Saturday, August 31, 2019

Displays the result Essay

To improve legibility the comments are displayed to the right of every TOM line of code, and not in the standard style. read keyin Reads data inputted by keyboard and stores in the store location keyin load keyin Loads data from the store location keyin in to the accumulator sub minus Subtracts the store location minus from the accumulator store display Stores value in accumulator in the store location display print display Displays contents of the store location display on the screen stop Stops program execution minus data. 1 Initialises a store location minus with the value 1 in it keyin data 0 Initialises a store location keyin with the value 0 in it display data 0 Initialises a store location display with the value 0 in it 2. Write a TOM program that reads a number from the keyboard, multiplies it by 2, reads another number b from the keyboard, multiplies it by 3, and then displays the result. In other words, evaluate 2*a+3*b. read keyin1 Reads data inputted by keyboard and stores in the store location keyin1 load keyin1 Loads data from the store location keyin1 in to the accumulator mult val1 Multiplies the accumulator by the store location val1 store display Stores value in accumulator in the store location display read keyin2. Reads data inputted by keyboard and stores in the store location keyin2 load keyin2 Loads data from the store location keyin2 in to the accumulator mult val2 Multiplies the accumulator by the store location val2 add display Adds the store location display to the accumulator store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen stop Stops program execution val1 data 2 Initialises a store location val1 with the value 2 in it val2 data. 3 Initialises a store location val2 with the value 3 in it keyin1 data 0 Initialises a store location keyin1 with the value 0 in it keyin2 data 0 Initialises a store location keyin2 with the value 0 in it display data 0 Initialises a store location display with the value 0 in it total data 0 Initialises a store location total with the value 0 in it 3. Write a TOM program that displays two numbers, entered from the keyboard, in descending numerical order. read keyin1 Reads data inputted by keyboard and stores in the store location keyin1 read keyin2. Reads data inputted by keyboard and stores in the store location keyin2 load keyin1 Loads data from the store location keyin1 in to the accumulator sub keyin2 Subtracts the store location keyin2 from the accumulator jifz lower Transfers control to the instruction lower if the zero flag is set print keyin1 Displays contents of the store location keyin1 on the screen print keyin2 Displays contents of the store location keyin2 on the screen stop Stops program execution lower print keyin2 Displays contents of the store location keyin2 on the screen print keyin1. Displays contents of the store location keyin1 on the screen stop Stops program execution keyin1 data 0 Initialises a store location keyin1 with the value 0 in it keyin2 data 0 Initialises a store location keyin2 with the value 0 in it 4. Write a TOM program that reads a number N from the keyboard and displays the sum of all integers from 1 to N i. e. 1+2+3+†¦ +N. read keyin. Reads data inputted by keyboard and stores in the store location keyin loop load sofar Loads data from the store location sofar in to the accumulator add one Adds the store location one to the accumulator store sofar Stores value in accumulator in the store location sofar add total Adds the store location total to the accumulator store total Stores value in accumulator in the store location total load sofar Loads data from the store location sofar in to the accumulator sub keyin Subtracts the store location keyin from the accumulator jifn loop. Transfers control to the instruction loop if the sign flag is set print total Displays contents of the store location total on the screen stop Stops program execution keyin data 0 Initialises a store location keyin with the value 0 in it one data 1 Initialises a store location one with the value 1 in it sofar data 0 Initialises a store location sofar with the value 0 in it total data 0 Initialises a store location total with the value 0 in it Alternatively, a more mathematical approach would be to use the below program. Observing the numbers inputted and outputted from the above program, I was able to find a relationship between the two numbers, this can be summarised by the below formula: (N x 0. 5) + 0. 5 x N = TOTAL The program using the above formula is simpler to write, uses far less processor cycles, and therefore far more efficient. read keyin Reads data inputted by keyboard and stores in the store location keyin load keyin Loads data from the store location keyin in to the accumulator mult val Multiplies. the accumulator by the store location val add val Adds the store location val to the accumulator mult keyin Multiplies the accumulator by the store location keyin store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen stop Stops program execution keyin data 0 Initialises a store location keyin with the value 0 in it val data . 5 Initialises a store location val with the value 0. 5 in it total data 0 Initialises a store location total with the value 0 in it TOM2 1. A mobile telephone company, Odear, makes a monthly standing charge of i 12. 50 and charges 5 pence per local call. Write a TOM program that reads the amount of calls made and displays the total monthly bill. read calls Reads data inputted by keyboard and stores in the store location calls load calls Loads data from the store location calls in to the accumulator mult rate Multiplies the accumulator by the store location rate add standing Adds the store location standing to the accumulator store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen stop Stops program execution total data. 0 Initialises a store location total with the value 0 in it calls data 0 Initialises a store location calls with the value 0 in it standing data 12. 50 Initialises a store location standing with the value 12. 50 in it rate data . 05 Initialises a store location rate with the value . 05 in it 2. Expand your program of (1) so that the program jumps back to the beginning, ready to calculate another bill instead of ending. start read calls Reads data inputted by keyboard and stores in the store location calls load calls Loads data from the store location calls in to the accumulator mult rate. Multiplies the accumulator by the store location rate add standing Adds the store location standing to the accumulator store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen jump start Transfers control to the instruction start stop Stops program execution total data 0 Initialises a store location total with the value 0 in it calls data 0 Initialises a store location calls with the value 0 in it standing data 12. 50 Initialises a store location standing with the value 12. 50 in it rate data . 05 Initialises a store location rate with the value . 05 in it 3. What’s wrong with the program in (2)? The program has no way of ending (normally), and will therefore loop continuously. 4. Modify (2) so that if the user enters 0 for the number of units the program terminates. start read calls Reads data inputted by keyboard and stores in the store location calls load calls Loads data from the store location calls in to the accumulator sub check Subtracts the store location check from the accumulator jifz end Transfers control to the instruction end if the zero flag is set mult rate. Multiplies the accumulator by the store location rate add standing Adds the store location standing to the accumulator store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen jump start Transfers control to the instruction start end stop Stops program execution total data 0 Initialises a store location total with the value 0 in it calls data 0 Initialises a store location calls with the value 0 in it standing data 12. 50 Initialises a store location standing with the value 12. 50 in it rate data . 05 Initialises a store location rate with the value . 05 in it check data 0 Initialises a store location check with the value 0 in it 5. Now modify (4) so that the user can tell the system how many bills to calculate and the program terminates after running that many times. read billnum Reads data inputted by keyboard and stores in the store location billnum start read calls Reads data inputted by keyboard and stores in the store location calls load calls Loads data from the store location calls in to the accumulator mult rate Multiplies the accumulator by the store location rate add standing. Adds the store location standing to the accumulator store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen load billnum Loads data from the store location billnum in to the accumulator sub billsub Subtracts the store location billsub from the accumulator store billnum Stores value in accumulator in the store location billnum jifz end Transfers control to the instruction end if the zero flag is set jump start. Transfers control to the instruction start end stop Stops program execution total data 0 Initialises a store location total with the value 0 in it calls data 0 Initialises a store location calls with the value 0 in it standing data 12. 50 Initialises a store location standing with the value 12. 50 in it rate data . 05 Initialises a store location rate with the value . 05 in it billnum data 0 Initialises a store location billnum with the value 0 in it billsub data 1 Initialises a store location billsub with the value 1 in it 6. Finally, modify the program of (5) so that the user can first enter the price per unit, and the standing charge. Read rate Reads data inputted by keyboard and stores in the store location rate read standing Reads data inputted by keyboard and stores in the store location standing read billnum Reads data inputted by keyboard and stores in the store location billnum start read calls Reads data inputted by keyboard and stores in the store location calls load calls Loads data from the store location calls in to the accumulator mult rate Multiplies the accumulator by the store location rate add standing. Adds the store location standing to the accumulator store total Stores value in accumulator in the store location total print total Displays contents of the store location total on the screen load billnum Loads data from the store location billnum in to the accumulator sub billsub Subtracts the store location billsub from the accumulator store billnum Stores value in accumulator in the store location billnum jifz end Transfers control to the instruction end if the zero flag is set jump start. Transfers control to the instruction start end stop Stops program execution total data 0 Initialises a store location total with the value 0 in it calls data 0 Initialises a store location calls with the value 0 in it standing data 0 Initialises a store location standing with the value 0 in it rate data 0 Initialises a store location rate with the value 0 in it billnum data 0 Initialises a store location billnum with the value 0 in it billsub data 1 Initialises a store location billsub with the value 1 in it Modifications in TOM2 In question 1, the program initialises four store locations; rate to store the standard call rate of 0. 5, standing to store the standing charge of 12. 50, calls to store the number of calls made and total to store the total bill. The programs reads a value inputted by the user (number of calls), multiplies this value by the call rate, adds the standing order and displays it. Question 2 introduces a loop after the total has been displayed to the start of the program so that user may calculate another bill, this however is not ideal as there is no correct way to terminate the program normally. Question 4 combats this problem by allowing the user to enter 0 to terminate the program. This is done by introducing an additional store location called check with the value 0 assigned to it. The program subtracts check from the number of calls entered, if the result is 0 (0 – 0 = 0) then the zero flag is set, the jifz statement then transfers control to the end of the program, where it terminates normally. Question 5, in addition to the store location used in question 1 introduces two more; billnum to store the number of bills required and billsub, a store location containing the value 1. The user initially enters the number of bills required, this is stored in billnum, the program then calculates the bill in same way as question 1. After the bill has been displayed, the program subtracts billsub (1) from the number of bills, if the result is zero (ie no more bill to calculate) the zero flag is set, and using the jifz statement jumps to the end of the program. If the zero flag is not set (more bills to calculate) the program is looped back to enter more bill details. Question 6, allows the user to enter the standing charge, rate of calls and number of bills before the bills are calculated, these are stored in their respective locations (standing, rate and billnum) before the program continues to execute in the same way as question 5. CSO Tutorial 4 Exercise 2. 1 We wish to compare the performance of two different machines: M1 and M2. The following measurements have been made on these machines: Program Time on M1 Time on M2 1 10 seconds 5 seconds 2 3 seconds 4 seconds Which machine is faster for each program and by how much? For program 1, M2 is 5 seconds(or 100%) faster than M1. For program 2, M1 is 1 second (or 25%) faster than M2. Exercise 2. 2 Consider the two machines and programs in Exercise 2. 1. The following additional measurements were made: Program. Instructions executed on M1 Instructions executed on M2 1 200 x 106 160 x 106 Find the instruction execution rate (instructions per second) for each machine running program 1. Instructions executed = Instructions per second (instruction execution rate) time(seconds) M1 200000000 = 20000000 10 = 20 x 106 Instructions per second or 20 Million Instructions per second M2 160000000 = 32000000 5 = 32 x 106 Instructions per second or 32 Million Instructions per second Exercise 2. 3 If the clock rates of machines M1 and M2 in Ex 2. 1 are 200 MHz and 300 MHz respectively, find the clock cycles per instruction (CPI) for program 1 on both machines using the data in Ex 2. 1 & 2. 2. Clock rate = clock cycles per instruction (CPI) Instruction execution rate M1 200000000 = 10 clock cycles per instruction (CPI) 20000000 M2 300000000 = 9. 375 clock cycles per instruction (CPI) 32000000 Question 4 Draw a full flowchart of the final TOM program produced at the end of exercise TOM2. This should include all the instructions, loops and all the program labels in the appropriate places.

