Wednesday, October 30, 2019

Managing Operations and Processes Through Servitisation Essay

Managing Operations and Processes Through Servitisation - Essay Example As manufacturing companies head towards the delivery of service propositions, employees; existing and potential, are increasingly expected to comprehend the components of services that are controllable for the purpose of increasing efficiency (Vandermerwe et al., 1988). Manufacturers are adopting the concept of servitisation whereby they deliver services in line with their original product. Besides the provision of value added to clientele, they are able to secure orders and boost their profitability. They are also putting themselves in a better position to possess the ability to produce at extremely high standards as well as respond and maximize on all service propositions that arise from the usage of their products.Studies reveal that more than sixty per cent of large manufacturing corporations all around the world are servitised. There are five steps to take when servitising a company. The first involves considering the possible service value proposalsaround the particular product. The aim here is not ownership of one’s product but rather the achievement of an alternative objective. Secondly, it is important to assess whether it is possible to achieve the set goal without having to sell the product. Thirdly, consider whether or not it is feasible to deliver the services through the use of internal resources and whether there would be need for external partnership or collaboration. Correspondingly, the company should assess its enthusiasm for and aptitude to cope with the implications of potential risks involved in the provision of the amenities. Last but not least, the firm must consider forming skills plus technology approaches that will convey the business infrastructure needed for the task (Vandermerwe et al., 1988). The process of servitisation necessitates supply chain and procurement professionals to adapt quite a large number of variables within their

Monday, October 28, 2019

Practicum Report Essay Example for Free

Practicum Report Essay I would like to acknowledge  the contributions of the following persons/individuals to the development of my paper/project: My classmates and Friends Who’s been there supporting me; every time that I  got questions about our paper,  I always ask for their advise. I greatly value their friendship and I deeply appreciate their belief in me. My Family None of this would have been possible without the love and patience of my family. My immediate family to whom this dissertation is dedicated to, has been a constant source of love, concern, support and strength all these years. I would like to express my heart-felt gratitude to my family. My extended family has aided and encouraged me throughout this endeavor. I warmly appreciate the generosity and understanding of my extended family who’s always giving me my allowance, for me to be able to go to my practicum site. To our practicum adviser, Mr. Romeo Carangian I have been amazingly fortunate to have an adviser who gave me the freedom to explore on my own, and at the same time the guidance to recover when my steps faltered. We had  swapped from  City Garden Suite to Lotus Garden Hoteland our schedule for this time is for morning shift. At firstday of duty  in Kitchen, we felt already the presence of laughterand  enjoyment. Chefs  were  so  naughty  and  they  don’t  take  thework seriously. I mean while cooking they tend to be funny sothat everybody is happy and you won’t fell the tiredness. Forus, who are trainees, we’re only capable to be the assistant ofchef. We prepared food and ingredients needed for breakfast. Westocked  ready-to-used food  in  refrigerator  and  we  even cookedvegetable which used for garnish. How great it was to be withfunny chefs yet we’ve learned things which we could use in thefuture. They  shared  not  only  tips  in  cooking  but  also  itsprocedure. If  for  garnish,  we  are  allowed  to  make  it  becausethey are just simple to follow and prepare. How many times thatI was assigned to cook for the food of employees The other wayfor us to learn also was to take an insight of what the chef iscooking. I’ve known how to make different types of omelet too. Quite sometimes we’re washing used plates though it’s not partof our duty. That was to show our willingness and gratefulnessto work in their establishments.

Saturday, October 26, 2019

Evolution and Education :: Science Teaching Argumentative Essays

Evolution and Education Whenever various debates have taken place in parts of the country regarding whether evolution should be taught in schools, I have always observed the situation with a degree of incredulousness; neither the parochial education I received in elementary and middle school nor the public education I received for high school ever attempted to dissuade us from learning about evolution, and while none of my classes ever taught evolution with as much depth as Ernst Mayr attempted to convey in What Evolution Is, both systems taught it as a fact – one that we took for granted. The debate on the use of the word "evolution" in the Georgia school system initially appeared to me to be a manifestation of more anti-evolution tendencies, although Superintendent Kathy Cox has not commented on the theory of evolution itself; "the unfortunate truth," stated Cox as her rationale, "is that 'evolution' has become a controversial buzzword that could prevent some from reading the proposed biology curriculum" (Gross A10). Whatever her own beliefs on the subject are, however, the elimin ation of the term "evolution" may provide cool comfort to the theory's detractors, but its overall effect is merely to hamper the student's understanding of what evolution entails. In place of "evolution," Georgia's proposed replacement is "biological changes over time"; it hopes to convey the meaning behind the word without using the word itself (Gross A10). Mayr's own definition seems to be rather similar when he states, "Evolution is change in the properties of populations of organisms over time," but a word expresses more than what a clipped dictionary definition can allow (Mayr 8). When "evolution" is used in daily parlance in a non-biological context, adaption is often an unspoken yet important component of it. If one speaks of "evolving as a person" or "evolving in his role as team captain," there is a sense that one is moving from a less-adapted state to becoming better suited for whatever it is one does. It implies that there is a development of certain qualities to be better suited for the environment an individual may find him- or herself in, not simply "changes over time" for the sake of change; while there is indeed a degree of randomness in how a species may evolve (or come to destruction, as the well-adapted dinosaurs did when a meteor struck and indelibly altered the environment), for the most part the changes are not entirely due to chance.

Thursday, October 24, 2019

Persuasive Study: Why We Vote Essay

America has been the land of the free and the home of the brave since 1776. America has been free from the monarchy of Great Britain. Over 200 years later, American citizens still fight for freedom and to uphold a strong democracy. Voting is important in America because the opinions and the results of voters reflect America’s morals and ethic, and the right to vote is a privilege. Also, every vote counts. Because America has the opportunity to vote, the overall view of America is not formed of what she truly is, but what the citizens are. What a person’s character is consists of what their values and beliefs are. When voting is accessible, those who do vote, vote for what represents them most accurately. If the voters don’t vote, the only representation of this country is of those who did vote. America is one of the only countries that have the freedom to vote with a democracy government in the world. Many countries do not have an option of whether or not they wish to vote. Monarchies or dictatorships, for example, have one ruler that enforces and makes all the laws and rules of that specific country; the citizens do not have a say about what they think is wrong or right. Because America has the opportunity to vote, the privilege should be expressed as much as possible. With the dilemma of not all citizens voting, the democracy can be far from a success. Those citizens that do vote present strong patriotism. Although patriotism is a praised emotion, not all patriotic people have the same ideas for this country. For example, a recent controversy is the problems with abortion. If majority of citizens that vote are not against abortion but a few others are against voting, they will lose all possibilities of opposing abortion simply because they gave up. Ever since 1776, America has been a democracy and a free country. Having a government that is a democracy, the right to vote accompanies it. Voting is crucial to the system of democracy for various reasons: the laws and representatives exemplify not only the government but the whole country, voting can be taken for granted and should be appreciated more, and if a citizen does not vote, they have no say in what happens in this country.

