-and-pepper-braid woman said when he got back, so I knew it wasnt just my imagination.Jeb dropped a heavy burlap sack to the floor with a deep thud. Thats a lot of flour there. You try lookin it, Trudy.Trudy snorted. I imagine it took a lot of rest stops to get it this far.Jeb grinned at her. It sure did.My heart, which had been thrumming like a birds for the entire episode, settled into a less frantic rhythm.The next day we were cleaning mirrors in the room that housed the cornfield. Jeb told me this was something they had to do routinely, as the combination of humidity and dust caked the mirrors until the light was too dim to feed the plants. It was Ian, working with us again, who scurfy the rickety wooden ladder while Jeb and I tried to keep the base steady. It was a difficult task, given Ians weight and the homemade ladders poor balance. By the end of the day, my arms were limp and aching.I didnt even notice until we were done and heading for the kitchen that the improvised holster Jeb always wore was empty.I gasped out loud, my knees locking like a startled colts. My body tottered to a halt.Whats wrong, Wanda? Jeb asked, too innocent.I would have answered if Ian hadnt been right beside him, watching my strange behavior with fascination in his vivid blue eyes.So I just gave Jeb a wide-eyed look of mingled disbelief and reproach, and then slowly began walking beside him again, shaking my head. Jeb chuckled.Whats that about? Ian muttered to Jeb, as if I were deaf.Beats me, Jeb said he lied as only a human could, smooth and guileless.He was a good liar, and I began to wonder if leaving the gun behind today, and leaving me alone yesterday, and all this effort forcing me into human company was his way of getting me killed without doing the job himself. Was the friendship all in my head? Another lie?This was my fourth day eating in the kitchen.Jeb, Ian, and I walked into the long, hot room-into a crowd of humans chatting in low voices about the days events-and nothing happened. Nothing happened. on that point was no sudden silence. No one paused to stare daggers at me. No one seemed to notice us at all.Jeb steered me to an empty counter and then went to get enough bread for three. Ian lounged next to me, casually turning to the girl on his other side. It was the young blonde-he called her Paige.How are things going? How are you holding up with Andy gone? he asked her.Id be fine if I werent so worried, she told him, biting her lip.Hell be home soon, Ian assured her. Jared always brings everyone home. Hes got a real talent. Weve had no accidents, no problems since he showed up. Andy will be fine.My interest sparked when he mentioned Jared-and Melanie, so somnolent these days, stirred-but Ian didnt say anything else. He just patted Paiges shoulder and turned to take his food from Jeb.Jeb sat next to me and surveyed the room with a deep sense of satisfaction plain on his face. I looked around the room, too, trying to see what he saw. This must have been what it was ordinarily like here, when I wasnt around. Only today I didnt seem to bother them. They must have been tired of letting me interrupt their lives.Things are settling down, Ian commented to Jeb.Knew they would. Were all reasonable folks here.I frowned to myself.Thats true, at the moment, Ian said, laughing. My brothers not around.Exactly , Jeb agreed.It was interesting to me that Ian counted himself among the reasonable folks. Had he noticed that Jeb was unarmed? I was burning with curiosity, but I couldnt stake pointing it out in case he hadnt.The meal continued as it had begun. My novelty had apparently worn off.When the meal was over, Jeb said I deserved a rest. He walked me all the way to my door, playing the gentleman again.Afternoon, Wanda, he said, tipping his imaginary hat.I took a deep breath for bravery. Jeb, wait.Yes?Jeb I hesitated, trying to find a polite way to put it. I well, maybe its stupid of me, but I sort of thought we were friends.I scrutinized his face, looking for any change that might indicate that he was about to lie to me. He only looked kind, but what did I know of a liars tells?Of course we are, Wanda.Then why are you trying to get me killed?His furry brows pulled together in surprise. Now, why would you think that, honey?I listed my evidence. You didnt take the gun today. And yesterday you left me alone.Jeb grinned. I thought you hated that gun.I waited for an answer.Wanda, if I wanted you dead, you wouldnt have lasted that first day.I know, I muttered, starting to feel embarrassed without understanding why. Thats why its all so confusing.Jeb laughed cheerfully. No, I dont want you dead Thats the whole point, kid. Ive been getting them all used to seeing you around, getting them to accept the situation without realizing it. Its like boiling a salientian.My forehead creased at the eccentric comparison.Jeb explained. If you throw a frog in a pot of boiling water, it will hop right out. But if you put that frog in a pot of tepid water and slowly warm it, the frog doesnt figure out whats going on until its too late. Boiled frog. Its just a matter of working by slow degrees.I thought about that for a second-remembered how the humans had ignored me at lunch today. Jeb had gotten them used to me. The realization made me feel strangely hopeful. Hope was a silly thing in my situation, but it seeped into me anyway, coloring my perceptions more brightly than before.Jeb?Yeah?Am I the frog or the water?He laughed. Ill leave that one for you to puzzle over. Self-examination is good for the soul. He laughed again, louder this time, as he turned to leave. No pun intended.Wait-can I ask one more?Sure. Id say its your turn anyway, after all Ive asked you.Why are you my friend, Jeb?He pursed his lips for a second, considering his answer.You know Im a curious man, he began, and I nodded. Well, I get to watch your souls a lot, but I never get to talk with em. Ive had so many questions just piling up higher and higher Plus, Ive always thought that if a person wants to, he can get along with just about anybody. I like putt my theories to the test. And see, here you are, one of the nicest gals I ever met. Its real interesting to have a soul as a friend, and it makes me feel super special that Ive managed it.He winked at me, bowed from the waist, and walked away.Ju st because I now understood Jebs plan, it didnt make things easier when he escalated it.He never took the gun anywhere anymore. I didnt know where it was, but I was grateful that Jamie wasnt sleeping with it, at least. It made me a little nervous to have Jamie with me unprotected, but I decided he was actually in less danger without the gun. No one would feel the need to hurt him when he wasnt a threat. Besides, no one came looking for me anymore.Jeb started sending me on little errands. Run back to the kitchen for another roll, he was still hungry. Go fetch a bucket of water, this corner of the field was dry. Pull Jamie out of his class, Jeb needed to speak with him. Were the spinach sprouts up yet? Go and check. Did I remember my way through the south caves? Jeb had a message for medico.Every time I had to carry out one of these simple directives, I was in a sweaty haze of fear. I concentrated on being invisible and walked as quickly as I could without running through the big roo ms and the dark corridors. I tended to hug the walls and keep my eyes down. Occasionally, I would stop conversation the way I used to, but mostly I was ignored. The only time I felt in immediate danger of death was when I interrupted Sharons class to get Jamie. The look Sharon gave me seemed designed to be followed by hostile action. But she let Jamie go with a nod after I choked out my whispered request, and when we were alone, he held my shaking hand and told me Sharon looked the same way at anyone who interrupted her class.The very worst was the time I had to find medical student, because Ian insisted on viewing me the way. I could have refused, I suppose, but Jeb didnt have a problem with the arrangement, and that meant Jeb trusted Ian not to kill me. I was far from comfortable with testing that theory, but it seemed the test was inevitable. If Jeb was wrong to trust Ian, then Ian would find his opportunity soon enough. So I went with Ian through the long black southern tunnel as if it were a trial by fire.I lived through the first half. Doc got his message. He seemed unsurprised to see Ian tagging along beside me. Perhaps it was my imagination, but I thought they exchanged a significant glance. I half expected them to strap me to one of Docs gurneys at that point. These rooms continued to make me feel nauseated.But Doc just thanked me and sent me on my way as if he were busy. I couldnt really tell what he was doing-he had several books open and stacks and stacks of cover that seemed to contain nothing but sketches.On the way back, curiosity overcame my fear.Ian? I asked, having a bit of difficulty saying the name for the first time.Yes? He sounded surprised that Id addressed him.Why havent you killed me yet?He snorted. Thats direct.You could, you