Friday, August 30, 2019

Input Controls

Input Controls When we talk about input controls, what are we really talking about? Input control includes the necessary measures to ensure that data is correct, complete, and secure. A system analyst must focus on input control during every phrase of input design, starting with source documents that promote data accuracy and quality. (Shelly & Rosenblatt, (2012)). Input controls can help the flow of data in a database to be the same format and easy to understand. Without input controls there can be data integrity errors that could occur and cause information to be incorrect in the database.There are advantages and disadvantages to restricting user interfaces to limit a person ability of typing in too much information or maybe not enough information. Although there are many different types of input controls in this paper there will be only four of them that are addressed in this paper; this would include input mask, validation rules, source documents and batch input. First letâ€℠¢s talk about input mask. Input mask is an appearance that helps to characterize what type of contact is allowed in a given field on a template.The main purpose behind the input mask is to keep the data entry process somewhat the same and decrease the chances for incorrect data to be entered into the field. The input field entry can be configured to allow automatic field input as a way of saving time and resources. Input mask is created doing the process of computer programming. The fields on the template are recognized with specific control values. The values make it impossible to enter data that is not compatible with the values.An example of that would be when a field that contains an input mask that only allows letters will automatically reject the input of numbers and another one would be automatically converting the input into an adequate format an example of that would be when the input mask requires that the date field on the template specifies a format that is structured as date/month/year. Even if you enter the date into the field follows a month/date/year format, the input system reads the entered data and automatically converts it into the proper form.Input mask is a type of tool which had been developed for the purpose of telling the person that what sort of things need to be provided as an input so that the desired output can be achieved. The input mask basically acts as developer software. The text box is the tool where the input needs to be entered. The input mask can also act as a template or a simple format and this basically differs from situation to situation. In this transcription errors are the one which needs to be reduced and this is done through the way of data integrity which is one of the most basic features of the input mask.Validation rule is a criterion used in the process of data validation, carried out after the data has been encoded onto an input medium and involves a data vet or validation program. This is distinct from formal verification, where the operation of a program is determined to be that which was intended, and that meets the purpose. This method is to check that data fall the correct parameters defined by the systems analyst. A judgment as to whether data is official which is possible made by the validation program, but it cannot ensure the entire accurateness.This can only be achieved through the use of all the clerical and computer controls built into the system at the design stage. The difference between data authority and correctness can be illustrated with a trivial example. An example of validations rules is when a user cannot misspell a customer name if it is not entered, or is entered automatically based on the user enter the customer ID. (Shelly & Rosenblatt, (2012)). There are at least eight different types of data validation rules; a sequence check, existence check, data type check, range check, reasonableness check, validity check, combination check and batch controls.Source docume nts is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction. Source documents generally are paper based. Some examples of source documents would be cash receipt, cancelled check, invoice sent or received, credit memo for a customer refund and employee time sheet. At a bare minimum, each source document should include the date, the amount, and a description of the transaction. When practical, beyond these minimum requirements source documents should contain the name and address of the other party of the transaction.When a source document does not exist, for example, when a cash receipt is not provided by a vendor or is absent, a document should be generated as soon as possible after the operation, using other documents such as bank statements to support the information on the generated source document. Once a transaction has been journalized, the source document should be filed and made retrievable so th at connections can be verified should the need arise at a later date. Batch input is a process when data entry is performed on a specified time schedule, such as daily, weekly, monthly, or longer.An example of this would be when a payroll department collects time cards at the end of the week and enters the data as a batch. Some advantages of batch input are collection and entering can be done off-line, entering data can be done by trained personnel, processing can be done very quickly and can be done during non-peak times. Now for some of the disadvantages are, data collection usually has to be a centralized activity, data entry usually needs to be done by specially trained personnel. The processing activity is delayed; hence the possibility exists for data to be considered old or untimely when it finally gets processed.Since processing is usually done during off-hours, input errors detected during processing would not get corrected until the next regularly scheduled processing of i nput data. The off-hours computer operator may have to call the systems analyst or programmer if the program malfunctions. Below you will see a design for a web-based input for making a hotel reservation which will be using many of the concepts that are mentioned in the paper when talking about input controls. We will look at it in phases. Information gathering Phase 1 – Search and evaluationInput stay requirements – including location (city) and proposed dates of stay Compare and evaluate results – user may view multiple hotel / room / rate combinations Decide – user decides which hotel / room / rate combination meets their requirements Reservation making Phase 2 – Selection Select hotel, room and rate – the user selects the hotel / room / rate they wish to book Select additional rooms and rates – the user adds additional rooms if required Phase 3 – Checkout Input guest details – such as name, address, email address etc . Input payment details – such as credit card details or other payment method Confirm reservationStandard booking processes Screen 1Screen 2Screen 3 Screen 2 Screen 3 Enter search criteria: †¢ Dates †¢ City name [SUBMIT] Display hotels: Hotel 1 [SELECT] Hotel 2 [SELECT] Hotel 3 [SELECT] Display and select rates: Hotel 1 Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 Figure 1: Three-stage screen flow Figure 2: Selection of hotel – ‘Screen 2' example from Opodo. co. uk Figure 3: Selection of rate – ‘Screen 3' example from Trip. com Screen 1Screen 2 Enter search criteria: †¢ City †¢ Dates [SUBMIT] Display hotels: Hotel 1 Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 [SELECT] Hotel 2Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 [SELECT] Hotel 3 Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 [SELECT] Figure 4: Two-stage screen flow Figure 5: Selection of rate and hotel – ‘Screen 2' example from Expedia. co. uk TABLE 1: Search and evaluation styles Sear ch and evaluation style Travel agency Hotel only Hotel chain Total A Select hotel on screen 2 Select rate on screen 3 10 13 6 29 B Select hotel and rate together on one screen 6 17 2 25 Other -132033 Table 1 demonstrates that for travel agencies and hotel-only websites, there is an even split between using style A and style B.The table also shows that hotel chains generally use other search and evaluation styles. References Amas. syr. edu. 8 Dec 2011. Application Self Evaluation. Retrieved 9 Feb 2012 from http://amas. syr. edu/AMAS/display. cfm? content_ID=%23%28%28%25! %0A Noyes, Brian. 2010 June. Enforcing Complex Business Data Rules with WPF. Retrieved on 9 Feb 2012 from http://msdn. microsoft. com/en-us/magazine/ff714593. aspx Shelly, G. B. , & Rosenblatt, H. J. (2012). System Analysis and Design (9th ed. ). Boston: Thomson Course Technology. Input Controls There are many kinds of input controls. Write a 4-5 page paper in which you: †¢Explain the function of input controls. †¢Identify four (4) types of input control and explain the function of each. †¢Provide an example of a data integrity error that could occur if each of these types of input control were not in place. †¢Explain the advantages and disadvantages of restricting user interfaces. (User interfaces can often be restricted, limiting the user’s ability to navigate to other areas of the system, or out of the system. †¢Design and build a graphical representation of a Web-based input for making a hotel reservation, using Visio or PowerPoint or an equivalent. †¢Research and cite at least three (3) reputable academic sources. Darren Blake Week 6 Assignment CIS210 â€Å"An HTML form is a section of a document containing normal content, markup, and special elements called controls. † These controls are commonly referred to as input controls , according to the World Wide Web Consortium. There are many types of input controls that can be used in a web form. They help to provide a framework for the kind of data that will be submitted by users.Selecting the correct input control for a data field is critical. Text input, select box, radio button, and password are four examples of input controls. As pointed out by Ponce de Leon, most input controls are visual and interactive. There is also something called a hidden input control. They can be used to store system critical data, such as database key data, that the user does not need to interact with. Text type input controls are used to input text. They provide a single-line input field in which any text can be entered. The text type input controls are useful for form data such as names, street addresses, and user names.This data is viewable on the screen, so it ought to not be used for passwords. Select box input controls are extremely common in web forms. There are two basic types of select input controls: single select and multi-select. This type of input control provides a list of predetermined options that the user can select. They offer strict control of what can be entered into the form. They are used for items that have limited and predefined options. Good examples of this would be things like credit card type, country, state, and language. Usually, this type of input is used when the number of pre-defined options more than two.If there are only two options, other types of input controls may be more appropriate. If the user is allowed to select multiple options, such as a list of career field interests, a select input control can easily be set up to permit multiple selections. Radio button input controls are always used within a group. This means that there should be more than one radio button that has the same name. When radio buttons have the same name and different values, only one can be selected at a time. They are used when there are few pr edefined options.Predefined option sets of two are usually not put inside of a selection input control. For instance, the options for gender should usually be â€Å"male† or â€Å"female. † It is more fitting in this case to use two radio buttons. This allows the user to enter their data with one click rather than the two which would be required with a select drop down input control. It is up to the programmer to decide if a select input control or a group of radio buttons is more suitable. In general, if the user can easily view all available options on a single line of the form, the programmer should seriously consider using radio buttons.Alternatively, if there are enough options that it would span many lines they should be presented inside of a select input control, like selecting a state. Password input controls, on the surface, looks exactly like the text input control. They also, form an allowed content perspective, functions in an identical manner. However, pas sword input controls hide the data that is entered into the control. This means that each keystroke within the control will result in a dot or star instead of the actual data. This is done to prevent other individuals, who may be able to see the user’s computer screen, from viewing the password as plain text.In order to insure the correct amount of keystrokes by the user, the star or dot remains on the screen. However, the text is not displayed for the world to see. Hidden input controls are extremely useful when performing data entry tasks with a database-driven web application. Often, the forms used to edit data are in reference to an entry within the database that has an integer primary key. This key is usually arbitrary integer that increments automatically, provides indexing, and has absolutely no meaning to the user. When the user selects to update the