Thursday, October 31, 2019

Ethical Decision Making and Ethical Leadership Essay

Ethical Decision Making and Ethical Leadership - Essay Example The leaders, therefore, will discourage the worker from accepting the gift no matter the reasoning and justification. The email would look like ‘‘Dear officer, I am sorry to inform you that if you breach the company’s rule that abhors acceptance of gift from customers then be ready to face the consequences. This rule should be followed at all times.’’ This approach hampers the organization’s democratic space where the views of others are not taken into account leading to the growth of an autocratic system. The management is likely to plunge into a culture where they impose strict self-centered rules. Over time, with the resistance and breach of these rigid rules, the leaders may escalate up the moral reasoning ladder making them adopt a more rational perspective in solving moral dilemmas in decision making. Moral reasoning is not complete at stage one and that is the reasoning why it is regarded as a reasoning pattern for children who do not have the capacity to rationalize between good and bad. They, therefore, have to blindly set or follow the laid down laws or regulations. Convection and post convection stages are eye-openers in moral

Tuesday, October 29, 2019

Theories as the Basis for Nursing Practice Essay Example for Free

Theories as the Basis for Nursing Practice Essay Abstract Theory development is the fundamental step for expansion of nursing knowledge. The knowledge has been borrowed from different disciplines to build the nursing theories. The categorization of theories is based on their scope of practice. The grand nursing theories are the most complex and abstract in their nature. Middle range theories are inducted mostly from grand nursing theories. Orem’s self-care model is clear and descriptive; the theory has been applied, analyzed in a precise method to various areas in the current nursing practice successfully. A comprehensive knowledge of nursing theories is an integral part of graduate nursing. Initially I was also wondering just like the graduate student in the beginning of chapter 2 in (McEwen amp; Willis, 2011) about the application of theory to nursing practice. However the initial theory classes were lot of information in a short duration. Over the time of the course it became clear that theory development in nursing has been crucial to nursing emerging as a profession. The knowledge for nursing theory development has been based on silent knowledge, where the role is limited to following physician orders, received knowledge; this is the information from other fields like sociology, psychology, physiology and anthropology. Later on the theory development was based on individual experiences, practical skills and procedures and empirical data and evidence based practices (McEwen amp; Willis, 2011). Initially it was extremely difficult to comprehend the grand theories, however, as mentioned by Professor Williams (2012) analyzing the grand theories in the context of meta paradigms like human, environment, nursing and health made it quite interesting and simple to understand M. Y. Williams (personal communication, October 12, 2012). The analysis of theories based on the concept development and the logical relationships between the concepts, provides the opportunity to conduct further research in the nursing practice. Grando (2005) described the use of Orem’s theory to guide nursing practice as an example of modern nursing to distinguish nursing from medicine. Grando (2005) successfully implemented a self-care deficit model while treating patients to maintain mental health functioning. She developed a tool based on conditioning of the basic human factors leads to self care requisites like changing behaviors, re framing the habits and managing feelings. Grando (2005) was able to cultivate self care agencies like adequate knowledge, judgment and perception modification to facilitate aintenance of mental health. SCNDT has been successfully implemented in various settings like care of the patient with learning disability. Orem’s model was used in the nursing process to assess the needs of a patient named Sara suffering with Asthma and formulated the nursing diagnosis and care plan based on the needs identified. â€Å"The human needs are categorized into food, air, water, shelter, rest, social interaction, prevention of hazards and maintaining adequate normal function level† (Horan, Doran amp; Timmins, 2004, p. 35 ). The patient was asked to maintain a diary of all the teachings and the interventions to track the progress of the care plan. The conclusion of the study was: It proved as a useful frame work in this situation because Sara was involved in the entire process. From this she became aware of issues relating to her self- care needs and how to meet them. The authors have found that using Orem’s (2001) model in this practice setting has greatly enhanced Sara’s self-care abilities and acknowledgement of deficits plus, preventing possible future problems.

Sunday, October 27, 2019

Relationship Between Insomnia And Depression Psychology Essay

Relationship Between Insomnia And Depression Psychology Essay Nowadays, insomnia is the most widespread sleeping disorder of this century. Being one of the most common sleep disorders, insomnia can be defined as inability to maintain a good sleep hygiene. According to epidemiological studies, atleast one third of the general population suffer from sleep troubles and among this, the incidence rate of insomnia is around 6% to 10% (Daley et al. 2009). Insomnia can be viewed as either being a symptom or a syndrome; the term secondary effect or symptom can be applied in cases set off by psychiatric afflictions, diseases, intake of illicit drugs or excess of alcohol and even an aggregate of all these factors coupled with stress, anxiety or depression (Sivertsen et al. 2009). Insomnia can be evaluated using the Insomnia severity index (ISI) which based on the patients providing an assessment of the intensity of their symptoms (Bastien et al, 2001). The Pittsburgh Sleep Quality Index (PSQI) which makes use of questionnaires is a practical way to assess the sleep quality along with the troubles causing it over a certain period of time (Backhaus 2002). Insomnia is regularly linked to psychiatric disturbances such as depression. Some researches show that depression is the factor that causes insomnia while others disagree by stating that in fact, insomniacs are more prone to develop depression (Isaac Greenwood 2011). Depression can be investigated using the Beck Depression Inventory (BDI). This literature review will be focused on defining the different types of insomnia and whether or not they are caused by depression. The flow of the bidirectional relationship between insomnia and depression will also be presented to determine which one of these two is a risk factor. Insomnia caused by depression Types of insomnia Primary Insomnia Primary insomnia (PI) is the repetitive inability to commence or uphold sleep and this excludes any natural or psychotic disturbances (Backhaus 2002). This has an impact on the quality of life of the patient causing distress and unfitness both socially and physically. Woods et al. 2008 reports that PI occurs in atleast 3% of the population in the western developed nations. According to a study conducted in the general population by Morin et al. (2006), people complaining of dissatisfaction in their sleep are more like to be developing insomnia symptoms compared to those have an appeasing and pleasant sleep. Some of the symptoms that might qualify a person as being insomniacs are: difficulty to fall asleep, have trouble in upholding sleep, waking up early in the morning or have a non-regenerative sleep; these symptoms can either appear individually or in combination with one another as shown in studies by Leger et al. (2010). PI does not occur due to any other particular health condit ions. It is independent of other factors. Secondary Insomnia As defined by the DSM (Diagnostic and Statistical Manual of Mental Disorders), secondary insomnia can be linked to mental disturbances, trouble to sleep owing to a medical state or stimulation by a substance. Secondary insomnia is one which is related to another mental disturbance whereby one of the chief grievances is based on the inability of start or maintains a proper sleep and that the sleep even of it is initiated is not rejuvenating at all and this spans for over a period of atleast one month. It occurs in close collaboration with other psychiatric and medical conditions whereby clinical depression is one of the main concern, this state is considered as a causative agent for insomnia. Transient or Acute Insomnia Insomnia can be classifies as being transient or acute is the delay of sleep disturbance expand over a period of less than a few nights or not more than three to four weeks (Fetveit et al. 2008). This type of insomnia is more likely to occur in people who have no previous history of sleep disorders but who have been exposed to some distinctive cause such as caffeine intake, nicotine or any other medications. Chronic Insomnia Chronic insomnia can be interpreted in two different ways; either as a syndrome as a whole similar to PI or as being the consequence arising from a medical ailment such as secondary insomnia or mental imbalance such as major depression, anxiety or by overdose of drugs and alcohol (de Sainte Hilaire et al. 2005). In relation to Fetveit et al. (2008), primary insomnia caters for around 25% of all the cases of chronic insomnia. 2.2 The Mechanism of how Depression causes Insomnia Depression is a factor that triggers insomnia by causing imbalance or deficiency in terms of serotonin which is monoamine neurotransmitter. These particular serotonergic activies govern the sleep regulation. According to studies conducted in vivo by Joensuu et al. (2007), the availability of the serotonin transporter (SERT) changes at different stages of depression and this can be proved by using a technique known as SPECT (Single proton emission tomography). This decline in terms of SERT which is due to depression is mostly localised in the diencephalon in the mid part of the brain (Joensuu et al. 2007). This decline in terms of serotonin level negatively influences the sleep patterns since the serotonin is key constituent affecting both the sleep phases and mood (Buckley Schatzberg 2010). The hypersecretion of cortisol along with ACTH is an indicator of insomnia. Changes made to the Hypothalamic-Pituitary-Adrenal (HPA) axis along with the mode of action of the hormone that predict s the start of sleep triggers the onset of depression. The hormone melatonin keeps the circadian rhythm of the body constant. Some studies show that depression causes the level of melatonin to drop which in turn causes a domino effect on the serotonin level. In people with major depressive syndromes, the concentration of cortisol is much higher than that of melatonin (Buckley Schatzberg 2010) as shown in the graphs below which highlights the relationship between the level cortisol and melatonin. Fig. 2 shows the phase relationship between cortisol and melatonin for healthy control compared to the one suffering from mental disorder (Buckley Schatzberg 2010). Yet, there are still other numerous neurobiological mechanisms like the deficiency of the monoamine neurotransmitters, excessive activity in the HPA axis, the faulty action of the gene related to plasticity and circadian genes mutation that can give an explanation on the irregularity in terms of sleep patterns in depressive patients (Benca Peterson, 2008). This diagnosis of sleeping troubles using only polysomnography is not reliable and must be supported by functional imaging or EEG activity patterns to define the correlation between the behavioral and experimental observations (Benca Peterson 2008). The bidirectional flow of the relationship between insomnia and depression Depression causes insomnia In those people who suffer from MDD, one of their major grievances is insomnia. In the adult population, around 60% of them that fits the criteria defining MDD whine about insomnia and an average of 10% to 20% of the insomniacs show signs of MDD (Fava et al. 2006). Using multiple variances, the mean values mean response for two particular groups (insomniacs with or without symptoms of depression) responses pertaining t to BDI-II were analyzed. From the total score derived from the BDI-II, it was seen that depressed plus insomniac participants attained much higher grades on the total score scale in contrast to those with solely insomnia. A feature that highlights depression is the shift in the sleep pattern that leading to insomnia and other disturbances. Among 90% of the depressive patients are insomniacs as well according to a study by Fava et al. (2006), this clearly emphasize on the co-existence of depression and insomnia. Insomnia triggers depression Though not the only one, insomnia is regarded as being the main factor that has an impact on depression. Studies conducted by Pigeon et al. (2008), patients with insomnia are more likely to become depressed and remain so. From the cohort study obtained from health surveys of the HUNT-2 by Neckelmann et al. (2007), the relationship between insomnia and depression is simply based on their resemblance to one another. This defines insomnia as a state marker for depression. As established by Taylor et al. (2005) with BDI and sleep diaries to support the research, the probability of insomniacs developing depression was 9.82 times more than people without insomnia as presented by the table 1. Further, this same study states that the depression score for patients with combined insomnia is much higher compared to other studies. Table 1. Prevalence Rates expressed using the Beck Depression Inventory Score to relate insomnia and depression (Taylor et al. 2005). From the direct analysis of figure 3 below that 4 out of the 5 different depression statuses prevail from persistent insomnia while more than 50% of the sample did not remit or have an improvement from the condition (Pigeon et al. 2008). This proves that insomnia (persistent or intermediate) does have a significant impact on the number of people with improved condition. All these facts boil down to the fact that insomnia is certainly a major risk factor for depression. Fig. 3 highlights the relationship of insomnia and how it is a risk factor for depression (Pigeon et al. 2008) Discussion Different types of insomnia react differently when exposed to other factors such as MDD for example it does not in any way cause primary insomnia however in cases of secondary insomnia, it is considered as being the most crucial factors based on studies related to DSM. This study did not really determine whether a correlation exists between insomnia and depression since they have common symptoms, yet the use of BD1-II did perceive the symptoms of depression in insomniacs. The PSQI has a high sensitivity and specificity for insomnia patients in comparison to healthy controls, thus underscoring that it is a good measure for differentiating between good sleepers and patients suffering from sleep disturbances. Our data suggest, however, that the cut-off score should be set to 6 in order to maximize specificity while only modestly reducing sensitivity. In sum, the PSQI proved to be a valuable adjunct to clinical work on insomnia and is a useful first-line, easy-to-handle, and time-efficient questionnaire to evaluate sleep disturbances. Conclusion