know. Jeb might be annoyed, but I dont think hed shoot you. What was I saying? It sounded like I was trying to convince him. I bit my tongue.I know, he said, his tone complacent.It was quiet for a moment, just the sounds of our footsteps echoing, low and muffled, from the tunnel walls.It doesnt seem fair, Ian finally said. Ive been thinking about it a lot, and I cant see how killing you would make anything right. It would be like executing a private for a generals war crimes. Now, I dont buy all of Jebs crazy theories-it would be nice to believe, sure, but just because you want something to be true doesnt make it that way. Whether hes right or wrong, though, you dont appear to mean us any harm. I have to admit, you seem honestly fond of that boy. Its very strange to watch. Anyway, as long as you dont put us in danger, it seems cruel to kill you. Whats one more misfit in this place?I thought about the word misfit for a moment. It might have been the truest description of me Id ever heard. Where had I ever fit in?How strange that Ian, of all the humans, should have such a surprisingly gentle interior. I didnt realize that cruelty would seem a forbid to him.He waited in silence while I con sidered all this.If you dont want to kill me, then why did you come with me today? I asked.He paused again before answering.Im not sure that He hesitated. Jeb thinks things have calmed down, but Im not completely sure about that. Therere still a few people Anyway, Doc and I have been trying to keep an eye on you when we can. Just in case. Sending you down the south tunnel seemed like pushing your luck, to me. But thats what Jeb does best-he pushes luck as far as it will go.You you and Doc are trying to protect me?Strange world, isnt it?It was a few seconds before I could answer.The strangest, I finally agreed.

Monday, May 20, 2019

Database Solutions

DATABASE SOLUTIONS (2nd Edition) THOMAS M CONNOLLY & CAROLYN E BEGG SOLUTIONS TO REVIEW QUESTIONS Chapter 1 Introduction- Re hatful questions 1. 1List quaternity subjects of entropybase carcasss some new(prenominal) than those listed in partition 1. 1. close to sheaths could be A governing body that keep ups comp binglent partially exposit for a car manufacturer An advertising comp all(prenominal) c ar details of any knobs and adverts placed with them A training society keeping course culture and participants details An forcible composition master(prenominal)taining whole sales suppose in coiffeion. 1. 2 dispute the kernel of individually of the interest hurt (a) tuitionFor end exploiters, this constitutes all the different regard ass connected with the various objects/entities that atomic anatomy 18 of c earnerlyrn to them. (b) trainingbase A sh atomic proceeds 18d catchion of logarithmically linkd selective in clearation (and a interpretat ion of this information), figure of speeched to meet the entropy adapts of an organization. (c) infobase showion formation A computer computer softw be program ashes that enables exploiters to define, create, and maintain the database and suffers checker conduct access to this database. (d) drill program A computer program that interacts with the database by issuing an entrance request (typically an SQL statement) to the database management system. (e)data independenceThis is essentially the separation of underlying file structures from the programs that operate on them, withal called program-data independence. (f)stances. A virtual instrument panel that does non necessarily exist in the database but is generated by the DBMS from the underlying base shelves whenever its accessed. These express solitary(prenominal) a subset of the database that is of situation interest to a substance absubstance ab personar. Views post be customized, for example, field de fecates whitethorn change, and they similarly provide a level of certificate preventing uptakers from seeing genuinely data. 1. 3 bring out the main characteristics of the database shape up.Focus is now on the data first, and indeedce the applications. The structure of the data is now kept cave in from the programs that operate on the data. This is held in the system catalog or data dictionary. Programs mass now shargon data, which is no longer fragmented. at that place is also a reduction in redundancy, and achievement of program-data independence. 1. 4 recognise the five comp halenessnts of the DBMS environment and discuss how they r apiece to separately other. (1)HardwargonThe computer system(s) that the DBMS and the application programs run on. This stop range from a ace PC, to a wiz mainframe, to a net hammer of computers. 2)Softw beThe DBMS software and the application programs, together with the operating system, including ne cardinalrk software if the DBMS is be employ over a nedeucerk. (3)DataThe data acts as a bridge in the midst of the hardware and software comp unmatchednts and the human components. As weve already said, the database contains both the operational data and the meta-data (the data well-nigh data). (4)ProceduresThe instructions and rules that govern the purport and practice session of the database. This whitethorn allow instructions on how to log on to the DBMS, make backup copies of the database, and how to handle hardware or software failures. 5)PeopleThis complicates the database excogitateers, database administrators (DBAs), application programmers, and the end-substance ab drug drug drug exploiters. 1. 5Describe the bothers with the traditional twain-tier client-server computer architecture and discuss how these problems were overcome with the three-tier client-server architecture. In the mid-1990s, as applications became much complex and potentially could be deployed to hundreds or thousands of end-users, the client attitude of this architecture gave rise to two problems A fat client, requiring considerable resources on the clients computer to run efficaciously (resources include saucer space, RAM, and CPU power). A signifi evoket client side administration overhead. By 1995, a spic-and-span variation of the traditional two-tier client-server mannequin appeared to solve these problems called the three-tier client-server architecture. This new architecture proposed three layers, each potentially running on a different platform (1)The user port layer, which runs on the end-users computer (the client). (2)The bloodline logic and data serviceing layer. This middle tier runs on a server and is often called the application server. One application server is de sign to serve five-fold clients. (3)A DBMS, which stores the data requisite by the middle tier.This tier may run on a separate server called the database server. The three-tier anatomy has umpteen advantages ov er the traditional two-tier name, such(prenominal) as A thin client, which requires less(prenominal) expensive hardware. Simplified application maintenance, as a result of centralizing the business logic for many end-users into a single application server. This eliminates the concerns of software distribution that are problematic in the traditional two-tier client-server architecture. Added modularity, which makes it easier to falsify or replace one tier with bring out affecting the other tiers. Easier load balancing, a authorize as a result of separating the core business logic from the database functions. For example, a Transaction Processing Monitor (TPM) stinkpot be used to reduce the number of inter-group communications to the database server. (A TPM is a program that controls data transfer amid clients and servers in coiffe to provide a consistent environment for Online Transaction Processing (OLTP). ) An additional advantage is that the three-tier architecture maps qui te an naturally to the weave environment, with a Web browser acting as the thin client, and a Web server acting as the application server.The three-tier client server architecture is instanced in Figure 1. 4. 1. 6Describe the functions that should be provided by a modern full-scale multi-user DBMS. Data Storage, Retrieval and UpdateAuthorization Services A engager-Accessible CatalogSupport for Data discourse Transaction SupportIntegrity Services Concurrency Control ServicesServices to Promote Data Independence Recovery ServicesUtility Services 1. 7Of the functions pull backd in your answer to Question 1. 6, which ones do you think would non be pick uped in a standalone PC DBMS? Provide justification for your answer.Concurrency Control Services all single user. Authorization Services besides single user, but may be destinyed if different individuals are to use the DBMS at different periods. Utility Services limited in scope. Support for Data Communication only standalo ne system. 1. 8Discuss the advantages and disadvantages of DBMSs. most advantages of the database climb include control of data redundancy, data consistency, sharing of data, and repaird security and haleness. Some disadvantages include complexness, cost, reduced performance, and higher impact of a failure.Chapter 2 The Relational Model Re get word questions 2. 