data, it is important that the systems knows what ID is being updated.However, there is no reason to display this ID to the user. In order to submit the ID of the edited database record along with the modified form fields, the ID can be assigned to a hidden input control. Data integrity with input controls is achieved both by the nature of the controls themselves and basic script validation techniques. As far as scripting is concerned, each data field can be easily verified upon submit before sending the data to the server. For the types of input controls chosen, selecting inappropriate input controls can result in data integrity issues. A text input control is rather straight-forward.It is also the easiest field to realize data issues with. Obviously, you would not want to use a select input control for an individual’s name. However, using this type of control opens databases up to SQL injection attacks, entry of HTML entities, and entry of incorrect or bad data. With SQL injection and HTML entities, it is critical that the data entered is cleaned before being processed by the server. For a field like â€Å"First Name†, entry of SQL or HTML should be identified and rejected. In general, you also wouldn’t want to use a password field for something like â€Å"First Name. While it is great to be able to mask data, the user should be able to see if they have entered a typo. Asking the user to verify the entry of every single text field would be unreasonable. The potential for data integrity issues if a select input control is not used when it should be are obvious. If a user is supposed to choose a U. S. state, allowing him to enter text would be deleterious. The user could enter Whoville. They could also enter â€Å"None of your business. † Restricting entry is important for fields that have limited, predefine options.Radio buttons are in the same category as select input controls when it comes to data integrity. Selecting to use something like text instead of a group of radio buttons would be undesirable. For instance, if the user was supposed to se lect gender, he could type enter eunuch. This would not be helpful if that data is critical for the site’s services or interactions. Password fields come with data integrity issues built in, the data within a password input control are masked. Since the user cannot see the entered data, it is very easy to submit data that contains typos. This is not critical for a log in form.The user would simply be notified that his log in attempt failed. Conversely, for a registration form, this could result in highly undesirable issues. It is therefore common to place two password input controls on a form like this. The second input control is used to validate the entry in the first input control. The user is able to submit the form only when the values in both fields are identical. If a programmer chose to use a normal text field rather than a password field, the integrity of the entire system could be compromised. This has more to do with systems security than data integrity, but is sti ll an important consideration.User interfaces are often restricted by logged in status or type of user. For instances, a member of the human resources department would have access to employee information that a member of the software development department should not have, and vice versa. Obviously, a user who has yet to log in should not be able to access any sensitive data from any department. These offer definite advantages to any system. However, there are caveats that come with setting up a system like this. The first is simply the design and setup of these restrictions.A small bug in the setup or the code can cause an entire department to lose access that they need to do their jobs. Another issues is password management. Designers need to deal with how often passwords must be changed, how strong the password should be, and users forgetting their passwords. Without good forgotten password procedures, employees can be at work-stoppage for a significant amount of time, costing th e organization money. There is also additional overhead when an employee needs to be granted access or removed from access. Finally, an organization can decide to alter the access requirements for an entire section.This makes it necessary that the system access restrictions can be easily updated. All of this adds a large amount of overhead and requires one or more individuals to take responsibility for system support. Web Form References Ponce de Leon, D. (n. d). Forms in HTML. Retrieved from http://www. htmlquick. com/tutorials/forms. html W3Schools (n. d. ). HTML forms and input. Retrieved from http://www. w3schools. com/html/html_forms. asp World Wide Web Consortium (n. d. ). , Forms in HTML documents. Retrieved from http://www. w3. org/TR/html401/interact/forms. html#h-17. 1 Input Controls Input Controls When we talk about input controls, what are we really talking about? Input control includes the necessary measures to ensure that data is correct, complete, and secure. A system analyst must focus on input control during every phrase of input design, starting with source documents that promote data accuracy and quality. (Shelly & Rosenblatt, (2012)). Input controls can help the flow of data in a database to be the same format and easy to understand. Without input controls there can be data integrity errors that could occur and cause information to be incorrect in the database.There are advantages and disadvantages to restricting user interfaces to limit a person ability of typing in too much information or maybe not enough information. Although there are many different types of input controls in this paper there will be only four of them that are addressed in this paper; this would include input mask, validation rules, source documents and batch input. First letâ€℠¢s talk about input mask. Input mask is an appearance that helps to characterize what type of contact is allowed in a given field on a template.The main purpose behind the input mask is to keep the data entry process somewhat the same and decrease the chances for incorrect data to be entered into the field. The input field entry can be configured to allow automatic field input as a way of saving time and resources. Input mask is created doing the process of computer programming. The fields on the template are recognized with specific control values. The values make it impossible to enter data that is not compatible with the values.An example of that would be when a field that contains an input mask that only allows letters will automatically reject the input of numbers and another one would be automatically converting the input into an adequate format an example of that would be when the input mask requires that the date field on the template specifies a format that is structured as date/month/year. Even if you enter the date into the field follows a month/date/year format, the input system reads the entered data and automatically converts it into the proper form.Input mask is a type of tool which had been developed for the purpose of telling the person that what sort of things need to be provided as an input so that the desired output can be achieved. The input mask basically acts as developer software. The text box is the tool where the input needs to be entered. The input mask can also act as a template or a simple format and this basically differs from situation to situation. In this transcription errors are the one which needs to be reduced and this is done through the way of data integrity which is one of the most basic features of the input mask.Validation rule is a criterion used in the process of data validation, carried out after the data has been encoded onto an input medium and involves a data vet or validation program. This is distinct from formal verification, where the operation of a program is determined to be that which was intended, and that meets the purpose. This method is to check that data fall the correct parameters defined by the systems analyst. A judgment as to whether data is official which is possible made by the validation program, but it cannot ensure the entire accurateness.This can only be achieved through the use of all the clerical and computer controls built into the system at the design stage. The difference between data authority and correctness can be illustrated with a trivial example. An example of validations rules is when a user cannot misspell a customer name if it is not entered, or is entered automatically based on the user enter the customer ID. (Shelly & Rosenblatt, (2012)). There are at least eight different types of data validation rules; a sequence check, existence check, data type check, range check, reasonableness check, validity check, combination check and batch controls.Source docume nts is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction. Source documents generally are paper based. Some examples of source documents would be cash receipt, cancelled check, invoice sent or received, credit memo for a customer refund and employee time sheet. At a bare minimum, each source document should include the date, the amount, and a description of the transaction. When practical, beyond these minimum requirements source documents should contain the name and address of the other party of the transaction.When a source document does not exist, for example, when a cash receipt is not provided by a vendor or is absent, a document should be generated as soon as possible after the operation, using other documents such as bank statements to support the information on the generated source document. Once a transaction has been journalized, the source document should be filed and made retrievable so th at connections can be verified should the need arise at a later date. Batch input is a process when data entry is performed on a specified time schedule, such as daily, weekly, monthly, or longer.An example of this would be when a payroll department collects time cards at the end of the week and enters the data as a batch. Some advantages of batch input are collection and entering can be done off-line, entering data can be done by trained personnel, processing can be done very quickly and can be done during non-peak times. Now for some of the disadvantages are, data collection usually has to be a centralized activity, data entry usually needs to be done by specially trained personnel. The processing activity is delayed; hence the possibility exists for data to be considered old or untimely when it finally gets processed.Since processing is usually done during off-hours, input errors detected during processing would not get corrected until the next regularly scheduled processing of i nput data. The off-hours computer operator may have to call the systems analyst or programmer if the program malfunctions. Below you will see a design for a web-based input for making a hotel reservation which will be using many of the concepts that are mentioned in the paper when talking about input controls. We will look at it in phases. Information gathering Phase 1 – Search and evaluationInput stay requirements – including location (city) and proposed dates of stay Compare and evaluate results – user may view multiple hotel / room / rate combinations Decide – user decides which hotel / room / rate combination meets their requirements Reservation making Phase 2 – Selection Select hotel, room and rate – the user selects the hotel / room / rate they wish to book Select additional rooms and rates – the user adds additional rooms if required Phase 3 – Checkout Input guest details – such as name, address, email address etc . Input payment details – such as credit card details or other payment method Confirm reservationStandard booking processes Screen 1Screen 2Screen 3 Screen 2 Screen 3 Enter search criteria: †¢ Dates †¢ City name [SUBMIT] Display hotels: Hotel 1 [SELECT] Hotel 2 [SELECT] Hotel 3 [SELECT] Display and select rates: Hotel 1 Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 Figure 1: Three-stage screen flow Figure 2: Selection of hotel – ‘Screen 2' example from Opodo. co. uk Figure 3: Selection of rate – ‘Screen 3' example from Trip. com Screen 1Screen 2 Enter search criteria: †¢ City †¢ Dates [SUBMIT] Display hotels: Hotel 1 Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 [SELECT] Hotel 2Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 [SELECT] Hotel 3 Rate 1 [SELECT] Rate 2 [SELECT] Rate 3 [SELECT] Figure 4: Two-stage screen flow Figure 5: Selection of rate and hotel – ‘Screen 2' example from Expedia. co. uk TABLE 1: Search and evaluation styles Sear ch and evaluation style Travel agency Hotel only Hotel chain Total A Select hotel on screen 2 Select rate on screen 3 10 13 6 29 B Select hotel and rate together on one screen 6 17 2 25 Other -132033 Table 1 demonstrates that for travel agencies and hotel-only websites, there is an even split between using style A and style B.The table also shows that hotel chains generally use other search and evaluation styles. References Amas. syr. edu. 8 Dec 2011. Application Self Evaluation. Retrieved 9 Feb 2012 from http://amas. syr. edu/AMAS/display. cfm? content_ID=%23%28%28%25! %0A Noyes, Brian. 2010 June. Enforcing Complex Business Data Rules with WPF. Retrieved on 9 Feb 2012 from http://msdn. microsoft. com/en-us/magazine/ff714593. aspx Shelly, G. B. , & Rosenblatt, H. J. (2012). System Analysis and Design (9th ed. ). Boston: Thomson Course Technology.