Friday, October 25, 2019

Othello: the Abnormal Essay -- Othello essays

Othello: the Abnormal Five Works Cited  Ã‚  Ã‚   William Shakespeare’s tragic drama Othello presents to the audience a very abnormal character in the person of Iago. Also can one classify the epileptic seizure of Othello as normal? Let us in this essay consider the abnormal in the play. The abnormal behavior of the ancient is partly rooted in his misogynism. In â€Å"Historical Differences: Misogyny and Othello† Valerie Wayne implicates Iago in sexism. He is one who is almost incapable of any other perspective on women than a sexist one: Iago’s worry that he cannot do what Desdemona asks implies that his dispraise of women was candid and easily produced, while the praise requires labour and inspiration from a source beyond himself. His insufficiency is more surprising because elsewhere in the play Iago appears as a master rhetorician, but as Bloch explains, ‘the misogynistic writer uses rhetoric as a means of renouncing it, and, by extension, woman.’ (163) And how about epilepsy? In Act 4 the evil Iago works up Othello into a frenzy regarding the missing kerchief. The resultant illogical, senseless raving by the general is a prelude to an epileptic seizure or entranced state: Lie with her? lie on her? – We say lie on her when they belie her. – Lie with her! Zounds, that’s fulsome. – Handkerchief – confessions – handkerchief! – To confess, and be hanged for his labor – first to be hanged, and then to confess! I tremble at it. [. . .] (4.1) Cassio enters right after the general has fallen into the epileptic trance. Iago explains to him: IAGO. My lord is fall’n into an epilepsy. This is his second fit; he had one yesterday. CASSIO. Rub him about the temples. IAGO. No, forbear. The lethargy must have his quie... ...l find Iago peeping out from many of its pages. Still more, Iago’s name will be found appearing occasionally in bold print in books on abnormal psychology. (89-90)    WORKS CITED    Bevington, David, ed. William Shakespeare: Four Tragedies. New York: Bantam Books, 1980.    Campbell, Lily B. Shakespeare’s Tragic Heroes. New York: Barnes and Noble, Inc., 1970.    Coles, Blanche. Shakespeare’s Four Giants. Rindge, New Hampshire: Richard Smith Publisher, 1957.    Shakespeare, William. Othello. In The Electric Shakespeare. Princeton University. 1996. http://www.eiu.edu/~multilit/studyabroad/othello/othello_all.html No line nos.    Wayne, Valerie. â€Å"Historical Differences: Misogyny and Othello.† The Matter of Difference: Materialist Feminist Criticism of Shakespeare. Ed Valerie Wayne. Ithaca, NY: Cornell University Press, 1991.

Thursday, October 24, 2019

The Ghetto Made Me Do It

024 ENG October 18, 2012 â€Å"The Ghetto Made Me Do It† Violent behavior is a direct result of heredity, environment, and parenting. The author of â€Å"Seeking The Roots Of Violence† believed that genetic heredity has to do with violent behaviors. I believe in her hypothesis, but also believe that environmental factors play a big role as well. How you are raised and people you are most closest to have a greater chance of influencing you in many ways. There is a saying my parents used to tell me when I was younger â€Å"show me your friends, nd ill show you your future†. The people you surround yourself with on a daily basis do illegal drugs, eventually you will too. Friends and family carry a great impact on a person’s life, especially when he or she is young. For example, in the essay â€Å"The Ghetto Made Me Do It† Lisa Morgan was brought up in a violent home. Lisa Morgan’s mother once had set her father on fire. Environment isn’t the only thing that has an impact on violence, it also has to do with ones heredity. Our DNA and our genes make us who we are.Our DNA controls our height, weight, how we look, as well as how we act. In the essay â€Å"seeking the roots on violence† Anastasia Toufexis stated that â€Å"for one thing, genes help control production of behavior relating chemicals. One suspect substance is the neurotransmitter serotonin. † Someone that has a chemical imbalance in the brain can cause depression and violence. Serotonin is chemical in our brain that controls ones mood. When a person is clinically classified as depressed he or she is prescribed to take serotonin to balance out the chemical mbalance that is causing these irrational mood swings. If we were to evaluate criminals for there behaviors and give them these drugs, it could potentially help control there violent thoughts. Not only is this a possibility, but if we study this it could lower a lot of violence throughout the world. At the same time it is very expensive and in my opinion the government needs to have a present of the population behind bars so they can gain profits. After reading these two articles it personally shined some light on this subject.