Wednesday, October 23, 2019

Essay on Democracy Essay

Democracy is the worst form of government except all those other forms that have been tried from time to time Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Even though the concept of democracy form of governance has long been in existence for centuries, it was the emergence of country state government system which gave birth to the rise and flourish of democracy that we enjoy today. In the modern day, almost three quarters of the world countries claim to be democratic. As accepted this form of governance may seem to be, still it has some inherent flaws as a system of governance. Most of the critics of this form of government claim that democracy is morally corrupt, humanly unfair, economically inefficient and humanly unfair. It is because of this view that Winston Churchill said that, â€Å"Democracy is the worst form of government, except for all those that has been tried from time to time. Democracy definition   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to the English oxford Dictionary, democracy is defined as the system of government by all the eligible members of the state or the whole population. One time US president, Abraham Lincoln, summed up the very essence of democracy as it being, the government of the people, by the people and for the people (History Place 2012). This of course was an idealist view and in regard to the current system, we can say that the true democracy was only demonstrated in 1918 when the representation of people act gave women the right to vote or they were declared as eligible voters. Before this act enactment or reform, democracy in Britain was only afforded by the rich and in fact up to the end of the 18th century, only about two percent of the population were entitled to vote. Following a number of vital reforms in the break of the 19th century, voting rights were extended slowly that lead to the culmination of the third Reform Act of 1884 that saw all men acquiring votes. This is the time that we can term as the crucial turn of event that led to the democracy that we all enjoy today.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There are differences to the democratic forms of government that exist today. In UK, we have the centralistic form of government where decisions are made in the capital and the local authorities are demanded to act according to these decisions and rules. In contrast to this, the federal government of Germany gives a lot of power to the federal state and this is the same form of democracy that is practiced in the United States (Dobson, 2012) Other forms of government   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As we know, democracy is not the standardised form of government that is practiced all over the world. There are many other alternatives that are apparent in other countries. For example in the republic of Korea, there exists a totalitarian regime. This form of government is solely based on ideology. This ideology claims the general validity for all the life aspects and often tries to replace religion. A totalitarian form of governance does not tolerate any kind of deviation from the known ideology and any person who attempts to oppose this ideology is persecuted. This was of course the form that was adopted by the Nazi Germany that led to the political opponents being persecuted and tortured and also detained in the concentration camps leading to the genocide of the ethnic minorities who were in line with the Nazi policy.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Even though the authoritarian form of governance is linked to the totalitarian regime, they have no distinct state ideology and they also grant some cultural and economic freedoms being careful not to jeopardize their policies. The goal that the authoritarian regime takes as being the most important is the maintenance of power along with personal enrichment on the cost of the population and the country as a whole (democracy-building website, 2005.).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There are other forms of government that are apparent and the one that is of particular interest is the Theocracy form of governance that is practiced by the Republic of Iran. This is known as â€Å"government by God†. This is where the official policy is governed by divine guidance or by people or official regarded as divinely guided, or it is simply pursuant to the doctrine of a specific religion or a religious group (merriam-webster online encyclopaedia 2012).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   With regard to the UK’s democratic form of governance that we have in place, its success can be determined by how the government interpret what we as people wants. The recent changes like the Scottish devolution along with the creation of the Welsh assembly sends light that if democracy is for the people, then such constitutional changes can be termed as integral and also successful part of practice of democracy.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As we said earlier, the literal meaning of democracy is the government of the people, for the people and by the people. But when the concept of democracy is mixed up with that of governance, this is really not the case even though we get the supporters of democracy pretending to be so. When the people are told that democracy is the rule by the people, then that’s a fallacy. If there is governance that is over those people, than there exist no government or governance by the people. Owing to this argument, the democracies that are adopted by many countries for instance the western countries are in fact oligarchies in every detail. But the people who are the main subjects believe that there are free and become apathetic of the same and they do not see any further need for revolution. The formation that is surely oligarchy is the one that makes democracy to be termed as the worst form of government like Winston Churchill termed it. Bel ow the arguments that point out the worseness of the democratic form of government are discussed. Among these are democracy and economic instability and Democracy as a vehicle of chaos and anarchy. Also the connection of police violence in Canada and democracy will be discussed in details citing the main features of the issue, the advocates of the issue and also the perspectives of the issue. Democracy breeds Economic instability   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The frequent changes of power that follows the democratic concept of carrying a general election after a term period of four or five years is a major source of economic instability for the countries that practice democratic form of government. Prior to election, each political party comes out with their manifesto of how they will govern the nation. A political party that wins the election may not be the one that was previously on power. When a new political party takes power they bring other policies that were not the ones adopted by their successor. This leads to frequent changes of policies with regard to the country’s economy. These changes can not only highly daunt investments but also affects corporate and individual businesses, hence limiting the country’s economic growth. The short and limited duration that a certain political party takes power also leads to short term policies. This comes in because the politicians ha ve the idea that they are in power for a limited time period and so they adopt This leads to frequent changes of policies with regard to the country’s economy. These changes can not only highly daunt investments but also affects corporate and individual businesses, hence limiting the country’s economic growth. The short and limited duration that a certain political party takes power also leads to short term policies. This comes in because the politicians have the idea that they are in power for a limited time period and so they adopt short term policies that will bring immediate gratification for the citizens so that they can win their votes for the next general election. These policies are adopted even though they could be disadvantageous in the long-run. This means that the democratic nations mostly will sacrifice their short term pains for the long run gains. This adversely affects the economy of the country. In most cases, the economies are the ones that suffer because policies are not given that time period to be tested and tried before they are adopted. Only come with a policy that will proof to be effective to the common people even though it could be disastrous in future. The These policies are adopted even though they could be disadvantageous in the long-run. This means that the democratic nations mostly will sacrifice their short term pains for the long run gains. This adversely affects the economy of the country. In most cases, the economies are the ones that suffer because policies are not given that time period to be tested and tried before they are adopted. Only come with a policy that will proof to be effective to the common people even though it could be disastrous in future. The ever rising debt of the UK and Us and many of other democratic countries could be attributed to the economic instability that is brought about by short-termism which is the main flaw of the democratic form of government. These changes can not only highly daunt investments but also affects corporate and individual businesses, hence limiting the country’s economic growth. The short and limited duration that a certain political party takes power also leads to short term policies. This comes in because the politicians have the idea that they are in power for a limited time period and so they adopt short term policies that will bring immediate gratification for the citizens so that they can win their votes for the next general election. These policies are adopted even though they could be disadvantageous in the long-run. This means that the democratic nations mostly will sacrifice their short term pains for the long run gains. This adversely affects the economy of the country. In most cases, the economies are the ones that suffer because policies are not given that time period to be tested and tried before they are adopted. Only come with a policy that will proof to be effective to the common peopl e even though it could be disastrous in future. The ever rising debt of the UK and Us and many of other democratic countries could be attributed to the economic instability that is brought about by short-termism which is the main flaw of the democratic form of government. This means that the democratic nations mostly will sacrifice their short term pains for the long run gains. This adversely affects the economy of the country. In most cases, the economies are the ones that suffer because policies are not given that time period to be tested and tried before they are adopted. Only come with a policy that will proof to be effective to the common people even though it could be disastrous in future. The ever rising debt of the UK and Us and many of other democratic countries could be attributed to the economic instability that is brought about by short-termism which is the main flaw of the democratic form of government.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The free market economists like Milton Friedman believed that democracy produces inefficient economic systems. These economists argue that if the government were to make effective economies, they need to make what is generally regarded as unpopular decisions, for instance mass privatisation; removing the rights of the workers and also deregulation especially a time like this of economic austerity. This example is the one that is termed as ‘governing paradox’ (Flinders, 2010, p. 311). Mostly, this is what is seen as inherent contradiction between capitalism and democracy in that, as economic agents, all individuals are expected to act in their own interest but when it comes to casting their votes, they are expected to act in the interest of the society.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The critics are perhaps rights when they say that democracy can lead to ineffectual government. This can be traced many years ago when Aristotle started establishing typologies and categorising political systems. According to him, democracy was a ‘perverted’ form of governance or rule by many. Democracy as a vehicle of chaos and anarchy   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The ancient great thinkers and philosophers like Plat, Machiavelli and Thomas Hobbes were very critical on the flaws that come by with the democracy form of governance. They saw the concept of democracy as an unlimited freedom and liberty for all which is a tool of manipulation that can culminate into chaos and disorder in the society. Despite democracy being the most popular form of governance in today’s world, this form of government is prone to the manipulation of wild politicians and other stakeholders who are out to use it as a tool to acquire power and accumulate the country’s wealth for their selfish interest hence create anarchy and chaos to the society as a whole. For instance, Tomas Hobbes saw democracy as a form of government that permits reckless liberty that will usually undermine the law conservation and the societal order. Most of the politicians usually will exploit the antagonism between the economic classes and the dissimilarity in the ethnic groups to turn them into votes for their political parties. Instead of intervening for good and for the passions of the people, these politicians unruly politicians will obviously fun them so that they can be seen as the heroes. Firstly, they monopolize the media and use it to propagate these courses. This eventually pokes holes into the community and creates differences that eventually results into chaos and riots in these groups. In the year 2006 for instance, two major national wide riots erupted in the country of France. The first was in economic in nature and started in the month of February and the next was both religious and ethnic erupted in November the same year. These riots are among the examples that can be brought about by the diverse opinions within the nation. For instance, Tomas Hobbes saw democracy as a form of government that permits reckless liberty that will usually undermine the law conservation and the societal order. Most of the politicians usually will exploit the antagonism between the economic classes and the dissimilarity in the ethnic groups to turn them into votes for their political parties. Instead of intervening for good and for the passions of the people, these politicians unruly politicians will obviously fun them so that they can be seen as the heroes. Firstly, they monopolize the media and use it to propagate these courses. This eventually pokes holes into the community and creates differences that eventually results into chaos and riots in these groups. In the year 2006 for instance, two major national wide riots erupted in the country of France. The first was in economic in nature and started in the month of February and the next was both religious and ethnic erupted in November the same year. These riots are among t he examples that can be brought about by the diverse opinions within the nation. For instance, Tomas Hobbes saw democracy as a form of government that permits reckless liberty that will usually undermine the law conservation and the societal order. Most of the politicians usually will exploit the antagonism between the economic classes and the dissimilarity in the ethnic groups to turn them into votes for their political parties. Instead of intervening for good and for the passions of the people, these politicians unruly politicians will obviously fun them so that they can be seen as the heroes. Firstly, they monopolize the media and use it to propagate these courses. This eventually pokes holes into the community and creates differences that eventually results into chaos and riots in these groups. In the year 2006 for instance, two major national wide riots erupted in the country of France. The first was in economic in nature and started in the month of February and the next was both religious and ethnic erupted in November the same year. These riots are among t he examples that can be brought about by the diverse opinions within the nation. For instance, Tomas Hobbes saw democracy as a form of government that permits reckless liberty that will usually undermine the law conservation and the societal order. Most of the politicians usually will exploit the antagonism between the economic classes and the dissimilarity in the ethnic groups to turn them into votes for their political parties. Instead of intervening for good and for the passions of the people, these politicians unruly politicians will obviously fun them so that they can be seen as the heroes. Firstly, they monopolize the media and use it to propagate these courses. This eventually pokes holes into the community and creates differences that eventually results into chaos and riots in these groups. In the year 2006 for instance, two major national wide riots erupted in the country of France. The first was in economic in nature and started in the month of February and the next was both religious and ethnic erupted in November the same year. These riots are among t he examples that can be brought about by the diverse opinions within the nation.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Democracy can be said to be a pluralist system of power distribution that is set to distribute power among the many and diverse competing groups even though not equally. Even if democracy can be said to be somehow worse, it achieves a greater level of political equality amongst the citizens than any other form and hence reflects the fundamental belief that all individuals or humans are all born equal and so the consent of governance should originate from the governed (Dahl, 1998). In addition, this form of government allows individuals to protect their self interests. The nature of humans dictates that each and every individual desires some control over their needs and wants and John Stuart Mill said that the ability to protect ones interests protects us from evil in the hands of others. The competition that exists between different groups of people within the society is exactly what differentiates democracy from authoritarianism. As it wa s argued by (Flinders, 2010), â€Å"Difference is good†. The discussion and debate along with the exercise of the right to freedom of speech act as the pillars upon which democracy is formed. Inherently, democracy is a system of rights. By definition, democracy grants both civil and political rights to the citizens so that they can fully participate in the democratic process. The nature of humans dictates that each and every individual desires some control over their needs and wants and John Stuart Mill said that the ability to protect ones interests protects us from evil in the hands of others. The competition that exists between different groups of people within the society is exactly what differentiates democracy from authoritarianism. As it was argued by (Flinders, 2010), â€Å"Difference is good†. The discussion and debate along with the exercise of the right to freedom of speech act as the pillars upon which democracy is formed. Inherently, democracy is a system of rights. By definition, democracy grants both civil and political rights to the citizens so that they can fully participate in the democratic process.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   So as for all the citizens to participate and hear the voice of their people, it is then very vital to grant these citizens the right to the freedom of assembly that is not provided for in the totalitarian nor in the authoritative regimes. The belief of equality is also one of the building pillars of democracy and thus enforcing and establishing the rights gives this a greater degree of equality than any other non-democratic form of government. In fact, granting these rights helps shield the minority from persecution and also allow them to also protect their interests. The society that we are in these days is made up of heterogeneous groups, all which represent different and varied interests; all these must be respected and recognized. If we do not observe this, we will obviously be committing ourselves to rule by an elite or selected few who think that their interest are over those of the other people. The police violence and democracy in Canada   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In Canada, the use of police force and violence has become one of the greatest concerns to the society. Many civilians and students are becoming more concerned about the force that is applied by the police in most encounters with the citizens in different situation. Following some of the bad encounters the people had with the police officers, many people are now tending to think that police in most of the time act to deprive the people their constitutional rights and hence they are violating the rule of democracy. The critics say that police sometimes employ much power to the civilians by use of violence and force. On the other hand, the advocates of this say that the police are entitled to use any power to stop crimes and also secure the people’s wellbeing.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For years the violence and force that has been used by police officers and the local authority in Canada has been not only of major concern but also a significant issue that has to be addressed for democracy to be realised. It all commences when a police officer abuse the powers that has been delegated to them by the state and constitution. In Canada, it has become obvious that each day in and day out there must be a case where a police officer has employed excessive power to the civilians.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As the literacy levels are increasing all day, people are becoming more aware of their democratic rights and the voices are becoming united daily. The authorities and the officers are in place to protect, help and promote safety in communities. There many people who are filing complaints daily against the police officers who are causing violence and using unnecessary force during arrest. In many instances in the city, we have seen how two or three police officers beat up a defenceless citizen using their batons or how they mistreat women and teenagers. These are all the cases that are act against democracy of whom the people should be enjoying, owing to the fact that this is a rule for the people, for the people and by the people. The heightened technology and the media has promoted the awareness that the police are culminating violence by abusing their powers. This has created fear and mistrust by the people towards the police departments . In accordance to the penal law guidelines, the police are only justified to use force that is only necessary to prevent homicide or a crime. The advocates   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The advocates for the police usage of power and force term the police as an armed force for participation and protection. They declare the power of the police by them being armed forces; then, they demonstrate their power by stating protection and express their community connection by stating that they participate. First these officers have the delegated power by their weapon that they carry and the ability that this weapon has to make other people to comply to the law. They argue that, by the fact that police have been given the mandate to protect; they must in any means pursue this goal even if it means use of excessive or unnecessary powers. Finally, the participation concept emphasizes the relationship between the officer and the community. To ensure that the communities are safeguarded effectively, they are free to use any power whether it means to deprive a person his/her constitutional rights or not. How we can improve democracy on this issue   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The police officers also being one of the citizens, they should strive to serve the communities they are in with their best interest at heart while safeguarding the democratic rights of the civilians. The police officers are the officials that are mandated to impose the laws while preserving order in the society and they should not act in a manner that may culminate violence or in any case deprive any individual his/her democratic rights. In the cases that the police officers are called into some stressful and dangerous events that may involve violent altercations, that must be controlled. We as the citizens also do not want to see our streets run by criminals who terrorize other people. It is true that in some cases police officers are allowed to use force but not in all the situations or self created situations geared at harassing a civilian or depriving him/her his/her democratic rights. Let us all observe the law. References Abraham Lincoln. The Gettysburg Adddress. Available http://www.historyplace.com/speech/gettysburg.htm. Last assessed 05 June 2012 Dahl, Robert A. On Democracy. New Haven: Yale UP, 1998. Print. Dobson, William J. The Dictator’s Learning Curve: Inside the Global Battle for Democracy. New York: Doubleday, 2012. Print. Flinders, Matthew V. Democratic Drift: Majoritarian Modification and Democratic Anomie in the United Kingdom. Oxford: Oxford UP, 2010. Print. Johnson, Marilynn S. Johnson, ed. Street Justice: A History of Police Violence in Canada. Beacon Press. p.  365. 2004. Loree, Don â€Å"Corruption in Policing: Causes and Consequences; A Review of the Literature†. Research and Evaluation Community, Contract and Aboriginal Policing Services Directorate. Royal Canadian Mounted Police, 2006 Peterson, Amsterdam.Democracy, Policy and Economic development. Stockholm: Stockholm Press, 2005. Stein Ringen. Three Priorities to Improve UK Democracy,2007 Theocracy. Available: http://www.merriam-webster.com/dictionary/theocracy.Last accessed 05 Jude 2012 Source document

Tuesday, October 22, 2019

Minority Education essays

Minority Education essays Perhaps first, before looking at the issue of differential education and opportunities, for minority students, we should look at what the term racial and ethnic minorities' means in a US setting. Many different peoples have settled in the United States, and each group had its own reason for coming - perhaps they came to avoid religious persecution or poverty in their homeland, or perhaps they came involuntarily through slavery (Excerpted from a nice discussion to be found geokey.de/jobusa/hinweise.landeskunde.ethnic_and_racial_minoritie Due to this diversity of people, it is often said that America is the great "melting pot" where personal freedom and equality of opportunity are guaranteed regardless of race, colour or creed (Excerpted from a nice geokey.de/jobusa/hinweise.landeskunde.ethnic_and_racial_minoritie Since World War II, making this vision of a harmonious multiracial society into a reality has become a key public issue, backed by racial discrimination laws and Affirmative Action programs; however, attitudes of individuals vary from the liberal to the antagonistic, depending on area, upbringing and education, and America still has a very long way to go in the fight against prejudice and racism (Excerpted from a nice discussion to geokey.de/jobusa/hinweise.landeskunde.ethnic_and_racial_minoritie What are ethnic minorities'' Ethnic minorities differ in some cultural respect, for example, language, religion or customs from the majority group (Excerpted from a nice discussion to be found at geokey.de/jobusa/hinweise.landeskunde.ethnic_and_racial_minoritie Examples of cultural differences include language - every European country is represented in the population of the US, and 1 in 10 Americans speak a language other than English at home: Swedes, Germans, etc. may still be identified by their mothe...

Monday, October 21, 2019

Risk And Resilience And Factors Example

Risk And Resilience And Factors Example Risk And Resilience And Factors – Coursework Example Risk and Resilience In case, one Specialist Ramirez has a strong social support system. This is a resilient factor because it offers love, friendship and an incentive for the veteran to survive the harsh conditions of war. These include the sendoff party before joining the army, the strong bond with his combat team which kept him alive, and the warm welcome he received on returning home after the war. Without the strong support system, he would have been susceptible to the few risk factors that might have affected his psychological health such as witnessing the violent death of two of his comrades. According to Kaylor et al., (1987), â€Å"exposure to combat, including being fired on and witnessing the death of fellow unit members, is the stressor that has dominated military veteran research, with implications for both acute and chronic stress reactions. In case two, the only resilient factor was the counselling Specialist Johnson received during his deployment after he went to retr ieve the burnt remains of a young girl. It helped him cope the horrific experience. However, the glaring risk factor he faced was the absence of any social support system from family and friends. The tragedies witnessed in his life prior to his deployment such as facing the hurricane Katrina and his parents’ divorce left him alienated. In addition, the constant criticism from the Major and absence of any warm welcome from his family made him vulnerable to stress. In conclusion, the veteran in case two has a greater risk of developing a combat-related psychological disorder. This is because of the absence of a strong social support system that might have served as an outlet for his pent up emotions arising from his handling the burnt remains of the victim during the war. According to McCarroll, Ursano, & Fullerton (1995) and Sutker, Uddo, Brailey, Vasterling, & Errera (1994) â€Å"Prior research with veterans of the 1990–1991 Gulf War, moreover, has shown that the hand ling of human remains was especially disturbing.† ReferencesKaylor, J., King, D. & King, L. (1987) Psychological effects of military service in Vietnam: a Meta analysis Psychological Bulletin, 102, 257-271McCarroll, J., Ursano, R., Fullerton, C. (1993). Symptoms of PTSD following recovery of war dead: 13-15 month follow-up. American Journal of Psychiatry, 152, 939-941.Sutker, P. B., Uddo, M., Brailey, K., Vasterling, J. J. & Errera, P. (1994) Psychopathology in war-zone deployed and nondeployed Operation Desert Storm troops assigned graves registration duties. The Journal of Abnormal Psychology and Social Psychology, 103(2), 4-12. doi:10.1037/0021-843X.103.2.383