Thursday, August 29, 2019

American Cars and Foreign Cars

American cars are now almost living. A car owned by a person shows the world what type of person they are. Most of these cars are the top ten car companies that dominate the automobile market. There are more than 250 million cars on the US road. Five of the ten car brands are American brands. For its incredible safety and reliability, unique style, support for the same or higher fuel economy and work in the United States, more people should buy American cars. American cars are stronger and more reliable than foreign cars. Another comparable difference between the US and foreign cars is performance. As we all know, American cars have bigger engines, which makes cars feel a way of driving. Unlike American cars, most foreign cars have a small but complicated engine to improve the reaction of driving cars. Regardless of whether the car is an American car or a foreign car, the engineering design of foreign cars made for performance is more complicated than most American cars. In contrast, the components of each type of car are similar, but foreign car seems to have a more sophisticated component system with better performance in handling, acceleration and braking. In terms of distinguishing performance, foreign cars have higher standards than American-made cars. From an American point of view, foreign cars are more expensive than similar cars in America. The most obvious answer is that foreign cars are being imported, so the retail price must be higher. This is true in almost all cases, but by contrast foreign cars are more valuable than American cars. The explanation of the difference in value may be that the quality of a foreign car is better than that of an American. Repair and maintenance of each type of car is directly related to value. Using general logic, expensive cars can be said to cost more as cars are repaired. In most cases, unless most foreign cars are of better quality, they are unlikely to need repair like an American car. Obviously foreign cars are more expensive and more valuable than American cars.

Wednesday, August 28, 2019

An Austrian company's tale of groth, globalizition and decline Essay

An Austrian company's tale of groth, globalizition and decline - Essay Example 3). Auer went into matured markets, including Egypt, Germany, Italy, and the United States. Hungary might be considered a more of a developing, or emerging, market, which is in line with where the world market is going, in that â€Å"most of the world’s growth is expected to occur in today’s emerging markets† (Cavusgil, 2002, p. 1). The factors in choosing these markets include competition, service costs, market characteristics and uncertainty (Davidson, 1982, p. 85). Based upon what you know about Auer Waffeln’s international expansion into a variety of foreign markets, can you identify distinct stages or phases in the entry process? What are the decisions that must be made at each stage? According to Johanson & Wiedersheim-Paul (1975), there are different stages for a firm when they decide to internationalize, and these stages represent successively higher degrees of internationalization commitment (Johanson & Vahlne, 1977, p. 23). When firms go internat ional, each additional market commitment will happen in incremental steps (Johanson & Vahlne, 1990, p. 211). The firms go through these stages, from a low degree of international involvement in Stage 1 to a high degree of international involvement in Stage 4 (Phing & Au, 2001, p. 163). The first stage is where there are no export activities. The second stage is that there is exportation via agents or independent representatives. The third stage is where an overseas sales subsidiary is established. The fourth stage is overseas manufacturing/production units (Johanson & Wiedersheim-Paul, 1975). With his entry into the Middle East, Waffeln conducted direct exportation of his products. This was the first stage of his entry into the market, and one of the biggest decisions that needed to be made when conducting the export business is how to circumvent, so to speak, the unique cultural challenges that exporting directly to the Middle East presents. Cultural challenges is one of the major barriers that internalizing firms face, and it is necessary to understand the cultural differences between the firm and the clientele (Copeland & Griggs, 1985, p. 52). Cultural â€Å"shapes business practices and processes in widely varying ways† (Caslione & Thomas, 2002, p. 24). Negotiating these cultural differences is considered to be one of the most important skills for the international manager (Brooke, 1986, p. 225). Cultural competency is one of the most important factors in gaining a competitive edge (Elashmawi, 2001, p. xvi). How managers interpret and respond to strategic issues is dependent upon the surrounding culture (Becker, 2000, p. 90). Culture can be spread across six different cultural dimensions – how does the society look at the nature of people; how does society look at the relationship between a person and nature; how does society look at the relationship between people; what is the primary mode of activity in society (accepting status quo or chan ging things to make them better); what is the conception of space in a given society (are meetings held in private or public); and what is the society’

Tuesday, August 27, 2019

Communication Disorders Assignment Example | Topics and Well Written Essays - 1000 words

Communication Disorders - Assignment Example So you need to adopt various skills and have knowledge about your profession and the tact of dealing efficiently. There is the need to improve upon the teaching practices by CART providers. It has been seen that most of the services are provided for graduate as well as under graduate levels. Professionals in this area need to cater various informal areas too. The association between student ands professionals should be made strong to gain better outputs. There should be more access for deaf and HH to lab settings etc. "while students can get support for classroom lectures, they find less possibility of access to study groups, lab settings, and other forms of information exchange outside the classroom." It is high time to treat graduates and under graduate students differently considering their level of experience and knowledge. Support for the growth in their careers rather than providing simple academic knowledge will be catered in future as well. More deaf and HH students will be encouraged towards opting different fields as careers as biomedical sciences, researching, vocational courses etc. It can be done by arranging an inventory of role models and speakers as well as deaf or HH scientists to share their scientific pursuits, training history etc. to encourage them. Various colleges offer the courses for learning and improving upon the knowledge imparting skills to deaf and HH people or students as STSN- Speech to Text Services Network, National Verbatim Reporters Association (NVRA), PepNet etc. So, the above mentioned improvements need to be catered upon in future for the benefit and growth of deaf and HH people. Sources: 1. National Institute on Deafness and Other Communication Disorders. 21 OCT, 2002. 2. Classroom Text Delivery Methods for the Deaf & Hard-of-Hearing.

