Tuesday, November 26, 2019

Vinyl Siding essays

Vinyl Siding essays I chose to do my paper on vinyl siding because it is the most durable, yet inexpensive, exterior finish. Vinyl siding also is available in many different textures and colors allowing each house to have a unique finish. Another reason I chose this topic is because vinyl siding is easy to install and maintain. According to an article in This Old House, consumers harp on the fact that it never needs painting. Compared to other building material, siding is rather new. It was introduced in the 1950s as a replacement for aluminum siding. However, when it fist came out it had a bad reputation for buckling, sagging, and cracking. Another problem people had was that the paint would fade. Technology has further advanced the products chemistry and installation techniques and consumers have given it a second chance. In fact, over 32 percent of new homes in the U.S. use vinyl siding. One of the big reasons that homebuilders chose vinyl siding is because of its low cost. A mid-grade vinyl costs about $1.60 per square foot to install, not including the necessary trim pieces, while the installed price of mid-grade cedar clapboard, exclusive of trim and paint, is about 2.5 times higher. Thisoldhouse.com/exteriors/vinylsiding Another reason why people chose vinyl siding is because it is easier to install and low-maintenance to keep up with. From reading the article I learned that vinyl siding is more cost-efficient and easier to install. This article makes me want to recommend vinyl siding to be placed on a customers home. I also learned how vinyl siding is formed and that the thicker the vinyl doesnt always mean the more impact resistant. It is all in the chemical make-up of the siding, which is never known to the consumer. Some siding, if installed properly, can handle winds of up to 180 miles per hour. The only benefits I really feel that I have gained through reading this article wa...