Sunday, October 20, 2019

Test Your Knowledge on the Gettysburg Address

Test Your Knowledge on the Gettysburg Address Characterized as both a prose poem and a prayer, Abraham Lincolns Gettysburg Address is a concise rhetorical masterwork. After reading the speech, take this short quiz, and then compare your responses with the answers below. Lincolns short speech begins, famously, with the words Four score and seven years ago. (The word score comes from an Old Norwegian word meaning twenty.) What famous document does Lincoln allude to in the first sentence of his speech?(A) The Declaration of Independence(B) The Articles of Confederation(C) Constitution of the Confederate States of America(D) The United States Constitution(E) Emancipation ProclamationIn the second sentence of his address, Lincoln repeats the verb conceived. What is the literal meaning of conceive?(A) to bring to an end, close(B) to overcome the distrust or animosity of; to appease(C) to be of interest or importance to(D) to become pregnant (with offspring)(E) to keep from being seen, found, or discoveredIn the second sentence of his address, Lincoln refers to that nation. Which nation is he talking about?(A) the Confederate States of America(B) the Northern States of America(C) the United States of America(D) Great Britain(E) Union States of America We are met, Lincoln says in line three, on a great battlefield of that war. What is the name of that battlefield?(A) Antietam(B) Harpers Ferry(C) Manassas(D) Chickamauga(E) GettysburgA tricolon is a series of three parallel words, phrases, or clauses. In which of the following lines does Lincoln employ a tricolon?(A) We have come to dedicate a portion of it, as a final resting place for those who died here, that the nation might live. (B) Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure.(C) This we may, in all propriety do.(D) The world will little note, nor long remember what we say here; while it can never forget what they did here.(E) But in a larger sense, we cannot dedicate, we cannot consecrate, we cannot hallow, this ground.This ground, Lincoln says, has been consecrated by the men . . . who struggled here. What is the meaning of consecrated?(A) empty, containing a deep space(B) soaked in blood(C ) made sacred(D) desecrated, violated(E) greeted in a warm and friendly manner Parallelism is a rhetorical term meaning similarity of structure in a pair or series of related words, phrases, or clauses. In which of the following sentences does Lincoln use parallelism?(A) This we may, in all propriety do.(B) The world will little note, nor long remember what we say here; while it can never forget what they did here.(C) We are met on a great battlefield of that war.(D) But in a larger sense, we cannot dedicate, we cannot consecrate, we cannot hallow, this ground.(E) Both B and DLincoln repeats several key words in his short address. Which one of the following words does not appear more than once?(A) dedicated(B) nation(C) freedom(D) dead(E) livingThe phrase birth of freedom in the final line of Lincolns address calls to mind which similar phrase in the first sentence of the speech?(A) all men are created equal(B) conceived in liberty(C) Four score and seven years ago(D) dedicated to the proposition(E) upon this continentEpiphora (also known as epistrophe) is a rh etorical term meaning the repetition of a word or phrase at the end of several clauses. In what portion of the long final sentence of The Gettysburg Address does Lincoln use epiphora?(A) It is for us the living, rather, to be dedicated here(B) this nation, under God, shall have a new birth of freedom(C) that from these honored dead we take increased devotion to that cause(D) we here highly resolve that these dead shall not have died in vain(E) government of the people, by the people, for the people shall not perish Answers to the  Reading Quiz on the Gettysburg Address (A)  The Declaration of Independence(D) to become pregnant (with offspring)(C) the United States of America(E) Gettysburg(E) But in a larger sense, we cannot dedicate, we cannot consecrate, we cannot hallow, this ground.(C) made sacred(E) Both B and D(C) freedom(B) conceived in liberty(E) government of the people, by the people, for the people shall not perish

Saturday, October 19, 2019

The tensions inherent in the public representation of complex issues Essay

The tensions inherent in the public representation of complex issues - Essay Example The newspapers, television channels and the internet were filled with various speculations about the incident. As usual the inefficiency of the government was criticized heavily. The lack of transparency in the Malaysian governments operation, their subdued efforts to keep the relatives of the missing informed and the lack of any guaranteed report about hijack or crash fueled the media wheels effortlessly. They represented the issue as if it was the sole mistake of the Malaysian government. The frustrated relatives of the missing people were shown mourning constantly in every TV channel. The issue was represented in such a way flight travel in South Asian countries is risky, as the governments there function passively and are non-transparent. The discretion of President Razak in handling the issue with the domestic means he had and his timely decision to use the help from Australia, a country quite near the crash site rather than the US situated on the other half of the world, went unmentioned in nearly all the reports. As John Berger (1972) mentions, "what the modern means of reproduction have done is to destroy the authority". The international media reproduction about a flight crash simply crushed the image of a well developed country into that of a poor backward country without any authorization of proof. The influences of such representation were so high, that even the stock market of the country underwent a great blow. The way the issue was represented in the international media was absolutely partial and judgmental. The media highly overshadowed the diplomatic efforts taken by the Malaysian government to search for the flight on a multinational level, highlighting its efforts to decline help from the US government. This led to the extent of the US President Obama reconsidering his trip to Malaysia due to security reasons. Several rumors about a couple of people travelling

EU LAW Essay Example | Topics and Well Written Essays - 1500 words - 2

EU LAW - Essay Example This essay demonstrates the difference between persons who are established and those who are service providers within EU LAW. The essay outlines key distinction between services and establishment. There are some interesting examples of court practice concerning EU Directives application in cases of natural persons and companies. The essay considers the opportunity of dual establishment whereby one can continue to operate in its home state and can have branches in other Member States. The courts have stated that if an office is set up in the home state, that in itself would not be conclusive evidence as to establishment, similarly in respect service provider, he may set up ‘the infrastructure necessary for the purpose of performing the services in question’ in host state which can be an office, thus that would not be conclusive. In respect of establishment, the court in case 81/87 Daily Mail held that stated that Article 43 of Directive73/148 did not provide any directly effective measure for transferring a company to another member state without restrictions and thus it was found that Directive 73/148 applied only to natural persons and not to companies. Services can be way of movement of the person or analogous whereby no movement takes place. In respect of services, the important thing is its definition, which is in Article 50 TEC and stipulates the important thing that leads to determination of services, the first one being that services are temporary in nature and are under normal circumstances provided for remuneration. In respect of services being temporary in nature, the important decision was that of Gebhard. As far as remuneration is concerned, it is necessary to distinguish whether the services are economic nature or for a non-profit making purpose. A private school coming under the head of services was considered in Case 263/86 Belgium v. Humbel5 where it was found that the school was not â€Å"the nature of the activity is not affected by the fact that pupils or their parents must sometimes pay fees† so as to provide for operating expenses. However, in Case C-109/92 Wirth6 it was held that if the institute was operational with the aim of making a profit and the basic mode of financing was private fees, then that would be service under Article 49 EC Treaty. The courts have strongly detested discrimination on the basis of nationality, establishment or residence, as can be seen in Case 33/74 Van Binsbergen7 where the requirement of a person to be habitually resident in the host state was said to be contrary to Article 49 EC Treaty. 1b. In respect of Sylvester it is important to consider the decision of Gebhard whereby it was stated that the duration, regularity, periodicity and continuity of the provision of the services’ is looked into. As far as services are considered they are considered to be temporary in nature, and actual movement is not required. In respect of Sylvester the duration has been two years, as far as regularity is concerned that cannot be

Friday, October 18, 2019

Does the efficient market theory apply on the forex market Fundamental Literature review

Does the efficient market theory apply on the forex market Fundamental analysis Vs. Technical analysis - Literature review Example In the international trade, the buyer or seller of the products wants to have payment in his home currency. This needs an exchange of currencies from that of a seller to that of a buyer. Any international trade will involve in any two instantaneous transactions: Exchange of the products in a physical form Sale or purchase of foreign currency In any international trade, the sale or purchase of any product will affect only one the parties in the foreign exchange. Suppose, If a British importer buy ? 100,000 worth of products from an American manufacturer, and the invoice is billed in US$, the burden falls on the British importer to buy ? to complete that business transaction and vice-versa. Thus, the party assumes the risk that the exchange rate on that specific date of conversion is positive to that party. (James, Neelankavil & Rai 2009:246). The Forex market is operating on an international basis where currency of each nation is bought and sold freely. The forex system was introduced in the 1970s at the time of introduction of free exchange rates and the price of one currency, and the price of one currency against another that happens from demand and supply that are only decided by the market participants.(Dicks 2010: 5). Forex market can be termed as a perfect market as it cannot be either monopolised or controlled by any of its participants. Due to ever increasing number of transactions on a daily basis makes it as the biggest liquid financial market and as per an estimate, money transaction involves in the forex market form up to US$ 6 trillion per day. This figure is only a tentative figure as the exact amount cannot be quantified due to the transactions are not centralised on a forex single exchange. With the help of telecommunication, trading is carried over all over the globe and with electronic networks with five days in week and 24 hours a day and there are dealers quoting currencies in each time zone through the main central markets: New York, London, Frankfurt, Hong Kong, Tokyo, New Zealand and Australia. (Dicks 2010: 5). The forex market is being able to maintain its goal and avoid being manipulated or controlled by any few or one of its participants since the volume transacted is so high that if any of them would want to distort by changing price at their volition, they have to operate with hundreds of billions of dollars. That is why forex market cannot be swayed by any single participant and even though, there are scenarios where large transactions can appear to assume control of the forex market for a few minutes, the balance is restored again instantly due to the great liquidity associated. This also permits traders to derive revenues by closing and opening positions within a few seconds. (Dicks 2010: 5). The place or venue for the sale and purchase of foreign currency is called as the foreign exchange market. This research essay will make a complete literature review on an efficient market hypothesis of forex market, inc luding fundamental and technical analysis, also offers a brief history on the forex market and overview of the market in an exhaustive manner. Definition of Foreign Currency A foreign currency rate denotes to the price any person pays in one currency to buy another currency. It is to be observed that a currency is analogous to any other product namely food or gold; its price is decided by the supply or demand for the said product. For instance, if a forex dealer quotes US$ 1.35 per ?, then he is quoting US$1.35 for the sale or purchase of per ?. (James, Neelankavil & Rai 2009:247). Quotes for exchange rates are available either for instant release or for the future delivery. For the immediate delivery, the price of foreign currency is known as spot rate. Due to introduction of advanced IT in the forex transactions, now it is made possible for a spot transaction to be cleared or settled on the same day is possible. The largest consortium of the

Observing .... ( write observing whom it depends who you are Essay

Observing .... ( write observing whom it depends who you are interviewing ) - Essay Example Introduction Over the weekend, I decided to attend a musical event hosted the Samba Reggae School of Michigan. The event was held on November 17, 2013 along the famous Grand Haven beach of Lake Michigan. It was organized by the Samba Reggae School in collaboration with local fans. It was a daytime event taking place between 12pm to 7pm in the evening. Since I had no opportunity of purchasing advanced tickets, I decided to get rush tickets at the beach, which were retailing at a price of $11.50. This event was a Samba Reggae concert meant for ceremonial and entertainment purposes. The guest artist was Luis Vieira, one of the most popular Samba Reggae artists in South America. The ceremonial event started with a rehearsal by a local percussion team followed by dances and major performance by the guest artist. The entire program for the concert was available at the gate free of charge. Samba Reggae Music At this juncture, we will evaluate integral aspects of Samba Reggae music as used w ithin the context of Brazilian traditional practices. First, it is worth acknowledging the fact that Samba Reggae derives its roots from a combination of Brazilian Samba genre and the Jamaican Reggae music (Pessanha and McGowan 23). A proportional blend between these two distinct genres gave birth to Samba Reggae, a music characterized by moderate tempo instrumentals with frequency ranging from 90-120 beats per minute. Samba Reggae is known for its close association with Carnival ceremony in Brazil, which involves dancers parading through residential villages while dressed in artifacts representing society’s values. It was originally an African ceremony brought into South America by slaves from West Africa. Currently, Samba Reggae is one of the most popular musical genres in Brazil and other Southern nations like Colombia. Personal Experience on the Event Prior to attending the music concert, I was not thoroughly conversant with events taking place in a Samba Reggae concert. I was used to seeing street dancers in television dressed in colorful attire and making magnificent patterns in their dancing formations. Therefore, this concert was my perfect opportunity to experience a Brazilian ceremonial event marked by musical performances. Chronological happenings in the beach were initiated by entrance by the two hosts carrying Samba Reggae flags followed by a short rehearsal performance by two local Samba bands. After the rehearsal, the drum session started preparing for the eagerly awaited Samba parade. The colorful parade which featured approximately 100 dancers of both genders lasted for about 2 hours. Finally, the guest artist, Luis Vieira, was invited to give his 1-hour energetic performance featuring top ten of his best tunes. After experiencing a Samba Reggae concert in person, I developed a high-spirited attitude towards involvement in such colorful events. In the past, I was used to experience Samba Reggae music in recorded videos or audio versions . However, attending an actual concert inspired me to start learning detailed concepts about Brazilian traditional ceremonies, especially the role of music in those ceremonies. In conventional context, I used to lose interest after listening to tunes from this genre for a consecutive 20 minutes. However, the concert was not only fun but also thrilling. Watching real people performing dancing moves

Thursday, October 17, 2019

Critical context, Essay Example | Topics and Well Written Essays - 2500 words

Critical context, - Essay Example ong had never taken place at all based on an assessment of economic and other losses and injuries that have been caused to the Plaintiff.3 Tort offers an option for the victims to shift at least some of the costs for the damages that they have to bear on to others who may be partly responsible for the fate of the victim. In order to establish a cause of action under tort, three aspects must be established: Liability under tort is generally determined along the lines of (a) strict liability or (b) no fault liability. Under the tort of strict liability, a defendant will be obliged to pay damages for a breach of duty of care and the Court will not question whether or not the defendant has acted in a justifiable manner. On the other hand in a case of no fault liability, it is possible that a victim may not receive damages for the harm caused if there has been a good justifiable reason for the wrong that has been perpetrated on the victim. Applying this to the case of the Marsh Down school children, the children and their parents could have had good cause to file a suit for tort on the basis of personal injuries at the disco, if they had suffered them. Firstly, the nature of the harm would have been serious enough to merit a cause of action, secondly, the cause of such injuries would have been the wrongful action of the school in giving publicity to the August camp in the local paper, especially in view of ethnic diversities among the school children. The School could have therefore been a party to the suit, with the supervising teachers – Clyde West, James, Dot and Duff being cited as respondents. It is the school that is most likely to be held liable, because the teachers are employed by the school and injuries that have occured to students at the dicso are the result of the failure of the teachers to protect them. As a result, vicarious liability will be imputed to the school, since an employer is expected t o be responsible for the negative consequences

Exhibits of astronomy Research Paper Example | Topics and Well Written Essays - 500 words

Exhibits of astronomy - Research Paper Example Keck Foundation Central Rotunda, the Cosmic Connection, the Gunther Depths of Space Hall, and the Edge of Space Mezzanine (Bill, 28) The large new Richard and Lois Gunther Depths of Space exhibit gallery activated by the recent transformation of cosmic perspective that began when people first went into space. The horizon no longer be bounded by observation and understanding of the sky bonded to the ground .The Gunther Depths of Space is filled with unique with exhibits that are as monumental representing ideas of different individual (Bill, 31). In this part the following are represented. Planets, our earth, our solar system, other worlds, other stars, Milky Way, galaxy, iconic universe, a familiar star pattern and a big picture related to the exhibits. Planet- from the edge of mezzanine and below, visitors encounter a row of nine subtly illuminated, accurately. The sun is represented by horizon; 3-dimensioonal model of the solar system is mounted on top a stand. Common and unique elements transform the features of each planet into landscape for visitors. Besides each stand is physical data about the planet and its gravitational pull. Our earth- the stand holding planet earth has an opening to a chamber below mezzanine include seismograph instrument, six foot earth model, a two foot projection earth model stimulating our atmosphere and oceans. Projector is a symbol of our old earth based perspective e of the sky. Solar system- on the left of planet stand, visitors’ eyes are drawn upwards to suspend projected model of the solar system (Bill, 32). Each planet revolves round the sun. This represents the accurate motion of the solar system. Other world, other stars- the station has simple LED counter known planets to illustrate the pace of discovery ad confront and confront visitors with change from traditional of planets. New systems are aligned which look like and their relative to the earth. Milky Way galaxy- a glass model of Milky Way galaxy