Monday, August 26, 2019

Role and Functions of Law Essay Example | Topics and Well Written Essays - 1000 words

Role and Functions of Law - Essay Example According to Reference.com (2007), law is defined as: â€Å"rules of conduct of any organized society, however simple or small, that are enforced by threat of punishment if they are violated. Modern law has a wide sweep and regulates many branches of conduct.† Law is the set of rules that help government in governing the conduct, social behavior, handle disputes, conflicts and deal with crime. Based on its role, law is classified into various categories like: criminal, civil, labor law. These play a major role in the society and its institutions. Criminal law has the powers to prosecute a criminal for an action that is deemed or defined as crime according to the letter of law. It has nothing to do with ethics or moral. It is not personal neither religious. It is objective and lays common law for all citizens of a country. Legislatures frame law by passing acts, bills and statutes. There are laws that govern the social and constitutional rights of each individual. They ensure safety and security of the citizens. Under civil law a citizen can file a suit for a compensation, etc. There are also guidelines in the form of procedural law that guides the jurisdictions of various courts. They detail on the trial methods and judgments. Different branches of law specialize in unique institutional and behavioral aspects of the society. It is the constitution of any country that delegates powers to various heads and sectors within the government. For instance, the US constitution Article II gives the president the executive power and it also states the powers of the US Supreme court and other Federal courts (Mallor and Barnes, pg. 54). This decides the powers of jurisdiction of various courts like appellate courts, state courts and trails courts, etc. It also says the extent to which state legislatures can exert their powers. In discussing the role that lawyers play in our society, Norman Redlich, Dean at New York

Research advantages and disadvantages to bring World Cup to US Paper

Advantages and disadvantages to bring World Cup to US - Research Paper Example and equipment, which could be practiced on any more or less flat open space of the required size, made its way through the world entirely on its merits. But not in the United States† (Markovits & Hellerman, 2001, p.7). Sports culture is what people breathe, read, discuss, analyze, compare, and historicize and the less popularity of soccer in the US may be a reason of cultural hegemonic sports culture in the US which may lead to the domination of other sports like baseball, basketball, tennis and so on over the soccer extravaganza (Markovits & Hellerman, 2001, p.9). However the craze for soccer is gaining speed in America and a transition has taken place from soccer pioneers to  soccer-literate and are gradually directing towards the creation of the road to soccer-passionate by the soccer fans (Saporito, 2010). The Men’s Soccer World Cup held in 1994 saw almost near-capacity crowds at stadiums around the United States and attracted large domestic television audiences. Coupled with this success, the Major League Soccer (MLS) was founded in 1996 with money flowing from large owners and influential investors accelerating the games’ recognition with high media coverage. Women’s football became the most popular game in the United States nowadays followed by the phenomenal World Cup shootout victory over China by the United States Women’s national team in 1999 paving the way for the Women’s United Soccer Association’s (WUSA) founding in 2001 with huge inflow of investments (Richard & Nagel, 2007). The US bidding committee has also started bidding for the 2018 and 2022 World Cup for bringing this mega event in their country. This paper will analyze the advantages and disadvantages of bringing the World Cup to the United States with the subsequent impacts on the social, economic, and environmental dimension of the country. Emphasis is given on the research of secondary literary resources. Justifications of the statements are provided with examples and

Sunday, August 25, 2019

Oragnizational Behavior Business Research Paper

Oragnizational Behavior Business - Research Paper Example In addition, there are problems of attrition and hiring & severance costs (LaMalfa, 2007). Hence, it becomes imperative for the top executives of a firm to make plans and take steps for employee engagement and motivation. As a president of my company, I would make a systematic plan for employee engagement and motivation. The same is discussed here. 2. Recognizing the need and meaning of employee engagement The first step in an employee engagement plan is to recognize its real meaning and need. It has been found through research that engaged employees are those who are emotionally connected to the organization’s business. This emotional connect is above pay scale, incentives, benefits or training. Engaged employees are more enthusiastic, productive and happy in their work. The board of directors and the top executives need to understand that engaged employees lead to significant cost savings in recruitment and training and also enable to gain a sustainable competitive advantage . They allow flexibility in business due to their capability to acquire new skills and adapt to new businesses. The managers also need to realize that like other factors employee engagement can be planned and managed. 3. ... tions, compensation & benefits, training facilities, recommendation of the organization as a place to work, recommendation of company’s products or services to friends and productivity (LaMalfa, 2007). The survey must follow a 5 point or 7 point Likert scale so that the qualitative responses can be converted into quantitative data for analysis. In addition to the questions, the comments of the employees can be noted separately so that different perspectives which can’t be revealed by data can be known. On the questions, advanced data analysis techniques such as regression, factor analysis, cluster analysis and hypothesis testing would be used to generate useful insights. To measure the level of employee engagement, I would also contemplate engaging Gallup which is one of the oldest consulting organizations in conducting engagement surveys. Alternatively, I would use Gallup Q.12, the 12 question survey prepared by the company for measurement (Vazirani, 2007). The same is shown in Appendix 1. 4. Identifying and analyzing the problems The analysis of data would help to identify the problem areas. A certain threshold score should be used for each area to accept or reject it as a problem area. After this the root cause analysis of each problem must be done using 5 Whys approach or Fish Bone diagram. Also a gap analysis needs to be performed at this stage to identify the distance to be travelled for transition from current level of employee engagement to future desired level. 5. Developing an employee engagement strategy Employee engagement strategy would be developed by considering hierarchical needs of employees across 3 levels- basic, intermediate and advanced. The basic level includes meeting employee needs regarding safe working conditions, goal setting, training,

Saturday, August 24, 2019

Ethical Egoism Essay Example | Topics and Well Written Essays - 500 words - 1

Ethical Egoism - Essay Example For example, while working at the Single Stop in Miami Dade College Kendal campus, it was clear that every activity had both benefits and costs. First, experience gained in working is very essential as one gets exposure to various challenges and thereby learning ways of overcoming them. Secondly, one gains the ability to manage time and to interact with people with different views and ideas that are usually helpful in life. It is also motivating to learn that through own efforts somebody else lives a better life through the role one played in their life success. In most cases, every action will have a cost under whatever circumstances. The costs are sometimes are minimal and outdone by the benefits, and acts as a motivation to others in most cases. Time is one of the major costs in engaging in an activity. It is a challenge to allocate time to assist others especially when there are no benefits tied to the activity. Engaging in an activity also requires dedication of own efforts, resources such as money or knowledge. These costs in most cases are necessary to part with in  daily  lives. The theory of ethical egoism offers a suitable platform for justification in every action one engages. The theory states that it is sufficient and necessary for action to stand as morally right if it maximizes one’s self interest (Shaffer-Landau 193). It takes two versions the individual and the universal ethical egoism. In individual ethical egoism, one should check on one’s own interests, and one should concern with others only if the extent of involvement contributes to own interests. In universal ethical egoism, everybody has an obligation to act on their best self-interest and ought to concern about others only if the extent of concern contributes to their self-interests. Thus, the theory outlines that before engaging in an action it is necessary to evaluate the benefits and the costs attached. If the costs exceed the benefits, then it is not

Friday, August 23, 2019

Should drivers of automobiles be prohibited from using cellular phones Essay - 1

Should drivers of automobiles be prohibited from using cellular phones - Essay Example (Lissy et al p. 67) A study has been published in the Journal of Experimental Psychology and this study lends credence to this position. It showed that a subject engaged simultaneously in driving and a verbal task (repeating the words of the experimenter) visually scanned a much smaller area outside of the vehicle than when not engaged in such a secondary task (Recarte & Nunes p. 31-42). Performing simple spatial imagery tasks while driving (e.g., mental rotation of letters) caused the scanned area to shrink even more. Critics cite this study (among many others) to buttress the position that any task which significantly occupies a driver's mental resources (such as talking on a cellular phone) may have a negative impact on safety (by making the driver less likely to notice unexpected events) and, thus, should be addressed by legislation. Driver distraction is a definite problem in terms of its impact on safety. National Highways Traffic Safety Administration (NHTSA) estimates that 25 percent of traffic accidents involve at least some degree of distraction on the operator's part, although only a small fraction of these involve the use of cellular phones. (Dreyer et al p. 1814) Driver distraction is a long-standing concern, one that has been debated for more than 90 years.