Wednesday, October 23, 2019

Flaws of the Hawthorne Effect Essay

Progress toward specified goals is fundamental to planned accomplishment. Measuring that progress is essential since it provides intermediate feedback for continued or corrective actions and can help ascertain actual accomplishment. Beyond the simple assessment of accomplishment is the evaluation of what that accomplishment truly means. Through proper evaluation, an accomplishment’s true worth can be determined. Then, decisions about future actions can be made. Care must be taken, however, to avoid pitfalls that could lead to incorrect conclusions and improper decisions. Let’s begin with an example. A golfer attempts to hit a ball into a hole in as few strokes as possible. After each stroke, the golfer hopes, the ball will be nearer the hole, until (at last) on the final shot, the ball disappears with a satisfying rattle into the plastic cup liner. The goal has been met. But what does that mean? How well was the goal met? Was it met in exemplary fashion or merely in a satisfactory manner? One measure is the number of strokes required. Assuming another player is competing, scores can be compared in order to evaluate relative performance. Without a norming score, however, goal attainment remains somewhat undefined in terms of level of achievement. Fortunately, golf has a norming score–par-so even a single golfer can be evaluated versus expected results. Golf can be taught and played in several ways. Which is the best method? How can one evaluate these methods? Perhaps comparing the performance of those who adhere to each method will provide a relative measure of which is most productive. Evaluation of these results can help golfers and instructors make informed decisions about which method to employ. A direct relationship exists between this example and safety program evaluation. A safety program is individually measured using a variety of tools. These measures, such as injury frequency rates, can be used in comparison with normalized (or group) measures to evaluate how a program is progressing toward a prescribed level of performance. Furthermore, program activities used to improve performance can be evaluated by comparing various measures of those activities. Hence, the evaluation process can be used to make informed decisions about safety program effectiveness. Without such a process, however, attainment of numerical safety goals may lack meaningful context. Hopkins and Antes describe traditional uses of the results of educational measurement and evaluation. â€Å"Educational evaluation takes the output of measurement and other pertinent information to form judgments based on the information collected. These judgments are the basis for decisions about students as individuals, and decisions about the effectiveness of school programs† (Hopkins and Antes 34). They conclude, â€Å"Improvement of the teacher’s teaching and the student’s learning through judgments using available information is the ultimate function of the evaluation process† (Hopkins and Antes 31). Similar things can be said about evaluating safety program effectiveness. That is, information collected about the various activities associated with a safety program should form the basis for decisions made to improve safety performance. Evaluation is based on information collected. Data collection can be achieved via many methods. Observation is one. Observations may be recorded or unrecorded. Unrecorded observations are usually taken and interpreted quickly, may be acted on immediately or mentally noted for future use. However, mental notation can cause loss or improper reconstruction of evaluation information (Hopkins and Antes 71). Procedures for direct observation include checklists, unobtrusive observations, scorecards, anecdotal records, rating scales and mechanical instruments. Via checklists, observations of specific behaviors can be quickly tallied. Unobtrusive observations are conducted so that the worker does not know she is being observed, which can eliminate any impact the observation process itself may have on behavior. Scorecards are similar to checklists, but apply a weighting scheme to the behaviors being observed. Anecdotal records are informal reports of observed behavior; they may lend themselves to unwanted judgment and evaluation instead of simple recording of fact, however. Rating scales can be used to collect information about intensity or degree in relation to the observation (Hopkins and Antes 78-96). Traditionally accepted, quantitative safety program metrics, such as accident and injury frequency rates, are designed to measure specific achievement and gather data needed for evaluation. Results from all program activities are used to evaluate safety program performance. Bottom line: Information-collection techniques must be designed to prevent an evaluator’s personal biases from influencing how results are recorded or considered. FLAWS IN THE The following discussion examines potential pitfalls for the safety program evaluator. Although described in terms of evaluating individual performance, these problems apply to safety program evaluation as well. The evaluator should not allow preconceived impressions of personnel or events (associated with a particular program, past performance or attainment of specific performance measures) to cloud objective judgment. Safety program evaluation takes time and resources. Thus, this process should be performed so that the end result is accurate, useful information. The Halo Effect The Halo Effect is one potential evaluation pitfall. According to Kirkpatrick, who describes the effect as it relates to the workplace and employee performance evaluation, the Halo Effect is a tendency to overrate the person being observed. This concept can be applied to safety program evaluation as well. Kirkpatrick lists seven reasons why this effect occurs. 1. A person’s past good performance leads one to expect continued good performance, and the assumption of good performance carries over to future evaluations (Effect of Past Record). 2. An evaluator tends to rate a person who is pleasing in personality and character, agreeable and otherwise compatible higher than performance may justify. . Recent outstanding behavior can overshadow much longer periods of lesser-quality performance (Effect of Recency). 4. A person with an asset deemed important by the observer, although it may be irrelevant, may receive a higherthan-justifiable rating. 5. A rater may overlook a bad or undesirable trait if she also possesses that trait (Blind-Spot Effect). 6. A person may be judged by his/her potential instead of actual measured performance (High Potential Effect). 7. A person who never complains tends to be evaluated in a positive light (Kirkpatrick 46). The Hams Effect The Horns Effect is the reverse of the Halo Effect in that evaluations tend to be lower than deserved. Kirkpatrick offers eight causes for this effect. 1. The evaluator may have high expectations that are not easily met. 2. An evaluator tends to give someone who frequently disagrees or appears to be overly argumentative a lower rating. 3. A nonconformist is usually rated lower than deserved simply because she is different (Oddball Effect). 4. Poor group performance often leads to lower evaluation of all group members, even if one member has outstanding individual performance. . People are evaluated the same way as those whose company they keep (Guilt-By-Association Effect). 6. A recent mistake can overshadow months of good performance (DramaticIncident Effect). 7. An evaluator may associate some character trait (i. e. , aggressiveness, arrogance, passivity) with poor performance and give a lower-than-justified rate to someone who has that trait (PersonalityTrait Effect). 8. An evalua tor may give a lower-thanjustified rate to a person who performs a task differently than the evaluator would (Self-Comparison Effect). Controlling These Effects  Kirkpatrick attributes these flaws to vague standards and maintains that effectively established standards of performance can reduce or eliminate their impact (Kirkpatrick 46-47). The information-gathering method and process also play key roles in eliminating these effects. As stated, anecdotal records that rely on memory can easily lead to inappropriate evaluation. Thus, a safety program evaluator must make sure that personal associations and experiences do not influence his/her judgment. Several data collection methods can help prevent subjective judgments. For example, the critical incident method is a three-step process that involves data collection, data summary and analysis, and feedback. Developed by J. C. Flanagan, this technique uses recorded observations of specific behaviors that are judged to be critical to good or poor performance. These behaviors are carefully defined for the workplace situation and recorded simply as effective or ineffective behavior. Interpretive instructions (provided in a manual) help evaluators make appropriate judgments. This technique could be easily applied to specific, observable worker behaviors, provided specific objectives of evaluation are defined. Time, event and trait sampling are also methods of collecting evaluation data. Time sampling involves specifically timed observations that, over time, might be expected to provide a good representation of total performance. Event sampling is like Flanagan’s critical incident method in that events deemed to represent specific performance characteristics are recorded as they are observed. Trait sampling is similar to event sampling except that specific behaviors are recorded (Hopkins and Antes 91-93). Such techniques can help ensure collection of objective data. An evaluator’s knowledge of the various facets of the Halo and Horns effects can also help alleviate these problems. The evaluator must learn to ask whether either of these effects is influencing his/her judgment and make adjustments if necessary. An evaluator who uses objective data-collection techniques and consciously avoids making Halos/Horns judgments will produce more-accurate evaluations that, in turn, will lead to better decisions. Hopkins and Antes suggest teaching evaluators about these effects in order to improve objectivity. The Illumination Experiments In the 1920s, a group of engineers at Western Electric examined the effect of illumination on work performance. The researchers established an experiment room and a control room, controlled various conditions and introduced changes one at a time. Much to the engineers’ dismay, the results were confounding. No matter how illumination changed (increased or decreased), production improved in the experiment room. Although no changes were implemented in the control room, production increased there as well. These results indicated the need to record not only the details of the physical changes made, but also the physiological, medical and social changes occurring (Mayo 80). Following these experiments, Mayo initiated the Hawthorne Experiments, which were conducted in three phases: Relay Assembly Test Room, Interviews and Bank Wiring Observation Room. Relay Assembly Test Room In the Relay Assembly Test Room, various regimes of workday length, payment schemes, break length and scheduling, work week and return to non-experimental conditions were evaluated. In all cases, productivity increased from previous levels. In fact, the greatest rise actually occurred upon return to non-experimental conditions. Mayo attributed this result to â€Å"†¦ six individuals working wholeheartedly as a team, without coercion from above or limitation from below† (Mayo 78). Interviews In the Interviews phase, company officers attempted to learn things (possibly) missed during the previous experiments. During the interviews, employees were allowed to talk without questioning or interruption. Some 20,000 employees were interviewed over several years. The result was a feeling of well-being among employees; the interview process had been a sort of emotional release. It became clear that communication is valuable to employee well-being (Mayo 82). Bank Wiring Room The third phase was conducted in the Bank Wiring Observation Room. Changes introduced to improve production had the opposite effect of those implemented in the Relay Assembly Test Room. Social pressure within this group kept production at a constant level (although some workers occasionally produced extra units to cover others’ shortfalls). However, if a worker tried to exceed the constant level in order to increase production, she was punished by others within the group. This process, called â€Å"binging,† involved a physical hit on the arm of the â€Å"offender† by an â€Å"enforcer† (Roethlisberger and Dickson 422). The Hawthorne Effect Thanks to these experiments, the term â€Å"Hawthorne Effect† was coined. Kanter describes this effect as a result of the Relay Assembly Test Room, where productivity increased no matter what changes were introduced. â€Å"In one experiment, a team of women workers was given a separate work area where their production would be measured while a variety of environmental conditions, such as lighting and rest breaks, were varied. Productivity tended to [increase] regardless of the changes that were made to physical conditions. â€Å"One conclusion was that being singled out to be in a high-visibility experiment was highly motivating in and of itself; calling this the Hawthorne Effect was, in part, a way of dismissing the claims made by new ‘human relations’ programs, arguing instead that any change involving [some] increased management attention and special treatment would have positive effects for a little while† (Kanter 409). Kanter simplifies this explanation, saying it was due to â€Å"the excitement of getting involved and making an impact† (Kanter 242). Controlling the Hawthorne Effect The key message is that, when evaluating a safety program, one must make sure the mere process of being evaluated is not the reason a measured characteristic changes from baseline measurements. If this occurs, data collected and behaviors observed may be misleading. Or, if, for example, several workers-are told they have been chosen to test a new safety-related process, will institution of the process itself lead to better performance, or will the workers be motivated to perform simply due to their participation in the experience? To minimize this effect, control groups should be established. By having two groups â€Å"participate† in the activity, the true effect of the different stimuli can be better determined. For example, Latham and Locke discussed an experiment through which a wood products company attempted to examine the value of goalsetting as it relates to increased production. One work crew was selected to strive toward specific production goals, while another crew, a control group, was told the experiment was designed to assess the effect of absenteeism on production (Latham and Locke 400-401). â€Å"To control for the Hawthorne Effect, we made an equal number of visits to the control group and the training group† (Latham and Locke 401). In other words, both groups received equal attention, so both had similar reason to be motivated by participation. Result: Test group was more successful than control group.

Tuesday, October 22, 2019

The eNotes Blog How to Plan a Road Trip Getting from Point A to PointB

How to Plan a Road Trip Getting from Point A to PointB Summer vacation is fast approaching, and with the promise of free time and sunshine, the wanderlust is real. With this in mind, is here to advise you on how to plan the perfect road trip to a T!  From preparation to execution  we have you covered when it comes to seizing the day (or road) this summer. Read on for our road trip tips and tricks! 1. Plot out your route. Where are you going? Think about where you are starting, and where you hope to end. Think about how many days you want to spend on the road. Do you intend to stop in two cities a day? Where do you want to sleep? Make a list of 10-15 places you for sure want to visit and explore. Mark these all on a map so that you can track what youll be able to do on day one, day two, etc. 2. This leads to another important step in the planning process. Make reservations if you wish to stay in a hotel or even if you want to stay at a specific campsite. Sure, part of the allure of a road trip is spontaneity, but you would much rather have a place to stay already arranged if you were to accidentally spend  a little extra time exploring a national park. Its nice to have a guaranteed place to rest your head. 3.  Invite your friends. Another important feature of planning your road trip is deciding who you want to bring with you. Once youve reached out to your group, let them know the dates you plan to be gone so that they can request work off in a timely manner. The last thing you want is for someone to have to drop out of the group at the last minute because they didnt notify their manager in time. 4. The packing list this list can make or break your experience on the road. Weve compiled a list of our must-have items below. A change of clothes for each day of the trip. (Kind of a no brainer, but whatever.) A swimsuit, towel, and pair of flip-flops. (No matter if you are taking a coastal route or not, youre bound to encounter some form of water, and when you do, youll want to be prepared.) Blankets, pillows, sleeping bags. (Sleeping accessories, le duh.) A safety-pack to be kept in the glove compartment. (Pepper spray, emergency numbers, road side assistance information, first-aid kit, and maps.) Snacks. (If you would prefer to have cold drinks or fruit, bring a cooler. By bringing your own snacks youll be able to save money by not having to stop every time someones hungry. Our suggestion? Hit up Costco before leaving, their muffins could feed an army.) Camera. (To capture all of your awesome experiences.) Toilet paper. (For those unexpected stops.) Car charger, phone charger. Baby-wipes. (Surprisingly useful, youll thank us after youve eaten something messy in the car.) Pack a book for your downtime. (We recommend Jack Kerouacs  On the Road, its the quintessential road trip read. If you can get past his unique narration, there are some beautiful pieces of wisdom to gather.) Once youve properly equipped yourself for the journey you can take off with the confidence that youre prepared to take on just about anything the road could figuratively throw at you. 5. Just in case you have never changed a flat tire before and find yourself in a sticky situation on the road, heres a how-to video with a really easy step by step method. 6. Avoid driving during rush hour traffic so you can get better gas mileage and save money! Be strategic about when you stop so that you can avoid sitting in horrendous stop and go traffic. 7. Be sure to create a kick-ass playlist to listen to on your drive. 8tracks and iTunes Radio both have great ways to select your own preferences. iTunes Radio has a function where you can create Three of a Kind stations combining similar artists to get songs that best suit you. Hopefully these tips and tricks will help you to get from safely and happily Point A to Point B! Happy driving!