Wednesday, October 16, 2019

Critical context, Essay Example | Topics and Well Written Essays - 2500 words

Critical context, - Essay Example ong had never taken place at all based on an assessment of economic and other losses and injuries that have been caused to the Plaintiff.3 Tort offers an option for the victims to shift at least some of the costs for the damages that they have to bear on to others who may be partly responsible for the fate of the victim. In order to establish a cause of action under tort, three aspects must be established: Liability under tort is generally determined along the lines of (a) strict liability or (b) no fault liability. Under the tort of strict liability, a defendant will be obliged to pay damages for a breach of duty of care and the Court will not question whether or not the defendant has acted in a justifiable manner. On the other hand in a case of no fault liability, it is possible that a victim may not receive damages for the harm caused if there has been a good justifiable reason for the wrong that has been perpetrated on the victim. Applying this to the case of the Marsh Down school children, the children and their parents could have had good cause to file a suit for tort on the basis of personal injuries at the disco, if they had suffered them. Firstly, the nature of the harm would have been serious enough to merit a cause of action, secondly, the cause of such injuries would have been the wrongful action of the school in giving publicity to the August camp in the local paper, especially in view of ethnic diversities among the school children. The School could have therefore been a party to the suit, with the supervising teachers – Clyde West, James, Dot and Duff being cited as respondents. It is the school that is most likely to be held liable, because the teachers are employed by the school and injuries that have occured to students at the dicso are the result of the failure of the teachers to protect them. As a result, vicarious liability will be imputed to the school, since an employer is expected t o be responsible for the negative consequences

Tuesday, October 15, 2019

Maximisation of profit Article Example | Topics and Well Written Essays - 5500 words

Maximisation of profit - Article Example When small groups of people come together and work on a project, they invariably have to analyze as to what their mission and goal are. Organizations are usually classifies into different types like public sector (Central governments, state government run offices, schools, colleges, public welfare systems), private sectors (small business partnerships, limited companies, cooperatives, multinationals etc.), Quasi-Governmental organizations, Organizations in the charitable sector and even the churches and trade unions can be referred to as organizations. (N.Kumar, 1997) Hence, every organization issues a mission statement, which includes the purpose of setting up the organization. In social sciences, organizations are perceived from different dimensions. The general study of how an organization works is termed as organizational behavior or analysis. The whole of organization's behavior revolves only around one aspect-its goal. Every organization should have, irrespective of the field i t operates in, a distinct goal. (N.Kumar, 1997) A goal, not only gives them a direction of persuasion, but also gives the much required motivation to the employees to work towards it, thereby helping them achieve their potential along with the company's growth. Likewise, a conceived state of an organization in a stipulated amount of time is referred to as 'Vision'. 'Vision' is extremely crucial for an organization as it gives a glimpse of the state of the organization after a certain period of time to the employees and stakeholders. 'Vision' can be taken as a benchmark for the company's performance in the future and can be used for comparison of various results recorded by the company. (Davenport Hines, 1990) Private-owned organizations usually have profit-maximization as their sole objective. (Susan Grant, 2000) However, many economists have different views over how an organization's objective should be formulated. Different people have come up with different theories over the issue of organizational objective. Many of them clashed, many of them overlapped and new theories were born out of the overlapping theories, but a general consensus is achieved that profit-maximization should be the sole objective organization though other objectives cannot be safely put aside. In this dissertation, I'd like to analyze the various theories put forward by economists and then draw a suitable conclusion from the same. I will also be studying a few patterns of various industries by taking certain specific examples of how a few companies overcame different situations keeping in their minds profit-maximization as their sole-objective. Literature Review As said above, it is imperative for an organization to identify its objectives before venturing and investing resources into the venture. So what is/are the goals a financial manager in a company will seek. In the first impulse, the only objective, which comes to, the mind, is profit maximization. Any business enterprise aims at earning profits; hence, it may be argued that profit maximization should be the sole objective of the organization. It is needless to say, that earning profits sustains the company's existence and can motivate the company to expand its market and

Monday, October 14, 2019

Difference Between Fasb and Iasb Essay Example for Free

Difference Between Fasb and Iasb Essay Major similarities between FASB and IASB: Same organizational structure FASB and IASB are each belongs to an organization that has four main bodies. Also, the internal structure and responsibility assignment of these organizations are basically the same. FASB and IASB are the standard setting board of the organizations. Other three parts of the organizations are there to support the standard setting process, such as selecting board members and deal with emergency issues (Kieso, et al. , p7-9). In addition, both boards have members from varies industries including accounting, finance, business and academia (Virginia Law Business Review, fall 2008, p283). Private entities Both boards are private entities that have been assigned the role and responsibility of developing and deploying Accounting Standards (Virginia Law Business Review, fall 2008, p284). By private, it means the standard setting process is not affected by politics. However, since the governments are also relying on standard set by these private institutions, both FASB and IASB are sensitive to politics to varies degree. Similar procedure of making rules Despite any internal and external influences, the procedure of drafting and publishing Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS) are similar. Generally, the process is as follows: discuss whether to add new project to agenda mostly based on recommendations from investors; plan for the project; draft the standard; vote and publish the standard once it is approved(FASB: Financial Accounting Standards Board, n. d). However, since each board has different members and they are setting rules based on its own investor’s concern, also by other external influences, they produce distinct rules. Differentiations between FASB and IASB: Scope of operations The jurisdiction of the IASB could be the whole world of commerce and industry, include EU nations and states, the latter is confined mainly to the United States and its trade partners (Virginia Law Business Review, fall 2008, p303). Because of this, the citizenship of the trustees has become a problem. The IASC Foundation has huge pressure of balancing the culture background of the board member; nevertheless, European members are still the majority of the board with a proportion of nearly 50% (Virginia Law Business Review, fall 2008, p307-308). This problem shows that the IASB standard setting has more outside interference. Political settings Different political settings for FASB and IASB authorized them different degree of independence. In the US, the standards set by FASB are implemented unless the Securities and Exchange Commission (SEC) interferes and prevents it for being accepted. However, in the case of IASB, standards set by the IASB do not gain value and authority unless these are passed by the European Commission (EC) (Virginia Law Business Review, fall 2008, p291). Funding The FASB is now financed through an obligatory contribution system, and therefore sheltered against financial influence. The IASB is financially depending on noncompulsory contribution from financial institutions, thus there is relatively huge financial pressure on IASB. Recently IASB has taken significant steps to widen the source of funding but the degree of mprovement varies from countries (Virginia Law Business Review, fall 2008, p292-298). Which approach to support? I would like to say the FASB standard setting approach is more appropriate considering your accounting background. Since many of your clients are Fortune 300 companies who would find FASB more in harmony with their preparation and presentation of periodic accounting statements and records. FASB is also in line with mo st widely accepted accounting norms and practices in the US. With less external influence, more freedom in standard setting and sufficient funds, I believe the FASB standard setting process is more trustworthy.

Sunday, October 13, 2019

A Look At Internet Browser Computer Science Essay

A Look At Internet Browser Computer Science Essay An internet browser is the program that you use to access the internet and view web pages. Internet browsers give service to user for access WWW (World Wide Web). There are different web browsers that are used today. Some internet browsers are Microsoft internet explorer Google chrome Mozilla Firefox Opera Netscape Navigator Apple Safari etc. We dont think that which browser is best for us and without knowing features and install it. We need to know which one is best for us and what are advantages and disadvantages and features of it. Here are some basic browsers features that make decision to choose best browser for us. Graphics Some browsers are capable for display text only they do not display any image, videos etc. modern web browsers have features of graphics and work faster and easier to use. Multiple Protocols A protocol is a set of rules that how data is received and transmitted. Hypertext transfer protocol (HTTP) is the common language of the web and all browsers support it and different protocol that are used for Browsers for browsing web pages. Security Support Many browsers have secure socket layer (SSL). SSL is special protocol to secure in buying and selling and transaction work. Different protocols and services are available to secure users from hackers and viruses. Frames One of the most basic features is frame. This technology divides a browser window into two or more parts. When we load different webpages in different tab. This feature makes work easily and quickly for the users. Filtering Good browsers establish rules for blocking objectionable web content for user. Browser block the web page that is not secure for user and does not browse it. Upload support The internets have many tools of attachment of file and send email etc. browsers must support upload services only older and basic browsers have not support users upload files. Cookies Cookies are small files that web sites leave on a PC. Cookies are must support in browsers to save password and history for users. Plug-ins Plug-in is a separate application that works with browsers to provide the content that is not designed for browsers. Avoid those browsers that are used plugins to provide contents. Language support Some browsers do not support language other than English. A browser which does not support multiple languages is text like gibberish. Best browsers support multiple languages for users. Internet Explorer One of the most powerful web browsers, internet explorer had the 95% usage market share in 2003. This web browser was developed by Microsoft and including by default in Microsoft windows operating system. This is high quality web browser. Internet browser is a good browser is not we know it after knowing advantages and disadvantages of it. Advantages: Availability: Internet Explorer is freely available by default in Microsoft operating system. There is no need to install it. Browsing in tabs: this new feature allowed users to open webpages in same window that we call tabs. No need to open webpages in group or in different windows. Security: security provide to users. User has some problem in different browsers but Internet Explorer has the feature of security to protect users from hackers. Application support: it has support almost every application available on internet and also many tools for help users. Reopen last sessions: when you close your browsers by mistake and lose all data that you were working on. IE save that data in it and when user open this IE restore the last session. Disadvantages: Speed: As we are in speed age and have no time to wait. Users need any browsers that work quickly IE considered as one of the slowest browsers as compared to Firefox and Chrome. It takes too much time to load webpage and downloading files. Security: This is the most annoying internet browsers. Best browser is based on security but internet explorer is the main target for hackers. Microsoft is struggling and trying to make Internet Explorer secure from hackers who steal the information of users. Customization: As compares to different browsers like Firefox and Google Chrome, IE dont have choice to customize privacy setting. Mozilla Firefox Mozilla Firefox is a free and open source web browser. Mozilla Firefox developed by Microsoft Windows and Linux coordinated by Mozilla Corporation and Mozilla Foundation. Mozilla Firefox is third most widely usage of share of web Advantages: Speed: Mozilla is fastest Brower not only do programs and file downloading but also you get the record of downloading that is easier for user to use in future. Security: Firefox has some advanced security that protect from hackers and viruses. Firefox block harmful web content and stop to browse it. Tabbed Browsing: Mozilla Firefox allows users to open unlimited webpages in a single window without opening in different windows. Restore Recent Session: Firefox will remember which internet pages you had open and get us back where users were working if your computer is turned off my mistake. Extensions and themes: Firefox is one of the most easily customize browser with support for browser extensions. It has more than 500 themes and also extension to perform work on toolbar etc. Simple Interface: Firefox has a simple interface that makes it easier to use and work on slower machines. Disadvantages: Compatibility issues: the main disadvantage of Firefox is compatibility. Some websites do not show properly in Firefox and it is view in Internet Explorer. This includes ActiveX and VBScript both of which is not supported by Firefox. Memory: Firefox takes a lot of memory to work and update makes it hard to run and invested heavily memory to use. Interrupted Service: Firefox cannot resume if downloading is interrupted. It may have a lot of trouble if your connection have problem. Google Chrome Google Chrome is a freeware web browser developed by Google. It was first released as beta version for Microsoft windows. Advantages: Speed: Google Chrome is faster than other browsers. it works more quickly. Ease to use: Google Chrome easy to use and work as compare to other browsers. Language support: it has number of Google website features. One of the features is language support which means if web content is in other language then Google Chrome has option to translate it. Speedy Start Up: if you use different browser then you have noticed that Google Chrome is quickly Start Up than others. Cloud Storage: Cloud storage of browser information is a main feature in Google Chrome where you can easily synchronize bookmarks, history, extensions to save it for future use. Chrome also variety of Google cloud-based services, including Gmail, Google Docs and Picasa for ease to user future use. Back up in Google Account and in PC: you can easily store synchronize bookmarks, history, extensions and more between Google Chrome installations on different computers. Chrome also integrates with variety of Google cloud-based services, including Gmail, Google Docs and Picasa by Google account where you can store it. And also save back up in window operating system. Restore session: Google Chrome has a feature of restore last tabs that are lost by any reason. Reopen last website: if Google chrome close by any mistake and after open it the last browsing website is open automatically. Disadvantages: Not Compatible with some websites: One of the main disadvantages of Google Chrome is not compatible with some websites, it not browse some website but better than Firefox and Internet Browser. Because as I have mention above Firefox not compatible and need to install ActiveX etc. but Google chrome is not compatible for some advanced website and no need to install ActiveX etc. No warning when closing Multiple Tabs: if you want to close multiple tab Google Chrome send no warning. As you have noticed that Internet Explorer has many disadvantages, but still have a lot of users. And second usage of share have Firefox and on third Google Chrome. And compare to speed and use I think Google chrome is best browser to use. But in some time we need to use IE. Google Chrome is faster and compatible than IE and Firefox and save bookmark and other things to and restore session etc. Google Chrome is better than IE and Firefox because if you have lost any data of tab and bookmark etc. then you just sign in to Google and get it easily and there is no need to install any plug in, ActiveX etc. Google Chrome faster start up and have also back up in your google account as I mentioned above in last 3 lines. Google Chrome has a lot of themes and also privacy setting. Google Chrome has history of browsers.