Thursday, August 22, 2019

Birth control Essay Example for Free

Birth control Essay Abortion is wrong and unjust housands of women throughout the world obtain abortions every year. The decision to have an abortion is life altering and can have an enormous impact on a womans future health and well being. The reasons for having an abortion vary from woman to woman. The fact that a woman has even had to consider having an abortion can be in and of itself very disturbing emotionally. Some women experience a tremendous sense of relief, while others may have feelings of guilt, anger or profound sadness. For most women these feelings gradually improve and cease to be after a short period of time; however, for a small percentage, they may become much more pronounced or serious and for a far longer period of time. The more certain a woman is about her decision to terminate her pregnancy, the less her chances will be of developing emotional or psychological problems. The same holds true for women who have friends and/or family to provide support before, during and after this emotionally trying time. Emotional problems following an abortion tend to be more prevalent among women who have been previously diagnosed with depression, anxiety disorders or other mental health issues. Also noted at higher risk of developing depression are teenagers, separated or divorced women, and women with a history of more than one abortion. It is not unusual for a woman to experience a range of often contradictory emotions after having an abortion, just as it would not be unusual for a woman who carried her unintended pregnancy to term. There is no right way to feel after an abortion. Feelings of happiness, sadness, anxiety grief or relief are common. Providing women with an outlet for discussing their feelings is the first step toward the process of achieving emotional well being following an abortion. Ads by Google Most experts agree that the negative feelings a woman may have after an abortion may be due to a negative reaction by her partner, friends or family members, who might judge her negatively for having an abortion or for even becoming pregnant in the first place. Research studies indicate that emotional responses to legally induced abortion are largely positive. They also indicate that emotional problems resulting from abortion are rare and less frequent than those following childbirth. Most studies in the last 25 years have found abortion to be a relatively benign procedure in terms of emotional effect except when pre-abortion emotional problems exist or when a wanted pregnancy is terminated, such as after diagnostic genetic testing. While most abortion providers offer post abortion counseling or counseling referral sources,

Wednesday, August 21, 2019

Internet Censorship Essay Example for Free

Internet Censorship Essay WebInternet censorship (Is it possible to keep children safe from potential internet dangers? ) by: Eko Setiyo Utomo The Internet has become a part of modern life style for most people. In developed countries, most people use the internet at home. Children can access the internet for everything, from playing games, to doing schoolwork, to chatting with friends via e-mail, to surfing the web. Most online services provide children with a vast range of resources such as encyclopedias, current events coverage, and access to libraries and other valuable material. However, there can be real risks and dangers for an unsupervised child because most materials on the Internet are not only uncensored but also unedited. Adults can be expected to make their own evaluations of what they find. Children, who lack experience and knowledge, can not do this. Strohm (n. d. ) claims that the essential issue in the internet is internet pornography, which is a topic debated by many experts, but many other issues dangerous to children are of concern too. Children who have access to the internet can easily be lured into something dangerous. As stated by Manista (2002), â€Å"censorship on the internet has become an issue for a number of very specific reasons†. Parents should not assume that their children are safe online from internet dangers; and they should not just rely on soft ware to protect their children. According to Schwartz (2004), using filters to block access to undesirable materials may never prove to be the solution. In addition, governments should have the power to decide what is not acceptable for the minds of children. In contrast, it is argued by some people that supervising access to the internet could limit the creativity of children. n addition, according to Males (2000), statistical evidence does not support to filter the internet. He describes that several kinds of sex offences has declined since period internet (1990s) access in America. This essay will investigate the unsuitable nature of much of the material on the internet for children. It will also examine the devastating and lasting e ffect of pornographic images on children. Thus, parents must play a key role to keep children safe from potential internet dangers. Finally, it will suggest that parents should teach children how to choose suitable materials on the internet. The first section of this essay will explain why internet pornography and some of the various resources unsuitable for children can have a harmful effect on children. The next section will maintain that soft ware is essential to protect children from site danger. Finally, this essay will argue that parents themselves should be aware of the dangers on the internet. It is important to recognize that pornographic images on the internet can have a devastating and lasting effect on children. Children using the internet unsupervised can view free pornography pictures through accidental accessing. Strohm (n. d. ) has claimed that it is a commonly held belief that pornography on the Internet presents a serious danger to children online, and that the effects of pornography are progressive and addictive for many people. He further points out that most pornography sites are very easy to find. These sites always invite children and teens to take part in exposure. Children using internet chat rooms are the main target of sexual predators, often with traumatic results (Nuss 1999). Pornography isnt the only thing parents dont want their children to see on the Internet. Parents are also concerned about anarchist, Neo-Nazi, and all sorts of other propaganda, as well as information on computer hacking and building explosives. There are hundreds of thousands of web sites promoting illicit activities. However, many individuals and organized groups at the same time are attempting to protect children from information on homosexuality, violence, drugs and alcohol, hate speech, and the environment. In addition, according to Males (2000), children can become victims of internet crime, such as pedophile contacts with children and child pornography distribution. It is possible that some children may be visiting internet sites and communicating with potential internet predators without parent know. Otherwise, some pornographers argue, â€Å"In the right hands porn has its place. As anyone in the industry will readily proclaim, millions of men and women enjoy Web erotica harmlessly, and some couples turn to porn to enhance their sex lives† (Jerome et al. 2004). Children may have the opportunity to become informed about adult lifestyle. Pornography materials on the internet or ther media can be a valuable educational tool for children to understand about the concept of sexuality (Reisman Ray 1999). Furthermore, according to Males (2000), the internet access period (1990s) does not seem to have brought about any particularly bad effects. Nonetheless, children have access to computers and the internet not only at home, but in many other places, what they choose to view is very difficult to control. It is a concern of many parents that fre edom of information presented by the internet can pollute their main of children. Many kinds of methods have been implemented to avoid some of these negative effects of the internet. First of all, School on the Web†, for example, is a program has been developed by Microsoft and MCI to assist many schools attending information about education world on the internet. Moreover, Cyber Patrol, a popular soft ware, is a soft ware program that contains a twofold filtering technique. It can block unsuitable sites from a list of restricted web addresses (Reeks 2005).. Others products are Bess/N2H2, CyberSnoop, I-Gear, Internet Filter, Library Channel, NetShepherd. On Guard, Parental Discretion, Rated-PG, SmartFilter, Tattle-Tale, WebSense, and X-Stop. These soft ware are designed to present at one or more many kinds of computers. According to Schrader (1999), these products offer five basic approaches bad word, bad site, bad topic, site content rating systems and bad service to control expressive content on the internet which may be set by the individual user or built into the program. In addition, children using the internet can also be prevented from disclosing their personal details via e-mail or chat room with the application of soft ware, such as Net Nanny. Meanwhile, The Platforms for Internet Content Selection (PICS) provides particular-labeling vocabularies, which work in different way to filter, to block inappropriate materials. According to Resnick and Miller (1996) the parent, as a user, can select every material in the certain label that is provided by software to block unsuitable sites. Nevertheless, it is an impossible task to be able to censor everything on the internet because the internet is an infinite global network. Males (2000) maintains that the internet would be a useless tool for students if it is blocked, or filtered. Filters can easily block student out of websites that they need to access for research simply because they contain words that have been flagged as inappropriate. He also believes that People who worry about the internet have a phobia or anxiety disorder which is not concerned about real problems. However, using appropriate soft ware can help to minimize the negative effects of the internet, even if many weaknesses exist in various software. Parents can play a key role in helping young people to be aware of the dangers and can get practical help on keeping children safe online. Governments especially, which have the power to decide what is not acceptable for the eyes of children, should make many regulations to help parents to keep children safe from potential internet danger. In late 1999, the Australian Government established NetAlert to provide independent advice and education on managing access to and usage of the Internet (NetAlert 2005). First of all, parents need to build trusting relationships with children and set a good example. Most parents teach their children not to give out information to strangers, not to open the door if they are home alone (AACAP 1997). As a result, it is hopped that children never give their name, phone number, e-mail address, password, postal address, school, or picture without their parent permission. Furthermore, parents should also teach children how to search and find many materials that are suitable for young people (in Healey ed. 2002). Parents are strongly encouraged to speak openly with their children about online dangers and monitor their online activities. Moreover, it is important for parents to be aware that they can not assume that their child will be protected by the supervision or regulation provided by the online services. Only parents can judge when a young person is mature enough to access the internet. Nuss (1999) also claims that children will be much safer accessing the internet if parents take the time to learn to use the internet first. However, children often feel that as Internet users, they know how to make a decision about what materials are harmful. Moreover, when students are exploring the Net for different kinds of materials, they are essentially exploring the real world (Singhal 1997). The internet is one of the contexts in which young people can discover themselves, what is normal and abnormal in their behavior (in Healey ed. 002). However, because most children do not understand what materials on the internet are real or just imagined, parents should not trust children to use the internet without supervision. In conclusion, the internet is a valuable tool for assisting in the education of children. However, when children are online, they can easily be lured into something dangerous. Children have access to online information that promotes hate, violence and pornography. These can influence their behavior and even be harmful. Filter soft ware is the most effective way to protect children from inappropriate materials on the internet. Therefore, parents, who play a key role, should talk to their children about what is online and what might happen online. Finally, the government should use its power to control those sites that provide unsuitable material for young people.

