Wednesday, July 31, 2019
Ernest J. Gaines: a Lesson Before Dying Essay
After reading theâ⬠lesson before dying ââ¬Å"by Ernest J. Gaines the two characters that Really peeked my interest was Grant Wiggins and Tane Lou. These two are in relation by blood. this is very surprising being they are the total opposites when it comes to their characters. So I will be comparing these 2 characters. Tante Lou is the aunt of Grant and tante Lou are the total opposites of each other. Grant is so serious all the time and thereââ¬â¢s something on his mind constantly. But he chooses to just stay silent about whatever he is thinking or going through. Whereas Tante Lou is the opposite sheââ¬â¢s really free spirited. She takes him and really cares for him even through his flaws. Even through all his obstacles sheââ¬â¢s able to change him for the better. He becomes a hero in this story heââ¬â¢s the protagonist in this story. He comes off as being so arrogant and wants freedom, respect but doesnââ¬â¢t do anything about it. But however great aunt tante i s anything but shy she will step up. Sheââ¬â¢s a role model in his life and the black community. Her actions throughout the story show that she has a big heart that loves but also is bossy. She accepts grant for who he is but says hey donââ¬â¢t put your people down. Stand up and use that education your smart let people see that side of you make an impact. Tante Lou is a unique and beautiful person she finds the good things in life through anything. She has a strong belief in god and his good works. Grant goes to church and is religious as well but he seems lost. Heââ¬â¢s there but not really and needs direction. So these two characters kind of balance each other out. Grant carries himself as being protagonists throughout the story because he is the narrator in the story. He comes off as being arrogant because he feels that there is no hope for his community. Unlike the others he actually got away and went to college and earned a degree. He wants equality treatment and we see this without this he feels enslaved. Based on his personality he is quiet on the inside but has something to say. There is a part that of him that hasnââ¬â¢t really been exposed His demeanor is that he has used his formal education as a way of distinguishing himself from the others. The fact that he feels this way he doesnââ¬â¢t feel the need to try and make a change or impact at all for his people. Grant feels like nothing will ever change and that heââ¬â¢s an African american stuck in a white racist world. Grant was the only one to leave for a temporarily short period when he went to get a college education and that was rare for the newly freed slaves. Even after the emancipation and getting and education without the barriers they had before. He sticks around but has no reason to stay which is strange he feels enslaved even when he isnââ¬â¢t His overall demeanor is that he seems conflicted with himself and heââ¬â¢s looking for a fight to win. His moods vary depending on how he feels in the story he is very mysterious. He changes from being afraid when first helping Jefferson to being proud. Then when he is with Vivian and his aunt tante heââ¬â¢s kind and caring. When itââ¬â¢s just him heââ¬â¢s is very standoffish and he is very reserved. His character dresses just as his personality is he wears bow ties, white collared shirt and trousers and dress shoes. This is what he wears pretty when it comes to clothes. He wants to make a statement by dressing like this and who he is. Tante is the Aunt of Grant and all we have to go on is her remarks throughout the story. She has what grant lacks which is hope and resilience in this story. The facts that grant has a cynical branded of atheism makes her disapprove it. She is a very spiritual person and is highly motivated by god. Tante constantly is trying to see the good in people and change them for the better. She dresses respectably in society and insists on being chauffeured in the back seat to the pichots. This goes to show you that even though they were regarded as the lower and poor class she didnââ¬â¢t let that affect her. She regarded the way she dressed as the way of saying just because we donââ¬â¢t have money and education doesnââ¬â¢t make us different. She isnââ¬â¢t going to give in to the concept that blacks in the south are the bottom rung. Tante not only is a leader in the community but also in grants life. People look at her to step up and take action and she does by telling grant to be compassionate and helpful. She forces his hand to help Jefferson who was convicted of a crime which he never did. Her faith in god and good works makes her whats good especially for grant in every way. Although physically free, Grant lives in a mental prison of his own making created by his hatred of whites, his arrogance, and his detachment from the black community. As an educated man, he sees himself as superior to people like Jefferson and Rev. Instead of preparing him to contribute to his community, his formal education has taught him to despise his own people. Consequently, he uses his role as a teacher not to inspire and uplift his students but to humiliate and ridicule them, much as his own teacher. Matthew Antoine humiliated and ridiculed him. Thus, instead of using his skills and talents to change the cycle of poverty and violence, Grant perpetuates the cycle by failing to challenge the system.
Tuesday, July 30, 2019
My first impression
My first impression looking at your resume is that it has a lot of information that no one ever reads because of the presentation. Graphically, your resume is simply to gray. It needs more use of white space and better formatting to call attention to the highlights of your experience and your background. Next, I was struck by the use of the courtesy title ââ¬Å"Dr. â⬠in the opening information.If you are wanting to teach, this could be appropriate, but otherwise instead of emphasizing your educational background (which is a good thing) and your perseverance in earning a Ph. D. in business administration, it makes people think medical doctor. Forgoing the honorific and moving you education to a more prominent place in your resume may be advantageous. Additionally, I think your resume needs to be focused regarding the job that you are seeking. While your CDL and HVAC licensing is interesting, it left me wondering how it qualified you to run a business (I believe international ma nagement is the goal, right? )I like the idea of making this an executive level resume with a separation out of core competencies and key achievements, but I think this resume falls short for a few reasons: 1) There are a lot of buzz words with specifics to back them up. I like the 36% increase, but you should not for whom. 2) There is a lot of information in this resume and not a format that makes me want to keep reading it. We need to find a more appealing presentation.I would suggest considering a more curriculum vitae type format, replacing the academic experience section with management experience. The format is cleaner and provides employers with a greater image of you as their executive. Finally, and this is only because I live in southern Illinois, I noticed that the address is Indiana, but both the phone numbers listed have a 618 area code. Is that correct? Thank you for using our evaluation services. I hope this will aid you in your career development.
Monday, July 29, 2019
Nowadays, Food Has Become Easier to Prepare Essay
Nowadays, Food Has Become Easier to Prepare. Has This Change Improved the Way People Live? Use Specific Reasons and Examples to Support Your Answer. By annicat Man, through the ages, has undergone many changes, from a period when he hunted for his food to the present era when man is dependent on preprocessed foods. During this period not only has man changed his mode of eating but his whole lifestyle as well. In pursuit of more in this competitive world, man no longer has time as he once had. He is caught in a race against the clock. A person who finishes more n lesser time is considered more efficient. This pressure to do more in less time has affected his eating habits as well and, as a result, man no longer has time to cook food. Early manââ¬â¢s only objective was to seek food to sustain him and his family. Nowadays finding food has taken a back seat to other priorities, such as career and education. Food is no longer of that importance. This is not an encouraging trend. People are too dependent on preprocessed or precooked food, which no longer has the freshness it once had. Such foods loose their mineral and vitamin content and re not as healthy as fresh food. That is why the number of diseases is also rising. People have also shifted to high calorie content food like French fries, pizzas, and ice cream, etc. , which is causing obesity, fatigue, etc. As man is becoming busy and too involved in his busy schedule, he has no time even to take care of his own personal needs. Furthermore, cooking is an art which is dying out. People once enjoyed cooking . It was a means of eliminating stress and tension. People were once able to relax during this time and reflect on their lives. People may tend to argue that by sing precooked and preprocessed food they are efficiently using time and can use this precious time saved for other purposes. But is it really worth it? This is a question whose answer can invite much speculation about whether by saving this little time we are inviting lots of other problems, which could easily be avoided. It is actually making our lives not simpler but more complicated. We have lost many of the simpler things in our lives, like the simple acts of selecting our evening meal, preparing it, and enjoying it with our loved ones, and we are worse off for it.