Saturday, October 12, 2019

The House on Mango Street Cisneross Style :: House Mango Street

The House on Mango Street Cisneros's Style Sandra Cisneros's writing style in the novel The House on Mango Street transcends two genres, poetry and the short story. The novel is written in a series of poetic vignettes that make it easy to read. These distinguishing attributes are combined to create the backbone of Cisneros's unique style and structure. The novel has confused many critics and readers because it reads like poetry, yet in actuality it is a narrative. Cisneros admits that many of the vignettes are "lazy poems." This means that they could be poems if she had taken the time to finish them (Olivares 145). At many times throughout the novel the words rhyme and can almost be put to a catchy tune. For example, the chapter "Geraldo No Last Name" reads like a poem with end rhyme and a structured pattern. "Pretty too, and young. Said he worked in a restaurant, but she can't remember which one" (Cisneros 65). At the other end of the spectrum, the novel is a series of vignettes. "I would affirm that, although some of the narratives of Mango Street are 'short stories,' most are vignettes, that is, literary sketches, like small illustrations nonetheless..." says critic Julian Olivares (145). Cisneros has stated that she wants a reader to be able to pick up the novel and understand its meaning from any point within; therefore, the novel is told in a series of vignettes, each of which makes it own point. The vignettes are combined to create a larger story (Olivares 145). "Chanclas" is an example of Cisneros's sound prose vignettes. "Meanwhile that boy who is my cousin... asks me to dance and I can't" (Cisneros 47).This chapter is a literary sketch which illustrates Esperanza's insecurity about being poor. Mango Street isn't necessarily structured in chronological order. There are no drastic nor specific changes in time. The reader understands that the character is growing up, but the existing structure can be rearranged without compromising the reader's understanding. The chapters "Hips" ("They(hips) bloom like roses, I continue because it's obvious I'm the only one who can speak with any authority...") and "The First Job" ("So the next morning I put on the navy blue dress that made me look older.

Friday, October 11, 2019

Technology and Civilization: Course Description

Key themes that will be surveyed in this course Include a) technology, culture, race and gender, b) religion and technology, c) the relationship between science and technology, d) the management of technology, and e) how users shape new technologies. Further Information about natural science courses can be found at www. Ants. York. Ca. Class Format: The class is scheduled to meet on Tuesdays and Thursdays from 4-5:pm. Classes will begin with a lecture followed by a discussion period of class readings.You will then be asked to fill out Work's Attending Physician's Statement and submit it before you are allowed to write the exam at an alternate date and time. Depending on your situation, you may also be asked to fill out a Deferred Standing Form as well. Further information about missed exams and the required forms can be found at: www. Registrar. York. Ca/exams/deferred/ If you miss an exam for a non-medical emergency, please contact your course director via email within 48 hours and outline your situation. If your explanation is accepted, you will be asked to provide further documentation.After examining your documentation, the course director will decide whether to grant or deny you permission to write your exam. Students with physical, learning or psychiatric disabilities who require reasonable accommodations in teaching style or evaluation methods should discuss this with the Course Director early in the term so that appropriate arrangements can be made. Course Website: The course website is: http://model. York. Ca Once you go this website, you must enter in your Passport York User ID and Password n order to access courses.The course is listed under the Faculty of Science. Will be posted on the course website. Although these notes are extensive, it is still imperative that you come to class. This is because our in-class lectures will highlight what material is most important to know. This will allow you to focus your attention on what you really need to know to do well on exams. Also, don't forget that attendance is worth 8% of your mark. is a student-run academic support service designed to help York University undergraduate students excel in their Natural Science courses.Their team of dedicated tutors will clarify course material and offer general guidance on assignments, enabling you to complete them independently with a higher degree of success.