1Discuss each of the following concepts in the con text edition of the coincidenceal data model (a)relation A delay with tugs and rows. (b) delegate A named chromatography column of a relation. (c)domain The set of allowable measure out for one or more attributes. (d)tuple A express of a relation. (e)relational database. A collection of linguistic ruleized tables. 2. 2Discuss the properties of a relational table. A relational table has the following properties The table has a name that is distinct from all other tables in the database. each cell of the table contains exactly one value. For example, it would be wro ng to store several telephone numbers for a single dissever in a single cell. In other words, tables dont contain repeating groups of data. A relational table that satisfies this property is said to be dominionized or in first blueprint form. ) from each one column has a distinct name. The determine of a column are all from the homogeneous domain. The order of columns has no signifi crapperce. In other words, provided a column name is moved along with the column values, we burn down interchange columns. Each record is distinct at that place are no duplicate records. The order of records has no significance, theoretically. 2. 3Discuss the differences between the pile paints and the primary key of a table. Ex homelike what is meant by a overseas key. How do foreign keys of tables relate to candidate keys? Give examples to enlarge your answer. The primary key is the candidate key that is selected to identify tuples uniquely inwardly a relation. A foreign key is an attribu te or set of attributes within one relation that matches the candidate key of some (possibly the same) relation. 2. 4What does a null deliver?Represents a value for a column that is periodly unknown or is non applicable for this record. 2. 5Define the two principal integrity rules for the relational model. Discuss why it is worthy to enforce these rules. Entity integrityIn a base table, no column of a primary key can be null. Referential integrityIf a foreign key exists in a table, either the foreign key value must match a candidate key value of some record in its home table or the foreign key value must be tout ensemble null. Chapter 3 SQL and QBE Re check questions 3. 1What are the two major components of SQL and what function do they serve?A data definition language (DDL) for defining the database structure. A data manipulation language (DML) for retrieving and updating data. 3. 2Explain the function of each of the articles in the bring statement. What restrictions are imp osed on these clauses? FROMspecifies the table or tables to be used WHEREfilters the rows checkmate to some condition GROUP BYforms groups of rows with the same column value HAVINGfilters the groups battlefield to some condition SELECTspecifies which columns are to appear in the output ORDER BYspecifies the order of the output. 3. What restrictions apply to the use of the aggregate functions within the SELECT statement? How do nulls affect the aggregate functions? An aggregate function can be used only in the SELECT list and in the HAVING clause. Apart from COUNT(*), each function eliminates nulls first and operates only on the remaining non-null values. COUNT(*) counts all the rows of a table, regardless of whether nulls or duplicate values occur. 3. 4Explain how the GROUP BY clause works. What is the difference between the WHERE and HAVING clauses? SQL first applies the WHERE clause. Then it conceptually arranges he table based on the grouping column(s). Next, applies the HAVIN G clause and finally orders the result fit to the ORDER BY clause. WHERE filters rows subject to some condition HAVING filters groups subject to some condition. 3. 5What is the difference between a subquery and a join? Under what circumstances would you not be able to use a subquery? With a subquery, the columns specified in the SELECT list are circumscribe to one table. Thus, cannot use a subquery if the SELECT list contains columns from more than one table. 3. 6What is QBE and what is the consanguinity between QBE and SQL?QBE is an alternative, graphical-based, point-and-click counsel of querying the database, which is oddly suited for queries that are not too complex, and can be expressed in terms of a few tables. QBE has acquired the reputation of being one of the easiest ways for non-technical users to obtain information from the database. QBE queries are born-again into their equivalent SQL statements sooner trans legation to the DBMS server. Chapter 4 Database corpses Development Lifecycle Review questions 4. 1Describe what is meant by the term software crisis.The past few decades has witnessed the dramatic rise in the number of software applications. Many of these applications proved to be demanding, requiring constant maintenance. This maintenance involved correcting faults, implementing new user requirements, and modifying the software to run on new or upgraded platforms. With so much software around to actualise, the effort spent on maintenance began to absorb resources at an alarming rate. As a result, many major software projects were late, over budget, and the software produced was unreliable, troublesome to maintain, and performed poorly.This led to what has become known as the software crisis. Although this term was first used in the late 1960s, more than 30 years later, the crisis is still with us. As a result, some people now refer to the software crisis as the software depression. 4. 2Discuss the race between the information syst ems lifecycle and the database system development lifecycle. An information system is the resources that enable the collection, do byment, control, and dissemination of data/information th untrimmedout a company. The database is a fundamental component of an information system.The lifecycle of an information system is inherently united to the lifecycle of the database that admits it. Typically, the make ups of the information systems lifecycle include planning, requirements collection and analysis, design (including database design), prototyping, implementation, examen, metempsychosis, and operational maintenance. As a database is a fundamental component of the larger company-wide information system, the database system development lifecycle is inherently linked with the information systems lifecycle. 4. 3Briefly describe the stages of the database system development lifecycle. hold back Figure 4. Stages of the database system development lifecycle. Database planning is the management activities that allow the stages of the database system development lifecycle to be realized as efficiently and effectively as possible. System definition involves identifying the scope and boundaries of the database system including its major user views. A user view can represent a job role or business application area. Requirements collection and analysis is the process of collecting and analyzing information about the company that is to be supported by the database system, and using this information to identify the requirements for the new system.There are three approaches to dealing with multiplex user views, namely the change approach, the view integrating approach, and a combination of both. The centralized approach involves collating the users requirements for different user views into a single list of requirements. A data model representing all the user views is created during the database design stage. The view integration approach involves deviation the user s requirements for each user view as separate lists of requirements. Data models representing each user view are created and past unified at a later stage of database design.Database design is the process of creating a design that will support the companys mission statement and mission objectives for the required database. This stage includes the limpid and tangible design of the database. The aim of DBMS selection is to select a system that meets the current and future requirements of the company, balanced against cost that include the purchase of the DBMS product and any additional software/hardware, and the costs associated with changeover and training. application program design involves innovation the user interface and the application programs that use and process the database.This stage involves two main activities transaction design and user interface design. Prototyping involves building a working model of the database system, which allows the designers or users to s ee and evaluate the system. Implementation is the somatic realization of the database and application designs. Data conversion and loading involves transferring any actual data into the new database and converting any existing applications to run on the new database. Testing is the process of running the database system with the intent of finding errors.Operational maintenance is the process of monitoring and maintaining the system following installation. 4. 4Describe the object of creating a mission statement and mission objectives for the required database during the database planning stage. The mission statement defines the major aims of the database system, succession each mission objective identifies a particular task that the database must support. 