Business Improvement and change Essay Example | Topics and Well Written Essays - 1500 words
Business Improvement and change - Essay Example In addition, my plan will also work to improve the skills set of the production executive in Nestle Malaysia since they will acquire necessary skills needed to help in solving the environmental constraints within the organization. Moreover, changes will also be noticed in the working culture of factory as the plan will work toward making it accommodate the various elements of change coming along its way (MANWANI, 2008, p.65). In the factory changes will be noticed on the diversity of the organizational culture as my plan will provide the organization with a system of assessing the impact of equality in different departments when handling organizational changes. At the rural factory, the changes that will be noticed will be between the frontline managers as my plan will provide them with a job security to assure them against the uncertainty of loosing their jobs while working for the organization. Also, there will be changes in frontline managers under this department as my plan will provide a system of work that will witness an increase in the production levels (PIPPIN, RONALD, 2009,p.374). Despite succeeding with my implementation plan, I will experience problems in alignment of resources of rural and urban factories since the rural workers may not readily accept my implementation plan to guide them. Secondly, I will also experience problems in trying to convince some of the best frontline managers in the urban centers to relocate to rural centers for equity. This is will be occasioned by the fact that most frontline managers in rural areas are not good as compared to the urban ones (REIFER, 2002). Implementation Approach I will approach the aspect of change within the organization using three interacting elements which are cultural modification, building capacity efforts and introducing infrastructures which are supportive, strengthening and long lasting. This will provide the needed leadership support which will be essential in formulating good values and no rms, resources and skills that will promote stakeholders involvement into the formulation of various departments and systems of the organization. In sum the approach will aim at improving innovativeness of the different programs used and incorporated within the organization to ensure productivity of the organization. Cultural transformation within the organization will assist the different managers present at the organization to promote research and change within the different departments or processes they are in charge. Building capacity efforts within the organization will assist in creating awareness between the different employees and managers available at the organization. This will clearly highlight the expectations and communication to help in achieving the goals and objectives within the organization. Use of infrastructures which are supportive will tremendously help the organization to achieve its production goals because it will provide the existing workers and managers of the organization with the required educational programs and expert resources needed in attaining productivity (FLORAC & CARLETON, 1999). The Implementation Plan Grouping activities within the organization has an added advantage to the productivity since it points to the various points where problems might
Sunday, July 28, 2019
MEN VERSUS WOMEN SPORTS COVERAGE AND POPULARITY Case Study
MEN VERSUS WOMEN SPORTS COVERAGE AND POPULARITY - Case Study Example This was about 13hours higher in comparison to the womenââ¬â¢s coverage. Men in most cases tend to perform extremely well in various games. This boosts the reporterââ¬â¢s morale towards covering most of menââ¬â¢s games. In the summer Olympics in 2008 as well as the preceding years, there emerged improved air time coverage with both men and women almost getting equal air time coverage. About 46.3% of airtime coverage went to women in this year, a decrease from the previous year 2004 when the coverage was 47.9%. Nevertheless, coverage of women sports events improved heavily towards the socially acceptable sports for women. The socially accepted sports are always attractive as these sports involve minimal clothing hence women can be easily displayed as physically attractive. These kind of sports, even though are highly ranked in the media coverage among the women are not morally acceptable in the media fraternity. This research paper explains the impact of media coverage in com parison to men and women sports coverage and popularity. Women who normally take part in sports that involve either power or hard body contact are more often unlikely to receive media coverage. This is due to the stereotypical assumptions involved with these kinds of feminine events thus there is reduced women sports coverage. ... The 2010 Olympics aptly inclined towards men coverage thus rendering it biased. Most of the winter sports by their nature generally provide women with fewer opportunities to capture various sports. The make-up of the spectators whom NBC normally targets to please provides a more complex narrative than mere pandering to male sports fans for the summer Olympics in 2008. Women spectators over 18years of age in the recent Olympic Games have lost the media coverage with only 49 per cent total viewers attending while the rest are women. This reduces the lively participation by the women in these games due to the feeling of being neglected by the fellow women spectators. This in turn reduces the women sports coverage popularity in womenââ¬â¢s sports participation fields. The sports world is almost entirely divided between menââ¬â¢s and womenââ¬â¢s groups. The menââ¬â¢s sport has nonetheless, always dominated all forms of broadcasting coverage despite the fact that women as well competes in those exact similar sports in an increasingly professional level. The sports coverage revolves around newspaper, broadcasting, news coverage, reports and internet articles in the media houses. In United States for example, womenââ¬â¢s sports receive a total of 1.65 of the total sports airtime on both the local, national and sports media giants such as ESPN. This is as well experienced in Australia media houses in relation to the popularity of menââ¬â¢s coverage in sports in relation to womenââ¬â¢s. In Australia the situation is even demeaning with womenââ¬â¢s sport coverage receiving only 9 per cent in relation to menââ¬â¢s coverage and airtime which is at 81 per cent. In the written press the numbers are always
Saturday, July 27, 2019
Compare and Contrast how these short novels deal with maturation theme Essay
Compare and Contrast how these short novels deal with maturation theme so common in fairy tales - Essay Example Darling recalls her childhood, the situation is reflected thus: ââ¬Å"but after thinking back into her childhood she just remembered a Peter Pan who was said to live with fairiesâ⬠¦Ã¢â¬ ¦.but now that she was married and full of sense she quite doubted whether there was any such personâ⬠(Chapter 1). ââ¬Å"Peter Panâ⬠is the short novel which gathers many themes. The three children, Wendy, John and Michael play the central role with ââ¬Å"Peter Panâ⬠who comes from the ââ¬Å"Neverlandâ⬠. They want to fly in the air ââ¬Å"Let's wake John and Michael," Wendy said. "You can teach us all to fly and then we will leave for Neverland!â⬠(Chapter 1) Peter Pan is the personified shape of their dream. ââ¬Å"Wendyâ⬠wants to be mature as is revealed in the Chapter 1: ââ¬Å"but henceforth Wendy knew that she must grow upâ⬠. A childââ¬â¢s dream is but to live in the wonderlands of fairies. They always reside inside the shells of dreams. They want to fly up in the air which tells of their hidden ambitions to attain glory and fame. Similarly Pinocchio is the dream which comes true of its carpenter when he dreams of him in the words: ââ¬Å"With it I intend to go around the world, to earn my crust of bread and cup of wineâ⬠(p4). The carpenter is the personification of an elderââ¬â¢s desire for his child. ... You hurt!" cried the same far-away little voiceâ⬠(p7). The continuous ill treatment makes the child ill tempered as the carpenter weeps over his troubles: ââ¬Å"I deserve it! he said to himself. I should have thought of this before I made him. Now it's too late!â⬠(p8) Consequently, the child in the shape of Pinocchio flew away and the father is left with all sorrows: ââ¬Å"Poor Geppetto ran after him but was unable to catch him, for Pinocchio ran in leaps and boundsâ⬠(p9). The novels seem here similar in tone. Pinocchio and the three children have the same feelings here. All are ambitious in heart. All want to attain heights but with different styles of expressions i.e. children in ââ¬Å"Peter Panâ⬠fly in the air while Pinocchio dances in celebration of his birth. The story of ââ¬Å"Peter Panâ⬠reflects the softer feelings of a child for a mother. Similarly the girlââ¬â¢s fantasy for motherhood is revealed when Wendy accepts the demand of the â⬠Å"lost boysâ⬠to become their mother. Though she informs them that she is just a little girl, she becomes persuaded and tells them the tales of Cinderella the whole night. She proved so affectionate that Tootles saw a mother in her being: ââ¬Å"They talked of Cinderella and Tootles was confident that his mother must have been very like herâ⬠(Ch, 5). Pinocchioââ¬â¢s short story has a theme of the destructive faction of the society. It tells the children that though a child may be able and disciplined enough in school, there are always chances of his leading astray. Pinocchio remains a competent student during his studies but he boasts of his wisdom when he is tipped off by a fellow: ââ¬Å"there is no such danger, answered the Marionette, shrugging his shoulders and pointing to his forehead as if to say, ââ¬ËI am too wiseââ¬â¢Ã¢â¬ (p109).
Friday, July 26, 2019
The May 6, 2010 Flash Crash Essay Example | Topics and Well Written Essays - 1250 words
The May 6, 2010 Flash Crash - Essay Example On the contrary, the contemporary market is characterized with higher demand as compared to the supply. Financial innovations enable changes in the financial market by introducing new ways of trading assets. One of the newest financial innovations entails trading from computer to computer through use of complex mathematical algorithms that are hard for humans to comprehend. The recent financial crisis resulted in increased unemployment, which is an indicator of the increased inefficiency of the stock market. This paper agrees with Stiglitz opinion that that Flash Crash will lead to less investment in information, which is harmful to the markets price discovery function hence the financial market. The paper will oppose the opinion that Flash Crash could be a positive feedback loop of the trading environment. Computer trading has become a common phenomenon, which has increased the speed of trading making it impossible for humans to intervene in times of occurrences such as flash crash. Additionally, the explosive trading speed results in undermined efficiency since the market becomes incapable of allocating resources efficiently. Flash Crash entail trading from computer to computer through use of pre-programmed algorithms. ... During the Flash Crash, a contract could be traded for more than 27,000 in a period of about 14 seconds (U.S. Commodity Futures Trading Commission & U.S. Securities & Exchange Commission, 2010; Stiglitz, 2012). According to the SEC report, computer generated algorithms, which are used for high frequency trading comprise more than 70% of trading in U.S. equities. On the SEC joint report on the flash crash of 6 May 2010, the American shares fell by 10% within a few minutes, which resulted in many questions regarding the credibility of nanosecond trading, which characterizes computer to computer trading. The computer based trading does not make use of price discovery but uses algorithms that makes it possible for dealers to extract information regarding expected price of securities through observing patterns of prices and trades. The dealers are thus incapable of making sound decisions. High frequency trading undermines the stability of the market. During the flash clash, high frequency trading firms started by absorbing sell pressure but eventually started forceful selling, which resulted in increased orders in the market and creation of feedback loop. Eventually, the high frequency trading firms began to buy and resell to each other e-mini contracts resulting in decreased net buying irrespective of the increased volume of e-mini contracts. Buyers using traditional trading methodologies refused to buy the extra E-minis resulting in the fall in trading funds. This was because dealers could not comprehend the transactions and feared taking risks. Therefore, computer based trading is inapplicable since there are no clear models on how it operates (Stiglitz, 2012; Mackenzie, 2006). High frequency trading resulted in liquidity crisis when automated trading systems
Thursday, July 25, 2019
Bowling for Columbine Essay Example | Topics and Well Written Essays - 500 words
Bowling for Columbine - Essay Example The possible conclusions of Moore adhere to a few criminological theories, among which the Classical and Rational Choice Theories can be considered the most convincing. The eclectic nature of Mooreââ¬â¢s arguments can also lead to the Integrated Theory. The basic argument of Moore is that the American community has a strange affinity towards gun crime, for which the easy accessibility of gun merely serves as an encouragement. In this sense, there are no sufficient deterrents for an average American citizen to be held back from possible crimes. The movie begins with the sequence of Moore acquiring a free gun for opening a time deposit for a specific sum in a Michigan bank. The argument by the Michigan Militia that guns vouchsafe the safety of the individual and family is shown as a reductive one, discounting the possibilities of increasing numbers of gun crimes in a society where everyone is entitled to possess a gun. Though there exists sufficient punishment as a deterrent in America, there is not enough awareness among the public regarding the use of the guns. Eventually, it is possible that the guns end up being I the hands of school kids, like Erik Harris and Dylan Klebold, who perpetrated the shocking massacres at Columbine school. Using the metaphor of an irresponsible game like bowling, Moore exposes the lack of proper concern and clear rules reading the possession and use of guns. In a culture where even teenagers can procure guns from supermarkets, one has to assume that the rational choice deterrence would be nonexistent. Even though Moore asserts that the easy availability of guns is not the only reason why the crime rates are shooting up, the lack of proper deterrents combined with this situation could definitely be a major reason. Integrated Theory can also provide significant explanations for the American gun crime rates. There could be several reasons for the use of violence, which basically stem from the use and misuse of
Wednesday, July 24, 2019
Individual or Issue Related to Africana Studies Essay
Individual or Issue Related to Africana Studies - Essay Example Similar to the arts of all individuals in the world, African art illustrate thought, attitudes, and values which are a result of African experiences in the past. Therefore, the study of African art gives an avenue for learning about the history of Africa. Through the study of African Art, individuals can find answers to the questions which have been engrossing the continent for long. Nonetheless, it is not only African art that can assist people get information on the past of Africa. Other elements, for example, lifestyle and stage of African development can also assist people gain additional information on the status of Africa in the globe. As individuals search information on Africa and its past, they must also take into consideration how Western view of racial and race differences has had an impact on views of the African history (Said 8). This paper will look at the impact of slavery and the slave trade era on the development of Africa. The ideas of race and racial differences ha ve always assumed, black people are inferior compared to their white counterparts. This notion begun in Western regions as the people from these regions attempted to rationalize their enslavement of Africans and the consequent colonization of the African continent. Historians and other professional studying African issues have now established that views of racial inadequacy have led to the conviction that African people in the past existed in a condition of primitive barbarism (Said 11). In addition, these professionals have also recognized that a large number of European works on the past of Africa, for example, stories by 19thcentury travelers and missionaries are stained by the similar view points of African inadequacy. This recognition has made historian and other experts studying the past of Africa to search for different sources of information that is less or not inspired by European or foreign concern with racial disparity. These different resources comprise oral traditions f ound in Africa, works by Africans, the physical evidence unearthed by archeologists, African art, and structures and vocabularies of the African language. These different sources, unlike European or foreign sources, will assist individuals comprehend the history of Africa from the African point of view.