Tuesday, August 20, 2019

Effects of family arrangements on child development

Effects of family arrangements on child development Describe cultural variations in family arrangements and critically examine psychological research on the effects of these family arrangements on childrens development. Marriage is the basis of households that are formed; a neolocal household consists of a married couple creating a new home. One main family type arrangement is the nuclear family. Lee (1987) this arrangement consists of three main positions. The members being within the household sets a presence, so the number of members does not make a nuclear family more compelling. In a patrilocal family, the new couple join the house of the husband and form a new home. In a matrilocal family the home is set up in the wifes birth home. Matri and Partilocal families are also extended/joint families; this is where members of different generations also live in the house. The older generations uphold a power role and are highly respected. The joint/ extended families usually consist of three or more generations in one house. However, there are non- residential extended families this arrangement is where they live near to the home and communal activities and eat with the other household. Extended family arrangements has its advantages such as being supportive in hard times, however there are disadvantages such as them becoming interfering in the independence and restrict the other younger members life Goodwin, Adatia et al 1997. Family structures are mostly dependant on social and economic circumstances as well as cultural values. Joint families are more likely to see having a bigger family as an important source of secure labour and importance. This is mostly deemed to be important when the wage labour is not the principal economic form. A hierarchical and authoritarian structure is often developed gradually within a joint family structure; this is in order to operate in a smooth manner, and to stress obedience and respect for authority and family reputation. Stropes-Roe and Cochrane, 1989. Extended family living situations have often been exaggerated; this was noticed by Goode 1963, when he researched family systems. An example of this is from family structures in China, whereby the family structure was under attack as the newer generations saw this structure within the household as a negative issue, as they stated that à ¢Ã¢â€š ¬Ã‚ ¦.the traditional family is being wiped out without being replacedà ¢Ã¢â€š ¬Ã‚ ¦. Levy 1949. In the rural areas of China the extended family arrangement is becoming extinct, as the census revealed that the nuclear family is becoming a more common arrangement, reasons for this change may stem from economical reasons, as high mortality rates have increased in the poorer regions due to financial issues which made it difficult for families to extend their homes to accommodate for more people. However, as this change was occurring in China a new form of living developed, this was known the stem family. Stem families consist of parents, their unmarried children and one married child with a partner and children. This arrangement suited children living with their parents due to the lack of housing made available to new buyers and the newly married couple may take advantage of the free accommodation whilst saving to buy further accommodation and the babysitting facilities whilst both parents attend to work. However, instead of contributing more to the elders within an extended family, the young would now benefit more and taking more than they are returning Tsui 1989. This shows that Chinese families can adapt very well in order to suit the socio-political conditions and the environment within the modern family. Overall this demonstrates the functional value of family which is to provide solidarity and material support in difficult times Yang 1988. Also like China the extended family arrangement is rare and only dominant amongst large landowners as they are able to support their large families. Research carried out from Al-Thakeb 1985 found that the extended family has never been the main family structure amongst families living in Arab cultures. This was found by studying nine different Arab countries. Although Al-Thakeb stated that the extended family has never been the main family form in Arab cultures. Due to the family being an independent wedded family this does not mean that the family bonds are weak. As in Arab countries it has been known that the relationship between family members is strong, due to living in close areas to their brothers and sisters, so this arrangement has its rewards as economic cooperation and emotional support is available for the family members. Within the Iran households, housing is a major problem which results in extended families being reduced in size, whilst intensive migration among the rural population has led to the weakening of larger household groups. In turn has led to the separation of extended families, whereby new couples leave their parents and form their own household separately. Meanwhile in Japan a different concept has been applied within household arrangements. The Japanese family structure is like the American family household arrangement; a nuclear setting. Economical reasons are adapted within families here as well, as the retired parents are more likely to live with their children due to economic reasons. However due to many cultural variations in family arrangements, childrens development in society may differ; although there are some similarities as well. The difference in how parents socialise with their children, affects the childs socialisation on childrens development. There are many different parenting styles that are adopted. Steinberg et al 1989 put forward suggestions of three different parenting styles. The first one being psychological autonomy which is the degree to which parents encourage their children to be independent. The second description is parental involvement this is where parents are actively involved in their childs lives. Lastly, the third style is behavioural control this is measured by the degree of how much the parents try to control their childs behaviour and activities. There are two main types of societies within cultures, one being collectivist: this is where the society is involved with the communitys life. The community encourages obedience to authority. In collectivist societies obligation is highly ritualised. The family arrangements that tend to stem from these societies are extended/ joint families mainly. On the other hand there are individualistic societies whereby children are encouraged to develop their own opinions. The family arrangement that mainly stems from this society is the nuclear family. Research into comparing the different societys views on parental upbringing. Larano 1997 conducted research in Canada. Children from different ethnic minorities a list of individualistic and collectivist activities and a parental monitoring scale. The results found showed that collectivist children perceived their parents as being more controlling and less involved with them than individualistic children. This research suggests that the childre n may have come to these conclusions as they live a particular life, for example if a child lived the collectivist extended family life, then it could be argued that the child may perceive the other way of doing things as the better way as it differs from the norm they have to abide by. In China there is continuing evidence for strong parental nurturance and support even when the child has grown up, although the Chinese parenting style is largely authoritarian and involves high levels of regulation from parents in order to ensure proper behaviour. This doesnt mean that children fail to develop autonomy, but may mean that they do so at a later age than children in the more individualistic cultures was found by Schneider et al 1997. One comparison that has been made into the difference between how a child is brought up in cultural difference within families is between Japanese and Israeli families. In Japan children are strongly bonded to their families, with the Japanese mother keen to harmonise her needs with those of her child, which shows the family arrangement between mother and child to be an important one, with the child growing up with a close bond with its mother. Japanese children are constantly in contact with their mothers and are rarely left alone Tobin 1992. Babies are often carried around on their mothers backs and there is a constant non-verbal interaction between parent and child. In comparison the Israeli mothers put forward a more independent upbringing style, and favour the idea of children being independent and self sufficient. As a result of this the Israeli mother may encourage the child ability to be alone as an example of their childs emotional independence, while the Japanese mother may value the child development of social relationships. In Britain different ethnic groups have different attitudes towards the socialisation of their children and their development. Asian families tend to be based with an extended family arrangement. Asian families and in particular Muslim, parents are highly protective of their daughters, fearing British societys drugs problems and its undue emphasis on sex Singh Ghuman 1994. In some cultures polygamous marriages are accepted, this is where a person may be married to more than one partner. On the other hand in most cultures monogamous families are more commonly recognised; one single partner. However, it would raise the question as to whether such a family arrangement affects the development of children Alean Al-Krenawi et al investigated this matter. 146 participants were involved in the study; they consisted of children who were involved in either polygamous family or a monogamous family. The children were tested through a questionnaire which was later analysed. The children from monogamous families had higher levels of learning achievement than the children from polygamous families, which in turn meant that the monogamous children adjusted to school framework better, unlike the polygamous children as much. This shows that these children suffer a disadvantage from living within such a large family, as they experience an overall educational disadvantage and social difficulties as well. The Results also showed that the conflict rating of the children from a large family background; polygamous had a higher rating. It was also found that the fathers level of education tended to be inversely correlated with family size in terms of both number of children and number of wives. These results show that due to these learning difficulties children are faced from living in such situations, that now the teachers my become aware of such problems, as it may be assumed that children from polygamous families may drop out of school early, and may be more at risk of falling for bad habits such as drugs and theft. It was stated that the problem should be overcome by focussing on the recognition of polygamy as a particular risk factor, along with the expectation that over time higher levels of paternal education may well lead to smaller families and more attention to the emotional and social needs of the children. Due to the findings issues within the polygamous families such as tension caused from other wives and step siblings, could be worked on, as it may be an issue affecting the childrens development. It could be argued that the wives could perhaps be encouraged to perceive one another as partners rather than opponents, and in turn the half siblings could also foll ow this principle to help improve the overall family relationship within the household. However there are limitations to this research such as, individual differences have not been considered as some children may just not be very into school life, and that the failure to achieve well isnt to do with the family arrangement at home. Another limitation is that the polygamous families that were researched only had two wives, so it cannot be widely generalised to polygamous families as they differ in sizes, therefore it cannot be stated that even larger polygamous families have a bigger affect on childrens development. A further limitation is that the study was based on a sample of one race, which again makes it harder to generalise the results to other races. With all these limitations it must not be forgotten that the research still shows us that living arrangements and differences such as monogamous and polygamous families do impact the children educational development at school to some extent. Nuclear and extended families affect childrens development as some research has suggested that these living arrangements may cause some psychological stress in childhood. An examination of lifestyles within the inner cities of non-industrial countries highlights the changes in family life this was noted by Abdel Rahim Cederblad, 1980 An example of this is from Sudan families as they traditionally consist of three or more generations, with siblings living side by side and sharing domestic duties and economic responsibilities. Marriages occur early and are arranged by parents; they are frequently between cousins or other family relations Abdelrahman Morgan, 1987.Authority in these extended households usually rests with the grandfather. The grandmother plays a central role in child care and the transmission of cultural identity to her grandchildren. In turn, the extended family is embedded within the wider communal structure of the tribe. This type of social structure encourages conformity to standards of conduct which are seen to be acceptable according to tradition and so promotes social stability. At the same time, gives a sense of communal responsibility for the upbringing of children. Up until the age of weaning a mother has the main responsibility for care. After weaning the responsibility for care and discip line is shared within both the immediate family, and to a lesser extent among the other responsible adults living with the immediate family. In the research conducted by Abdel Rahim Cederblad, 1980 the relation between emotional and social development and family structure in the Sudanese capital, Khartoum, was examined. Children between the ages of 4 and 9 living in extended and nuclear families were compared on mothers ratings of a range of childhood problems. Analysis revealed that children in nuclear families had more conduct, emotional, and sleep problems, poorer self-care, and were more likely to be over dependent than those living in extended families. They were also less likely to be breast fed, to be weaned later, and to have grandmothers involved in child care. Linear multiple regression revealed that, of these 3 childcare factors, grandmothers involvement was the strongest predictor of normal social and emotional adjustment. The possible protective characteristics of the extended family are discussed in relation to the importance of the grandmother as maternal advisor, social support, and socialization agent. However this research does face some limitations such as results of the study may be influenced by factors not studied here. First, it is possible that mothers reports were affected by some systematic bias in reporting. Although both groups reported spending the same amount of time with their children, reporting bias may be due to differences in the mental health of nuclear and extended family mothers Lancaster, Prior, Adler,1989 or variation in the standards of conduct deemed acceptable by them Sonuga-Barke, Minocha, Taylor, Sandberg. These questions centre on the relation between actual deviance and parental perceptions and cannot be addressed without direct observation of the childs behaviour. Second, the relation between child development and family structure reported in the study might be mediated by the effects of stressful life events, such as migration. In a recent study. El Farouk (1991) examined the makeup of a representative sample of the large (34% of the total population; Population Census Office, 1989) migrant population living in Khartoum. More than half of the 266 migrant families studied included three generations. This is similar to the proportion found in the non migrant population and suggests that migration would not selectively affect childhood adjustment in the nuclear families in the present study. The findings imply that the meaning and protective significance of factors is conditional on cultural context as well as developmental status and history. Global ideals of human conduct operating within different cultures directly influence the meaning and significance of personal and intergenerational relationships within families. The impact of family life on child development is mediated by a set of beliefs about the extent to which a particular family structure is consistent with those ideals. In Sudanese culture, as in many traditional societies, social life is governed by ideals of communal interdependence, intergenerational harmony, and social conformity motivated by feelings of collective responsibility and filial piety. In extended families, the physical proximity, emotional intimacy, and (grand-) parental authority are consistent with these ideals. So far the issues that have been mentioned are that family arrangements can affect children development in educational aspects such as the childrens performance at school, and the differences between nuclear and extended family arrangements in regards to development. Another aspect that some research has found that family arrangements may affect is the nutrition and physical growth of children in their development this was researched by Tinkew and DeJong 2004. They looked into the influence of household structure and resource dilution features. The study aimed to compare the impact of different types of household structures such as single parent, multiple parents, extended and cohabitating, and the influence this had on childrens nutrition. They also aimed to investigate whether household structure and household resources interact to affect child nutrition. The results were collated from the Jamaica 1996 Living Standards Measurement Study Survey and other sources. The findings showed that living in a single parent household and cohabitating household increases the odds of stunting for children. The analysis also indicates that children in single parent families with low income and have siblings are more likely to have low height for age, as well as low income extended families with siblings. The key policy implication that is shown through this study is that household structure is important for understanding childrens nutritional outcomes in the Caribbean. This research was beneficial as it highlighted that household arrangements does have some impact on childrens development in regards to health issues. However, it can be criticised as the findings would be more reliable if a larger sample was used and the use of longitudinal data was used instead of cross sectional data, as this would be useful for capturing changes over time in childrens nutritional statuses as well as changes in household structures. Longitudinal data would be especially useful for understanding how changes in household structure can influence child nutrition given the variability of households in the Caribbean, and other changes in composition across the developmental cycle of the household. It has been suggested that further research should also include measures of parental time allocations which would improve the understanding of how time used as a resource is used to affect child nutrition. Household structures effects could work through a variety of mechanisms, and a careful study of these processes is needed especially with regard to future research on this issue in the Caribbean context. In regards to whet her this research is useful, it shows us that there can be some cultural family arrangement issues that are proven to impact the nutritional development of children showing us that there arent just psychological differences; which most research suggests there is. Overall it could be suggested that there are many cultural variations within many different family arrangements. However, it is not completely clear whether the family arrangement directly affects the childs development for reasons such as every child and their development is different and we therefore cannot pin point what factors specifically affect development. Other factors such as sexual orientation, wealth of families, social status and class are all areas that could be researched further to help link the affects within child development. 3215