4. 5Discuss what a user view represents when designing a database system. A user view defines what is required of a database system from the perspective of a particular job (such as passenger car orSupervisor) or business appli cation area (such as marketing, personnel, or profligate control). 4. 6Compare and contrast the centralized approach and view integration approach to managing the design of a database system with multiple user views. An outstanding activity of the requirements collection and analysis stage is deciding how to deal with the situation where there is more than one user view. There are three approaches to dealing with multiple user views the centralized approach, the view integration approach, and a combination of both approaches.Centralized approach Requirements for each user view are merged into a single list of requirements for the new database system. A arranged data model representing all user views is created during the database design stage. The centralized approach involves collating the requirements for different user views into a single list of requirements. A data model representing all user views is created in the database design stage. A diagram representing the managemen t of user views 1 to 3 using the centralized approach is shown in Figure 4. 4.Generally, this approach is preferred when there is a significant overlap in requirements for each user view and the database system is not as well complex. See Figure 4. 4 The centralized approach to managing multiple user views 1 to 3. View integration approach Requirements for each user view remain as separate lists. Data models representing each user view are created and then merged later during the database design stage. The view integration approach involves leaving the requirements for each user view as separate lists of requirements.We create data models representing each user view. A data model that represents a single user view is called a local anaesthetic logical data model. We then merge the local data models to create a global logical data model representing all user views of the company. A diagram representing the management of user views 1 to 3 using the view integration approach is shown in Figure 4. 5. Generally, this approach is preferred when there are significant differences between user views and the database system is sufficiently complex to justify dividing the work into more manageable parts.See Figure 4. 5 The view integration approach to managing multiple user views 1 to 3. For some complex database systems it may be purloin to use a combination of both the centralized and view integration approaches to managing multiple user views. For example, the requirements for two or more users views may be first merged using the centralized approach and then used to create a local logical data model. (Therefore in this situation the local data model represents not just a single user view but the number of user views merged using the centralized approach).The local data models representing one or more user views are then merged using the view integration approach to form the global logical data model representing all user views. 4. 7Explain why it is demand to sele ct the target DBMS before beginning the physical database design phase. Database design is made up of two main phases called logical and physical design. During logical database design, we identify the important objects that need to be represented in the database and the bloods between these objects.During physical database design, we patch up how the logical design is to be physically enforced (as tables) in the target DBMS. Therefore it is necessary to shake off selected the target DBMS before we are able to proceed to physical database design. See Figure 4. 1 Stages of the database system development lifecycle. 4. 8Discuss the two main activities associated with application design. The database and application design stages are parallel activities of the database system development lifecycle. In most cases, we cannot complete the application design until the design of the database itself has taken place.On the other hand, the database exists to support the applications, and s o there must be a flow of information between application design and database design. The two main activities associated with the application design stage is the design of the user interface and the application programs that use and process the database. We must ensure that all the in operation(p)ity stated in the requirements specifications is present in the application design for the database system. This involves designing the interaction between the user and the data, which we call transaction design.In addition to designing how the required functionality is to be achieved, we oblige to design an sequester user interface to the database system. 4. 9Describe the potential benefits of developing a prototype database system. The answer of developing a prototype database system is to allow users to use the prototype to identify the features of the system that work well, or are inadequate, and if possible to suggest improvements or even new features for the database system. In th is way, we can greatly clarify the requirements and evaluate the feasibility of a particular system design.Prototypes should have the major advantage of being relatively inexpensive and quick to build. 4. 10Discuss the main activities associated with the implementation stage. The database implementation is achieved using the Data Definition speech (DDL) of the selected DBMS or a graphical user interface (GUI), which provides the same functionality while hiding the subordinate DDL statements. The DDL statements are used to create the database structures and empty database files. Any specified user views are also implemented at this stage.The application programs are implemented using the preferred third or fourth genesis language (3GL or 4GL). Parts of these application programs are the database transactions, which we implement using the Data Manipulation language (DML) of the target DBMS, possibly embedded within a host programming language, such as ocular Basic (VB), VB. net, Python, Delphi, C, C++, C, Java, COBOL, Fortran, Ada, or Pascal. We also implement the other components of the application design such as menu screens, data entry forms, and reports.Again, the target DBMS may have its own fourth generation tools that allow rapid development of applications by the provision of non-procedural query languages, reports generators, forms generators, and application generators. Security and integrity controls for the application are also implemented. Some of these controls are implemented using the DDL, but others may need to be defined outside the DDL using, for example, the supplied DBMS utilities or operating system controls. 4. 11Describe the purpose of the data conversion and loading stage.This stage is required only when a new database system is replacing an old system. Nowadays, its common for a DBMS to have a utility-grade that loads existing files into the new database. The utility usually requires the specification of the source file and the t arget database, and then mechanically converts the data to the required format of the new database files. Where applicable, it may be possible for the developer to convert and use application programs from the old system for use by the new system. 4. 2Explain the purpose of testing the database system. Before going live, the newly developed database system should be thoroughly tested. This is achieved using carefully planned test strategies and realistic data so that the entire testing process is methodically and rigorously carried out. Note that in our definition of testing we have not used the commonly held view that testing is the process of demonstrating that faults are not present. In fact, testing cannot show the absence seizure of faults it can show only that software faults are present.If testing is conducted successfully, it will uncover errors in the application programs and possibly the database structure. As a warrantary benefit, testing demonstrates that the database a nd the application programs appear to be working according to their specification and that performance requirements appear to be satisfied. In addition, metrics collected from the testing stage provides a measure of software reliability and software quality. As with database design, the users of the new system should be involved in the testing process.The ideal situation for system testing is to have a test database on a separate hardware system, but often this is not available. If real data is to be used, it is essential to have backups taken in case of error. Testing should also cover usability of the database system. Ideally, an evaluation should be conducted against a usability specification. Examples of criteria that can be used to conduct the evaluation include (Sommerville, 2000) Learnability How long does it take a new user to become productive with the system? Performance How well does the system response match the users work practice? Robustness How tolerant is the syst em of user error? Recoverability How computable is the system at recovering from user errors? Adapatability How closely is the system tied to a single model of work? Some of these criteria may be evaluated in other stages of the lifecycle. After testing is complete, the database system is ready to be signed off and handed over to the users. 