Dementia and Antipsychotic Drugs Assignment Example | Topics and Well Written Essays - 2000 words
Dementia and Antipsychotic Drugs - Assignment Example A review of literature on the use of antipsychotic drugs reveals a high prevalence of the said factor in the United States. When cases of dementia are diagnosed, the physician has to first eliminate other treatment options for the symptoms before antipsychotic drugs are prescribed. However, for some symptoms such as restlessness and aggression, it has been noted that nursing home providers decide to apply antipsychotic medication to calm the patients without considering other forms of treatment. Estimates indicate that many physicians use antipsychotic drugs with dementia patients as a first resort without considering other non-drug ways of managing the symptoms. One of the main concerns that research shows is that there are cases of overprescriptions in nursing homes ââ¬â a fact that can be attributed to the symptomatic behavior of the patients. With the new policy on the use of antipsychotic drug to manage dementia patients, the number of patients prescribed with antipsychotic medication to manage their symptoms is expected to reduce significantly. Snowden, Sato and Roy-Byrne (2003) indicate that the training and education accorded to health and nursing home providers will be effective in reducing cases of improper prescriptions of antipsychotic drugs to dementia patients. Furthermore, it can be shown that the claims from Medicare for antipsychotic drugs, especially atypical drugs, have been on the increase, and close investigation revealed that the claims were not warranted.
Tuesday, July 23, 2019
Philosophy of Life Essay Example | Topics and Well Written Essays - 1500 words
Philosophy of Life - Essay Example Throughout my whole life the sense of family has been a value instilled in me by my grandparents and parents. They have always have stressed the importance of spending time together as a family, so growing up, family has just been a part of the person I was slowly becoming. Every Sunday after church,our family tradition has always been to have my fatherââ¬â¢s side of the family to get together for breakfast. It is something that is always the same, we have the main dish of cheesy eggs with toast, and everyone is responsible for bringing a side dish to go with the main meal. My grandparentââ¬â¢s house is filled with the chattering and laughing of everyone updating one another on how their week has gone. The men sit in the family room discussing farming, sports, or weather. While the women gather in the kitchen filling each other in on the latest gossip or upcoming events in our town. Then there is the chaos of the grandkids and great grandkids running around and screaming as the y play various games together. My grandma has always insisted it was something we had to do. She wanted us all to know what was going on in each others lives and not lose track of the importance of family, regardless of our busy schedules. It is a tradition that we have continued even after she left us for the higher plain. We continue the tradition knowing that she would have wanted us to do so. Now that I am older and in college I realize I miss being able to go see my family every Sunday and look forward to it when I come home. Even though family has always been something I valued, now that I am further away and unable to see them as often, I have developed an even stronger appreciation for the significance of spending time together as a family. Honesty is another value that has been influenced and expected of me by my family as I was growing up. From the time I was achild my parents always promoted the importance of honesty, and demonstrated it to us by being good examples to fo llow. Throughout my rebellious high school years, my freshman and sophomore years, was when I truly implemented honesty as one of my own values that I found imperative to uphold and not just something that was expected of me. During my rebellious years I would defy my parents and make up lies about where I was truly going. In most of the cases it ended up getting me into more trouble than if I would have told them honestly where I was going right away. After countless times of my parents figuring out I had lied and punishing me for my deviance, I finally realized it was easier to be honest. Telling them where I was going and what I would be doing allowed us to develop a sense of trust , openness, and an earnest relationship with one another that I value to this very day. The trusted me more, and to my surprise they actually approved of the events I thought they would prevent me from attending. Now honesty is something I believe to have great worth and feel as though I have more resp ect for myself as a result of incorporating honesty into my value system. Teamwork is another value very important to me. I developed teamwork early on in my childhood and have continued to build on it from playing sports. During elementary school I participated in both basketball and little league softball. Starting out learning all the basic rules and skills of the sport was a challenge. Then by actually playing the game it became critical to work together
Monday, July 22, 2019
Physics Lab Safety Booklet Example Essay Example for Free
Physics Lab Safety Booklet Example Essay Why Is Laboratory Safety Important? Lab Safety is important because a safe work space, is a productive work space. When everyone follows all rules and regulations the assignment will get done and no one will be hurt. Some of the chemicals and substances can be harmful if used incorrectly, so there all certain ways we protect ourselves. Lab Safety Symbols This is the fire symbol, it means something is flammable. So keep it away from flames or it will catch on fire. This symbol is for toxic or poisonous chemicals. Safety procedures are to protect you and others also in the lab. Safety Symbols continued The symbol below means that a chemical or substance is corrosive, which means that is can cause visible disintegration of human tissue or any other substances or materials it may come in contact with. These two symbols mean that a substance or a chemical have dangerous fumes. Those fumes will harm you if inhaled. These three symbols are the different types of radioactive symbols you might see. Radioactive waste can harm both humans and the environment, so handle with care. Lab Safety Equipment These are goggles, they are use to protect the eyes. Gloves (below) are used to protect the hands. ï ¿ ¼Safety Equipment cont. This is a lab apron. It is used to protect the clothing from spills, chemicals or substances that might go through the clothes and damage skin. ï ¿ ¼ Measuring Instruments This is a triple beam balance. It measures mass in grams. This is a graduated cylinder, it measures volume in milliliters. This is a ruler, it measures length in both centimeters and inches. ï ¿ ¼Safety Rules This is a fire blanket, it is used when a persons hair or article of clothing catches fire. This is a safety shower with an eye wash station built in. If you ever get anything in your eyes, go swiftly over to the eye wash station , turn in on and hold open your eyelids and let keep using it for 15 to 20 minutes.