Sunday, October 20, 2019

The Choosen essays

The Choosen essays The Chosen, a novel written by Chaim Potok, revolves mainly around the lives of four people. They include Reuven Malter, Mr. Malter, Reb Saunders and Danny Saunders. It mainly details the friendship between Reuven Malter and Danny Saunders and not as much around their fathers, Mr. Malter and Reb Saunders. Because the story revolves around the friendship of Reuven and Danny, I will focus on Reuven. The story takes place in Brooklyn around the time of World War II. Reuven Malter lives with his father in an apartment in Brooklyn. They live in a Hasidic and Orthodox area, with some Irish, German, and Spanish families. Most of the buildings around were three or four story brownstones. According to the book, only a few stores in the area were owned by Orthodox Jews. The rest were run by gentiles. Reuven lives in a world that is just out of the depression and World War II, and we, up until September eleventh, lived in a world which was different than his world. We were in a peaceful and prosperous time, while Reuven was in a world where the economy was only beginning to recover and the war was only just ending. Now we are at a time where our economy is not booming and we are gearing up for war. Reuven attended a yeshiva, which is a Jewish parochial school. Reuvens father Mr. Malter taught in the yeshiva that Reuven attended. This school was looked down upon by other schools because of the fact that it taught its Jewish subjects in Hebrew and not Yiddish, and it also offered more subjects in English than the minimum requirement. Reuven played baseball on his schools varsity softball team and he was a good second basemen and pitcher. His team was number one in their league, partly because of the coaching of their gym instructor, Mr. Galanter. Reuven along with the other members of his softball team wondered why their gym instructor was not fighting in a war somewhere because he would constantly ta ...

Saturday, October 19, 2019

Message Passing Interface - not a title just area Essay

Message Passing Interface - not a title just area - Essay Example The MPI specification results from an MPI-Forum that entails several standards upon a movable system. Additionally, the standard is not specific on the explicit joint-memory processes, explicit support, and debugging facilities. The argument is that procedures proposed and established to increase the standard of implementation of the MPI in highly performing clusters like the Gigabit Ethernet and InfiniBand are useful in programming of parallel appliances; most clusters’ demonstration critically depend on the communication presentation of the routines provided by the library of the MPI. Historical Context and Development The message passing interface work started in 1991when a group of researchers began deliberations at a certain retreat in Austria. In another workshop, there were discussions on the Standards for Message Passing within an environment of Distributed Memory Environment in Virginia in 1992. During the workshop, there was a debate on the primary traits vital to a typical message-passing interface and a functional group created to commence the process of standardization (Gropp, Ewing & Anthony 1999, P. 27). Drafting of an introductory draft preceded this process in the same year, as a proposal to the project by three researchers. This was the MPI1. Thereafter, an assembly of the MPI team was conducted in Minneapolis. The working group of the MPI met frequently in 1993, and it comprised of people commonly from America and Europe. The standard of the MPI describes the semantics and syntax of a principal of library practices beneficial to many users drafting programs on portable message passing in C and Fortran (Gropp, Ewing & Anthony 2007, P. 790). In an effort to establish a real platform for message passing, the researchers integrated the most expedient traits of a number of systems into MPI as opposed to choosing one system to assume as a standard. Attributes were utilized from p4, Express, IBM, Intel, and PVM among other systems. Currently, the message-passing standard is striking due to its wide portability. It can thus be used in conveying messages for shared memory and distributed memory networks, multiprocessors, and a mixture of these rudiments (Foster & Nicholas 1988, P. 4). Application of the paradigm exists in several settings, regardless of memory planning or network speed. Critical Analysis of Current Trend The output of the plan for implementing an MPI presents crucial issues for computing systems of high performance. This especially applies for more progressive processor technological systems. Consequently, benchmarking the implementation of MPI on multi-core designs can be measured by ascertaining the Open MPI combined communication performance on the Gigabit Ethernet, as well as the infiniBand group, using SKaMPI (Ismail, et al 2013, P. 455). In the past years, clusters have developed into key architecture engaged for computing systems of high performance. The emergent style of the use of clusters as Hig h Performance Computing has led to numerous research in the discipline, especially in the standard method used for communicating between nodes (Gropp, Ewing & Anthony 1999, P. 29). Another significant factor which can impact the performance of communication of clusters is the clusters interconnect. Slower interconnects are capable of slowing down processes. The preferable cluster interconnect has to offer non-blocking inter-connect architecture and low dormancy great

Friday, October 18, 2019

Suez Canal Crisis of 1956 Essay Example | Topics and Well Written Essays - 2250 words

Suez Canal Crisis of 1956 - Essay Example To undertake construction Ferdinand de Lesseps created a company with Egyptian partners known as the Universal Suez Ship Canal Company. At the time the Ottoman Empire had influence and control over Egypt’s politics. The economic crisis forced Egypt’s ruler to sell his shares of the Universal Suez Ship Canal Company to England. England now had considerable share in the operation of the canal along with French investors, whereas Egypt lost control over the canal and its profits. The period saw great turmoil and the wars made the potential and strategic importance of the canal apparent to all forces. The British Imperial Empire had colonies across the world and the canal proved to be essential for trade. In 1882 Egypt was invaded by the British and the country was termed an indispensable possession of the British Empire. The canal became a super highway for the British to link its trade to its colonies in East Africa, India, and Australia. Egyptian rebel groups tried to pu sh British Colonial Empire but were not successful. 2. Weakening of the British Colonial Empire After the World War II, the British Empire faced economic difficulties to maintain its colonial empire. The Indian subcontinent was left after the war and the British forces were weakened. The time saw an uprising among the Egyptians to phase out the British from the country. The British maintained presence of a garrison at Suez to protect her strategic interests. The British were allowed to maintain presence of 10,000 troops on the basis of Anglo-Egyptian Treaty of 1936 (Tucker 107). But Egyptian rebel groups started gaining popularity of the masses and pressure increased over Britain to vacate the area. The events ultimately led to a coup in 1952 and finished kingship in the country. Egypt was made a republic by the key member of the coup and the new president of Egypt Gamal Abdel Nasser. 3. Nationalization of Suez Canal Gamal Abdel Nasser was the second president of Egypt and gathered support against the colonialist. He shifted cooperation of Egypt towards the Soviets and the act ions were against the two super powers of the time, the British and the French. He was viewed as a great threat by the two forces. At the time the US had very less influence in the Middle East. Its main ally in the region was Saudi Arabia. Gamal Abdel Nasser moved towards Saudi Arabia for its future ties and the US saw an opportunity to increase influence in the region. The biggest step that Gamal took against the British and the French was perhaps the nationalization of the Suez Canal on 26 July 1956 (Witte 51). This step was the basis of this crisis. The British and the French militaries were exhausted and their economies were at a low stage. Gamal took over the Suez Canal without firing a single shot and the Suez Canal came under Egypt. He cancelled the Anglo-Egyptian Treaty of 1936 and forced the British to vacate the canal within the next 20 months (Tucker 107). This was a surprise move by the army and the British forces were not given a chance to react. The Suez Canal Company was frozen and all its shareholders were given the share. 4. Buildup of Egyptian Army Foreseeing the threats, Gamal used his newly developed relations to build up his army on modern weapons through an arms deal with Czechoslovakia (DeRouen and Heo 346). These weapons were from the Soviets and the two countries became close allies. The Soviets equipped Egypt with modern tanks and its air force with fighters and bombers. Artillery guns were given to Egypt and Self Propelled Artillery pieces were procured from the Soviets to move along with the tanks in the desert

Proposal Essay Example | Topics and Well Written Essays - 2250 words - 1

Proposal - Essay Example In addition to wresting these native populations and lands from Mexico, the U.S grabbed itself many overseas colonies. While it reluctantly joined the two world wars rather late, the United States has started and waged quite a number of wars single-handedly since becoming a superpower. Interestingly, some of these wars have been merely military interventions whose justification some consider ulterior and therefore uncalled for. From this war-mongering nature of the United States and its leaders (presidents), it is strange that U.S citizens and subsequent presidents consider themselves as peace-loving people and continually deceive Americans that the U.S foreign policy serves their interests. One reason the U.S citizens elected President Barrack Obama is that they thought he would be different from his predecessor George Bush who not only started the foolish and unnecessary wars in Iraq and Afghanistan but also mismanaged these wars. It is because of Obama’s opposition to the two wars that he was endeared to the war-wary U.S citizens thus prompting his election. Unfortunately, two years into his first term in office, President Obama, who was expected to be more thoughtful on the use of U.S armed forces and the implications of crude policy tools escalated the U.S. involvement in Afghanistan and even launched a new war against Libya. Because of its love for war and military interventions in countries and regions considered enemies, strategic, or of interest to it, the United States has made many enemies in the world, more so the Arab and Muslim world. In fact, the U.S foreign policy has particularly been aggressive towards the Arab world, seen to be harboring and su pporting individual terrorists and terror groups such as the Al-Qaeda and Al-Shabab. This paper explores the United States’ foreign policy, which is marred with a lot of lies not