4. 13What are the main activities associated with operational maintenance stage.In this stage, the database system now moves into a maintenance stage, which involves the following activities Monitoring the performance of the database system. If the performance falls below an acceptable level, the database may need to be tuned or reorganized. Maintaining and upgrading the database system (when required). New requirements are in somaticd into the database system finished the preceding stages of the lifecycle. Chapter 5 Database Administration and Security Review questions 5. 1Define the purpose and tasks associated with data administration and database administration.Data administration is the management and control of the corporate data, including database planning, development and maintenance of standards, policies and procedures, and logical database design. Database administration is the management and control of the physical realization of the corporate database system, including physical database design and implementation, setting security and integrity controls, monitoring system performance, and reorganizing the database as necessary. 5. 2Compare and contrast the main tasks carried out by the DA and DBA.The Data Administrator (DA) and Database Administrator (DBA) are responsible for managing and controlling the activities associated with the corporate data and the corporate database, respectively. The DA is more concerned with the early stages of the lifecycle, from planning through to logical database design. In contrast, the DBA is more concerned with the later stages, from application/physical database design to operational maintenance. Depending on the size and complexity of the organization and/or database system the DA and DBA can be the responsibility of one or more people. . 3Explain the purpose and scope of database security. Security considerations do not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database. Consequently, database security encompasses hardware, software, people, and data. To effectively implement security requires appropriate controls, which are defined in specific mission objectives for the system. This need for security, while often having been neglected or overlooked in the past, is now increasingly recognized by organizations.The tenableness for this turn-around is due to the increasing amounts of crucial corporate data being stored on computer and the acceptance that any loss or unavailability of this data could be potentially disastrous. 5. 4List the main types of threat that could affect a database system, and for each, describe the possible outcomes for an organization. Figure 5. 1 A summary of the potential threats to computer systems. 5. 5Explain the following in terms of providing security for a database authorization views backup and retrieval integrity encryption RAID. AuthorizationAuthorization is the granting of a set or privilege that enables a subject to have legitimate access to a system or a systems object. Authorization controls can be built into the software, and govern not only what database system or object a specified user can access, but also what the user may do with it. The process of authorization involves authentication of a subject requesting access to an object, where subject represents a user or program and object represents a database table, view, procedure, trigger, or any other object that can be created within the database system. ViewsA view is a virtual table that does not necessarily exist in the database but can be produced upon request by a particular user, at the time of request. The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users. The user is not aware of the existence of any columns or rows that are missing from the view. A view can be defined over several tables with a user being granted the appropriate privilege to use it, but not to use the base tables. In this way, using a view is more restrictive than simply having certain privileges granted to a user on the base table(s).Backup and recovery Backup is the process of periodically taking a model of the database and log file (and possibly programs) onto offline computer memory media. A DBMS should provide backup facilities to assist with the recovery of a database following failure. To keep course of database transactions, the DBMS maintains a finicky file called a log file (or journal) that contains information about all updates to the database. It is always advi sable to make backup copies of the database and log file at regular intervals and to ensure that the copies are in a secure location.In the event of a failure that renders the database unusable, the backup copy and the details captured in the log file are used to restore the database to the latest possible consistent state. Journaling is the process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure. Integrity constraints Contribute to maintaining a secure database system by preventing data from neat invalid, and hence giving misleading or incorrect results. EncryptionIs the encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. If a database system holds peculiarly sensitive data, it may be deemed necessary to encode it as a precaution against possible impertinent threats or attempts to access it. Some DBMS s provide an encryption facility for this purpose. The DBMS can access the data (after decoding it), although there is degradation in performance because of the time taken to decode it. Encryption also protects data transmitted over communication lines.There are a number of techniques for encoding data to hold the information some are termed irreversible and others reversible. Irreversible techniques, as the name implies, do not license the original data to be known. However, the data can be used to obtain valid statistical information. Reversible techniques are more commonly used. To transmit data securely over insecure networks requires the use of a cryptosystem, which includes an encryption key to encrypt the data (plaintext) an encryption algorithm that, with the encryption key, transforms the plain text into ciphertext a decryption key to decrypt the ciphertext a decryption algorithm that, with the decryption key, transforms the ciphertext back into plain text. Redundant Array of In drug-addicted Disks (RAID) RAID works by having a large disk drift comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. The hardware that the DBMS is running on must be fault-tolerant, meaning that the DBMS should hap to operate even if one of the hardware components fails. This suggests having redundant components that can be seamlessly integrated into the working system whenever there is one or more component failures.The main hardware components that should be fault-tolerant include disk drives, disk controllers, CPU, power supplies, and cooling fans. Disk drives are the most vulnerable components with the shortest times between failures of any of the hardware components. One solution is the use of Redundant Array of Independent Disks (RAID) technology. RAID works by having a large disk array comprising an arrangement of several independent disks that are organized to improve reliabili ty and at the same time increase performance. Chapter 6 Fact-Finding Review questions 6. Briefly describe what the process of fact-finding attempts to achieve for a database developer. Fact-finding is the formal process of using techniques such as interviews and questionnaires to collect facts about systems, requirements, and preferences. The database developer uses fact-finding techniques at various stages throughout the database systems lifecycle to capture the necessary facts to build the required database system. The necessary facts cover the business and the users of the database system, including the terminology, problems, opportunities, constraints, requirements, and priorities.These facts are captured using fact-finding techniques. 6. 2Describe how fact-finding is used throughout the stages of the database system development lifecycle. There are many occasions for fact-finding during the database system development lifecycle. However, fact-finding is particularly crucial to the early stages of the lifecycle, including the database planning, system definition, and requirements collection and analysis stages. Its during these early stages that the database developer go outs about the terminology, problems, opportunities, constraints, requirements, and priorities of the business and the users of the system.Fact-finding is also used during database design and the later stages of the lifecycle, but to a lesser extent. For example, during physical database design, fact-finding becomes technical as the developer attempts to apprise more about the DBMS selected for the database system. Also, during the final stage, operational maintenance, fact-finding is used to determine whether a system requires tuning to improve performance or further developed to include new requirements. 