Sunday, July 21, 2019
The Role Of Cryptography In Network Security Computer Science Essay
The Role Of Cryptography In Network Security Computer Science Essay Network security is concerned with the protection of network resources against alteration, destruction and unauthorized use, cryptography and encryption are most critical components of network security. In my assignment, as a network security manager, I will try to research explore the performance of various cryptographic schemes and evaluate web security and the security of wireless network system. Networks take all kind of sensitive data and security play a vital role of any wireless network system. Security certify level of data integrity and data confidentiality as maintain wired network, without accurately implement security measures and wireless network adapter come within range of the network adapter. Security is high lack, laziness, and lack of knowledge and employee are not aware of these things, especially in small organisation and home, every organisation need to aware and training for employees time to time. Cryptology has two components, kryptos and logos. Cryptographic methods to certify the safety and security of communication and main goal is user authentication, data authentication such as integrity and authentication, non-repudiation of origin, and confidentiality and it has two functions encryption and decryption. In my research, as a network security manager, I will analyze cryptography, web security, and security of wireless network system to implement the network security strategies for the organisation in future. 1. Explore and explain different types of cryptography and assess the role of cryptography in network security. Cryptography has different methods for taking clear, readable data, and converts into unreadable data of secure communication and also transforms it back. Cryptography is also used to authenticate identify of message source and certify integrity of it. Cipher send message and use secret code. The cipher scrambles the message so that it cannot be understood by anyone other than the sender and receiver. Only the receiver who has the secret code can decipher the original message, thus ensuring confidentiality. (Citrix-system, 2010) Type of cryptography Following three common types of cryptography as below: Secret key cryptography is identified as symmetric key cryptography. Both sender and receiver know same secret code described the key and messages are encrypted by the sender and use key, decrypted by the receiver. It use single key for both encryption and decryption. This method works healthy if you are communicating with only a limited number of people, but it becomes impractical to exchange secret keys with large numbers of people. Secret key cryptography use is such as data encryption standard, advance encryption standard, Cast-128/256, international data encryption algorithm, and rivest ciphers etc. (Citrix-system, 2010) Public key cryptography is called asymmetric encryption and use couple of keys one for encryption and another for decryption. Key work in pairs of coordination public and private keys. Public key can freely distributed the private key. If senders and receivers dont have to communicate keys openly, they can give private key to communication confidentially. Public key cryptography use for key exchange and digital signatures such as RSA, digital signature algorithm, public-key cryptography standard etc. Hash functions use a mathematical transformation to permanently encrypt information. It also called message digests and one way encryption. Hash function use to provide a digital fingerprint of file contents and it is commonly employed by many operating system to encrypt passwords and it provide measure of the integrity of a file. It is also use message digest, secure hash algorithm, RIPEMD etc. (Kessler, G,2010) The role of cryptography Many feature combine to throw network security to the top issues in the organisation and face IS professional daily. Nowadays business operation decentralization and correspondence growth of computer network is the number one driver of concern about the network security. As far as security concern, many organisation networks are accidently waiting to occur, such accident will occur is impossible to predict but security breaches will occur. When organisation network security chooses is 100% involve cryptography technology. The following five basic uses of cryptography in network security solution are: Confidentiality Cryptography gives confidentiality through changing or hiding a message and protects confidential data from unauthorized access and use cryptographic key techniques to critically protect data; Access control Only authorized users (login password) can access to protect confidential data etc. Access would be possible for those individual that had access to the correct cryptographic keys; (Mitchell, M, 1995) Integrity Cryptographic tools give integrity verify that permit a recipient to authenticate that message transformed and cannot prevent a message from being transformed but effective to identify either planned and unplanned change of the message; Authentication is the ability to verify who sent a message. It done through the control key because those with access to the key are able to encrypt a message. Cryptographic function use different methods to certify that message is not changed or altered. These hash functions, digital signatures and message authentication codes. 2. Explore encryption for network security. Encryption for network security Encryption is the most effective method to reduce data loss or theft to encrypt the data on the network security. Encryption is a process of network security to apply crypto services at the network transfer layer on top of the data link level and under the application level. Network encryption other name network layer or network level encryption. The network transfer layers are layers 2 and 4 of the open systems interconnections (OSI) is the reference model, the layers responsible for connectivity and routing between two end points. Using the existing network services and application software, network encryption is invisible to the end user and operates independently of any other encryption processes used. Data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts. Encryption for network security execute through internet protocol security and set of open internet engineering task force (IETF) standard and apply in combination and build structure for confidential communication over IP networks. Internet protocol security works through the network architecture and encrypted packets show to be the same to unencrypted packets and rout through any IP network easily. Network encryption product and services provide several companies such as Cisco, Oracle etc. (Search security, 2010) http://www.cipheroptics.com/images/network-encryption-big.jpg Figure 1 Network Encrypted 3. Critically review the key and password management in terms of network system security. The key management Information become essential assets and protects it and availability is vital for business success. Encryption is the technology for doing so and become significant part of network system security. Encryption key is very helpful to secure data and information. There are two types of key public and private key use to secure the information and network. These key used in cryptographic system as below: Public Key it was invented in 1976 and refer to cypher architecture type and apply two key pairs is encrypt and decrypt. It can use to encrypt message and corresponding private key to decrypt it. Public key encryption believe extremely secure because it does not need secret shared key among the sender and receiver. It is helpful for keeping private emails and stored on mail servers for many years. It programs such as PGP has digital signature ability built message sent can digitally signed. Private Key it also called secret key and encryption/decryption key to exchange secret messages and shared by the communicators so that each can encrypt and decrypt messages. Public key uses with private key together. (Search-security 2010) Password management Password is the most important aspect to login into the system and the network. Organisation should allow only authorised users to access to the network and every user access individual login and passwords to enter the network, its result increase the security aspects. There are following necessary things to secure password in the network system as below: Long Password every user need to long password because short password can very quickly compromised and analyse the permutation based on the password length; Change password anytime employee should change password regularly, nobody assume easily and helpful for security breaches of the network; Avoid utilize similar password dont use the same password for different accounts because it would naive for administrator to think and employee should use different password for safety and security for network system; Necessity to changing password regularly employees also gradually more access their work accounts from remote location, user need to educate/awareness on the required of altering the password frequently. (Storts, J, 2010) 4. Compare symmetric and asymmetric encryption systems and their vulnerability to attack. Symmetric encryption systems and their vulnerability Symmetric encryption system use same secret key is used to encrypt and decrypt information and transform between two keys. Secret key concern to information to transform the content because both can use encrypts and decrypts traffic. Symmetric encryption system has two types are: Stream ciphers it is bits of information one at a time and operates on 1 bit of data at a time. It is faster and smaller to implement and have an important security gap. Certain types of attacks may cause the information to be revealed; Block ciphers it is encrypts information by breaking it down into blocks and encrypt data in each block and this data is fixed sized commonly 64 bit and mostly use in triple DES and AES. (Encryptionanddecryption, 2010) Symmetric encryption algorithms including Des, 3DES, AES, and RC4 etc. 3DES and AES are normally used in IP sec and other types of VPNs. RC4 is used on wireless networks and used by WEP and WPA for encryption. Symmetric encryption algorithms can be extremely fast, and their relatively low complexity allows for easy implementation in hardware. However, they require that all hosts participating in the encryption have already been configured with the secret key through some external means. (Stretch, J, 2010) Symmetric Encryption Vulnerabilities are: To break symmetric encryption system through brute force and cryptanalysis; Figure-2 Symmetric encryption system Weak password can break symmetric encryption systems; Password always keep in mind or make a backup copy of the password; Exchange secret keys in secure manner and stored properly. (Encryptionanddecryption, 2010) To leaking and spying out password. symmetric_encryption.png Asymmetric encryption systems and their vulnerability Asymmetric encryption system use two keys one for encryption use for public, anyone can encrypt a message and another for decryption use for private and only receiver can decrypt a message, normally set up a key pair within a network and involve in six main elements are: Plaintext Text message applied in algorithm; Encryption algorithm it performs mathematical operation to conduct substitutions and transform to the plaintext; Public and Private keys the keys pair where one use for encryption and other decryption; Ciphertext produce encrypt message by applying algorithm to plaintext message through using key; Decryption Algorithm generates ciphertext and match key to produce the plaintext. (Encryptionanddecryption, 2010) Most common asymmetric encryption is RSA and if compare with symmetric encryption it is much slower but its capability to establish secure channel over a non-secure medium such as internet. This is accomplished by the exchange of public keys, which can only be used to encrypt data. The complementary private key, which is never shared, is used to decrypt. (Stretch, J, 2010) asymmetric_encryption.png Asymmetric Encryption Vulnerabilities are: Figure-3 Asymmetric encryption systemPublic key can be distributed freely; It is computing intensive; It process very slowly; Weak password can easily steal; Weak encryption to break this system; Crash digital signature; Security breach at the time of key exchange. 5. Explain and critically assess web security and critically list down different type web security tools and technologies. Web security Web is very vital role in our daily life such as online searching, surfing, customers, vendors, co-staffs, email, etc but need to be web security and identity theft protection. Web security has many problems like spam, viruses, security breaches theft etc. This problem with web security is the part of network of attack computers and servers send out spam messages without knowing it and email / passwords produce and re-sale to competitor. In my research, security expert says that shows you how to do something in five minutes and conveniently neglect to mention the security implications of their advice. If it sounds too easy to be true, it probably is. A perfect example of this is PHP solutions that use a file for data storage and ask you to make it writable to the world. This is easy to implement, but it means that any spammer can write to this file. (Heilmann, 2010) Web security has many risk and attacks such as IP address identify the computer, Fixed IP address is larger security risk, share network, staff unaware security leak in the network setting, SQL injection attacks, exploits browsers and websites, remote file inclusion (RFI), phishing etc. (Heilmann, 2010) Web Security Tools and Technologies The following list down of different type of web security tools and technologies as below: Spike Proxy It is a professional grade tool for looking for application level vulnerabilities in web application and cover SQL injection and cross-site-scripting; Power fuzzer It capable of spidering website and identifying inputs and common web vulnerabilities such as XSS, SQL injection and support https. Written in python; Sec point penetrator It network security tools based, penetration testing appliance or web based service give vulnerability scan pen testing and can change IP address to scan and report; Net sparker It allows users to exploit the identified vulnerabilities and see real impact of the problem. It capable false positive free, handling of websites that rely on AJAX and JavaScript; OWASP It uses multiple techniques such as conditional errors injection, blind injection based on integers, strings/statements, MS-SQL verbose error message and identify database version and gather information Gama Sec It is automated online website vulnerability assessment delivers test to web servers, web based application and web-interfaced system and support HTTP authentication schemes, HTTP protocol, BASIC etc; NIkto Scanner Open source web server scanner and perform complete tests against web servers for multiple items, dangerous files, CGIs, and problems of the server; Perimeter check it analyze external network devices such as servers, websites, firewalls, routers and security vulnerabilities and also lead to interrupted service, data theft, system destruction and help immediately remedy security problem. (Hower, R, 2010) . 