Friday, November 22, 2019

Jean-Baptiste Bernadottes Role in the Napoleonic Wars

Jean-Baptiste Bernadottes Role in the Napoleonic Wars Born at Pau, France on January 26, 1763, Jean-Baptiste Bernadotte was the son of Jean Henri and Jeanne Bernadotte. Raised locally, Bernadotte elected to pursue a military career rather than become a tailor like his father. Enlisting in the Rà ©giment de Royal-Marine on September 3, 1780, he initially saw service in Corsica and Collioure. Promoted to sergeant eight years later, Bernadotte attained the rank of sergeant major in February 1790. As the French Revolution gathered momentum, his career began to accelerate as well. A Rapid Rise to Power A skilled soldier, Bernadotte received a lieutenants commission in November 1791 and within three years was leading a brigade in General of Division Jean Baptiste Klà ©bers Army of the North. In this role he distinguished himself in General of Division Jean-Baptiste Jourdans victory at Fleurus in June 1794. Earning a promotion to general of division that October, Bernadotte continued to serve along the Rhine and saw action at Limburg in September 1796. The next year, he played a key role in covering the French retreat across the river after being defeated at the Battle of Theiningen. In 1797, Bernadotte left the Rhine front and led reinforcements to the aid of General Napoleon Bonaparte in Italy. Performing well, he received an appointment as ambassador to Vienna in February 1798. His tenure proved brief as he departed on April 15 following a riot associated with his hoisting of the French flag over the embassy. Though this affair initially proved damaging to his career, he restored his connections by marrying the influential Eugà ©nie Dà ©sirà ©e Clary on August 17. The former fiancà ©e of Napoleon, Clary was sister-in-law to Joseph Bonaparte. Marshal of France On July 3, 1799, Bernadotte was made Minister of War. Quickly showing administrative skill, he performed well until the end of his term in September. Two months later, he elected not to support Napoleon in the coup of 18 Brumaire. Though branded a radical Jacobin by some, Bernadotte elected to serve the new government and was made commander of the Army of the West in April 1800. With the creation of the French Empire in 1804, Napoleon appointed Bernadotte as one of the Marshals of France on May 19 and made governor of Hanover the following month. From this position, Bernadotte led I Corps during the 1805 Ulm Campaign which culminated with the capture of Marshal Karl Mack von Leiberichs army. Remaining with Napoleons army, Bernadotte and his corps were initially held in reserve during the Battle of Austerlitz on December 2. Entering the fray late in the battle, I Corps aided in completing the French victory. For his contributions, Napoleon created him Prince of Ponte Corvo on June 5, 1806. Bernadottes efforts for the remainder of the year proved rather uneven. A Star on the Wane Taking part in the campaign against Prussia that fall, Bernadotte failed to come to the support of either Napoleon or Marshal Louis-Nicolas Davout during the twin battles of Jena and Auerstdt on October 14. Severely reprimanded by Napoleon, he was nearly relieved of his command and was perhaps saved by his commanders former connection to Clary. Recovering from this failure, Bernadotte won a victory over a Prussian reserve force at Halle three days later. As Napoleon pushed into East Prussia in early 1807, Bernadottes corps missed the bloody Battle of Eylau in February. Resuming campaigning that spring, Bernadotte was wounded in the head on June 4 during fighting near Spanden. The injury forced him to turn command of I Corps over to General of Division Claude Perrin Victor and he missed the victory over the Russians at the Battle of Friedland ten days later. While recovering, Bernadotte was appointed governor of the Hanseatic towns. In this role he contemplated an expedition against Sweden but was forced to abandon the idea when sufficient transports could not be gathered. Joining Napoleons army in 1809 for the campaign against Austria, he took command of the Franco-Saxon IX Corps. Arriving to take part in the Battle of Wagram (July 5-6), Bernadottes corps performed poorly on the second day of fighting and withdrew without orders. While attempting to rally his men, Bernadotte was relieved of his command by an irate Napoleon. Returning to Paris, Bernadotte was entrusted with command of the Army of Antwerp and directed to defend the Netherlands against British forces during the Walcheren Campaign. He proved successful and the British withdrew later that fall. Crown Prince of Sweden Appointed governor of Rome in 1810, Bernadotte was prevented from assuming this post by an offer to become the heir of the King of Sweden. Believing the offer to be ridiculous, Napoleon neither supported nor opposed Bernadotte pursuing it. As King Charles XIII lacked children, the Swedish government began seeking an heir to the throne. Concerned about the military strength of Russia and wishing to remain on positive terms with Napoleon, they settled on Bernadotte who had shown battlefield prowess and great compassion to Swedish prisoners during earlier campaigns. On August 21, 1810, the Ãâ€"retro States General elected Bernadotte crown prince and named him head of the Swedish armed forces. Formally adopted by Charles XIII, he arrived in Stockholm on November 2 and assumed the name Charles John. Assuming control of the countrys foreign affairs, he began efforts to obtain Norway and worked to avoid being a puppet of Napoleon. Fully adopting his new homeland, the new crown prince led Sweden into the Sixth Coalition in 1813 and mobilized forces to battle his former commander. Joining with the Allies, he added resolve to the cause after twin defeats at Lutzen and Bautzen in May. As the Allies regrouped, he took command of the Northern Army and worked to defend Berlin. In this role he defeated Marshal Nicolas Oudinot at Grossbeeren on August 23 and Marshal Michel Ney at Dennewitz on September 6. In October, Charles John took part in the decisive Battle of Leipzig which saw Napoleon defeated and forced to retreat towards France. In the wake of the triumph, he began actively campaigning against Denmark with the goal of forcing it to cede Norway to Sweden. Winning victories, he achieved his objectives through the Treaty of Kiel (January 1814). Though formally ceded, Norway resisted Swedish rule requiring Charles John to direct a campaign there in the summer of 1814. King of Sweden With the death of Charles XIII on February 5, 1818, Charles John ascended to the throne as Charles XIV John, King of Sweden and Norway. Converting from Catholicism to Lutheranism, he proved a conservative ruler who became increasingly unpopular as time passed. Despite this, his dynasty remained in power and continued after his death on March 8, 1844. The current King of Sweden, Carl XVI Gustaf, is a direct descendent of Charles XIV John.