6. 3For each stage of the database system development lifecycle identify examples of the facts captured and the corroboration produced. . 4A database developer commonly uses several fact-finding techniques during a single database project. The five most commonly used techniques are examining documentation, interviewing, observing the business in operation, conducting research, and using questionnaires. Describe each fact-finding technique and identify the advantages and disadvantages of each. Examining documentation can be utilitarian when youre toilsome to gain some insight as to how the need for a database arose.You may also find that documentation can be serveful to provide information on the business (or part of the business) associated with the problem. If the problem relates to the current system there should be documentation associated with that system. Examining documents, forms, reports, and files associated with the current system, is a good way to quickly gain some actualiseing of the system. Interviewing is the most commonly used, and everydayly most useful, fact-finding technique. You can interview to collect information from individuals face- to-face.There can be several objectives to using interviewing such as finding out facts, checking facts, generating user interest and feelings of involvement, identifying requirements, and gathering ideas and opinions. Observation is one of the most effective fact-finding techniques you can use to understand a system. With this technique, you can either participate in, or watch a person perform activities to learn about the system. This technique is particularly useful when the validity of data collected through other methods is in question or when the complexity of certain aspects of the system prevents a clear explanation by the end-users.A useful fact-finding technique is to research the application and problem. Computer trade journals, reference books, and the Internet are good sources of information. They can provide you with information on how others have solved similar problems, plus you can learn whether or not software packages exist to solve your problem. Another fact-find ing technique is to conduct surveys through questionnaires. Questionnaires are special-purpose documents that allow you to gather facts from a large number of people while maintaining some control over their responses.When dealing with a large audience, no other fact-finding technique can put off the same facts as efficiently. 6. 5Describe the purpose of defining a mission statement and mission objectives for a database system. The mission statement defines the major aims of the database system. Those driving the database project within the business (such as the Director and/or owner) normally define the mission statement. A mission statement helps to clarify the purpose of the database project and provides a clearer elbow room towards the efficient and effective creation of the required database system.Once the mission statement is defined, the next activity involves identifying the mission objectives. Each mission objective should identify a particular task that the database mus t support. The assumption is that if the database supports the mission objectives then the mission statement should be met. The mission statement and objectives may be accompanied with additional information that specifies, in general terms, the work to be done, the resources with which to do it, and the money to pay for it all. 6. 6What is the purpose of the systems definition stage?The purpose of the system definition stage is to identify the scope and boundary of the database system and its major user views. Defining the scope and boundary of the database system helps to identify the main types of data mentioned in the interviews and a rough guide as to how this data is connect. A user view represents the requirements that should be supported by a database system as defined by a particular job role (such as Manager or Assistant) or business application area (such as video rentals or stock control). 6. How do the contents of a users requirements specification differ from a system s specification? There are two main documents created during the requirements collection and analysis stage, namely the users requirements specification and the systems specification. The users requirements specification describes in detail the data to be held in the database and how the data is to be used. The systems specification describes any features to be included in the database system such as the required performance and the levels of security. 6. Describe one approach to deciding whether to use centralized, view integration, or a combination of both when developing a database system for multiple user views. One way to help you make a decision whether to use the centralized, view integration, or a combination of both approaches to manage multiple user views is to examine the overlap in terms of the data used between the user views identified during the system definition stage. Its difficult to give precise rules as to when its appropriate to use the centralized or view integ ration approaches.As the database developer, you should base your decision on an assessment of the complexity of the database system and the degree of overlap between the various user views. However, whether you use the centralized or view integration approach or a mixture of both to build the underlying database, ultimately you need to create the original user views for the working database system. Chapter 7 Entity-Relationship Modeling Review questions 7. 1Describe what entities represent in an ER model and provide examples of entities with a physical or conceptual existence.Entity is a set of objects with the same properties, which are identified by a user or company as having an independent existence. Each object, which should be uniquely identifiable within the set, is called an entity occurrence. An entity has an independent existence and can represent objects with a physical (or real) existence or objects with a conceptual (or abstract) existence. 7. 2Describe what bloods r epresent in an ER model and provide examples of unary, binary, and ternary relationships.Relationship is a set of meaningful associations among entities. As with entities, each association should be uniquely identifiable within the set. A uniquely identifiable association is called a relationship occurrence. Each relationship is give a name that describes its function. For example, the shammer entity is associated with the use of goods and services entity through a relationship called Plays, and the Role entity is associated with the Video entity through a relationship called Features. The entities involved in a particular relationship are referred to as participants.The number of participants in a relationship is called the degree and indicates the number of entities involved in a relationship. A relationship of degree one is called unary, which is commonly referred to as a recursive relationship. A unary relationship describes a relationship where the same entity participates more than once in different roles. An example of a unary relationship is Supervises, which represents an association of rung with a supervisor where the supervisor is also a particle of round.In other words, the faculty entity participates twice in the Supervises relationship the first participation as a supervisor, and the second participation as a segment of stave who is supervised (supervisee). See Figure 7. 5 for a diagrammatic delegation of the Supervises relationship. A relationship of degree two is called binary. A relationship of a degree higher than binary is called a complex relationship. A relationship of degree three is called ternary. An example of a ternary relationship is Registers with three participating entities, namely classify, Staff, and Member.The purpose of this relationship is to represent the situation where a member of staff registers a member at a particular furcate, allowing for members to register at more than one runner, and members of staff to move between branches. Figure 7. 4 Example of a ternary relationship called Registers. 7. 