6. Identify vulnerabilities and mis-configurations in wireless networks. Vulnerability and mis-configuration describe as some event that exposes organisation and network security has ability to work efficiently its required confidentiality level and protects lack of the systems. Wireless networks vulnerabilities Some of the following common wireless networks vulnerabilities as below: No set physical boundaries wireless access points can lose signals, due to doors, walls, floors, and insulation etc; Untrained users setting up unauthorized networks and workstation untrained users who either are uninformed and therefore unaware of security measures that must be taken when deploying wireless, or whose desire to have wireless is so strong that it completely overshadows the rules set by the organization to ensure that systems are secure. (Lane, H, 2005) Rogue access points this attack consist of connecting illegal access point on the network; Lack of monitoring every organisation has some loopholes in monitoring but intrusion detection tools can use continuously monitor to secure the network system; MAC address filtering it is unique number assigned and wireless LANs allows access point to connect to network. Filtering can result in security breach as user change MAC address, it result identity theft; Insufficient encryption standards weak encryption standard say that users will not enable it and harmful to wireless LAN as weak encryption; Easy to eavesdrop wireless use airwaves to listen easy on network traffic or connect to network and it results the data is encrypted with strong encryption. If WEP encryption use, hackers can some attempt to decrypt the information; Unsecure holes in network hacker can enter wireless LAN by circumventing firewalls and allow other to come, as a result confidential data lost or may compromise on the network; Denial-of-service attacks external causes based is Denial-of-service attacks and make network unproductive and forcefully user to disconnect continually disrupting operation in the organisation such as jamming (jam a radio network), rush access (overload network with malicious connection), spoofed de-authentication frames etc. (Lane, H, 2005) Wireless network mis-configuration Mis-matched software and hardware it is problem arises for network infrastructure that is vulnerable to wide range of attacks. Sometime function work properly but awfully mis-configured; Service Set ID (SSID) SSID is a configurable identification mechanism to enables a client to communicate with the correct base-station. Configured properly with SSID otherwise attacker can exploit the SSID in attempt to access base station and change SSID password and change 802.11 security settings for authentication. (Spam-laws, 2009) 7. Demonstrate how to keep wireless network system safe. Nowadays, wireless network become more common called Wi-Fi /802.11 and allow computer to connect to another without cables and using computer easier and more convenient than ever before with fast internet connection and wireless router and surf internet, data transfer, print documents, email, download information etc but unhappily, it also make easy for outsider/hacker to do the same. Organisation should following points to keep wireless network system safe and secure as below: Keep-out undesirable wireless guests wireless network restrict access through encryption is easy through which encoding or scrambling information to receive and send, only those can access with right password or encryption key and restrict wireless network to normal office hours. Some encryption protect wireless network such as wired equivalent protection (WEP), Wi-Fi protected access (WPA), WPA2 etc; Choose strong password in my research, I found some basic guideline when create a wireless network password is Password should be longer (20 characters) it takes someone to figure it out; Use mixture lowercase and uppercase letters; Insert numbers in between letters; Change password every 3 months; Write password down and keep in safe (in case of forget). Use the firewall it is front security and secures network, computers and data from snooping eyes; (Bryan, S, 2010) Dont show the name of the network (SSID); Change default SSID, dont use name to identify the organisation; Use MAC filtering because each network card is unique code known MAC address and access points to restrict access to assured; Switch on and use built-in encryption to prevent eavesdrop; Restrict user ability (network administrators) to setup quick and dirty wireless network, even temporarily. One rogue access point can undo all the good work you do on the others; Certify all security measures are in place, it result defence against intruders; (Microsoft, 2010) Turn off the wireless network when it isnt use; Hide/keep safe place confidential files/data. Conclusion I conclude that security of wireless network system play key role in every organisation and also implement all network security strategies for the organisation in present and future and secure network resources against alteration, destruction, and unauthorized use. Cryptography tools and web security tools are also very helpful to secure the network system and protect IT assets, confidential data and information. Recommendation I recommend some of the important points as below: Better education and stronger security implementation; Wireless network awareness and training for employees timely; Update wireless network security timely; Certify to secure wireless access point with a strong password; When it need implement WEP authentication method; Make sure all users have proper key or password configured on their system; Make sure all service provide to users are protected by end to end encryption; Use SSID, MAC address filtering allows to configure wireless APs.
Saturday, July 20, 2019
Sense of Community Among University Students | Research
Sense of Community Among University Students | Research The study is primarily aimed at identifying level of sense of community among students who enrolled in the psychology and social work programmes at Universiti Malaysia Sabah, Kota Kinabalu. It was also carried out to investigate whether there were relationships between a sense of community and altruistic behaviour, academic achievement, age, and students involvement in club or organizational activities. One hundred and fifty one students participated in this study. A questionnaire that comprised of three sections was adapted and further developed to measure the schools sense of community, altruistic behaviour scale, and demographic background of the sample. In this study, membership, influence, integration and fulfillment of needs, and shared emotional connection as proposed by McMillan and Chavis (1986) are the subscales for the measurement of sense of community. Rushtons (1981) Self-Report Altruism Scale (SRAS) was used to measure altruistic behaviour. Furthermore, the study attemp ted to compare the level of sense of community between programmes, gender, ethnicity, and year of study. Age was the only variable found to be correlated with a sense of community. There was no difference found between any of those variables studied. INTRODUCTION The aim of this research was to analyse the university students sense of community, or their perception towards their school community, which focused on issues pertaining to how much the students perceive the bond between them and the school and its surroundings. Further, the study aimed at identifying whether or not their perception correlated with altruistic behaviour. The concept of a sense of community as popularly cited in the literature stemmed from Saransons (1974) idea concerning the perception of similarity to others, an acknowledged interdependence with others, a willingness to maintain this interdependence by giving to or doing for others what one expects from them, the feeling that one is part of a larger dependable and stable structure. Saranson (p. 157) further adds that the psychological sense of community is one of the major basis of self-definition. Charvat (2004) states that a sense of community is a complex phenomenon because of the fact that the definitions vary from one individual to the next, and from time to time. For example, the Child Development Project at the Development Studies Center in Oakland has defined a sense of community as the students experience of being a valued influential member of a group committed to everyones growth and welfare (Schaps, 1998). This concept has been expanded into theories. Among them, McMilla n and Chaviss (1986) is so far the most prominent and have been applied by most researchers. McMillan and Chavis (1986) define a sense of community as: . . . a feeling of belonging, a feeling that members matter to one another and to the group, and a shared faith that members needs will be met through their commitment to be together . . . (in Dalton et al., 2001, p.193) McMillan and Chavis (1986) proposed that a sense of community is comprised of four elements: membership, influence, integration and fulfillment of needs, and shared emotional connection. Further explanations on each element are as follows: Membership There are five attributes in the dimension of membership, i.e., boundaries, emotional safety, sense of belonging and identification with the community, common symbol system, and personal investment. Boundaries refer to the necessity of defining the qualities, such as members way of dressing, language, and rituals, and even shared goals, that include and exclude non-members. Hence, boundaries are not necessarily clearly or obscurely marked, but the definition can be loose or rigid depending on the communitys need to protect its intimate social connection (Wright, 2004). Emotional safety refers to the feelings of security which may involve self-disclosure and group acceptance (Dalton et al., 2001). A sense of belonging and identification with the community looks at the acceptance of being a member of the community. A common symbol system helps to define or indicate membership boundaries and to strengthen the sense of integration among members that could be physically identified or seen , such as wearing the same logo-printed shirts. A symbol is very significant to a community as Nisbet and Perrin (1977, p. 47) quote, . . . the symbol is the beginning of the social world . . ., which carries the identity of the particular group. Meanwhile, personal investment relates to the long-term commitment to a community, such as devotion of time to activities run by the alumni of a varsity. Influence According to McMillan and Chavis (1986), influence refers to mutuality of influence in group. This is explained by the bi-directional relationships in a community, whereby members of a group must feel empowered to have influence over what a group does, and group cohesiveness depends upon the group having some influence over its members (Wright, 2004). However, those who obviously try to dominate the group are often isolated, and the more cohesive the group is, the greater is its pressure for conformity. Integration and fulfillment of needs McMillan and Chavis (1986) explain this dimension in two related concepts: shared values and satisfying of needs, and exchange of resources. Members share values which tend to facilitate their interactions and their ability to meet each others needs simultaneously (Charvat, 2004). Needs are not only understood as survival and the likes, but also include what is desired and valued in a particular community (Dalton et al., 2001). Shared emotional connection This element is also explained by the existence of a spiritual bond that is based on a shared history among members of the community which could be in the form of behaviour, speech, or any other cues that may not be related to behaviour. McMillan and Chavis (1986, p. 14) summarised shared emotional connection as, the definitive element for the true community. Past studies have shown that having a sense of community has brought several positive outcomes, especially to the community members involved. Positive subjective perception of well-being and participatory problem-solving are among the positive outcomes (Davidson Cotter, 1993; Chavis Wandersman, 1990). Empirical studies on a schools sense of community have brought significant impact to students academic achievement and social development (Charvat, 2004). The students experience of school as a community was found to be associated with prosocial behaviors, including concern for others, altruistic behaviour, and positive interpersonal behaviour, as well as democratic values, skill, and desire, and achievement motivation (Battistich, 2001; Schaps Lewis, 1999). From a review of 15 years of research in elementary schools, Charvat (2004) found positive correlations between a schools sense of community and good outcomes for both students and teachers. He added that students who feel a strong school sense of community tend to have more positive attitudes towards school and learning higher educational aspirations, greater trust in and respect for teachers, more prosocial attitude and better social skills. This is also related to teacher attitudes and the perception of school climate. These findings were similar to that of Solomon et al.s (2000) which suggested that teacher practices that emphasizes prosocial values, elicitation of student thinking and expression of ideas, encouragement of cooperation, warmth and supportiveness, and reduced use of extrinsic control, were related to student classroom behaviour. Such behaviour includes engagement, influence, and positive behaviour, which, in turn, were related to students sense of community (see also Schulte et al., 2003). Research on a sense of community has also been expanded to include a broad range of demographic characteristics. It was reported that a schools sense of community was associated with those who live in the campus, among students in private schools, those out of state, seniors, and females (Lounsbury DeNeui, 1995). Other findings reported that the people who came from small-sized campus and suburban area feel a stronger sense of community. In a more recent study, Fraering and Minor (2006) for example, have found that there was a positive relationship between age and a perceived sense of community among customers of financial services firms, and men perceive a greater sense of community than women. Research addressing such issues on a sense of community in Malaysia is still at its infancy. Measuring unity among ethnic groups in Malaysia and efforts in building up as well as promoting national identity perhaps are among studies that the authors can recall to have some connections to the study of sense of community. Looking at how important a sense of community can be in promoting students well being and development, prompted the undertaking of this research project. For a start, the authors use the sample from their school. Objectives of Research To identify the sense of community by various socio-demographic background. To identify the correlation between frequency of students involvement in clubs or organization run at school level such as academic achievement, age, and altruistic behaviour. Hypotheses 1. There is significant difference between sense of community with ethnic group, type of programme, and years of study. 