Thursday, November 21, 2019

Methods Assignment Example | Topics and Well Written Essays - 500 words

Methods - Assignment Example There are other scholars with similar contribution (e.g., Fearon 1998; Lake and Rothchild 1996). A contention by (Saun and Tirone 2011) is that democratic transitioning develops an environment that easily encourages the rise of conflicts through the induction of exclusionary polarization and nationalism in the society. Significant exceptions towards the democratization-conflict tendency emerge in such countries as Tanzania, Malawi, Burkina Faso, and Kenya, all having experienced a democratic move within 20 years period without encountering much civil conflict. The authors argue that the key factor that â€Å"shelters† such democratizing states from violence comes from the democratization aid (Saun and Tirone 2011). The proposition by Snyder (2000) regarding instability indicates that in the initial phases of democratization are favored by two conditions via which civil conflict may emerge: there is the exploitation of rising nationalism by political elites, in the name of achieving their selfish ends and, therefore, creating society divisions, and that there is a general weakness on the side of central government in preventing the polarizing tactics of elites. (Saun and Tirone 2011) proposes that the assistance programs of democracy can potentially provide a restrictive force regarding the danger of politically initiated domestic violence; notably, even when a state lacks strong institutions, which would help, manage democratization, democracy aid can potentially provide an external source of stability, strength, and state credibility to ease the transition. The role played by the U.S. Agency for International Development’s (USAID) when Indonesia underwent the transition. Ideally, Indonesia attained democracy in 1999 from the Suharto’s regime (Saun and Tirone 2011). Some of the specific ideas developed as measurable and testable variables can be identified from the literature

Tuesday, November 19, 2019

Problems of Defining and Measurement of Development Essay

Problems of Defining and Measurement of Development - Essay Example There are many geographers that measure the development in the terms of countries Human Development Index. On the other hand in various countries economists link the development with the developed or either with developing countries economies and use the GNP (Gross National Product) and GDP (Gross Domestic Product) for measuring it (Pieterse 2009). As the definition of development, it is important that technological justice and improvements are even interrelated features that require being considered. The study has been conducted for defining the problems that occur while defining the development taking place in the economy and the various measures adopted by the economists for measuring it on the specific index. The study will also include different theories that are applied in the development for defining it. The study will also include examples drawn from various countries for defining the development, as most of the countries use the income level for defining the development taking place in different countries (Jaffee 1998). The term development has been used from the past few decades and there are several definitions which are associated with the training, seminars, workshops, certificate programs, college and degree programs and also the books and other reading materials. The term development when initially discussed was treated as the synonym of the term improvement of individuals of a lot of individuals in society. With the passage of time, with the emergence of new initiatives and innovations, there is an addition to the confusion in the definition of the term development. There is confusion in the terminology that is used for defining the term â€Å"development†. From the international perspective, it can be said to be as an integral part of a large and broader process of the social and community change (Love and Guthrie 2011). The goal of this change is to bring in the efficiency and improvement in the activities related to economic and social justice.  