3Describe what attributes represent in an ER model and provide examples of simple, composite, single-value, multi-value, and derived attributes. An attribute is a property of an entity or a relationship. Attributes represent what we expect to know about entities.For example, a Video entity may be described by the catalogNo, title, kinsfolk, dailyRental, and price attributes. These attributes hold values that describe each video occurrence, and represent the main source of data stored in the database. simple-minded attribute is an attribute composed of a single component. Simple attributes cannot be further subdivided. Examples of simple attributes include the kinsperson and price attributes for a video. Composite attribute is an attribute composed of multiple components. Composite attributes can be further divided to yield smaller components with an independent existence.For example, the na me attribute of the Member entity with the value Don Nelson can be subdivided into fName (Don) and lName (Nelson). Single-valued attribute is an attribute that holds a single value for an entity occurrence. The bulk of attributes are single-valued for a particular entity. For example, each occurrence of the Video entity has a single-value for the catalogNo attribute (for example, 207132), and therefore the catalogNo attribute is referred to as being single-valued. Multi-valued attribute is an attribute that holds multiple values for an entity occurrence.Some attributes have multiple values for a particular entity. For example, each occurrence of the Video entity may have multiple values for the category attribute (for example, Children and Comedy), and therefore the category attribute in this case would be multivalent. A multi-valued attribute may have a set of values with specified lower and upper limits. For example, the category attribute may have between one and three values. D erived attribute is an attribute that represents a value that is derived from the value of a related attribute, or set of attributes, not necessarily in the same entity.Some attributes may be related for a particular entity. For example, the age of a member of staff (age) is derivable from the date of birth (DOB) attribute, and therefore the age and DOB attributes are related. We refer to the age attribute as a derived attribute, the value of which is derived from the DOB attribute. 7. 4Describe what multiplicity represents for a relationship. Multiplicity is the number of occurrences of one entity that may relate to a single occurrence of an associated entity. 7. 5What are business rules and how does multiplicity model these constraints?Multiplicity constrains the number of entity occurrences that relate to other entity occurrences through a particular relationship. Multiplicity is a representation of the policies established by the user or company, and is referred to as a busines s rule. Ensuring that all appropriate business rules are identified and represented is an important part of modeling a company. The multiplicity for a binary relationship is generally referred to as one-to-one (11), one-to-many (1*), or many-to-many (**). Examples of three types of relationships include A member of staff manages a branch. A branch has members of staff. Actors play in videos. 7. 6How does multiplicity represent both the cardinality and the participation constraints on a relationship? Multiplicity actually consists of two separate constraints known as cardinality and participation. Cardinality describes the number of possible relationships for each participating entity. Participation determines whether all or only some entity occurrences participate in a relationship. The cardinality of a binary relationship is what we have been referring to as one-to-one, one-to-many, and many-to-many.A participation constraint represents whether all entity occurrences are involved i n a particular relationship (mandatory participation) or only some (optional participation). The cardinality and participation constraints for the Staff Manages Branch relationship are shown in Figure 7. 11. 7. 7Provide an example of a relationship with attributes. An example of a relationship with an attribute is the relationship called PlaysIn, which associates the Actor and Video entities. We may wish to record the character played by an actor in a given video.This information is associated with the PlaysIn relationship rather than the Actor or Video entities. We create an attribute called character to store this information and assign it to the PlaysIn relationship, as illustrated in Figure 7. 12. Note, in this figure the character attribute is shown using the symbolisation for an entity however, to distinguish between a relationship with an attribute and an entity, the rectangle representing the attribute is associated with the relationship using a hie line. Figure 7. 12 A re lationship called PlaysIn with an attribute called character. . 8Describe how strong and weak entities differ and provide an example of each. We can classify entities as being either strong or weak. A strong entity is not dependent on the existence of another entity for its primary key. A weak entity is partially or entirely dependent on the existence of another entity, or entities, for its primary key. For example, as we can distinguish one actor from all other actors and one video from all other videos without the existence of any other entity, Actor and Video are referred to as being strong entities.In other words, the Actor and Video entities are strong because they have their own primary keys. An example of a weak entity called Role, which represents characters played by actors in videos. If we are unable to uniquely identify one Role entity occurrence from another without the existence of the Actor and Video entities, then Role is referred to as being a weak entity. In other words, the Role entity is weak because it has no primary key of its own. Figure 7. 6 Diagrammatic representation of attributes for the Video, Role, and Actor entities.Strong entities are sometimes referred to as parent, owner, or dominant entities and weak entities as child, dependent, or subordinate entities. 7. 9Describe how fan and chasm seamans can occur in an ER model and how they can be resolved. Fan and chasm traps are two types of connection traps that can occur in ER models. The traps normally occur due to a misinterpretation of the meaning of certain relationships. In general, to identify connection traps we must ensure that the meaning of a relationship (and the business rule that it represents) is fully understood and clearly defined.If we dont understand the relationships we may create a model that is not a true representation of the real world. A fan trap may occur when two entities have a 1* relationship that fan out from a third entity, but the two entities should h ave a direct relationship between them to provide the necessary information. A fan trap may be resolved through the addition of a direct relationship between the two entities that were originally separated by the third entity. A chasm trap may occur when an ER model suggests the existence of a relationship between entities, but the pathway does not exist between certain entity occurrences.More specifically, a chasm trap may occur where there is a relationship with optional participation that forms part of the pathway between the entities that are related. Again, a chasm trap may be resolved by the addition of a direct relationship between the two entities that were originally related through a pathway that included optional participation. Chapter 8 Normalization Review questions 8. 1Discuss how normalization may be used in database design. Normalization can be used in database design in two ways the first is to use ormalization as a bottom-up approach to database design the second is to use normalization in conjunction with ER modeling. Using normalization as a bottom-up approach involves analyzing the associations between attributes and, based on this analysis, grouping the attributes together to form tables that represent entities and relationships. However, this approach becomes difficult with a large number of attributes, where its difficult to establish all the important associations between the attributes. Alternatively, you can use a top-down approach to database design.In this approach, we use ER modeling to create a data model that represents the main entities and relationships. We then translate the ER model into a set of tables that represents this data. Its at this point that we use normalization to check whether the tables are well designed. 8. 2Describe the types of update anomalies that may occur on a table that has redundant data. Tables that have redundant data may have problems called update anomalies, which are classified as introduceion, deletion, or modification anomalies. See Figure 8. 2 for an example of a table with redundant data called StaffBranch.There are two main types of insertion anomalies, which we illustrate using this table. Insertion anomalies (1)To insert the details of a new member of staff set(p) at a given branch into the StaffBranch table, we must also enter the correct details for that branch. For example, to insert the details of a new member of staff at branch B002, we must enter the correct details of branch B002 so that the branch details are consistent with values for branch B002 in other records of the StaffBranch table. The data shown in the StaffBranch table is also shown in the Staff and Branch tables shown in Figure 8. 