2. There is significant relationship between sense of community with age group, involvement in school, academic achievement, and altruistic behaviour. METHODOLOGY Subjects One hundred and fifty one students from the School of Psychology and Social Work participated in the study. They were picked at random from each programme that comprised of 52 juniors, 61 sophomores, and 38 seniors. Design, Tools, and Measurement The study was designed in survey form. A set of questionnaires comprising of 3 sections was developed and adapted from original sources. Section A measures socio-demographic variables, Section B measures Sense of Community Scale (SOCS) which was adapted from McMillan and Chavis (1986). There are four subscales measured in SOCS as proposed by McMillan and Chavis (1986). While to measure altruistic behaviour in Section C, Rushtons (1981) Self-Report Altruism Scale (SRAS) was used. For SOCS, 40 items were developed, while SRAS contained 20 items. Both scales were measured through a four- and five-point Likert scales. Cronbach Alpha for both scales ranged between 0.82 and 0.89, indicating that they were highly reliable to be used in the context of this study. In terms of validity, subscales of SOCS significantly correlate to one another and to the whole scale. As for SRAS, it was used before by local researchers in a similar context of this study, and it was found to be valid. Procedure Questionnaires were administered to the subjects who were picked randomly from each programme with the help of fellow lecturers. They were allowed 15 to 20 minutes to answer the questionnaires. Data analysis To test the hypotheses, data were then analysed by one-way ANOVA and Pearsons correlation. Descriptive statistics were applied to see the distribution of the sample. RESULTS Background of sample Descriptive analyses indicated 67 males and 84 females participated in the study that comprised of 34.4 percent of first year students, 40.4 percent second year students, and 25.2 percent third year students. A total of 23.2 percent of them enrolled in the programme for Youth and Community Development, 20.5 percent in Industry and Organizational Psychology, 13.9 percent in Counseling Psychology, 19.2 percent in Child and Family Psychology, and 23.2 percent in Social Work Programme. The mean age of the subjects was 22.01 years. More than 60 percent identified themselves as Malay, 9.9 percent Chinese, 11.9 percent Kadazandusun, 4.6 percent Bajau and Pribumi of Sarawak respectively, and others, 5.3 percent. More than half of the subjects were members of clubs and organizations that were based in the campus, with about 40 percent holding position as committee members of the organizations or clubs. Almost 80 percent have been involved at least two times in activities run by the School. Mo st of the students stayed in hostels in the campus. In terms of academic achievement, the subjects can be categorized into three groups. A total of 22 percent are high achievers (with CGPA score of 3.00 and above), 57.3 percent moderate, and 20.7 percent low achievers. The mean score of SOCS was 120.09, indicating the subjects were in the category of moderately high. Table 1 presents some of the socio-demographic data of the samples. Hypotheses Testing Results The Pearson product moment correlation analyses showed no significant inter-correlation between a sense of community, altruism, involvement in school or programme activities, and academic achievement. Age was the only variable correlated significantly with a sense of community (r = 0.23, p Meanwhile, further analyses showed that there were no differences in the sense of community according to students year of study, type of programme, and ethnicity. Table 3 summarises the result of one-way ANOVA, while t-test analyses indicated that female and male subjects did not differ in a sense of community. Table 1: Socio-demographic background of the subjects __________________________________________________________________ Variables N % ______________________________________________________________________ Gender Male 67 44.4 Female 84 55.6 Ethnicity Malay 95 62.9 Chinese 12 7.9 Kadazandusun 18 11.9 Bajau 7 4.6 Pribumi of Sarawak 4 2.6 India 7 4.6 Others 8 5.3 Types of programme Youth and Community Development 35 23.2 Industry and Organisation Psychology 31 20.5 Counseling Psychology 21 13.9 Child and Family Psychology 29 19.2 Social Work 35 23.2 Year of study 1 52 34.4 2 61 40.4 3 38 25.2 ______________________________________________________________________ Table 2: Correlation results between academic achievement, year of study, age, and involvement in school or programme activities, altruism, and sense of community ______________________________________________________________________ Sense of community (r value) __________________________________________________________ Altruism à ¢Ãâ ââ¬â¢ .08 Academic achievement .14 Age 0.23* Involvement in school activities 0.10 ______________________________________________________________________ *p Table 3: Mean differences in sense of community in terms of ethnicity, types of programme, and year of study ______________________________________________________________________ Variables Sum of Squares Mean of Square df F Sig. ______________________________________________________________________ Ethnicity Between group 2520.82 420.14 6 0.51 0.80 Within group 95723.20 818.15 117 Types of programme Between group 699.40 174.85 4 1.23 0.30 Within group 15059.52 142.07 106 Year of study Between group 703.26 351.63 2 2.52 0.09 Within group 15055.66 139.40 108 ______________________________________________________________________ DISCUSSION The findings showed that there was no difference in the sense of community between year of study, ethnicity, and type of programme. It was also found that students involvement in clubs or organizations, academic achievement, and altruism did not correlate with a sense of community. These results contradicted previous findings. The mean for SOCS was in moderately high group, suggesting that it was not strong enough to have connections to other possible phenomena, such as in this case, the academic achievement and altruistic behaviour, as much as for the socio-demographic variables to have some impact on differences of mean in SOCS. In other words, these findings indicated that the students sense of community could be promoted by other socio-demographic factors that were not studied here. Only age was found to be correlated with a sense of community. The older the students are, the more they felt attached to the school. Older students normally consisted of those who have faced difficulties in getting a place in a higher learning institution. They might have worked for a while and have experienced repeating national school examinations (referring to the Malaysian Certificate of Education and Higher School Certificate) and competed with other candidates who might have much better grades than they had to enter the university. Once they have the opportunity to enter university, they will make use of it and gain as much advantage as possible to enhance their academic and social development. These students are normally selected or elected as leaders, or at least take part seriously in school clubs or organizations, which inevitably contribute to the building of the schools sense of community. This study was only a beginning for the authors to understand the nature or level of sense of community among their own students. There are several limitations to this study. The results are applicable only to this sample. Hence, the findings are not expected to be generalized. Future studies are warranted to extend the findings to a larger scale, and to students in different disciplines. Secondly, this study only examined the relationship between a sense of community and altruistic behaviour, and differences among a few socio-demographic variables. For future studies, the authors also suggested that researchers examine causal relationship between variables. Perhaps, a longitudinal study could also be conducted to determine whether a sense of community is associated with time change. More studies are still needed to understand this phenomenon better, as community is not stagnant, and will always evolve. ACKNOWLEDGEMENT A preliminary draft of this paper was edited by Fadzilah Majid Cooke of the School of Social Sciences, Universiti Malaysia Sabah.
The Lewis And Clark Expedition :: essays research papers
American history is accompanied by a long list of explorers who first discovered and who explored the massive continent. All of the explorers had an impact on the development of America. The Lewis and Clark expedition, also known as the Corps of Discovery, stands prominently at the top part of this list. The Lewis and Clark Expedition has had a significant political, social, and economic effect on America. They were the first to map out the west and set off westward expansion. Without the success of the expedition growth of America would have taken five times as long, as predicted by Thomas Jefferson. Ã Ã Ã Ã Ã The Expedition had a drastic political effect on The United States of America. The area in which the expedition was to explore was very close along Spanish territory and a portion of the expedition was in Spanish territory. The Spanish government was very uneasy with the Corps advancing towards them because they thought The United States was attacking them. They dispatched a small group to intercept the Corps however they nearly missed them. Another political impact was the now issue of Indian relations. America just acquired a great deal of land that was formerly owned by Indians and they now had to explain to them that the land was no longer theirs and that they were now a part of the United States. Indian relations would be fine until they were forced to move off their land. The United States had to set up a new branch of government just for Indian relations. Previous to the expedition there were only little issues of dealing with Indians. Ã Ã Ã Ã Ã The Exploration of the west could have had the greatest economical impact on the United States ever. After the west had now been explored they realized they had a great deal of land that now had to be settled. The land was so vast and so cheap that it was sold for very low prices and sometimes just given away. This caused a huge surge of people to begin flowing west and sparked westward expansion. People began setting up farms and more and more people had opportunities to make a good living. Also people now had the chance to look for gold out west and the Gold Rush began. This is when America really had its boom. Lastly we now had twice as much if not more natural resources than we had before.
Friday, July 19, 2019
The Natural :: Essays Papers
The Natural Iris vs. Memo, the everlasting battle of Good and Evil, Good Angel vs. Bad Angel. In The Natural the Angels take the form of women that interact with Roy. Iris the ââ¬Å"Good Angelâ⬠has nothing but a positive influence on Roy and cares about him deeply. The exact opposite of Iris is the ââ¬Å"Bad Angelâ⬠Memo who cares just about what she can get her hands on except poverty. To her nothing or nobody matters. The reason Memoââ¬â¢s able to sneak in with Roy so easy is that she uses her body, her looks. She makes Roy a ââ¬Å"toyâ⬠to her. She wants money so badly, thatââ¬â¢s why sheââ¬â¢s always with people like Gus or the Judge, because they are the rich people who like to spend a lot of money. Memo has always been mean to Roy: She hadnââ¬â¢t treated him right. For a while things had looked so goodâ⬠¦ but no sooner has he gone into a slump when she began again to avoid him. Had she been nice to him instead, heââ¬â¢d have got out of trouble sooner (165). Iris is really ââ¬Å"laid backâ⬠when it comes to Roy. Iris isnââ¬â¢t as attractive as Memo, but she looks past the dollars and sees what she likes. Each ââ¬Å"Angelâ⬠has a different effect on Roy both being on and off the field. Roy goes out with Memo ignoring Popââ¬â¢s warning ââ¬Å"â⬠¦She is unlucky and always has been and I think that there is some kind of whammy in her that carries her luck to other peopleâ⬠(136). Roy goes into a bad slump. Everything he does fails until one game in Detroit. The lady in the stands hesitantly roseâ⬠¦ She was an attractive woman, around 30, maybe more, and built solid but not too bigâ⬠¦ A reporter approached her and asked her name but she wouldnââ¬â¢t give it to him, nor would she, blushing, say why she was standing now (159). The woman standing is Iris and she is standing because she believes in Roy, and wants him to regain his confidence by showing her support.