Sunday, November 17, 2019

Ethnography on Middle Class American Male Essay Example for Free

Ethnography on Middle Class American Male Essay Two centuries ago leading white, middle-class families in the newly united American states spearheaded a family revolution that replaced the premodern gender order with a modern family system. But modern family was an oxymoronic label for this peculiar institution, which dispensed modernity to white, middle-class men only by withholding it from women. The former could enter the public sphere as breadwinners and citizens, because their wives were confirmed to the newly privatized family realm. Ruled by an increasingly absent patriarchal landlord, the modern, middle-class family, a woman’s domain, soon was sentimentalized as traditional. It took most of the subsequent two centuries for substantial numbers of white working-class men to achieve the rudimentary economic pass book to modern family life a male family wage. By the time they had done so, however, a second family revolution was well underway. Once again middle-class, white families appeared to be in the vanguard. This time women were claiming the benefits and burdens of modernity, a status they could achieve only at the expense of the modern family itself. Reviving a long-dormant feminist movement, frustrated middle class homemakers and their more militant daughters subjected modern domesticity to a sustained critique. At times this critique displayed scant sensitivity to the effects our antimodern family ideology might have on women for whom full-time domesticity had rarely been feasible. Thus, feminist family reform came to be regarded widely as a white, middle-class agenda, and white, working-class families it’s most resistant adversaries. African-American women and white, working-class women have been the genuine postmodern family pioneers, even though they also suffer most from its most negative effects. Long denied the mixed benefits that the modern family order offered middle-class women, less privileged women quietly forged alternative child rearing. Struggling creatively, often heroically, to sustain oppressed families and to escape the most oppressive ones, they drew on traditional premodern kinship resources and crafted untraditional ones, lurching backward and forward into the postmodern family. Rising divorce and cohabitation rates, working mothers, two-earner households, single and unwed parenthood, and matrilineal, extended, and fictive kin support networks appeared earlier and more extensively among poor and working-class people. Economic pressures more than political principles governed these departures from domesticity, but working women like Martha Porter and Dotty Lewison soon found additional reasons to appreciate paid employment. Popular images of working-class family life, like the Archie Bunker, rest on the iconography of unionized, blue-collar, male, industrial breadwinners and the history of their lengthy struggle for the family wage (Stacey 30). But the male family wage was a late and ephemeral achievement of only the most fortunate sections of the modern industrial working class. Most working-class men never secured its patriarchal domestic privileges. Postmodern conditions expose the gendered character of this social-class category, and they render it atavistic. As feminist have argued, only by disregarding women’s labor and learning was it ever plausible to designate a family unit as working class. In an era when most married mothers are employed, when women perform most working-class job, when most productive labor is unorganized and fails to pay a family wage, when marriage links are tenuous and transitory, and when more single women than married homemakers are rearing children, conventional notions of a normative working-class family fracture into incoherence. The life circumstances and mobility patterns of the members of Pamela’s kin set and of the Lewisons, for example, are so diverse and fluid that no single social-class category can adequately describe any of the family units among them. If the white, working-class family stereotype is inaccurate, it is also consequential. Stereotype is moral stories people tell to organize the complexity of social experience. Narrating the working class as profamily reactionaries suppresses the diversity and the innovative character of many working-class kin relationships. The Archie Bunker stereotype may have helped to contain feminism by estranging middle-class from working-class women. Barbara Ehrenreich argues that caricatures which portray the working-class as racist and reactionary are recent (Handel 655), self-serving inventions of professional, middleclass people eager to