Thursday, October 10, 2019

Introduction to Computers by Peter Norton 6th Ed

Q e SPECIAL INDIAN EDITION [ J^ ^ S ix t l^ d it io n INTRODUCTION TO COMPUTERS PETER NORTON In te rn S n H T M l Office For Sale in India, Pakistan, Nepal, Bangladesh, Sri Lanka and Bhutan only Uploaded By : M. Kamran Hanif E-mail : mk. [email  protected] com Website : www. kamran. hk. ms Information contained in this work has been obtained by Tata McGraw-Hill, from sources believed to be reli ­ able.However, neither Tata McGraw-Hill nor its authors guarantee the accuracy or com pleteness of any infor ­ mation published herein, and neither Tata McGraw-Hill nor Its authors shall be responsible for any errors, omissions, or damages arising out of use of this Infor* mation. This work is published with the understanding that Tata McGraw-Hill and its authors are supplying in ­ formation but are not attempting to render engineering or other professional services. If such services are re ­ quired. the assistance of an appropriate professional should be sought m Tata McGraw-HillPE T ER NORTON’S * INTRODUCTION TO CO M PUTERS Indian Adaptation done by arrangement with the McGraw-Hill Companies Inc.. NewYbrk Sales territories: India. Pakistan, Nepal, Bangladesh, Sri Lanka and Bhutan. Ninth reprint 2008 RYXDCDRXRB8YA Copyright (D 2006 by The McGraw-Hill Companies, inc. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc.. including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning.Some andllaries, including electronic and print components, may not be available to customers outside the United States. ISBN-13:97S4M>7-0S9374*9 ISBN-10:0-07-059374-4 Published by the Tata McGraw-Hill Publishing Company Limited. 7 W est Patel Nagar, New Delhi 110 008. typeset m Tim es at Script Makers. 19, A1-B. DDA Market, Pashchim Vlhar, New D elhi 110 063 and printed at Pashupati Printers, 1/429/16, G ali No. 1, Friends Colony. G. T. Road, Shahdara, Delhi 110 095 Cover Printer: SD R Printers Cover Design: Kapil Gupta The M cG raw -H ill Contponies Ez& sscr PH M TPM TQ AT A Cl IWindows 7 Check Your UnderstandingChapter 1: Introducing Computer Systems Lesson 1A: Exploring Computers and Their Uses Lesson IB : Lookina Inside the Computer Svstem Chapter 2: Interaction with Your Computer Lesson 2A: Using the Kevboard and Mouse Lesson 2B: Inputting Data in Other Wavs Chapter 3: Secinq, Hearing, and Printin') Data l;ctnn 3A; Virfpo and Snunri Lesson 3B: Printinq Chanter 4: Processing Data Lesson 4A: Transfbrmina Data into Information Lesson 4B: Modem CPUs Chapter 5; Storina Data Lesson SA: Types of Storaqe Devices Lesson SB: Measurinq and Improving Drive Performance Chapter 6: Usina Ooeratinu Systems Lesson 6A: Oporatinq Svstem Basics lesson 6B: Survev of PC nd Network Operatino Systems Chanter 7: Networks Lesson 7A: Networkinq Basics 2 3 24 48 49 68 88 89 1 07 124 12S Ufi m m 107 Chapter 0: Working in the Online World Lesson 9A: Connectinq to the Internet Lesson 9B: Doinq Business in the Online World Chapter 10: Workinq with Application Software Lesson 10A: Productivity Software Lesson 10B: Graphics and Multimedia Chapter 11: Database Management Lesson 11A: Database Manaqement Systems Lesson 11B: Survey of Database Systems Chanter 12: Software Proaramminq and Development Lesson 12A: Creating Computer Proqrams Lesson 12B: Proaramminq Lanauaoes and the Proqramminq Process Chanter 13: Protectina Your Privacy. Your Computer, and Your Data 330 331 345 382 263 383 400 401 42Q 438 439 456 478 477 497 518 528 532 538 SS8Lesson 13A: Understanding the Need for Security Measures 204 Lesson 13B: Takina Protective Measures 205 Appendix A: Creating Your Own Web Paae 22k Appendix B: Buyinq Your First Computer 242 Appendix C: Computer Viruses Annendix D: History of Microcomputers 243 267 Appendix E: Self-Check Answers Ch apter ; Presenting the Internet Lesson 8A: The Internet and the World Lesson 8B: E-Mail and Other Internet Services 284 286 312 Urheberrechtlich geschutzies ^ aterial FEATURE ARTICLES At Issue Computerized Oisease Manaqement Computer Votinq—Is It a Good Thinq? 36 62 10? 134 192 228 252 316 336 372 414 450 490 Productivity Tig Choosinq the Riqht Tool for the Job Savinq Time with Keyboard Shortcuts The Care and Feedinq of Printers Do You Need M n RAM? ; Backino Up Your Data Do-It-Yourself Tech Support The Telecommuter's Checklist—————- — Evaluatino the Reliability of Search Results and Web Sites Sharinq an Internet Connection Automatinq Your Work with Macros 0atahaoard, mouse,and microphone are commonInputdevices. Microphone Keyboard Speakers Monitor Printer :: FIGURE 1B. 11 Themonitor, primer,and speakers are commonou? put devices. 30 Chapter 1 Some types of hardware can act as both input and output devices. A touch screen, for example , is a type of monitor that displays text or icons you can touch. When you touch the screen, special sensors detect the touch and the computer cal ­ culates the point on the screen where you placed your finger.Depending on the lo ­ cation of the touch, the computer determines what information to display or what action to take next. Communications devices are the most common types of devices that can per ­ form both input and output. These devices connect one computer 10 another—a process known as networking. The most common kinds of communications de ­ vices are modems, which enable computers to communicate through telephone lines or cable television systems, and network interface cards (NICs), which let users connect a group of computers to share data and devices. Storage Devices A computer can function with only processing, memory, input, and output de ­ vices.To be really useful, however; a computer also needs a place to keep program files and related data when t hey are not in use. The purpose of storage is to hold data permanently, even when the computer is turned off. You may think of storage as an electronic file cabinet and RAM as an elec ­ tronic worktable. When you need to work with a program or a set of data, the computer locates it in the file cabinet and puts a copy on the table. After you have finished working with the program or data, you put it back into the file cabinet. The changes you make to data while working on it replace the original data in the file cabinet (unless you store it in a different place). Novice computer users often confuse storage with memory.Although the func ­ tions of storage and memory arc similar; they work in different ways. There arc three major distinctions between storage and memory:  » There is more room in storage than in memory, just as there is more room in a file cabinet tlian there is on a tabletop.  » Contents are retained in storage when the computer is turned off, whereas programs o r the data in memory disappear when you shut down the computer.  » Storage devices operate much slower than memory chips, bur storage is much cheaper than memory. Nor Formore formation onsorage U V C 3 Visit 3S 8. http://www. mhhe. ccm/ petemorton There are two main types of computer storage: magnetic and optical. Both are covered in the following sections.Magnetic Storage There are many types of computer storage, but the most common is the magnetic disk. A disk is a round, flat object that spins around its center. (Magnetic disks are almost always housed inside a case of some kind, so you can’t see the disk itself unless you open the case. ) Read/write heads, which work in much the same way as the heads of a tape recorder or VCR, are used to read data from the disk or write data onto the disk. The device that holds a disk is called a disk drive. Some disks are built into die drive and are not meant to be removed; other kinds of drives enable you to remove and replace disks (see Figure IB. 12).Most personal computers have at least one nonremovable hard disk (or hard drive). In addition, there is also a diskette drive, which allows you to use removable diskettes (or floppy disks). The hard disk serves as the computer’s primary filing cabinet because it can store far more data than a diskette can contain. Diskettes are used to load data onto the hard disk, to trade data with other users, and to make backup copies of the data on the hard disk. Introducing Computer Systems sch :: FIGURE 1B. 12 Standard PCs haw a buB-in hart disk and a octette dim The hard dfck is bult into the computer's case. Diskettes can be inserted into and removed from the diskette drive. Optical StorageIn addition to magnetic storage, nearly every computer sold today includes at least one form of optical storage—devices that use lasers to read data from or w rite data to the reflective surface of an optical disc. The CD-ROM drive is the most common type of optical stor age device. Com ­ pact discs (CD s) arc a type of optical storage, identical to audio CDs. U ntil re ­ cently, a standard CD could store about 74 minutes of audio or 650 M B of data. A newer breed of CDs can hold 80 minutes of audio or 700 M B of data (see Fig ­ ure 1B. 13). The type used in computers is called Compact Disc Read-Only Mem ­ ory (CD -RO M ). As the name implies, you cannot change the inform ation on the disc, just as you cannot record over an audio CD.If you purchase a CD-Recordable (CD-R) drive, you have the option of creat* ing your own CDs. A CD-R drive can w rite data to and read data from a compact disc. To record data w ith a CD-R drive, you must use a special CD-R disc, which can be written on only once, or a CD-ReW ritable (CD-RW ) disc, which can be written to m ultiple times, like a floppy disk. An increasingly popular data storage technology is the Digital Video Disc (D V D ), which is revolutionizing home entertainment. Using sophisticated com ­ pression technologies, a single DVD (which is the same size as a standard compact disc) can store an entire full-length movie. DVDs can hold a minimum of 4. 7 G B of data and as much as 17 G B.Future D VD technologies promise much higher stor ­ age capacities on a single disc. DVD drives also can locate data on the disc much faster than standard CD-ROM drives. DVDs require a special player (see Figure IB . 14). M any DVD players, how ­ ever, can play audio, data, and DVD discs, freeing the user from purchasing dif ­ ferent players for each type of disc. D VD drives are now standard equipment on many new personal computers. Users not only can install programs and data from their standard CDs, but they also can watch movies on their personal computers by using a DVD. FIGURE 1B. 13 Software nakers commonly sel Oier productson CDbecauseof the dsc's high storage capaoty. Software Brings the Machine to LifeThe ingredient that enables a computer to perform a specific task is software , which consists of instructions. A set of instructions that drive a computer to per ­ form specific tasks is called a program. These instructions tell the machine’s phys ­ ical components what to do; without the instructions, a computer could not do anything at a ll. When a computer uses a particular program, it is said to be run ­ ning or executing that program. Although the array of available programs is vast and varied, most software falls into two major categories: system software and application software. ONLINE FormoreInformation on computersoftware, visit http://www. mhhe. com/ petemorton 32 Chapter 1 System SoftwareSystem software is any program (hat controls the computer’s hard ­ ware or that can be used to maintain the computer in some w ay so that it runs more efficiently. There are three basic types of system software:  » An operating system tells the computer how to use its own com* poncnts. Examples of operating systems include Windows, the Mac intosh Operating System, and Linux (see Figure IB . 15). An operating system is essential for any computet; because it acts as an interpreter between the hardware, application programs, and the usee When a program wants the hardware to do something, it communicates through the operating system. Sim ilarly, when you want the hardware to do something (such as copying or printing a file), your request is handled by the operating system. A network operating system allows omputers to communicate and share data across a network while controlling network op* erations and overseeing the network’s security. A u tility is a program that makes the computer system easier to use or performs highly specialized functions (see Figure IB . 16). U tilities arc used to manage disks, troubleshoot hard* ware problems, and perform other tasks that the operating sys ­ tem itself may not be able to do.  »  » FIG U RE 1B. 14 DVDplayersare now standardon many PCsand are foundin marryhome enterta inmentcentos. Application Software Application software tells the computer how to accomplish specific tasks, such as word processing or drawing, for the user.Thousands of applications are available for many purposes and for people o f all ages. Some of the major categories of these applications include  »  » Word processing software for creating text-based documents such as newsletters or brochures (see Figure IB . 17). Spreadsheets for creating numeric-based documents such as budgets or bal ­ ance sheets. FIG U RE 1B. 15 Windowsis Ihe mostpopular cf aS PC operatingsystems, runningonabout BagiEBEBBjBSi 90 percentof al personalcomputers. Introducing Computer Systems 33 Urheberrechtlich geschutzles M «  » Database management software for building and manipulating large sets of data, such as the names, addresses, and phone numbers in a telephone directory.Presentation programs for creating and presenting electronic slide shows (see Figure 1B. 18). Graphics programs for design ing illus ­ trations or manipulating photographs, movies, or animation. Multim edia authoring applications for building digital movies that incorporate sound, video, anim ation, and interactive features. Entertainment and education software, many of which are interactive multime ­ dia events.  »  »  »  » FIGURE 1B. 16  » Web design tools and Web browsers, and other Internet applications such as newsreaders and e-mail programs.  » Games, some o f which arc for a single player and many of which can be played by several people over a network or the Internet.Thereare hundreds of utility programs available forpersonal computers. This one. caled ParttlonMagic, helps you manage jour hard cfisKto getthe most from it Computer Data You have already seen that, to a computer, data is any piece of information or fact that, taken by itself, may not make sense to a person. For example, you might think of the letters of the alphabet as data. Taken individually, they do not mean a lo t. But when grouped into words and sentences, they make sense; that is, they become information (see Figure IB . 19). Sim ilarly, basic geometric shapes may not have much meaning by themselves, but when they arc grouped into a blueprint or a chart, they become useful information. n o * a  « ‘ – f o lflJJ e†¢ IS*H*M  »*a* n o t – * *†¢- t *-†¢* jlK  » z j* / u-*-ai-:. *— . ; – f t ir – V * ‘* – * n, i. 4r  »  ¦ ~ { _ k___ _ l l 1 I FIG U RE 1 B. 1 ? Word processing software s designed (or creating documentsthatconsistprimarily of text, but also lets youadd graphcs and sounds to your documents. It also provides layout features that letyou create brochures. newsletters,Web pages, and mom . 34 Chapter 1 M i 3 —  « I H w fcn  «h Haw*M**AH «a4 «M* M M ptflw W lM A to A M Ih m k B m V Dmm*mS. xa NvMrHtwMMk  ¦ M r itM m i l « h  » M ld  »  »  »  « * llh i » ^ f c n 1 ilfilw >  » à ¢â‚¬â€ n TW  « t iW * *  » lW fa m i w d p u l— n le y— d w t ‘t i i w l a Ml  ¦M l  ¦ ‘*  ¦ * -1________________________B lw f lja ! ______ ‘‘  ¦; ! .. C uitrom A K lM M T . U . ATTOOCTBATLAW 1002 AIMMBSB8ZT sunu;,iL4nw C i A Urheborrechtlich geschOtztes M FIGURE 1B. 18 :: T oil rtyt Sj ;fca f Presentation software is mostoften used torcreating sales presentations,aXtvxjgh I can be effectivetorany typeol electronicside show.  « H i n ^ X iM ; . i W h;i; :' V! J i 1 jwufinm :. ^  ¦ H o? drrnfi! ^Viis,-S* The Keyboard The Mouse Variants of the Mouse Ergonomics and Input Devices Lesson 2B: Inputting D ata In O ther W ays  »  »  » Devices for the Hand Optical Input Devices Audiovisual Input Devices LESSON v m Overview: T he K eyboard an d M ouseIf you think of the CPU as a computer’s brain, then you might think of the input devices as its sensory organs—the eyes, ears, and fingers. From the user’s point o f view, input devices are just as important as the CPU, perhaps even more important. After you buy and set up the com* putcr, you may take the CPU for granted because you interact directly with input devices and only indirectly with the CPU. But your ability to use input devices is critical to your overall success with the whole system. An input device docs exactly what its name suggests: it enables you to enter information and commands into the computer. The most com* monly used input devices arc the keyboard and the mouse.If you buy a new personal computer today, it w ill include a keyboard and mouse un ­ less you specify otherwise. Other types of input devices arc available as well, such as variations of the mouse and specialized †alternative† input devices such as microphones and scanners. This lesson introduces you to the keyboard and the mouse. You w ill learn the importance of these devices, the way the computer accepts input from them, and the many tasks they e nable you to perform on your PC. Using the Keyboard and Mouse OBJECTIVES :: > Identity the five key groups on a ; †¢ standard computer keyboard. > Name six special*purpose keys found on all standard computer keyboards.  » List the steps a computer follows when accepting input from a keyboard. Describe the purpose of a mouse and the rote it plays in computing.  » Identify the five essential techniques for using a mouse.  » Identify three common variants of the mouse.  » Describe five steps you can take to avoid repetitive stress injuries from computer use. Urheberrechtilch g eschutztes Material The Keyboard O N L IN E For mote information on computer-based keyboard tutooals, vs* http://wvrw. mhho. com/ petemortoa The keyboard was one of the first peripherals to be used with computers, and it is still the primary input device for entering text and numbers. A standard keyboard includes about 100 keys; each key sends a different signal to the CPU.If you have not used a comp uter keyboard or a typewriter, you w ill learn quickly that you can use a computer much more effectively if you know how to type. The skill of typing, or keyboarding, is the ability to enter text and numbers with skill and accuracy. Certainly, you can use a computer without having good typing skills. Some people claim that when computers can interpret handwriting and speech with 100 percent accuracy, typing w ill become unnecessary. But for now and the foreseeable future, keyboarding remains the most common way to enter text and other data into a computer: The Standard Keyboard Layout O N L IN E For more miormaiion on computer keyboards and keyboard manufacturers, visit http://www. mhhc. com/ petemortal Keyboards come in many styles.The various models differ in size, shape, and feel; except for a few special-purpose keys, most keyboards arc laid out almost identi ­ cally. Among IBM-compatible computers, the most common keyboard layout is the IBM Enhanced Keyboard. It has about 100 keys arranged in five groups, as shown in Figure 2A. 1. (The term IBM-compatible computer refers to any PC based on the first personal computers, which were made by IBM . Today, an IBMcompatible PC is any PC other than a Macintosh computer. ) The Alphanumeric Keys The alphanumeric keys—(he area of the keyboard that looks like a typewriter's keys—are arranged the same way on almost every keyboard.Sometimes this com ­ mon arrangement is called the Q W ERTY (pronounced KWER-tcc) layout be ­ cause the first six keys on the top row of letters are Q, W, E , R , T, and Y. Along with the keys that produce letters and numbers, the alphanumeric key group includes four keys having specific functions. The t a b , CAPS LOCK, ba c k  ­ spa c e , and e n t e r keys are described in Figure 2A. 2. FIGURE 2A . 1 Most BM com pattie PCs use a keyboard like M s one. Mar/ keyboards feature a number of specialized keys, am)keyboardscan vary in size and shape. But nearly e l standard P C keyboards include the keys shewn here. The Modifier Keys The SHIFT, ALT (Alternate), and CTRL (Control) keys are called modifier keys be ­ cause they modify the input of other keys.In other words, if you hold down a modifier key while pressing another key, then you are changing the second key's Alphanum keys eric 50 Chapter 2 Theto key m ovesyouto predefined tabstops In m applicationprogram any s (suchas wordprocessors). Thebackspace keyerases characters youhavejusttyped. Forexam ina ple, word processingprogramyoucan press baosmce to â€Å"backover† an Incorrect character anddelete it Thecaps lock keylets you†lock* the alphabetkeys sotheyproduceonly capital letters. The ehter key letsyou finalize dataentry inm typesof appBcatkmprogram any s. Ybualso can usewtw tocboosecom ands m andoptionsin m program and at any s various places in anoperatingsystem's Interface. FIGURE 2A . 