1.These tables do have redundant data and do not suffer from this potential inconsistency, because for each staff member we only enter the appropriate branch number into the Staff table. In addition, the details of branch B002 are recorded only once in the database as a single record in the Branch table. (2)To insert details of a new branch that currently has no members of staff into the StaffBranch table, its necessary to enter nulls into the staff-related columns, such as staffNo. However, as staffNo is the primary key for the StaffBranch table, attempting to enter nulls for staffNo violates entity integrity, and is not allowed.The design of the tables shown in Figure 8. 1 turn aways this problem because new branch details are entered into the Branch table separately from the staff details. The details of staff ultimately located at a new branch can be entered into the Staff table at a later date. Deletion anomalies If we delete a record from the StaffBranch table that represents the last member of staff located at a branch, the details about that branch are also mazed from the database. For example, if we delete the record for staff Art Peters (S0415) from the StaffBranch table, the details relating to branch B003 are lost from the database.Th e design of the tables in Figure 8. 1 avoids this problem because branch records are stored separately from staff records and only the column branchNo relates the two tables. If we delete the record for staff Art Peters (S0415) from the Staff table, the details on branch B003 in the Branch table remain unaffected. Modification anomalies If we want to change the value of one of the columns of a particular branch in the StaffBranch table, for example the telephone number for branch B001, we must update the records of all staff located at that branch.If this modification is not carried out on all the appropriate records of the StaffBranch table, the database will become inconsistent. In this example, branch B001 would have different telephone numbers in different staff records. The above examples illustrate that the Staff and Branch tables of Figure 8. 1 have more desirable properties than the StaffBranch table of Figure 8. 2. In the following sections, we examine how normal forms can be used to formalize the designation of tables that have desirable properties from those that may potentially suffer from update anomalies. . 3Describe the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF. The rule for first normal form (1NF) is a table in which the intersection of every column and record contains only one value. In other words a table that contains more than one atomic value in the intersection of one or more column for one or more records is not in 1NF. The non 1NF table can be converted to 1NF by restructuring original table by removing the column with the multi-values along with a copy of the primary key to create a new table.See Figure 8. 4 for an example of this approach. The advantage of this approach is that the resultant tables may be in normal forms later that 1NF. 8. 4What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form. Only first no rmal form (1NF) is critical in creating appropriate tables for relational databases. All the subsequent normal forms are optional. However, to avoid the update anomalies discussed in Section 8. 2, its normally recommended that you proceed to third normal form (3NF).First normal form (1NF) is a table in which the intersection of every column and record contains only one value. 8. 5Describe an approach to converting a first normal form (1NF) table to second normal form (2NF) table(s). game normal form applies only to tables with composite primary keys, that is, tables with a primary key composed of two or more columns. A 1NF table with a single column primary key is automatically in at least 2NF. A second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can be worked out from the values in all the columns that makes up the primary key.A table in 1NF can be converted into 2NF by removing the columns that can be worked out from only part of the primary key. These columns are placed in a new table along with a copy of the part of the primary key that they can be worked out from. 8. 6Describe the characteristics of a table in second normal form (2NF). Second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can only be worked out from the values in all the columns that make up the primary key. 8. Describe what is meant by full functional habituation and describe how this type of dependance relates to 2NF. Provide an example to illustrate your answer. The formal definition of second normal form (2NF) is a table that is in first normal form and every non-primary-key column is fully functionally dependent on the primary key. Full functional dependency indicates that if A and B are columns of a table, B is fully functionally dependent on A, if B is not dependent on any subset of A. If B is dependent on a subset of A, this is referred to as a partial depe ndency.If a partial dependency exists on the primary key, the table is not in 2NF. The partial dependency must be removed for a table to achieve 2NF. See Section 8. 4 for an example. 8. 8Describe the characteristics of a table in third normal form (3NF). Third normal form (3NF) is a table that is already in 1NF and 2NF, and in which the values in all non-primary-key columns can be worked out from only the primary key (or candidate key) column(s) and no other columns. 8. 9Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.The formal definition for third normal form (3NF) is a table that is in first and second normal forms and in which no non-primary-key column is transitively dependent on the primary key. Transitive dependency is a type of functional dependency that occurs when a particular type of relationship holds between columns of a table. For example, consider a table with columns A, B, and C. If B is functionally dependent on A (A ? B) and C is functionally dependent on B (B ? C), then C is transitively dependent on A via B (provided that A is not functionally dependent on B or C).If a transitive dependency exists on the primary key, the table is not in 3NF. The transitive dependency must be removed for a table to achieve 3NF. See Section 8. 5 for an example. Chapter 9 Logical Database Design Step 1- Review questions 9. 1Describe the purpose of a design methodology. A design methodology is a structured approach that uses procedures, techniques, tools, and documentation aids to support and accelerate the process of design. 9. 2Describe the main phases involved in database design. Database design is made up of two main phases logical and physical database design.Logical database design is the process of constructing a model of the data used in a company based on a specific data model, but independent of a particular DBMS and other physical considerations. In the logical database design phase we build the logical representation of the database, which includes identification of the important entities and relationships, and then translate this representation to a set of tables. The logical data model is a source of information for the physical design phase, providing the physical database designer with a vehicle for making tradeoffs that are very important to the design of an efficient database.Physical database design is the process of producing a description of the implementation of the database on secondary storage it describes the base tables, file organizations, and indexes used to achieve efficient access to the data, and any associated integrity constraints and security restrictions. In the physical database design phase we decide how the logical design is to be physically implemented in the target relational DBMS. This phase allows the designer to make decisions on how the database is to be implemented. Therefore, physical desig n is tailored to a specific DBMS. . 3Identify important factors in the success of database design. The following are important factors to the success of database design Work interactively with the users as much as possible. Follow a structured methodology throughout the data modeling process. Employ a data-driven approach. Incorporate structural and integrity considerations into the data models. Use normalization and transaction validation techniques in the methodology. Use diagrams to represent as much of the data models as possible. Use a database design language (DBDL). Build a data dictionary to supplement the data model diagrams. Be willing to repeat steps. 9. 4Discuss the important role played by users in the process of database design. Users play an essential role in confirming that the logical database design is meeting their requirements. Logical database design is made up of two steps and at the end of each step (Steps 1. 9 and 2. 5) users are required to review the design and provide feedback to the designer. Once the logical database design has been signed off by the users the designer can continue to the physical d