Assessment 3 Essay Example | Topics and Well Written Essays - 2000 words - 1

Assessment 3 - Essay Example Both sets of findings were evaluated using perceptual maps. High taste will reflect the high quality and high entertainment is intended to serve as an excitement factor besides communicability to help maintain high customer satisfaction. Initially, the likely early adopters will be targeted specifically to ensure a successful start. Their traits are also identified in the report, and the brand name is justified. Recommendations are then given to address a number of possible issues that may arise and in anticipation of opportunities for learning. This report details the business launch strategy for the product identified in assessment 2 collectively referred to by the Conversations brand name. The ideas gathered earlier are now developed into a virtual product ready for launching. The aim is to have an enhanced understanding of all the elements necessary to make the launch successful and to ensure that this success transpires. This strategy could have been approached by means of a product launch checklist but this does not always prove to be effective (Daniels, n.d.). Therefore the goals, readiness and constraints are presented in the form of this report. In consideration are the areas (in terms of product qualities) in which demand can most likely be created, the potential competitive advantage, the target market, and suitable product characteristics. The positioning statement is also defined, and the chosen brand name is justified. The following areas are therefore covered in this report: Recommendations are also made to deal with possible problems arising. The detailed planning could then ease the task of strategic marketing to ensure the launch is successful and that Conversations becomes a well-established brand in Australia. The marketing strategy usually poses the most significant challenge for all types of companies (Jain & Haley, 2009: 27), so the usefulness of this report extends beyond simply

Thursday, October 17, 2019

European Union Creation Essay Example | Topics and Well Written Essays - 2500 words

European Union Creation - Essay Example The European Union comprises of a majority of states in Europe. Starting from a membership of 6 nations it has grown to 27. The 1957 Treaty of Rome was the foundation for the European Union. Since then it has experienced many changes. The EU consists of common project and policies controlled by member nations. World War 2 was a watershed in the history of Europe. There had never been such a tremendous cost in human and economic which hit Europe so hard. There was a desire to avoid the horrors of war like the Holocaust, concentration camps, slave labour and the numerous other atrocities which were perpetrated in the war. There was also a yearning for an end to warfare since the horrors of modern warfare had been exposed in the conflict. The cold war was also developing between the Soviet Union and United States. The threat of annihilation from nuclear weapons remained. Charlemagne and The Holy Roman Empire were both historical examples of attempts to unite Europe. The Arab conquest of Spain, South France and Italy also led to the idea of a united Christendom against the Moors. There were also ideas about the peaceful unification of European following the threat from the Ottoman Turks. The end of the American Revolution also led to calls for a similar United States of Europe. The rise of nationalism and fascism in the 1930s would however destroy any dreams of United Europe.

Demonstrate a critical understanding of current issues in either Essay

Demonstrate a critical understanding of current issues in either investigation or prosecution of a aspect of cybercrime or e-investigation - Essay Example Increase in financial crime activities has become widespread, but there is still difficulty in maintaining transparent policies and actions of financial information. The problems faced by financial institutions continue to rise with issues relating to politics, legal, technology and economics arising with time. Financial institutions increasingly face challenges in managing cyber-attacks. Malicious attackers are increasingly becoming more sophisticated and widespread in devising methods of financial fraud. Banking institutions in Europe mainly face denial-of-service on a large-scale basis hindering their daily investigations. Institutions that handle regional bank and credit Sacco’s often face challenges in financial security breach. Enemies of the state breach their financial systems to seek for intellectual property and intelligence. Hackers use the security breaches to make political statements to their enemies. Cyber gangs working in crime groups opt for the vice to gain money by stealing finds in accounts or hacking into ATMs. A reduction in technology costs leads to the decrease of barriers implemented to curb cybercrime, providing criminals with cheaper and easier ways to penetrate into financial networks. The growing black market encourages a new generation of wrong doers wi shing to breach data services for financial institutions. 1In June 2014, the Bank of England increased its efforts in the protection of the UK’s financial institutions from cybercrime. The testing framework aims at combining government intelligence with security industries assessing the risks. Implementing the new cyber security strategy named CBEST seeks to ease pressure on financial services in England. With this in mind, the study seeks to analyze the financial security of the Bank of England. Financial crime in indicates that both internal and external rely on IT systems to manage information (BBC,

Wednesday, October 16, 2019

Assessment 3 Essay Example | Topics and Well Written Essays - 2000 words - 1

Assessment 3 - Essay Example Both sets of findings were evaluated using perceptual maps. High taste will reflect the high quality and high entertainment is intended to serve as an excitement factor besides communicability to help maintain high customer satisfaction. Initially, the likely early adopters will be targeted specifically to ensure a successful start. Their traits are also identified in the report, and the brand name is justified. Recommendations are then given to address a number of possible issues that may arise and in anticipation of opportunities for learning. This report details the business launch strategy for the product identified in assessment 2 collectively referred to by the Conversations brand name. The ideas gathered earlier are now developed into a virtual product ready for launching. The aim is to have an enhanced understanding of all the elements necessary to make the launch successful and to ensure that this success transpires. This strategy could have been approached by means of a product launch checklist but this does not always prove to be effective (Daniels, n.d.). Therefore the goals, readiness and constraints are presented in the form of this report. In consideration are the areas (in terms of product qualities) in which demand can most likely be created, the potential competitive advantage, the target market, and suitable product characteristics. The positioning statement is also defined, and the chosen brand name is justified. The following areas are therefore covered in this report: Recommendations are also made to deal with possible problems arising. The detailed planning could then ease the task of strategic marketing to ensure the launch is successful and that Conversations becomes a well-established brand in Australia. The marketing strategy usually poses the most significant challenge for all types of companies (Jain & Haley, 2009: 27), so the usefulness of this report extends beyond simply

Tuesday, October 15, 2019

Demonstrate a critical understanding of current issues in either Essay

Demonstrate a critical understanding of current issues in either investigation or prosecution of a aspect of cybercrime or e-investigation - Essay Example Increase in financial crime activities has become widespread, but there is still difficulty in maintaining transparent policies and actions of financial information. The problems faced by financial institutions continue to rise with issues relating to politics, legal, technology and economics arising with time. Financial institutions increasingly face challenges in managing cyber-attacks. Malicious attackers are increasingly becoming more sophisticated and widespread in devising methods of financial fraud. Banking institutions in Europe mainly face denial-of-service on a large-scale basis hindering their daily investigations. Institutions that handle regional bank and credit Sacco’s often face challenges in financial security breach. Enemies of the state breach their financial systems to seek for intellectual property and intelligence. Hackers use the security breaches to make political statements to their enemies. Cyber gangs working in crime groups opt for the vice to gain money by stealing finds in accounts or hacking into ATMs. A reduction in technology costs leads to the decrease of barriers implemented to curb cybercrime, providing criminals with cheaper and easier ways to penetrate into financial networks. The growing black market encourages a new generation of wrong doers wi shing to breach data services for financial institutions. 1In June 2014, the Bank of England increased its efforts in the protection of the UK’s financial institutions from cybercrime. The testing framework aims at combining government intelligence with security industries assessing the risks. Implementing the new cyber security strategy named CBEST seeks to ease pressure on financial services in England. With this in mind, the study seeks to analyze the financial security of the Bank of England. Financial crime in indicates that both internal and external rely on IT systems to manage information (BBC,