2 nput in some way. For example, if you press the Jtkcy, you input a small letter/. ‘ B ut if you hold down the sh u t key while pressing the J key, you input a capital /. M odifier keys arc extremely useful bccausc they give all other keys multiple ca ­ pabilities. Figure 2A. 3 describes the modifier keys and their uses. Functionsofthe tab,catsloo. v o s ta , andtwin keys The Numeric Keypad The numeric keypad is usually located on the right side of the keyboard, as shown in Figure 2A. 1. The numeric keypad looks like a calculator's keypad, with its 10 digits and mathematical operators (+, -, *, and Whenpressedalong with analphanumerickey,smft forcesthe /).The numeric keypad also features a NUM computerto outputa capital letterorsymbol sun is also a LOCK key, which forces the numeric keys to in ­ m ocfifierkey in someprogram forexam youcan presssnft s; ple, put numbers. When NUM LOCK is deactivated, alongwtthcursor-m ovem keys toselect textforediting. ent the numeric keypad's keys perform cursormovement control and other functions. The Function Keys The function ke ys, which are labeled F l, f l, and so on (as shown in Figure 2A. 1), are usu ­ ally arranged in a row along the top of the key ­ board. They allow you to input commands without typing long strings of characters or navigating menus or dialog boxes. Each func ­ tion key's purpose depends on the program you are using. For example, in most programs, F l is the help key. When you press it, a special window appears to display information about = OnThecm (control) key producesdifferent results dependingonthe programyouare using. In m Windows-based program any s, cm-key combinationsprovideshortcuts for m com ands. Forexam the enu m ple, combinationcnuo enables youto open a newfile. n Them j (mjcmmu) keyoperates Skethectrl key,but producesa different set of results. In Windowsprogram Mi-key s. combinations enableyouto navigate m enus anddialog boxeswithoutusingthe m ouse. FIGURE 2A . 3 Fuvtionsoftheshft, emuanda lt keys. Interacting with Your Computer 51 the program you are using. Mos t IBM-compatible keyboards have 12 function keys. Many programs use function keys along with modifier keys to give the func ­ tion keys more capabilities. The Cursor-Movement KeysMost standard keyboards also include a set of cursor-movcmcnt keys, which let you move around the screen without using a mouse. In many programs and op* erating systems, a mark on the screen indicates where the characters you type w ill be entered. This mark, called the cursor or insertion point, appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line. Figure 2A. 4 describes the cursor-movcmcnt keys and Figure 2A. 5 shows an insertion point in a document window. Special-Purpose Keys In addition to the five groups of keys described earlier, all IBM*compatible key ­ boards feature six special-purpose keys, each of which performs a unique func ­ tion. Figure 2A. describes these spccial-purposc keys. Since 1996, nearly all IBM-c ompatible keyboards have included two additional special-purpose key’s designed to work with the Windows operating systems (see Figure 2A. 7):  » start . This key, which features the Windows logo (and is sometimes called the Windows logo key), opens the Windows Start menu on most computers. Pressing this key is the same as clicking the Start button on the Windows taskbar. s h o r t c u t . This key, which features an image o f a menu, opens an on-screen shortcut menu in Windows-based application programs.  » One of the latest trends in keyboard technology is the addition of Internet and multimedia controls.Microsoft's Internet Keyboard and MultiMedia Keyboard, for example, feature buttons that you can program to perform any number of tasks. For example, you can use the buttons to launch a Web browser, check e-mail. Depending onme program,you maybe able to press nomcto movethe cursorto the beginning ofa line and br>to moveto the endof a line. The mccu and hm o o w keys let you â€Å"flip† p * through a document, screen by screen, Hto turning the pages of a book. Press m et w to lump to the previous screen; press m gedonn to jump to the next ___ I The arrow keys move the insertion point up or down a single line, or left or right one character space. FIGURE 2A . 4 The airsor-movement keys. FIGURE 2A . Thecursor, orinsertionpoW, shews wherethenextletter typedwit appear. 52 Chapter 2 The cursor, o r insertion point, in a document eberrechtlich M The(softkey's functiondependsonyour programoroperatingenvironment Typically, the csckeyis usedtoâ€Å"backup†onelevel in a multilevel environm ent. ThenmT scREBtkey sRom the user10 s capture whatever b shownon thescreen as anim Thiskeydoes notwork with al age. program s. In som programs,scrou. lockcauses the e cursorto remainstationary onthescreen, andthe document'scontentsm aroundIt. ove Thiskeydoesn'tfuncttonatal in som program e s. In som programs,themuse key can b e e usedtostopa co m In progres s. m and 1 5 M i I I I | ? :. a . 5 is  ¦Bill r I I* J†TheM keyBatches som programsfrom SEm e Insert m ode† (in wtiich textis inserted into thedocum at the cursor) toâ€Å"overtypem ent ode (in whichnewtextis typodover existingtext), andvice vena. m —N A 4 f I 6 ‘ m n ?  » 6 a [? | 3 i* J removesonecharacterat a time at thecursor's location, cam erases characterstothe right otthecursor. FIGURE 2A . 6 SpecU jwpose keysonm standard ost keyboards FIGURE 2A . 7 ThosafiT keyandtheatofiran toy appear frequencyontherwwer keytnordsthat are sdldwAhWndcMiS' basedcom puters. 2Z and start your most frequently used programs. Multimedia buttons let you control the computer’s CD-ROM or DVD drive and adjust the speaker volume. Many key* board makers offer such features on newer models (see Figure 2A. 8). How the Computer Accepts Input from the KeyboardYou might think the keyboard simply sends the letter of a pressed key to the computer—after all, that is what appears to happen. Actually, the process of ac ­ cepting input from the keyboard is more complex, as shown in Figure 2A. 9. When you press a key, a tiny chip called the keyboard controller notes that a key has been presxd. The keyboard controller places a code into pan of its memory. Interacting with Your Computer 53 B i f a ‘S Q ill FIGURE 2A. 8 called the keyboard buffer, to indicate which key was pressed. (A buffer is a tem ­ porary storage area that holds data until it can be processed. ) The keyboard con ­ commonplace on newer keyboards. roller then sends a signal to the computer's system software, notifying it that something has happened at the keyboard. Q A key is pressed onthe keyboard When the system software receives the signal, it determines the appropriate response. When a keystroke has occurred, the system reads the Q Thesystemsoftwareresponds to memory location in the keyboard He Interruptby reading thescan code fromthe keyboardbuffer. buffer that cont ains the code of the key that was pressed. The sys ­ K EYBO RD A SYSTEM tem software then passes that BUFFER SOFTWARE code to the CPU. 0 The keyboard controler e The keyboardcontroller The keyboard buffer can store Q The system software sends an interrupt sendsDiescan code passes the scan code many keystrokes at one time.This request to the forthe key tothe tothe CPU capability is necessary because keyboardbuffet system software. some time elapses between the pressing of a key and the com ­ FIGURE 2A. 9 puter’s reading of that key from the keyboard buffer. W ith the key ­ How Input is recawd from the keyboard strokes stored in a buffer, the program can react to them when it is convenient. O f course, this all happens very quickly. Unless the computer is very busy handling multiple tasks, you notice no delay between pressing keys and seeing the letters on your screen. In some computers, the keyboard controller handles input from the computer's keyboard and mouse and stor es the settings for both devices.One keyboard set ­ ting, the repeat rate, determines how long you must hold down an alphanumeric key before the keyboard w ill repeat the character and how rapidly the character is retyped while you press the key. You can set the repeat rate to suit your typing speed. (You w ill learn how to check your keyboard’s repeat rate in the lab exer ­ cises at the end of this chapter. ) internet and muftmeda features are The Mouse A personal computer that was purchased in the early 1980s probably included a keyboard as the only input device. Today, every new PC includes a pointing dcvicc as standard equipment, as shown in Figure 2A. 10. Full-size PCs usually include a mouse as the pointing dcvicc.A mouse is an input dcvicc that you can move around on a flat surface (usually on a desk or keyboard tray) and controls the pointer. The pointer (also called the mouse pointer) is an on-screen object, usually an arrow, that is used to select text; access m enus; and interact with programs, files, or data that appear on the screen. Figure 2A. 11 shows an example of a pointer in a program window. FIGURE 2A. 10 Most modern personal computers are eqlipped w ti a mctse. 54 Chapter 2 The mechanical mouse is the most common type of pointing de ­ vice. A mechanical mouse contains a small rubber ball that proW trades through a hole in the bottom of the mouse's. case (see Figure 2A. 12). The ball rolls inside the case when you move the mouse around on a flat surface.Inside the mouse, rollers and sensors send signals to the computer, telling it the distance, direction, and speed of the ball's motions (see Figure 2A. 13). The computer uses this data to position the mouse pointer on the screen. Another popular type of mouse, the optical mouse, is nonmechanical. This type of mouse emits a beam of light from its underside; it uses the light's reflection to judge the distance, direction, and speed of its travel (see Figure 2A. 14). The mouse offers two main benefits. First, the mouse lets you position the cur ­ sor anywhere on the screen quickly without using the cursor-movement keys. You simply move the pointer to the on ­ Rdlers screen position you want and press the mouse button; the cursor appears at that location.Second, instead of forcing you to type or issue commands from the key ­ board, the mouse and mouse-based operating systems let you choose com ­ mands from easy-to-use menus and dialog boxes (see Figure 2A. 15). The result is a much more intuitive way to use computers. Instead of remembering obscure command names, users can figure out rather easily where com ­ mands and options arc located. FIG U R E 2A. 11 Anexam ola pointeras it m ple ight appearona com puterscreen. ^ o r ^ f f c iN E For m Inform ore ationonm ice andm ousemanufacturers,vsil http://www. mhhe. com/ petemoiton. FIGURE 2 A . 1 2 Thepartsofa mechanical m ouse,seen fro Vieb m m otto . NortO N L IN E Formoreformation onoptical mice, visit h ttp://wvrw. mhhe. com/ petemorion Q Whenthe mouse mom†¦ ^ †¦ he rolling mouse bail spins me rollers Q Thertormafa i from the spinning roMereIs sent to the system software,wNcti controls the pointer. FIGURE 2A. 13 H them ow ousecontrolsthepointer. Interacting with Your Computer 55 1 Urheberrechtlich geschi i: FIGURE 2A. 14 The underside ol anoptical mouse. If you use a drawing program, you can use the mouse to crcatc graphics such as lines, curves, and freehand shapes on the scrccn. The mouse has helped establish the com* purer as a versatile tool for graphic designers, starting w hat has since bccome a revolution in the graphic de* sign field. Using th e Mouse For more MormaUcn on mouse techniques, w sl http://www. mhhe. com/ petemortonYou use a mouse to move the pointer to a location on the screen, a process called pointing. Everything you do with a mouse is accomplished by com bining point ­ ing w ith these techniques:  » Clicking  » Double-clicking  » Dragging à ‚ » Right-clicking :: FIGURE 2A. 15 Using the mouse to choose a command Irom a menu. r*e Cdt ym ?e «xh ? o fcsownarks Ctrl+N ( New U*vn)4lCir SVQctow N&† *I Ofwn Web Location†¦ CtrHSMt+l Qpen Fie†¦ 0 SM CblfO Qrl+W OrM-S CdtPaga Send Page†¦ OrUâ‚ ¬ Q rffP Print P is WoifcCffine _  » fe t Q jW } 1 Pointing means pushing the mouse across your desk. O n the scrccn, the pointer moves in relation to the mouse (see Figure 2A. 16).Push the mouse forward, and the pointer moves up. Push the mouse to the left, and the pointer moves to the left. To point to an ob ­ ject or location on the scrccn, you simply use the mouse to place the pointer on top of the object or location. The mice that come w ith IBM-compatible computers usually have two buttons, but tech ­ niques such as clicking, double-clicking, and dragging arc usually carried out w ith the left mouse button (see Figure 2A. 17). In m ulti ­ button mice, one button must be designated :: FIGURE 2A. 16 Usi ng the mouse to control the on-screen pointer. The pointer moves in relation tothe mouse's movements. 56 Chapter 2 Urheberrechthch geschutztes Ma s the â€Å"primary† button, re ­ InWindows and m any The left mouse button Windows programs, the ferred to as the mouse button. is usualy the primary right mouse button Some mice can have three or button. can be used in more buttons. The buttons' manyways, too. uses arc determined by the computer's operating system, application software, and mouse-control software. To click an item w ith the mouse, you move the pointer to the item on the scrccn. When the pointer touches the object, quickly press and release the primary mouse button once â€Å"d c k † {see Figure 2A. 18). Clicking— or single-clicking, as it is also called— is the most important mouse action. To select any object on the screen, such as a menu, com mand, or button, you click it.Double-clicking an item means pointing to the item with the mouse po inter and then pressing and releasing the mouse button twice in rapid succession (see Figure 2A. 19). Double-clicking is prim arily used with desktop objects such as icons. For example, you can double-click a pro ­ †¢click click† gram's icon to launch the program. Dragging an item means positioning the mouse pointer over the item, pressing the primary mouse button, and holding it down as you move the mouse. As you move the pointer, the item is â€Å"dragged† along with it across the scrccn (see Figure 2A. 20). You can then drop the item in a new position on the screen. This technique is also called drag-and-drop editing, or just drag and drop. Dragging is a very handy tool.In a wordprocessing program, for exam ­ -and release the button ple, you can drag text from one Hold down the when you finish dragging. primary button 4 location to another in a docu ­ a s you move ment. In a file-managemcnr th e m o u se.. program, you can drag a docu ­ ment's icon and d rop it onto a printer's icon to print the docu ­ ment. W indows and many W in ­ dows programs support rightclicking, which means pointing to an item on the screen, then pressing and releasing the right mouse button (see Figure 2A. 21). Right-clicking usually opens a shortcut menu that contains commands and options that pertain to the item to which you arc pointing.A wheel mouse has a small wheel nestled among its but ­ tons (see Figure 2A. 22). You can use the wheel for various purposes, one o f which is scrolling through long docu ­ ments. N ot all applications and operating systems support the use o f the wheel. FIGURE 2A. 17 Standardbutton configuration ona tw obuttonmouse. FIGURE 2A. 18 Clicking a mouse. FIGURE 2A. 19 DoUbie-dlcWnga mouse. FIG URE 2A. 20 Bragging with a mouse. FIG URE 2A. 21 RiQht-dictonga mouse. Interacting with Your Computer 57 U rheberrechtlich g esch u tz tes al Nor Mouse Button Configurations m IN E For m tatorm ore atJononthecare andusageofrrtce. v isit http://www. mhhe. com/ pctemorton FIGURE 2A. 22 Avrfieel mouse.The mouse usually sits to the right of the keyboard (for right-handed people), and the user maneuvers the mouse with the right hand, pressing the left button with the right forefinger. For this reason, the left mouse button is sometimes called the primary mouse button. If you are left-handed, you can configure the right mouse button as the primary button (as shown in Figure 2A. 23). This configuration lets you place the mouse to the left of the keyboard, control the mouse with your left hand, and use your left fore* finger for most mouse actions. Newer mice enable you to configure buttons to perform different tasks than clicking. You might configure a button to delete selected text, for ex ­ ample, or to open a program that lets you search for files.Such settings may lim it the usefulness of the mouse but can be helpful if you need to perform a certain task many times. m 3 MW^waau^MOUl Variants of the Mouse Althou gh the mouse is a handy tool, some people do : MMbi not like using a mouse or have difficulty maneuvering 1(0* one. For others, a mouse W D i W tfW w : requires too much desktop jo* space—a real problem when you are not working at a deskl Uw aJi | tM For these reasons and others, hardware makers have developed devices that Cm * k 1 m * 1  « duplicate the mouse's func ­ tionality but interact with the user in different ways. The primary goals or these â€Å" mouse variants'* are to provide case of use while taking up less space than a mouse.They all remain sta ­ tionary and can even be built into the keyboard. Trackballs A trackball is a pointing device that works like an upside-down mouse. You rest your index finger or thumb on an exposed ball, then place your other fingers on the buttons. To move the pointer around the screen, you roll the ball with your in ­ dex finger or thumb. Because you do not move the whole device, a trackball re ­ quires less space than a m ouse. Trackballs gained popularity with the advent of laptop computers, which typically are used on laps or on small work surfaces that have no room for a mouse. Trackballs come in different models, as shown in Figure 2A. 24.Some track ­ balls are large and heavy with a ball about the same size as a cue balL Others are much smaller. Most trackballs feature two buttons, although three-button models http://www. mhhe. com/ pctemorton 58 Chapter 2 Urheberrechlllch geschOtztes Ma SELF-CHECK :: Circle the correct answer for each question. 1. Themost com onkeyboard layout hasabout this manykeys. m a. 10 a. s t/ h i k e y h. 100 b. sh o rtc u t k e y c. 110 c. a lte rn a je key IB il 2. Wfochspecial keyboardkey has a picture of theWindows logoonit? 3. Most full-si2e PCs feature oneof these as the pointingdevice. a. Keyboard b. Mouse c. Scanner † p w | are also available. Trackball units also are available in right- and left-handed models. TrackpadsThe trackpad (also called a touchpa d) is a stationary pointing device that many people find less tiring to use than a mouse or trackball. The movement of a finger across a small touch-sensitive surface is translated into pointer movement on the computer screen. The touch-scnsitivc surface may be only 1. 