seek legitimating for their own more conservative impulses. In the early 1970s, ignoring rising labor militancy as well as racial, ethnic, and gender diversity among working-class people, the media effectively imaged them as the new conservative bedrock of middle America. Thus, All in the Family, the 1970s television sitcom series that immortalized racist, chauvinist, working-class hero-buffoon Archie Bunker, can best be read, Ehrenreich suggests, as the longest-running Polish joke, a projection of middle-class bad faith. Yet, if this bad faith served professional middle-class interest, it did so at the expense of feminism. The inverse logic of class prejudice construed the constituency of that enormously popular social movement as exclusively middleclass. By convincing middle-class feminists of our isolation, perhaps the last laugh of that Polish joke was on us. Even Ehrenreich, who sensitively debunks the Bunker myth, labels starting the findings of a 1986 Gallup poll that 56 percent of American women considered themselves to be feminists, and the degree of feminist identification, was, if anything, slightly higher as one descended the socioeconomic scale. Feminist must be attuned to the polyphony of family stories authored by working-class as well as middle-class people if they are ever to transform data like these into effective political alliances. While the ethnographic narratives in this research demonstrate the demise of the working-class family, in no way do they document the emergence of the classless society postindustrial theorists once anticipated. On the contrary, recent studies indicate that the middle classes are shrinking and the economic circumstances of Americans polarizing. African-American has borne the most devastating impact of economic restructuring and the subsequent decline of industrial and unionized occupations. But formerly privileged access to the American Dream in the 1960s and 1970s, now find their gains threatened and not easy to pass on to their children. While high-wage, blue-collar jobs decline, the window of postindustrial opportunity that admitted undereducated men and women, like Lou and Kristina Lewison and Don Frankin, to middle-class status is slamming shut. Young white families earned 20 percent less in 1986 than did comparable families in 1980, and their homeownership prospects plummeted. Real earnings for young men between the ages of twenty and twenty four dropped by 26 percent between 1980 and 1986, while the military route to upward mobility that many of their fathers traveled constricted. In the 1950s men like Lou Lewison, equipped with VA loans, could buy homes with token down payments and budget just 14 percent of their monthly wages for housing costs. By 1984, however, carrying a median-priced home would cost 44 percent of an average male’s monthly earnings. Few could manage this, and in 1986 the U. S government reported the first sustained drop in home ownership since the modern collection of data began in 1940. Thus, the proportion of American families in the middle-income range fell from 46 percent in 1970 to 39 percent in 1985. Two earners in a household now are necessary just to keep from losing ground. Data like these led social analysts to anxiously track the disappearing middle class, a phrase that Barbara Ehrenreich now believes in some ways missed the least from the middle range of comfort. Conclusion The major arena to which expert turned in their examination of postwar masculinity was the American family, placing a spotlight upon men’s roles as husbands, fathers, and family heads. It was commonly noted by social scientist and delineators of American character that men had lost much of their former authority within the family. Indeed, the typical American male, as described by the anthropologist Geoffrey Gorer, was seen as having so completely given up any claim to authority that the family would constantly risk disintegration and disaster if not for the efforts of his wife (Reumann 66). On the other hand, commentators diagnosed an assault on middle-class manliness and warned of its effects on the nation and its culture. Obsessively rehearsing a narrative of nationwide decline, social disarray, and familial and gender collapse, they pictured a country in which masculinity had become a besieged and precious resource. Works Cited Handel, Gerald. and Gail, Whtchurch, The Psychosocial Interior of the Family, Aldine, Transaction, 1994 Reumann, Miriam. American Sexual Character: Sex, Gender, and National Identity, Berkeley, California: London University of California Press, 2005 Stacey, Judith, In the Name of the Family: Rethinking Family Values in the Postmodern Age; U. S, Beacon Press, 1996