Gender Differences in Mathematics Essay Example for Free

Gender Differences in Mathematics Essay Throughout the first half of the 20th century and into the second, women studying or working in engineering were popularly perceived as oddities at best, outcasts at worst, defying traditional gender norms. Female engineers created systems of social, psychological, and financial mutual support, through such strategies, conditions for female engineers changed noticeably over just a few decades, although many challenges remain. Engineering education in the United States has had a gendered history, one that until relatively recently prevented women from finding a place in the predominantly male technical world. For decades, Americans treated the professional study of technology as mens territory. At places where engineerings macho culture had become most ingrained, talk of women engineers seemed ridiculous (Sax, 2005). For years its been assumed that young women avoid careers in mathematics-based fields, like engineering and physics, because they lack confidence in their math skills. But a new study finds that it’s not a lack of confidence in their math skills that drives girls from those fields; its a desire to work in people-oriented professions. It has been found that young women who are strong in math tend to seek careers in the biological sciences. They value working with and for people, they dont perceive engineering as a profession that meets that need. The environment at many tech schools is hostile toward helping students achieve a degree and is more geared toward weeding out those who are struggling. Its difficult to come up with alternative engineering solutions if everybody in the room looks alike. Thats the initial reason why automakers and suppliers are busy trying to identify and hire minority and women engineers. The business case is that if more than half of an automakers customers are either female and/or people of color, which they are, then those groups need to be represented in every sector of the company. One of the most important areas for automakers to get a range of views is in product development. With that diversity mission in mind, DaimlerChrysler Corp. , Ford Motor Co. and General Motors Corp. , all have mounted aggressive programs to identify and hire minority and women engineers. At GM the story is the same. To attract minority and women engineers, the automaker proclaims that innovation comes from the people who see the world in a different way than everyone else. One women and minorities enter into the automotive engineering ranks, they need to be challenged and encouraged to develop their careers or theyll be gone (Sax, 2005). Its not just the Big Three that are working to create a more diverse engineering workforce. Suppliers and engineering support organizations such as the Society of Automotive Engineers are trying to draw more women and minorities into the profession. Faced with chronically small percentages of minorities and women in virtually every segment of engineering, companies are going to great lengths to attract them to the world of automotive engineering. Harvard President Lawrence Summers ignited a firestorm recently when he suggested more men than women are scientists because of differences between males and females in â€Å"intrinsic aptitude. † Many scientists-both men and women-expressed outrage at Summer’s remarks and blamed any lag in math among girls mainly on discrimination and socialization (Dean, 2006). They point out that girls have closed the gap in average scores on most standardized math tests in elementary and high school. Today women constitute almost half of college math majors and more than half of biology majors. But Summer’s supporters say he courageously raised a legitimate question for scientific inquiry. Indeed, in recent years some researchers have been pursuing a scientific explanation for the discrepancies in math and science aptitude and achievement among boys and girls and have found differences, including biological ones. Summer’s suggestion that women are biologically inferior in math infuriated many female scientists. Some asserted that the other two factors he mentioned were far more important in keeping women out of science: sex discrimination and the way girls are taught to view math as male territory. Some differences are well established. Girls do better on tests of content learned in class and score much higher on reading and writing tests than boys. Boys score higher on standardized tests with math and science problems not directly tied to their school curriculum. On tests of spatial awareness, boys do better on tests that involve navigation through space. Girls are better at remembering objects and landmarks. Studies show differences in brain structure and hormonal levels that appear to influence spatial reasoning. But the implications of these differences for real world math and science achievement remain unclear. â€Å"There is evidence that male and female brains differ anatomically is subtle ways, but no one knows how these anatomical differences relate to cognitive performance,† (Dean, 2006). At the heart of the current controversy is a societal implication-that the failure of an institution like Harvard to tenure even one woman mathematician can be blamed on the lack of top-flight women mathematicians, which in turn can be blamed on too-few top female minds in math. As evidence of intrinsic aptitude differences, Summers pointed out that more boys than girls receive top scores on standardized math tests. Today girls receive better grades than boys in math and science through high school, have closed the gap on average scores on most standardized math tests and take more advantage high school classes than boys in almost every category except physics and high-level calculus. In college they constitute nearly half the math majors and more than half the biology majors. Indeed, today a growing number of researchers contend boys are the ones who are shortchanged-judging by the larger proportion of boys in special-education classes and the declining proportion attending college. Women now make up 56 percent of students enrolled in college; by 2012, the Department of Education projects they will account for about 60 percent of bachelor’s degrees (2002). The fact that more boys than girls make top scores on standardized math tests is often invoked as evidence that boys possess an innate superiority in high-level math. Experts on both sides of the divide agree gender differences are real, even if they disagree bout how much is socially learned and how much biologically based. Girls do better on writing and on algebra problems, probably because algebraic equations are similar to sentences, and girls excel in language processing. Boys are better at mathematical word problems; girls are better at mathematical calculation. Boys and girls also differ on spatial skills, and experts are divided over how innate or important these differences are. A recent study of the Graduate Record Exam, for instance, found men did better on math problems where a spatially based solution was an advantage (Gallagher, Kaufman, 2005). Sex hormones have been shown in several studies to affect the ability to envision an object rotating in space. Females who take male hormones to prepare for a sex-change operation improve on tests of 3-D rotation and get worse on tests of verbal fluency, at which women typically excel. During their menstrual cycle, women do better on 3-D rotation when levels of the female hormone estrogen are low; they do better on verbal fluency when estrogen levels are high. If science be taught directly with a hands-on, inquiry-based approach, it sustains girl’s interest in science. Girls like to work in cooperative teams, a lot of science was taught in a competitive mode. Women scientists also earn less than men. But it’s only fair that women who work fewer hours face the economic consequences of lower salaries and less status. References: Dean, Cornelia. (2006). â€Å"Dismissing ‘Sexist Opinions’ About Women’s Place in Science†. A Conversation with Ben A. Barres. The New York Times. July 18, 2006, pp. 1-5. Gallagher, Ann M. , Kaufman, James M. (2005). â€Å"Gender Differences in Mathematics: An Integrative Psychological Approach. Cambridge University Press. National Center for Education Statistics, â€Å"Projections of Education Statistics To 2012†. (2002). Available on-line: http://nces. ed. gov/pubs2002/proj. 2012/ch_2. asp.. Sax, Leonard. (2005). Too Few Women- â€Å"Figure It Out†. Los Angeles Times. Jan. 23, 2005.