5 or 2 inches square, so the finger never has to move far. The trackpad's size also makes it suitable for a notebook computer. Some notebook models feature a built-in trackpad rather than a mouse or trackball (sec Figure 2A. 25). Like mice, trackpads usually are separate from the keyboard in desktop com ­ puters and are attached to the computer through a cord.Some special keyboards feature built-in trackpads. This feature keeps the pad handy and frees a port that would otherwise be used by the trackpad. Trackpads include two or three buttons that perform the same functions as mouse buttons. Some trackpads arc also â€Å" strike sensitive,† meaning you can tap the pad with your fingertip instead of using its b uttons. FIGURE 2A. 24 Trackballscomeinm shapes and any sires. Form infcxm on ore ailon tracl; ad andintegrated p s porting devces. vis* http://www. mhhe. com/ petemorton Pointers in the Keyboard Many portable computers now fea ­ ture a small joystick positioned near the middle of the keyboard, typically between the G and H keys.The joy ­ stick is controlled with either fore ­ finger, and it controls the movement of the pointer on screen. Because users do not have to take their hands off the keyboard to use this device, they can save a great deal of time and effort. Two buttons that per ­ form the same function as mouse buttons are just beneath the space ­ bar and are pressed with the thumb. Several generic terms have emerged for this device; many manu ­ facturers refer to it as an integrated FIGURE 2A. 2S Trackpad Soma notebookcomputersanddesktop keyboardsfeatire a buiK-intraefcpod Interacting with Your Computer 59 M , I Pmdunthvily Tip Saving Tim e With Keyboard Shortcu tsIn the 1980s, as programmers began packing more features into PC software, they also developed ways for users to is ­ sue an ever-increasing number of commands. Software packages came with long lists of commands, all of which had to be entered at the keyboard. (This was before the mouse came into common use. ) As a result, the computer keyboard rapidly became a valuable tool. Programmers began devising keyboard shortcuts that allow users to issue commands quickly by typing a short combination of keystrokes. Keyboard shortcuts involve using a modifier key (such as aut or cm. ) along with one or more alphanumeric or function keys. To print a document in many applications, for example the user can press ctri+p.Function keys also became important The Fl key, for ex ­ ample, became the universal way to access online help. IBMcompatible computer keyboards originally had 10 function keys; eventually the number of function keys was expanded to 12. Another common type of keyboard short cut involves pressing the a u key to access a program's menu system. When running any Windows program, you can press alt to activate the menu bar, and then press a highlighted letter in a menu's name to open that menu. Stilt a keyboard can hold only so many keys, and the lists of keyboard shortcuts became unmanageable. A single program could use dozens of â€Å"hotkeys,† as these shortcuts were called. If you used several programs, you had to learn different shortcuts for each program.Finally, the Common User Access (CUA) standard led to the standardization of many commonly used hotkeys across different programs and environments. With this standard for commonly used hotkeys, users have fewer hotkeys to remember. Despite such standards, pointing devices (such as the mouse) came along none too soon for hotkey-weary com ­ puter users. Microsoft Windows and the Macintosh operating system gained popularity because of their easy-to-use, mouse-oriented graphical interfaces. By ope rating the mouse, users could make selections visually from menus and dialog boxes. Emphasis rapidly began shifting away from the keyboard to the screen; today, many users do not know the purpose of their function keys! pointing dcvicc, while others call it a 3-D point stick.On the IBM ThinkPad line of notebook computers, the pointing device is called the TrackPoint (see Figure 2A. 26). Ergonomics and Input Devices Any officc worker w ill tell you tliat working at a desk all day can be extremely uncomfortable (see Figure 2A. 27). Sitting all day and us ­ ing a computer can be even worse. Not only docs the user's body ache from being in a chair too long, but hand and wrist injuries can result from using a keyboard and mouse for long periods. Eyes can become strained from staring at a monitor for hours. Such injuries can be extreme, threatening the user’s general health and ability to work. Much is being done to make computers easier^ safer, and more comfortable to use.Ergono mics, which is the study of the physical relationship between people and their tools—such as computers— addresses these issues. Now more than ever before, people recognize the impor ­ tance of having ergonomically correct computer furniture and using proper posture and techniques while working with computers. (The term ergonomically correct means that a tool or a workplace is designed to work properly with the human body, and thus reduces the risk of strain and injuries. ) TrackPoint : FIG U RE 2A. 26 IBM's ThinkPad computers feature the TrackPoint pointing device, and smtar donees are found in many otter portable PCs. 60 Chapter 2 Press cm+a To Toggle bold character formatting on or off for the selected or inserted ext; make letters bold or unbold Toggle italic character formatting on or off for the selected or inserted text; make letters italic Toggle underline character formatting on or off for the selected or inserted text; underline letters Oecrease font size fo r the selected or inserted text Increase font size for the selected or inserted text Remove paragraph formatting for the selected paragraph or paragraphs Remove character formatting for the selected text Copy the selected text or object Cut the selected text or object Paste text or an object Undo the last action Redo the last action c tilh Pointing, however, can slow you down. As menus and di ­ alog boxes become increasingly crowded, commands can be hard to find and their locations can be as difficult to re ­ member as keyboard shortcuts. Many computer users over ­ come these problems by using a combination of keyboard shortcuts and a pointing device. You use one hand to issue many basic shortcuts (such as cnti+f and ctrl+s) or to launch macros. A macro is a series of commands that a pro ­ gram memorizes for you. Macros enable you to issue an en ­ tire set o t commands in just a few keystrokes.Using these techniques minimizes keystrokes and leaves a hand free to use a poin ting device. The following table lists some of the shortcut keys avail ­ able in Microsoft Word. ctri-hi ctm >shift*< ct «l+shih+> CTRi+o ctri+smcebar cm -K ctri+x ctri+y ctri+z ctrl+ y Repetitive Stress Injuries The field of ergonomics did not rcccivc much attention until a ccrtain class o f in ­ juries began appearing among clerical workers who spend most o f their time en ­ tering data on computer keyboards. These ailments are called repetitive stress injuries (RSIs) or repetitive strain injuries and result from continuously using the body in ways it was not designed to work.One type of RSI that is especially well documented among computer users is carpal tunnel syndrome, a wrist or hand in ­ jury caused by using a keyboard for long periods of time. W C IW E For moreinformationon ergonomics andavok&ig computer-relatedinjuries, v a i http://www. mhhe. conj/ petemorton FIGURE 2A. 27 Experience showslhat office worftcan pose speofc healti risks. Interacting with Your Compu ter 61 Urheberrechtlich geschulzles M Transverse Cross Section of NormalW rit! FlexorTendons and Sheath . † :â„ ¢ . Inflamed Inflamedtendon sheath presses against median nerve carpal?. : : * Bones FIGURE 2A . 2 8 Carpel tunnel syndrom affectsthe e nervesrunningthroughthe carpal tunnel of thewrist. The carpal tunnel is a passageway in the wrist through which nerves pass (see Figure 2A. 28).In carpal tunnel syndrome, tendons in the tunnel bccome inflamed because the victim has held his or her wrists stiffly for long periods, as people tend to do at a keyboard. When the tendons become inflamed, they press against the nerves, causing tingling, numbness, pain, or the inability to use the hands. Carpal tunnel syndrome is the best-known repetitive stress injury. It can become so de ­ bilitating that victims can miss weeks or months of work. In extreme cases, surgery is required. Avoiding Keyboard-Related Injuries If you use a computer frequently, you can avoid RSIs by adopting a few good work habits, and by making sure that your hardware and workspace are set up in an ergonomically friendly way. At Jssue Com puter Voting— Is It a Good Thing?The dispute over electronic voting is as heated as a debate between presidential candidates. The risks versus the bene ­ fits are discussed, investigated, and argued. But what are the facts that lie beneath the fuss? The key function of an electronic voting system is to ob ­ tain voter preferences and report them—reliably and accu ­ rately. Some assert that electronic systems are safer than other methods of voting because they implement security checks and audit trails, and are tougher to tamper with than paper ballots. One of the most widely used electronic voting systems. Diebold Election Systems (http://www. diebold. com/ dieboldes/accuvote_ts. tm), boasts some 33,000 voting stations in locations across the United States. Dieboltfs AccuVote-TS system is a voter-activated interactive touch ­ scre en system using an intelligent Voter Card as the voter interface. The interface allows voters to view and cast their votes by touching target areas on an electronically gener ­ ated ballot pad. Each unit provides a direct-entry computerized voting station that automatically records and stores ballot infor ­ mation and results. While classified as a direct record entry (ORE) device, the AccuVote-TS system has additional capa ­ bilities. The tabulator is a multifunctional interface that counts and abulates the ballots at precincts on election day and communicates with the host computer at Election Central for accurate and timely jurisdictionwide results. However, electronic voting systems have generated con ­ cern because their work is not readily accessible for inspec ­ tion; what goes on behind the screen is a mystery to the general public and therefore causes uneasiness. With com ­ puter voting, voter records are intangibly stored on a hard drive, with voting results re corded in electronic memory. Indeed, a July 2003 analysis of the Diebold touch screen by computer researchers from Johns Hopkins and Rice uni ­ versities (found at http://www. newscientist. oin) showed that the software was riddled with errors and open to fraud. However, even with the possibility of fraud, electronic 62 Chapter 2 Urheberrechllich oesch When setting up your computing workspace, make it a prior ­ ity to choose a comfortable, ergonomically designed chair (sec Figure 2A. 29). Your office chair should  »  »  » Allow you to adjust its height. Provide good lower-back support. Have adjustable armrests. Your desk also should be well-suited to computer use, like the one shown in Figure 2A. 30. The desk should hold your key ­ board and mouse at the proper height, so that your hands are at the same height as your elbows (or a few inches lower) when you hold them over the keyboard.Here arc some other tips that can help you avoid RSIs while working with your keyboard and mouse:  » Use an Ergonomic Keyboard. Traditional, flat keyboards arc not well-suited to the shape of human hands. An ergonomic keyboard allows you to hold your hands in a more natural position (with wrists straight, rather than angled outward) while typing (see Figure 2A. 31).  » Use a Padded Wrist Support. If you type a lot, a wrist support can be helpful by allowing you to rest your hands comfortably when you are not actually typ ­ ing. Remember; however, that FIGURE 2A. 29 Anergonom ically designedcom puter chairanddesk. FIGURE 2A. 30 A propertydesignedcom puterdesk featuresa Udl-insfieB or traytohoWffw keyteard andm ouse. ystems may still be safer than prior methods of voting be ­ cause they implement redundant security checks and audits and may be more difficult to tamper with because of the size and nature of their tabulating components. Another argument in favor of paper ballots, or at least paper receipts, is that in order to verify an election, all you need to d o is gather up the ballots and tabulate them a sec ­ ond (or third, as the case may be) time. However, auditing paper ballot systems is not always as easy as it sounds. Bal ­ lots, particularly punch-cards, sometimes provide ambigu ­ ous results, as seen in a recent presidential election. They are easily forged and they must be physically handled and transported, which provides the opportunity for substitu ­ tion or loss.Whether computerized or traditional, no election system is infallible, and in truth, perhaps it doesn't need to be. As some have said, every safe has the capability to be cracked. The same is true for voting systems. The issue is not whether they are 100 percent secure, but whether they pre ­ sent adequate safeguards to give us faith in the integrity of our elections. n Interacting with Your Computer 63  »  »  »  » you should never rest your wrists on anything—even a comfortable wrist support—while you type. Use the support only when your fingers are not moving over the keyboard. Keep Your Wrists Straight. When typing, your hands should be in a straight line with your forearms, when viewed either from above or from the side (see Figure 2A. 32).Keeping the wrists bent in cither direction can cause mus de fatigue. Sit Up Straight. Avoid slouching as you type, and keep your feet flat on the floor in front of you. Avoid crossing your legs in front of you or under your chair for long periods. Learn to Type. You w ill use the keyboard more efficiently and naturally if you know how to type. If you M hunt and peek,† you are more likely to slouch and keep your head down while looking at rite keyboard. This tech ­ nique not only slows you down, but it leads to fatigue and stiffness. Take Frequent Breaks. Get up and move around for a few minutes each hour, and stretch occasionally throughout the day. FIGURE 2A. 31Anexam ol anergonom keyboard. ple ic FIGURE 2A. 32 Whent> in . your handsshouldbein pg & eWin yourforea rm al all tonesand n s whenviewedfromanyantfe. 64 Chapter 2 Urheberrechlllch geschutzte Review Summary ::  » A standard computer keyboard has about 100 keys.  » Most keyboards follow a similar layout, with their keys arranged in five groups. Those groups include the alphanumeric keys, numeric keypad, function keys, mod ­ ifier keys, and cursor-movement keys.  » When you press a key, the keyboard controller places a code in the keyboard buffer to indicate which key was pressed. The keyboard sends the computer a signal, which tells the CPU to accept the keystroke. The mouse is a pointing device that lets you control the position of a graphical pointer on the screen without using the keyboard.  » Using the mouse involves five techniques: pointing, clicking, double-clicking, drag ­ ging, and right-clicking.  » A trackball is like a mouse turned upside-down. It provides the functionality of a mouse but takes less space on the desktop.  » A trackpad is a touch-sensitive pa d that provides the same functionality as a mouse. To use a trackpad, you glide your finger across its surface.  » Many notebook computers provide a joystick-like pointing device built into the keyboard. You control the pointer by moving the joystick.On IBM systems, this de ­ vice is called a TrackPoint Generically, it is called an integrated pointing device.  » Continuous use of a keyboard and pointing device can lead to repetitive stress injuries.  » The field of ergonomics studies the way people use took. This study leads to bet ­ ter product designs and techniques that help people avoid injuries at work.  » Ergonomically designed keyboards are available to help users prevent repetitive stress injuries to the wrists and hands. Key Terms :: alphanumeric key, 60 buffer, 54 carpal tunnel syndrome, 61 click, 57 cursor, 52 cursor-movement key, 52 double-clicking, 57 drag and drop, 57 drag-and-drop editing, 57 dragging, 57 ergonomics, 60 function key. 51 insertion point 52 integrated pointing device. 9 keyboard buffer, 54 keyboard controller, 53 keyboarding, 50 mechanical mouse, 55 modifier key, 50 numeric keypad, 51 optical mouse, 55 pointer, 54 pointing, 56 pointing device. 54 repeat rate, 54 repetitive stress injury (RSI), 61 right-dicking, 57 trackpad, 59 TrackPoint 60 wheel mouse, 57 Interacting with Your Computer 65 Urheberrechtlich g esch u tztes M « | tLg §g @ 8 0 K ey Term Quiz :i Review Complete each statement by writing one of the terms listed under Key Terms in each blank. 1. In computer use, the skill of typing is often referred to as 2. IBM -com patible PCs have 10 or 1 2______________ keys. . 3. In many programs, an on-screen symbol called a(n )___________ or a(n )____________ shows you where you are in a document 4.A(n) is a temporary storage area that holds data until the CPU is ready for it. 5. In addition to pointing, the four primary mouse techniques are and___________ _ 6. You use a mouse (or one of its variants) to position a (n )_____ 7. In many Windows applications, you can open a shortcut menu by. on the screen. ______ the mouse. 8. Many laptop computers feature a small joystick between the c and k keys, which is called a(n) a(n )———-9. is the study of the way people work with tools. 10. _____ is a common type of repetitive stress injury among computer users. Multiple Choice is Circle the word or phrase that best completes each statement. 1.Some people claim that when computers can interpret handwriting and speech with 100 percent accuracy, this will become unnecessary. a. mice a. special-purpose keys b. typing b. function keys c. pointing device c. typing keys †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ – – layout. d. special-purpose keys d. alphanumeric keys d. QWERYT d. iadsmce 2. These keys make up the part of the keyboard that looks like a typewriter's keys, 3. The common keyboard arrangement is called the a. QWERTY b. QEWTYR 4. Which of the following is not a modifier key? a. shift b. cm c. ait 5. In most programs, you can press this key to get help, a. csc a. keyboard a. C C S b. r l b. keyboard buffer b. f1 c . alt c . keyboard controller C. SM CEBAR d . no d. keyboard CPU d.S O T U H RCT 6. When you press a key, this device notifies the system software, 7. In many Windows applications, you can use this key as an alternative to the right mouse button. c. QYWERT 66 Chapter 2 Urheberrechtlich geschutztes Material | 8. This type of mouse uses reflected light to measure its movements. c. mechanical a. optical b. laser 9. In a multi-button mouse, one button must be designated as the c. primary a. first b. left 10. You can__ a. point to a program's icon to launch the program. b. double-click C. right-click button. d. user d. drag Review d. wheel Review Questions :: In your own words, briefly answer the following questions. 1.Host standard keyboards include five major groups of keys. List them. 2. Why are most standard keyboards called â€Å"QWERTY† keyboard s? 3. What does the ctrl key do? 4. What is the purpose of the start key, which appears on many IBM-compatible keyboards? 5. What happens when you press a key on the computer's keyboard? 6. What is the purpose of the mouse pointer? 7. How does a mechanical mouse work? 8. Describe two benefits of using a mouse. 9. What does the term dragging mean and how do you do it? 10. Describe the cause and effect of carpal tunnel syndrome. Lesson Labs :: Complete the following exercises as directed by your instructor. 1. Test your typing skills in Notepad.Click the start button, point to All Programs, click Accessories, and then dick Notepad to open the Notepad text-editing program. Notepad opens in a window. Have a classmate time you as you type a paragraph of text. The paragraph should be at least five lines long and should make sense. (For example, you could type a paragraph of text from any page in this book. ) Do not stop to correct mistakes; keep typing until you are finished typing the se lection. 2. Inspect your system's mouse settings. (Do not change any settings without your instructor's permission. ) Use the following steps: a. Click the start button to open the Start menu; then click Control Panel.The Control Panel window opens. b. Double-dick the Mouse icon to open the Mouse Properties dialog box. Click the tabs in this dialog box and inspect your settings. c. Experiment with the Pointer Speed and Show Pointer Trails tools. How do they affect your mouse's performance. When you are finished, dick Cancel Interacting with Your Computer 67 M U R B Overview: O ptions for Every N eed a n d P referen c e Although the keyboard and the mouse arc the input dcviccs that people use most often, there are many other ways to input data into a com ­ puter. Sometimes the tool is simply a matter of choice. Some users jusr prefer the feel of a trackball over a mouse.In many cases, however, an ordinary input device may nor be the best choice. In a dusty factory or warehouse, for example, a standard keyboard or mouse can be dam* aged if it becomes clogged with dirt. Grocery checkout lines would slow down dramatically if cashiers had to manually input product codes and prices. In these environments, specialized input devices tolerate extreme conditions and reduce the risk of input errors. Alternative input devices are important parts of some specialpurpose computers. Tapping a handheld computer's scrccn with a pen is a much faster way to input commands than typing on a miniature key ­ board. On the other hand, a specialized device can give new purpose to a standard system.If you want to play action-packed games on your home PC, for example, you w ill have more fun if you use a joystick or game controller than a standard keyboard or mouse. This lesson examines several categories of alternative input devices and discusses the special uses of each. You may be surprised at how of ­ ten you see these devices, and yo