Thursday, July 18, 2019
Teachers and maintenance discipline in a classroom situation
In order to hold a better as a schoolroom director ( instructor ) one must hold the followers: Handle every sort of schoolroom subject job Learn to convey any schoolroom under control Get the pupils ââ¬Ë attending Let there be regard for each other particularly sentiments or replies and There must be quietness If one can conceive of himself or herself in the schoolroom twenty-four hours after twenty-four hours passing all the clip learning to an attentive category. As a instructor you will demo the deep rooted love in replying the call as a instructor. A instructor whose pupils are punctual because promptness is the psyche of concern, respectful on undertaking and attentive all the will decidedly bask his or her undertaking. Form my observation Manchester Academy is one of the schools that keep schoolroom under control, and this shows a clean and clear apprehension of planning. Knowing how to maintain a schoolroom non merely controlled but on undertaking and attentive is the most important accomplishment a instructor can hold, without which no effectual instruction can take topographic point. At Manchester Academy I observed the school has a batch to offer and they have given themselves clip to offer it, because it is non a nice feeling traveling to category mundane feeling you do non hold the necessary tools to acquire the acquisition atmosphere you justly deserve. It is a nice feeling traveling to your category knowing that you will be learning in a favorable ambiance that is contributing to larning and that you have the tools to manage any state of affairs, alternatively of seeking to convey order or shushing a inveterate riotous pupil or shouting that there should be quietness every clip. Manchester Academy displayed that spirit during the reading lessons. As instructors we do non desire our schoolrooms to be orderly merely for its ain interest or because we are on some sort of power trip, but so that we can give pupils what we have to offer. Sometimes you find you want to larn this from person who does non hold to be that right, but who has had to set up schoolroom control even inside the worst behaved schoolrooms found anyplace in the universe. Management and subject are the chief ingredients in the instructors ââ¬Ë planning. Sound subject and direction underpins every facet of the school life. For successful instruction and acquisition to take topographic point it is of import that good subject exist in every schoolroom in peculiar and in the school as a whole. Harmonizing to Hill & A ; Hill ( 1997: 16 ) â⬠scholars learn to the best of their abilities in an orderly and safe environment. â⬠Research workers like Potgieter, Visser, Van der Bank, Mothata and Squelch ( 1997:59 ) stated that ââ¬Å" if subject is non taken into consideration, the school environment will be unsafe in the educational procedure may be disrupted. â⬠This may besides impact the educational attainment of scholars. In this respect Levin & A ; Nalon ( 1991:30 ) province that, ââ¬Å" in add-on to the obvious impact on the instruction and larning environment riotous behavior, can besides impact the scholars ââ¬Ë safety, preparednes s to larn every bit good as future behavior. â⬠In add-on, Hill & A ; Hill ( 1994:6 ) ââ¬Å" if subject can destruct the possibility of a safe and orderly environment and thereby a shackle the nucleus intent of the school. â⬠It is hence necessary that subject is maintained in a school for the public assistance and safety of scholars and pedagogues, and for the success of the educational procedure. Learners in the farther instruction are working hard to organize the ain individualities asseverating power through the brilliant by presenting instructors. Coetzer & A ; Le Roux ( 1996:84 ) endorse this position when they stated that, ââ¬Å" modern kids and young person want to set up their ain life, and by making so will melt Rebel against subject and authorization. â⬠They sum up by stating that ââ¬Å" the young person have been emancipated to populate their ain life styles as they see it fit and accept values different from the society. ââ¬Å" Sowetan ( South Africannewspaper ) of Thursday March, 17 2011: 5 ( Early edition ) states that ââ¬Å" we call on all students to contend fire with fire-when instructors hit you, you must hit back. ââ¬Å" As a consequence, instructors experience troubles, experiencing that they are challenged and might lose control. A deficiency of subject in public schools is experient all over the universe. Wayson & A ; Pinnell ( 1994:1534 ) ââ¬Å" The deficiency of scholar subject in many public schools throughout the universe has been a affair of great concern for school direction and instructors, to a lesser extent for scholars themselves parents and the general populace. â⬠Harmonizing to Charles ( 1996:3 ) legion surveies that were conducted in the USA in 1992, have listed subject is a major job with which instructors must postulate and a important factor in instructors go forthing the profession. In add-on to the job, Charles ( 1996:3 ) provinces, ââ¬Å" instructors try to reassign off from the schools that have high degrees of misbehavior, live in such schools in the custodies of instructors non yet skilled in exercising keeping subject. â⬠From a personal observation and informal interviews with instructors I as a school teacher at a 2nd at the school have concluded that it is subject is non prevailing in Manchester Academy. The bulk of instructors seem to believe that scholars should non be left entirely to their ain devices without being controlled or supervised. The position of supervising featured Manchester Academy High School. Learners are non left to act in whatever manner they wish. The instructors in the Manchester Academy are non kicking that they are making more policing work than learning in the schoolroom. Manchester Academy has a computerized manner of tracking and training scholars who misbehave harmonizing to the type of offenses. Teachers do non pass clip disproportionately covering with this riotous behavior of scholars and the consequence of the actions. Apparently Manchester Academy impart their perceptual experiences in such a manner that scholars took positively towards benefits of instruction. Proper, important and sympathetic counsel of class will ever help scholars to see the demand to set up good resonance with instructors and eventually with parents. It is the duty of the instructors to keep a civilization of instruction and acquisition in schools, but it is non possible to make so if the subject and the safety are non considered in the school environment. Disintegrated subject causes trouble in the attainment of school aims. Schools become there is functional when both scholars and instructors can non work efficaciously and expeditiously under conditions which are non contributing and are shocking. Learners can non set down and instructors can non learn in an insecure environment. A safe an orderly school environment is a requirement for acquisition and instruction to take topographic point. Thus instructors can merely dispa tch their professional responsibilities if there is order and subject in both the schoolroom and the school as a whole.How can teachers keep subject?Research workers are of an sentiment that instructors play a critical function in keeping subject and control within the school. Harmonizing to Joubert & A ; Prinsloo ( 1999:55 ) , ââ¬Å" pedagogues are responsible to keep subject at all times. â⬠Varma ( 1993:31 ) provinces that, ââ¬Å" beyond their duty for learning, pedagogues are besides responsible for the moral development of scholars and to guarantee that they become observant citizens. â⬠This implicitly means that within the school community, instructors are expected to react in a commanding Y to misdemeanors of the institutional regulations and of the school and signifiers such as larceny, and strong-arming that has a direct bearing on the moral sphere. The Department of Education besides demands that subject be maintained in school so that civilization of instruct ion and acquisition is realized. Harmonizing to Section 8 ( 1 ) Of the South African Schools Act ( SASA ) ( RSA, 1996 a: 8 ) , subject must be maintained in the school and schoolroom state of affairss so that the instruction of scholars flourishes.Teachers are in fact expected to manage riotous scholars in the categories so that scholars can concentrate on the school assignment. Butchart & A ; McEwan support this position by saying that, ââ¬Å" inequality school, pedagogues must larn how to manage a riotous scholar in a manner that is non punitory, yet gets the state of affairs under control and at the same clip opens the scholars in head to work in category â⬠How to match subject and equity?One of the inquiries on the questionnaire is ââ¬Å" what is your ( instructor ) function in a show in subject in your school? â⬠Harmonizing to Hosten et Al ( in Oosthuizen 1985:59 ) explains fairness as ââ¬Å" the moral value that serves as a norm to guarantee nonpartisanship when covering with viing involvements of assorted topics. â⬠This denotes that the involvements of both instructors and scholars must be protected. The scholars are the legal topics and have legal rights that should be protected. The scholars other legal topics and have legal rights that should be protected. Section 12 ( 1 ) of the Constitution of the Republic of South Africa ( RSA, 1996 degree Celsius: 8 ) . In this independent survey support ( ISS ) hungry and took shy to reply inquiries that have been asked in the questionnaire. Manchester Academy claim to be executing really good in footings of subject, direction and leading since its passage. Now strategies for good schoolroom subject could be based on both standard and student behavioral facet to do subject more effectual. The followers may perchance help instructors to better the jobs that may be at that place in state of affairss, that is, they might be underlying issues in the school and has to be solved in expectancy.Aid to scholars and their voice.Teachers should steer scholars towards their ain behavior. Passing opinion on lawbreakers ââ¬Ë action instructors should alternatively inquire inquiries that encourage scholars to judge their ain behavior. They should remain focused and if need be, assist scholars to accept ownership of their actions. Teachers should steer scholars for bettering future behavior. They should inquire scholars to explicate alternate ways of acting the following clip they are confronted with similar state of affairss. Teache rs should construct scholars ââ¬Ë committedness to their programs by giving them feedback and support. Learners will experience more committed if instructors acknowledge the cogency of their programs. Making this could be every bit simple as oculus contact. Teachers should non let onionskin alibis are the lone service to avoid duty. Harmonizing to Rich ( 1982:169 ) ââ¬Å" school regulations may be breached when scholars feel that they are undue â⬠. This will doubtless go on if scholars were non allowed to take portion in the preparation of regulations. It is hence necessary that scholars must understand why regulations have been formulated and why they should follow with them. Again, harmonizing to Blandford ( 1998:39 ) ââ¬Å" a school without an effectual subject policy that encompasses schemes and mechanisms that are available to all the members of the school community, can non work as a centre for learning and larning. â⬠The procedure of developing and implementing subject policy involves collaborative decision-making. Therefore, all the members of the school should hold an chance to take portion in the decision-making. Sunday Times ( South African newspaper ) of 12.01. 