Monday, October 14, 2019

Suitable Network To Implement In Gaming Centre Computer Science Essay

Suitable Network To Implement In Gaming Centre Computer Science Essay In this documentation, is going to propose a suitable network to implement in gaming centre. In order to select the right network, it is necessary to have understanding and knowledge on various types of network, to know the efficiency and reliability of the network, various types of game and requirement, network topology and architecture, ISP package selection, network component. Follow by types of game that going to provide to the customer, by providing several example of games requirement for making decision on different types of hardware and software to use in gaming centre. The game requirement is an important role that allows gaming centre to choose the suitable hardware for the computer in the gaming centre in order to achieve customer satisfaction. In order to allow customer to play online and LAN games with lowest connection latency, the selection of network topology and architecture is important. Due to the gaming centre is going to implement 30 gaming computer for the customer, the right topology and architecture allow customer to play online and LAN game smoothly. To play an online game with smooth connection, it is required to have good bandwidth of connection speed. Therefore, choosing the suitable package among other Internet Service Provider will be based on the connection speed. To build a complete and working network for the gaming centre, the major component of network cannot be missed out, which is computer, software, network interface device, and transmission media. Each of the components has different responsibility in order for a network to be complete. With the help of research on Internet, the model of device and type of application is recommended base on the specification of the hardware and software. However, these hardware and software may request to change by gaming centre after or before the implementation based on their justification. Assumption Below is some of the assumption of the gaming centre and network that going to implement:- The gaming centre will be providing high-end game to customer. Customers allow playing offline, online, and LAN games in the gaming centre. The gaming centre is capable of hosting tournament for different types of online and LAN games. The computer specification is sufficient enough for most of the high-end game. The connection bandwidth is capable to handle up to 35 computers in the gaming centre. The network topology, architecture and device recommended able to achieve the terms of scalability and flexibility for the gaming centre to expanding the business in future. Limitation There is some of limitation of the network that may require specialist or admin with relevant knowledge to solve the problem. These limitations may require paying extra attention by admin in order to minimize the lost that cause by it. The particular networks fail if the centralized device is encountering a problem. This may affect all computers that connected to the device. The network congestion problem occur when huge numbers of users trying to access the server to obtain the resource from the server. When the server is down or damage, it unable to handle and provide result of request by the customer such as starting a game. 1.0 Chapter 1 1.1 Introduction Wendell Odom (2004, pg.5) states that Network, a combination of hardware, software, and cabling, which together allow multiple computing devices to communicate with each other. In general, network basically means that numbers of computer being attached together in order to communicate and sharing information using cable. However, without proper configuration and supported software, communication and sharing information activities cant perform accordingly. Picture below shows the example of a network. Figure 1.1 Computer Network (http://www.home-network-help.com/wireless-router-as-access-point.html, n.d.) In order to create a successful network, it should consist of several parts, which is computer, software, network interface device, and transmission medium. Without any of the important part mention above, it will not call as a network. Computer is electronic devices that allow users to perform certain task easily compare to perform manually. Software is an application that helps computer to perform most of the task. Network interface device is referring to the device that uses to connect the computer with the internet, example modem, switch, router, and hub. Transmission medium is cable that connects the network interface device with the computer, as well as connects to the internet. People nowadays know that advantage of network is to share resources and information in shortest time and different geographical location. It helps to evaluate the travel time from one location to another location. Moreover, network also helps increased cost efficiency, this is refer to most of the software are published are costly and required certain amount of time to install. With the help of network, they can stored or install the software on a server so that it can be used by different workstation. In the gaming centre, it allow customer to access to the game play online or LAN games with players within or outside the gaming centre. 1.2 Type of Network 1.2.1 Wide Area Network (WAN) The gaming centre will be implementing the Wide Area Network, which is a combination of multiple Local Area Networks to allow customer to play online game as well as LAN game at the same time. Example of the WAN is Internet. It combines all the LAN that connected to the internet which allows users to communicate and sharing resource within the LAN or other LAN that connected to the Internet. Figure 1.2 WAN (http://wally.cs.iupui.edu/n241_06/files/webMag/index.html, n.d) The reason of having WAN for the gaming centre is due to the wide coverage of the network. The only resource needed for the gaming centre to implement is LAN that can access to the Internet, then it is automatically becomes part of the WAN. 2.0 Chapter 2 2.1 Computer Game Mark Stanfield and Thomas Connolly (2008, pg.25) states that The definition of computer games combines the more comprehensive concept of game with the use of computer. The game concept represents a structured or semi-structured activity with goal that players try to achieve and set of rules governing its operation. Base on the definition, game is referring to a well planned structure that consists of objective for anyone that plays it. However, player is required to understand and obey the rules and regulation of the specific in order to achieve the objective and gain achievement. Meanwhile, computer game is mean by the game can only be played using electronic devices which is computer. That the beginning of computer games, there is only offline game available and it required lesser disk space compare to computer games nowadays. Until today, there is plenty type of computer game on the market, such as online games, offline games, LAN games which is local area network games, and every type of computer games had been classified into different categories, for example RPG, FPS, RTS and many more. Offline games is referring to any games that can play by single player and unable to connect through the network and play with other players that playing the same game. An online game is referring to any type of game that can play using Internet and play or compete against other player. Lastly, LAN games is referring to any types of game that can played with other players within the certain area whereby users computer is connected to a same network. However, there are many games that can allow single player as well as multiplayer. Every game had its own requirement in order for player to play the games without any foreseen problem, the requirement divided into different categories, such as type operating system, processor, and type of graphic card, numbers GB of RAM, hard disk space, and also DirectX version. However, there is minimum requirement and recommended requirement which allow player to know that the specific game is suitable to play on their computer or not. Minimum requirement is to allow users to run and play the game in a normal performance and loading speed. As for recommended requirement, users able to run and play the game smoother in terms of performance and higher loading speed. As a LAN gaming centre, it is necessary to have various type of games provided to customer according to their favourite, and to satisfied the customer, there is certain level of knowing the games requirement and specification so that the centre able to choose the right hardware and software for the computer in the centre. By taking some example of the games requirement, it should be able to help in choosing the proper gadget for the computer. 2.2 Types of Game The game chosen to review the game requirement and use it as a reference for selecting the suitable hardware and software for the computer, Starcraft II, Warcraft 3, Counter-Strike: Source, Sudden Attack SEA, and Devil May Cry 4. The example of game chosen included online games, offline games, and LAN games. Online game example for this documentation is Sudden Attack SEA, which is first person shooting game and can only be played while connected with internet. Offline game is Devil May Cry 4 which is role playing game only for single player. Lastly LAN game, the example of game chosen is Starcraft 2 and Warcraft 3, a real time strategy game, and Counter-Strike: Source is a first person shooting game. These three games can be played with other player while connected to the network. However, it can be consider as offline, online game as well, due to these game are able to play with single player or connected to internet and play with or compete against other player. 2.3 Games Requirement Figure 2.1 Sudden attack SEA (online) (http://www.gx.com.sg/Blog/Blog.aspx?id=7ab57b16-fa13-4f2a-a937-0fb14368fec3, n.d) System Minimum Requirement Recommended Requirement CPU Intel Pentium 4 1.8GHz or above AMD Athlon XP2100 or above Intel Core 2 Duo or above AMD Athlon 64 X2 or above Memory 1GB or above 2GB or above (Win Vista/7) 2GB or above 4GB or above (Win Vista/7) Video Card 128MB or above 256MB or above Microsoft DirectX 9.0c compatible Graphic Card Operating System Windows 2000/XP/Vista/7 DirectX Microsoft DirectX 9.0c or above Hard Disk Space 3GB free space after game installation Table 2.1 Sudden Attack requirement (http://suddenattack.asiasoftsea.net/04-download/04-download_01_01.aspx, n.d) Figure 2.2 Devil May Cry 4 (offline) (http://cineclubecovilha.com/torrent/torrent/Devil-May-Cry-4-DVDDL-Full-PC-Gamedaa/2905/0.html, n.d) System Minimum Requirement Recommended Requirement CPU Intel Pentium 4 processor or better Intel Core 2 Duo processor or better Memory 512MB 1GB Video Card NVIDIA GeForce 6600 series or better NVIDIA GeForce 8600 series or better Operating System Windows XP service pack 2 Window Vista Hard Disk Space 8GB Drive DVD-ROM Drive Table 2.2 Devil May Cry 4 requirement (http://devilmaycry.org/243/devil-may-cry-4-pc-system-requirements.html, n.d) Figure 2.3 Starcraft II (LAN/Online/Offline) (http://www.keys4.me/starcraft-2-ii-wings-of-liberty-eu-cd-key-pc.html, n.d) For Windows OS System Minimum Requirement Recommended Requirement Operating System Window XP/Vista/7 (latest service pack) Window Vista/7 CPU 2.6GHz Pentium IV or equivalent AMD Athlon processor Dual Core 2.4GHz processor Graphic Card 128MB PCIe NVIDIA GeForce 6600 GT or ATI Radeon 9800 PRO or better 512MB NVIDIA GeForce 8800 GTX or ATI Radeon HD 3870 or better RAM 1GB (1.5GB for Window Vista/7) 2GB Hard Disk Space 12GB Others (hardware) Keyboard/mouse, Internet Connection Resolution Minimum 1024720 display resolution DirectX DirectX 9.0c Table 2.3 Starcraft II: Wings of Liberty requirement (for Windows) (http://us.blizzard.com/support/article.xml?articleId=26242locale=en_US, n.d) For Mac System Minimum Requirement Recommended Requirement Operating System Mac OS X 10.5.8, 10.6.2 or newer Mac OS X 10.6.5 or newer CPU Intel Processor Intel Core 2 Duo processor Graphic Card NVIDIA GeForce 8600 GT or ATI Radeon X1600 or better NVIDIA GeForce 9600M GT or ATI Radeon HD 4670 or better RAM 2GB 4GB Hard Disk Space 12GB Others (hardware) Keyboard/mouse, Internet Connection Resolution Minimum 1024720 display resolution Table 2.4 Starcraft II: Wings of Liberty requirement (for Mac) (http://us.blizzard.com/support/article.xml?articleId=26242locale=en_US, n.d) Figure 2.4 Counter-Strike: Source (LAN/Online/Offline) (http://www.moddb.com/games/counter-strike-source, n.d) For Windows System Minimum Requirement Recommended Requirement CPU 1.7GHz processor Pentium 4 processor (3.0GHz or better) RAM 512MB 1GB Graphic Card DirectX 8.1 level graphic card (Requires support for SSE) DirectX 9 level graphic card Operating System Windows 7 (32/64-bit) / Vista / XP DirectX DirectX 8.1 or above DirectX 9 or above Table 2.5 Counter-Strike: Source requirement (for Windows) (http://store.steampowered.com/app/240, n.d) For Mac System Minimum Requirement Operating System OS X version Leopard 10.5.8 Snow Leopard 10.6.3 RAM 1GB Graphic Card NVIDIA GeForce 8 or higher ATI X1600 or higher Intel HD 3000 Others (hardware) Mouse, Keyboard, Internet Connection Table 2.6 Counter-Strike: Source requirement (for Mac) (http://store.steampowered.com/app/240, n.d) Based on the example of game requirement shown above, it clearly shows that different game have its own minimum and recommended requirement in order to play the game smoothly. Games requirement are usually based on previous version of graphic card or processor that already in the market to allow more player to play the games with their current computer. It also shows that different year of published the game may affected the requirement directly. With the example given for different games requirement, it helps the gaming centre to choose the right hardware for the gaming computer. 3.0 Chapter 3 3.1 Topology The topology choose to implement in the gaming centre is star topology. Star topology is one of the most common topology that used in current days. In star topology, every device is connected to a centralized device such as switch, router, or hub via Ethernet cable. This topology arrangement creates a point-to-point network connection between two devices and overall gives the appearance of a star. The reason of implementing the star topology in the gaming centre is the level of flexibility and expandability is high. Multiple star can combine as a hierarchical star and connectivity of the network on one particular computer will not affected other computer that connected to the same network unless the whole centralized device or main cable connected with the modem or router is damaged. Figure 3.1 Star Topology (http://tjliu.myweb.hinet.net/COA_CH_12.htm, n.d) 3.2 Architecture The architecture that suggested implementing in the gaming centre would be client-server architecture. Client-server architecture is referring multiple user computer connect and interact with one or multiple server that connected within same network. This architecture allows multiple users to submit request at the same time, and the server able to react to the request and provide result to user requested accordingly. Server are usually powerful machine due to the workload is heavy and need to be complete within short period of time. The reason of implementing client-server architecture to the gaming centre is due to the resource will be kept in the server that connected to the same network with the users computer. If the gaming centre decides to expand and add more computers to the network, it would be very easy to configure and it wont affect other clients connection with the server. Figure 3.2 Client-server (http://www.javaworld.com/javaworld/jw-10-2001/jw-1019-jxta.html, n.d) 3.3 Internet Service Provider ISP is the companies that provide Internet service to the people by subscribe various packages that give various amount of Mbps and services to the customer. Some ISP also provides modem/router for subscribing their package. The ISP that suggested is TM. Currently TM is promoting high speed broadband called Unifi, these package allow customer to enjoy the speed from minimum 5Mbps up to 20Mbps. For the gaming centre, the BIZ 10 package is sufficient enough for gaming. Below shows some of the key features of the BIZ 10 package:- Download and upload up to 10Mbps 1 fixed IP Unlimited usage 2 online guard plus 2 ishield plus 3.4 Component of Network In earlier part of documentation, it states that a complete network consists of 4 major components. The components are, computer, software, network interface device, and transmission medium. If lacking either one of the components, a network will not complete. 3.4.1 Computer Computers, a component that responsible on dealing with the user and connection, to setup, configure and maintain the network. Gaming centres main objective is to provide good service in terms of game playing satisfaction for customer to gain profit. In customer view, they usually hope to play game without any connection latency problem, or display lagging problem during the game. And also external hardware such as keyboard, mouse, and headphone also must be in good quality to satisfy the customer. In order to achieve the objective, choosing the right hardware for the computer would be important. Due to the computer hardware is updating model and performance frequently, there is impossible for a gaming centre to get a set of latest hardware for computer in the gaming centre, because it is costly. In this case, the computer that installed in the gaming centre would be a customize computer, which means the CPU itself is installed based on buyers need. Therefore, the computer specificat ion for the gaming centre is shown on table below. System Component Device model Operating system Windows 7 Ultimate 32-bit CPU Intel Core i5 650 @ 3.20GHz RAM 4GB Graphic Card ATI Radeon HD 5670 DirectX DirectX 11 Table 3.1 Computer Specification In order for gaming centre to keep the important data and information such as finance report or employees profile. It is highly recommended to implement server in the gaming centre. Server also allows gaming centre to store the games that going to play by the customer. Customer able to play any games that already installed in the server of the gaming centre, by choosing and click on the games shortcut inside the computer, customer are able to play the game freely. The model of server recommended to implement in gaming centre is Dell PowerEdge R515 2U Rack Server. It is suitable for storing database, application, email and others file. This model of server consists up to 25TB of internal storage space. And is easy to manage with the help of dell management console, and interactive LCD screen and other features to allow administrator to monitor and maintain the server frequently. Figure 3.3 Dell PowerEdge R515 2U Rack Server Processors AMD OpteronTM   4100 series processors Memory Up to 128GB1  (8 DIMM slots) 1GB/ 2GB/ 4GB/ 8GB   Up to 1333MHz Operating System Microsoft ®Ã‚   Windows ®Ã‚   Small Business Server 2011 Microsoft ®Ã‚   Windows ®Ã‚   Small Business Server 2008 Microsoft ®Ã‚   Windows Server ®Ã‚   2008 SP2, x86/x64 (x64 includes Hyper-VTM   ) Microsoft ®Ã‚   Windows Server ®Ã‚   2008 SP2 R2, x64 (includes Hyper-VTM   v2) Microsoft ®Ã‚   Windows ®Ã‚   HPC Server 2008 Novell ®Ã‚   SUSE ®Ã‚   Linux ®Ã‚   Enterprise Server Red Hat ®Ã‚   Enterprise Linux ®Ã‚   Virtualization Options: Citrix ®Ã‚   XenServerTM   VMware ®Ã‚   vSphereTM   4.1 (including VMware ESX ®Ã‚   4.1 or VMware ESXiTM   4.1) Storage Option Hot-plug Hard Drive Options: 2.5 SAS SSD, SATA SSD, SAS (10K) 3.5 SAS (15K), nearline SAS (7.2K), SATA (7.2K) Maximum Internal Storage: Up to 8TB1-24.6TB1  (depending on chassis) Embedded Network Controller One Dual-Port Broadcom 5716 Gigabit NIC (total of two 1x GB ports) Drive Bays Hot-Swap options available:   Up to eight or twelve 3.5 SAS or SATA, or 2.5 SAS or SSD drives Slots 3 PCIe G2 slot + 1 storage slot: One x8 slot Two x4 slots One x4 Storage slot Power Redundant 750W hot-plug power supplies Availability Hot-plug hard drives, Hot-plug redundant power, ECC memory, and Quad-pack LED diagnostic (12HDD chassis) or interactive LCD (8HDD chassis) Graphic Maxtrox G200eW w/8MB Chassis 8 HDD Chassis 3.40 H x 17.19 W x 24.09 D (in) 86.4 H x 436.6 W x 610.2 D (mm) 12 HDD Chassis 3.42 H x 17.53 W x 26.17 D (in) 86.7 H x 445.2 W x 664.6 D (mm) Management DellTM   OpenManageTM   BMC, IPMI 2.0 compliant Lifecycle Controller enabled via optional: iDRAC6 Express, or iDRAC6 Enterprise and vFlash Unified Server Configurator Table 3.2 Server Specification (http://www.dell.com/us/en/enterprise/servers/poweredge-r515/pd.aspx?refid=poweredge-r515s=bizcs=555, n.d) 3.4.2 Software The software that recommended implementing into the gaming centre is Windows 7 Ultimate 32-bit installed in every computer inside the gaming centre due to user friendly. For the server, it is recommended to install Windows small business server 2008. This particular operating system support internet connectivity, internal Web sites, remote access, file and printer sharing, backup and restore to secure all the resource that installed in the server. For securing the computer in the gaming centre from virus attack and hacking, the antivirus also required to install. The KasperSky anti-virus 2011 is the latest and suitable to protect the computer in gaming centre. In order to maintain and configure the network easily, the Cisco routers are integrated with Cisco IOS which is an all-in-one network operating system that allow user maintain the network using Cisco IOS Command Line Interface (CLI). With the help of Cisco IOS, administrators can configure, monitor and troubleshoot the system easily. Last but not least, all the games software or client need to installed into the server to allow customer to access. The reason of installing all games client is to save time on install and maintain. When a games encounter a problem, admin can solve it on the server side compare to install in each pc, admin have to solve the same problem over and over again when problem encounter. 3.3.3 Transmission Media The transmission media used for the gaming centre is Unshielded Twisted Pair (UTP) and wireless. UTP is the most commonly used media for connecting from device to device in various type of network. It consists of eight individual copper wires and each of the wires are covered by an insulating material and twisted around each other. Upon searching for information regarding UTP (CICSO, 2004) has shown various category of UTP cable. Category 1 Used for telephone communications. Not suitable for transmitting data. Category 2 Capable of transmitting data at speeds up to 4 megabits per second (Mbps). Category 3 Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps. Category 4 Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps. Category 5 Can transmit data at speeds up to 100 Mbps. Category 5e Used in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps]). Category 6 Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge (AWG) copper wires. Currently the fastest standard for UTP. The reason of having UTP to be implement in the gaming centre is due to the cost for the cable is cheap compare to other type of cables and is easier to install as well. It also can support multiple signals travelling through the same cable. Figure 3.3 Unshielded Twisted Pair cable (http://www.tech-faq.com/utp.html, n.d) 3.4.4 Network Interface Device For network interface device, is the component that act as the middle man in terms of business, it is connected with the users computer, and also Internet to handle data transferring, such as modem, router, switch, hub, and bridges. The device that implement in the gaming centre is modem, router, and switches. Each three device have different usage, modem, allow users to gain access to the internet which usually provided by the Internet Service Provider company upon subscribe the package. Router, to allow more than two users to connected and access to the internet, it also allow users to form a LAN. Switches, allow multiple users to communicate and sharing resource within the network. The router that recommended implementing in the gaming centre is Cisco 2951 Series Integrated Router. This model of routers has the feature shown below:- 3 integrated 10/100/1000 Ethernet ports with 1 port capable of RJ-45 or SFP connectivity 2 service module slots 4 Enhanced High-Speed WAN Interface Card slots 3 onboard digital signal processor (DSP) slots 1 internal service module slot for application services Fully integrated power distribution to modules supporting 802.3af Power over Ethernet (PoE) and Cisco Enhanced PoE Security Onboard hardware acceleration for VPN encryption Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN Integrated threat control using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering Identity management using authentication, authorization, and accounting (AAA), and public key infrastructure Voice High-density packet voice DSP module, optimized for voice and video support Standards-certified VoiceXML browser services Cisco Unified Border Element capabilities Cisco Unity Express voicemail support. Support for Cisco Communications Manager Express and Survivable Remote Site Telephony Figure 3.4 Cisco 2951 Series Integrated Router (http://www.datavox.net/ProductsServices/cisco-2951-router.htm, n,d) For switches, one of the most famous and reliable brand is Cisco. Therefore, the model choose to implement in gaming centre will be ESW-520-48P-K9. This particular model of switch contains 48 ports which mean that it capable to handle 48 devices at a time and it have 4 expansion ports: 2 10/100/1000BAST-T and 2 SFP slot. Figure 3.5 ESW-520-48P-K9 (http://www.telephonyware.com/telephonyware/products/cisco-esw-520-48p-k9.html, n.d) 4.0 Floor Plan Figure 4.1 Floor Plan 5.0 Network Diagram 6.0 Appendix 6.1 Practical 1 Task A List the different types of Unshielded Twisted Pair (UTP) cables commonly found and state the common uses for each. (12 marks) Category 1 Used for telephone communications. Not suitable for transmitting data. Category 2 Capable of transmitting data at speeds up to 4 megabits per second (Mbps). Category 3 Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps. Category 4 Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps. Category 5 Can transmit data at speeds up to 100 Mbps. Category 5e Used in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps]). Category 6 Category 6 cable consists of four pairs of 24 American Wire Gauge (AWG) copper wires. Currently the fastest standard for UTP. Task B Identify the components and tools necessary to wire Ethernet cables using the chosen UTP cable. (4 marks) RJ-45 connecter Crimping tool (AMP modular plug hand tool) Cable tester UTP cable Task C For each of the component and tool identified in part (b), describe and illustrate using diagrams where applicable the purpose of each and differentiate the various categories or classifications should they exist. (20 marks) UTP cable Figure 6.1 UTP cable (http://www.tech-faq.com/utp.html, n.d) -Common type of cable that used to connect between computer and network device in most of the network nowadays. RJ-45 connecter Figure 6.2 RJ-45 connecter (http://www.or.com.my/products/cable/accessories/, n.d) -To connect between RJ-45 interface network device and computer. Crimping tool (AMP modular plug hand tool) Figure 6.3 AMP modular plug hand tool (http://www.laikeet.com/catalog/product_reviews_new-amp-tyco-2-231652-0-modular-plug-hand-tool-crimper.html, n.d) -A multipurpose tool that can use for stripping the wires jacket and cut the wires into specific length and crimping RJ-45 connecter to sealed the wires of UTP in correct place within the jack Cable tester Figure 6.4 Cable tester (http://networkcable-tester.com/2011/01/14/cable-tester-2/, n.d) To perform a test on the cable when successfully crimped. Task D Using separate diagrams, illustrate the different two wire color-code standards for implementing of UTP Ethernet cables. (16 marks) Figure 6.5 color-code standard (http://www.controlcable.com/custom.asp?c=61084321, n.d) Table 6.2 Wiring Standards (http://www.controlcable.com/custom.asp?c=61084321, n.d) Pin # T568A T568B 1 White/Green White/Orange 2 Green Orange 3 White/Orange White/Green 4 Blue