Monday, August 19, 2019

Gilbert Ryle’s The Concept of Mind Essay -- Ryle Concept Mind Philosop

Gilbert Ryle’s The Concept of Mind Gilbert Ryle’s The Concept of Mind (1949) is a critique of the notion that the mind is distinct from the body, and is a rejection of the philosophical theory that mental states are distinct from physical states. Ryle argues that the traditional approach to the relation of mind and body (i.e., the approach which is taken by the philosophy of Descartes) assumes that there is a basic distinction between Mind and Matter. According to Ryle, this assumption is a basic 'category-mistake,' because it attempts to analyze the relation betwen 'mind' and 'body' as if they were terms of the same logical category. Furthermore, Ryle argues that traditional Idealism makes a basic 'category-mistake' by trying to reduce physical reality to the same status as mental reality, and that Materialism makes a basic 'category-mistake' by trying to reduce mental reality to the same status as physical reality. Ryle rejects Descartes’ dualistic theory of the relation betwen mind and body. According to Ryle, this theory attempts to separate mental reality from physical reality, and it attempts to analyze mental processes as if the mind were distinct from the body. As an example of how this doctrine can be misleading, Ryle explains that knowing how to perform an act skillfully is not a matter of purely theoretical reasoning. Knowing how to perform an act skillfully is a matter of being able to think logically and practically, and is a matter of being able to put practical reasoning into action. Practical action is not necessarily produced by highly abstract reasoning, or by an intricate series of intellectual operations. The meaning of actions is not explained by making inferences about hidden mental processes, but is ... ...ocesses which are distinct from observable behavioral responses. Acts such as thinking, remembering, perceiving, and willing are defined by behavioral actions and by dispositions to perform behavioral actions. However, Ryle criticises Behaviorist theory for being overly simplistic and mechanistic, just as he criticizes Cartesian theory for being overly simplistic and mechanistic. While Cartesian theory asserts that hidden mental processes cause the behavioral responses of the conscious individual, Behaviorism asserts that stimulus-response mechanisms cause the behavioral responses of the conscious individual. Ryle argues that both the Cartesian theory and the Behaviorist theory are too simplistic and mechanistic to enable us to fully understand the Concept of Mind. Works Cited: Ryle, Gilbert. The Concept of Mind. Chicago: The University of Chicago Press, 1949.

Accounting Essay -- Business Management Studies

Accounting Accounting is the practice of â€Å"†¦maintaining, auditing and processing financial information†¦Ã¢â‚¬  (http://en.wikipedia.org/wiki/Accounting) for the purpose of a company, persons or organisation. There are some fundamental parts of accounting which are; â€Å"Identifying, measuring and communicating† (Black, 2000). You need to identify the important financial sections of a company, person or organisation which will include the companies assets, liabilities, capital, income and of course expenditure. You will also need to measure â€Å"†¦ monetary values of the key financial components in a way which represents a true and fair view of the organisation† (Black, 2000). Finally there is the communication side of accounting, it is vital that a company, person or organisation can communicate all of the financial information gathered so in turn users, whether they are internal or external, will be able to receive the correct financial information and be able follow it. There are two forms of accounting they are Financial Accounting and Management Accounting. Financial Accounting is concerned with the preparation of financial accounts for the benefit of people outside a company or organisation. Management Accounting is financial information used by managers within a company or organisation to make financial decisions based on the information that the accounts provide. There are many people who would be interested in company’s accounts, they are divided up into two groups; External Users and Internal Users. Within the External Users group are; Investors, lenders, Suppliers, Customers, prospective buyers, other businesses and the Government. Included in the Internal Users group are the Owners, Shareholders, the Board of Directors and Employ... ...ounts Payable which are debts owed BY a company, person or organisations which, at present have not been paid, Capital, Income and finally Revenue and as before if there was a increase in any of the above it would be a Debit entry. For example if a company, person or organisation was to purchase a fixed asset such as a building or piece of machinery this would be an increase in that company, person or organisations assets and would therefore be a Debit entry, the other side of the entry would be a Credit entry as there would be a decrease in the bank account of the company, person or organisation. The Double Entry Bookkeeping is essential in order for a company, person or organisation to keep track of all financial transaction as Double Entry is a very detailed financial account and everything that comes in or out of the business is written in a Double Entry Account.