1992, noted that ââ¬Å" grade 12 scholars in black townships in South Africa, were continuously neglecting because of the conspicuous deficiency of subject among them. â⬠It is of import that subject should be maintained at all times in schools and that each and every school must hold a codification of behavior. Teachers should avoid doing irrelevant regulations because this will make serious disciplinary jobs in the school and the schoolroom. McQueen ( 1992:56 ) supports this position and infinite that ââ¬Å" irrelevant regulations are useless and black because ailing chosen regulations will make serious direction and disciplinary jobs in the schoolroom state of affairs.Motivating and promoting scholars.They word ââ¬Å" motive â⬠is derived from a Latin word ââ¬Å" movere â⬠significance to travel ( McLean, 2003:7 ) . Therefore, motive is the amount of all that moves a individual to action. To actuate indicate tha t one individual provides another individual with a motivation to make something. Motivation can be regarded as the cardinal facet of emotional intelligence. Harmonizing to the South African Oxford Dictionary ( 1998:285 ) . The term ââ¬Å" motivate â⬠means to give a individual a motivation or inducement to make something. Harmonizing to Word mention online, con sized Oxford lexicon ( 2008 ) the word ââ¬Å" motive â⬠means ââ¬Å" excite the involvement of. â⬠First, it has a directional undertakings taking among options and keeping the action desired. Second, it has strength, for illustration degree of enthusiasm ( McLean 2003:37 ) . Harmonizing to Burden ( 1995:16 ) . Most pedagogues use the construct motive to depict ââ¬Å" those procedures which can elicit any initiate behavior, continue to let the behavior to prevail, and lead to taking or preferring a specific behavior. â⬠Teachers are hence interested in a peculiar kind of scholar motive which is to act uate scholars to larn. Teachers should guarantee that scholars are motivated to larn and act suitably because demotivated scholars get discouraged easy. Teachers should honor scholars when they are acting good for finishing their work. They should make this through congratulations and category acknowledgment. Any program for covering with misbehaviour must include encouragement of good behavior, otherwise learners learn what they are non make, but they have non learnt what they should make. To further discourse the impact of schoolroom subject is partially involves on the scholars conduct, are the ability and accomplishments that instructors should hold. Patience comes foremost, particularly when a scholar has a behavioral job, and this should be given attending in an appropriate manner, hence as portion of the instructors responsibilities and duties. Making it a point that effectual instruction makes scholars learned. The instructor plays a important function in which it imparts the cognition and accomplishments to the scholars and the instructor should love and demo the deep-seated love in the calling that is believed he or she chose it volitionally. The instructor must hold the enterprise on how to cover with each scholar in category, doing it his or her responsibility to affect to maintain scholars busy and at the same clip see their category as gratifying and holding a great impact on the field of larning. Taking into awareness that scholars differ in their abilities and instructors should cognize up to what extent would a peculiar be able absorb the lesson. Skills coupled with effectual schoolroom subject can be acquired through pattern, holding feedback and besides willing to accept merely errors is no 1 is infallible. Teachers must walk the talk. Teachers who have many old ages of experience have contributed to a specific position of what peculiar technique work and what are the relevant methods that may non be applicable in training a category with such inevitable scholars ââ¬Ë behavioral facet. The instructor must do it a point that the instruction method and manner or managing subject must keep a sort of ambiance that enhances larning for the scholars. The manner the category is arranged signifiers portion of category subject. A good category agreement makes it easy to keep subject. It is the instructors ââ¬Ë duty to be argus-eyed at all times to supervise and detect scholars ââ¬Ë public presentation in activities. Apparatus, books learning AIDSs and other stuff should ever be readily available. Harmonizing to Ofsted study of the 30th to 31st of March 2009. It is stated that Manchester Academy is â⬠outstanding â⬠This shows that Manchester Academy as a school is working really hard to bring forth good hereafter citizens. The 2009 study further stated that the school aims to to the full fit the pupils in such a sensible mode. Learners are expected to travel into the outside universe, skilled and ready to run into the demands of life. Parents and instructors have a responsibility to fix them to execute good in the community every bit good is in the universe of work. They must hold an impact upon the scholars ââ¬Ë behavior by learning them about the determinations and choices the scholars have to do every twenty-four hours and how such determinations and hints affected their lives, both at school and thenceforth. For illustration, ââ¬Å" a disciplinary step against a scholar who comes to school tardily will help to promote him or her to be on clip and be more responsible and accountable in the hereafter ( Lemmer, 1998:47 ) . Discipline challenges the scholars to make self-contemplation about their end and intent in life. Discipline should stress success and non failure. It should help the scholars to develop their single abilities in order to run into challenges of life with assurance. If this has occur red the scholars would hold gained a sense of security and significance in life through subject Lent at school.Decision.Learners of Manchester Academy are good disciplined. They are good motivated and they besides had an chance to research themselves outside the schoolroom, hence they say that they are ââ¬Å" prepared exceptionally good for farther survey and work beyond the school. â⬠The school ââ¬Ës positive clime and success are obtained from the good behavior of scholars. The instructors in a subject school our free and happy to learn without being preoccupied with tenseness and fright caused by misconducting scholars. The disciplinary jobs that are common in lending to, indiscipline in Manchester Academy seems to be identified and discussed with scholars so that proactive actions are taken to advance good subject. Rights and responsibilities of instructors and their part in keeping subject merely at that place because it is said that the ââ¬Å" follow policy. â⬠See appendix. Educators seem to back up the school principal/headmaster by guaranting that the scholars observe school regulations and ordinances in they are held responsible for any misbehaviour hence the school has a commission responsible for behavior harmonizing to their types. Teachers can non work in isolation in acquiring read of ill-disciplined behavior in category in the school as a whole. It takes an attempt from all the stakeholders, including the school, parents and scholars to minimise deficiency of subject. See appendix.
Four Star Case Study Essay
tetrad principal sum is a mattress manufacturer known for a focus on quality, yieldivity and client service. In enunciate to meet market place demand from clients as well as competition foursome head increase proliferation of mattress varieties offering a total of 230 diametrical model types at one time. This modify ca employ quad maven to experience useable issues and bad memorial management, resulting in unhopeful profitability and productivity. Of the many problems faced by quaternary wizardry, proliferation of mattress varieties and its impact on operations and archive management is their biggest issue. This has had a major(ip) impact on the things that cardinal maven once prided itself on quality, productivity and customer service. Having 230 product variations created extremely long erect fill identifys resulting in a loss of customers and created a great convey of customer dissatisfaction.There was also added pressure placed on four thaumaturge employe es to fill siteings. Having so many unsated employees put Four champion at risk for loosing employees which would add additional form to the deed process. In addition, large dealers who would typically sell and inventory Four Star products began limiting the number of mattresses stored due to their softness to predict which of the 230 varieties a customer would purchase. Instead, LDs would detainment until a customer placed an high society to request inventory from Four Star. Upon regularise placement LDs expected fast inventory arrival which is the level of service they were used to getting barely due to the tension placed on the Four Star manufacturing operation they were having trouble filling orders. This resulted in dealers no longer committing to placing orders with Four Star. Four Star in additionk on the burden of carrying inventory which was an additional expense for the organization placing added song on the overall manufacturing process. Four Star soon bega n to see decreased sales revenue. Sia Meng considered several selections to smoothly manage its operations.The commencement exercise option was to reduce the number of mattress models manufacture back to 40 or 60, levels at which the confederation germinated in 1996 and 1998. This would be a very effective solve to the issues cosmos had with Four Star since historical information shows that revenues and customer satisfaction levels were up and the company was not experiencing such turmoil in its manufacturing. In addition, it has also been proven by the behavior of the dealers that there are to a fault many mattress varieties. Reducing model levels would financial aid increase revenue. Another option organism investigated by Sia Meng is to insist on a token(prenominal) order size by dealers.This requirement from dealers would help stream neckcloth the order and production process and allow Four Star a window of chance to fulfill orders within a commonsensical timeframe an d increase customer satisfaction. The last option being considered is to reduce safety blood line requirements for finished mattresses. This is not a possible option for Four Star. The company is already having major issues and relocating would not fix the ingrained turmoil that exists. Below are my recommendations for how Four Star can reconfigure its product design, manufacturing and order fulfillment process. Product DesignFour Star should begin all mattresses with the like basic design and alter the product to meet customers needs. This could let in adding more(prenominal) coils and the quilt cover depending on the customers request. This would allow Four Star to inventory and produce a limited number of materials needed to produce a mattress because all mattresses would use the identical basic formula with modifications. For example, if Four Star received an order for one of its premium mattresses, the number of coils added to the mattress would be adjusted whence as we ll as the quilted cover. Doing so would reduce the fill rate and limit frustration of employees working on the production line as they would be working to produce a less(prenominal) complicated product with less travel parts.ManufacturingIt is recommended that Four Star keep its preparation where it is currently to work out the production issues they are experiencing before determining whether paltry to another location would be more lucrative. There are currently too many other issues looming with the production line to isolate any one main(prenominal) cause for the issue. To Order FulfillmentTo mend the order fulfillment process it is recommended that Four Star enforce a minimum order quantity on its dealers. Doing so may initially increase inventory costs for Four Star but the long term benefits could outweigh this forgetful term frustration. Enforcing a minimum order quantity would also allow dealers to hard-boiled better expectations with customers and increase customer satisfaction.
Subscribe to:
Comments (Atom)