Sunday, October 13, 2019

Biography of Norman Washington Manley :: Essays Papers

Biography of Norman Washington Manley Norman Washington Manley was born in Roxborough, Manchester, on July 4, 1839. He was the son of Magaret and Thomas Albert Manley. He attended Beckford & Smith High school. Since his youth, Norman Manley began to show hints of greatness when it came to sports and intelligence, hints which manifested themselves when Norman Manley attended Jamaica College. Norman Manley set records and gained national attention in the area of Track and Field and later as the Jamaican political leader. Norman Manley was an exceptional athlete. His most impressive and memorable performance was a 10 second time in the 100-meter sprint in 1911. This record became known throughout Jamaica as â€Å"the even time.† His record stood for an astounding 41 years until Frank Hall broke it in 1952. That same year Norman Manley’s eldest son, Douglass Manley, eclipsed the record also. Norman Manley’s athletic greatness continued through the 1912 Class 1 Championships. Between 1910 and 1912, his college team won two championships, mainly because of Norman Manley’s contributions. During the 1912 championship year, Norman Manley had another awe-inspiring performance in the 220 yard run. His time of 23 seconds flat was very comparable to the previous Olympic times in the 200 meters. He was without a doubt one of the fastest College men in the World. Norman Manley went to study at Oxford University in 1914 after being awarded the Rhodes scholarship. The First World War broke out and he enlisted to become a gunner in the Royal Artillery and was eventually promoted to corporal. He was awarded the Military medal and went on after the war to study law in England. There he married his cousin Edna Swithenbank. They had two sons: Michael and Douglass. In 1922, Norman Manley returned to his homeland of Jamaica and became a much sought after lawyer. He holds the distinction of never losing a murder case he represented. By the late 1930s, a hostile air arose in Jamaica concerning taxes, labor strikes, and civil unrest. This would lead to Manley lending his aide to the workers and forming the People’s National Party. Norman Manley founded the People’s National Party (PNP) in September 1938, and was elected its president for 31 consecutive years until his retirement.