Thursday, November 14, 2019

PSY 301, Introductory Psychology, 2002, Exam 2 :: UTEXAS Texas Psychology

Introductory Psychology Pennebaker – October 16, 2002 Write your name and social security number on this page and also on your Scantron. Be sure to blacken in the FORM letter on the Scantron as well. 1 Which of the following is FALSE about Stage 4 sleep? A) It is the stage in which most dreams occur B) If deprived of it, individuals become exhausted and disoriented C) It is blocked by alcohol and sleeping pills D) It is marked by low amounts of eye movement E) It is not necessary every night 2 The night before his exam, Jerry was unable to sleep for more than one hour before waking-up. Which of the following best characterizes Jerry’s difficulty falling asleep? A) Sleep apnea B) Narcolepsy C) Insomnia D) Circadian rhythm E) Night terrors 3 Classical conditioning is to operant conditioning, as __________ is to __________? A) passive, active B) passive, unconditioned response C) emotional thoughts, logical emotions D) Pavlov, Freud E) conditioned stimulus, unconditioned response 4 Bill is trying to figure out the best way to increase the productivity of his workers.

Tuesday, November 12, 2019

Arranged Marriages Essay

Love is a many splendored thing: well that’s what I’ve heard. Eyes meet, birds sing, hearts beat and the world turns upside down; unless you are in a arranged marriage. Only the parents are happy, and of course we want our parents to be happy but at whose expense? For centuries arranged marriages were a tradition and in some cultures they still are. There may be a good reason why arranged marriages are good for the people in the east. However today, arranged marriages are still ongoing because it’s traditional, I don’t think that’s a good tradition. I mean celebrating New Years Eve in Times Square New York is a good tradition. It’s a good tradition because I feel and know that no one ever gets hurt celebrating New Years Eve. Arranged marriages can hurt and deny a persons certain civil rights. There are plenty of cultures where there are no such things as civil or human rights but it still doesn’t make it right. Arranged marriages are a tradition from a past era, I believe that arranged marriages are a way of controlling people, especially women. Around the world there has been a custom or tradition of subjugating women. Eastern cultures or religions believe that it is their right to make women 2nd class citizens. To me it means much more, like controlling a life. If you have the desire to control women and to control their lives start with the marriage. In the western societies they tend to frown upon that kind of control inflicted upon women. I’m sure that women tend to frown upon that as well, any control over anyone is frowned upon. There must be a certain lack of respect for both the bride and groom in arranged marriages, these marriage ideas might be old but who said that they’re a good idea? Some traditions should be destroyed faster than a Scotsman can clean out a free bar at a wedding reception. Arranged marriages are one of those traditions. Romeo and Juliet is a classic example of why arranged marriages are outdated and ends in tragedy. Those times required most young women and men to enter into a relationship, that weren’t of their own choice, but their parents. You would not think that in today’s society that arranged marriages still existed, however the parents are still planning their children’s life; albeit, the children are adults. The purpose of this is to maintain the wealth for both families. If the case was that a young girl was being made to marry a adult male, that is being labelled as paedophilia. Yet in India or in the east it is still ongoing and it doesn’t make a difference, here in England it’s a different story for that matter and is illegal. These children are brainwashed into believing that this is normal and that love or any other emotion is not their right but to blindly allow the wishes of their parents. We have not stepped forward in time but have fallen into biblical proportions. That may have sounded too descriptive (biblical proportions), but we have to realize that in biblical times children were married off to other family members for the purpose of continuing their ancestors and that was thousands of years ago and yet it’s still happening in today’s society. One might consider that arranged marriages are more like a business deal than a true marriage, often with the engaged couple being used as pawns on a chess game. Marriage should not be only a business proposition. Call me a hopeless romantic but I don’t believe that two people can be truly happy together unless it was themselves who saw valuable qualities in their partner, what is more is that it completely defies the law of nature. More importantly a marriage should be based on usual trust and affection, as well as common goals. Anything less than that and all you end up with is an emotionless, false union. Arranged marriages are a mockery or the true nature of marriage, a worthless document to be filed into our court systems. What is love? That is said to be one of the hardest questions to be answered as many people don’t know what it is. In all truth I don’t think anyone knows the answer unless they are in love and even so it’s a unexplainable feeling that someone can’t describe to another. You can only know what it is when you are in it. In a arranged marriage I feel that you can’t find that love feeling between the two people in the relationship. As I said earlier we do want to make our parents happy and yes they’re the ones that know what’s best for us and only want us to make the right decisions. But I don’t think they know or understand that even though they might think the man/women we’re going to marry may not be the right choice, we’re in love with them. Whatever love is. We care about them and at the time you know that you want to be with them for the rest of your life and most importantly they’re yours forever and you’re theirs. And it doesn’t matter what people say and if they disagree with your choice. Because you know what you want and that’s him/her. But this is not what you get in a arranged marriage. In a arranged marriage I would imagine that the woman would feel somehow trapped, that’s how I’d feel if I was in the situation. I’d be so cooped up on trying to keep my parents happy and not being able to express how I felt to anyone and would feel as if it were my duty. â€Å"If more couples were matched up through class, education, family background, life goals and earnings† That’s quoted from a women called Aneela Rahman. She was on BBC’s 2 programme ‘Arrange Me a Marriage’. The programme was about finding a partner for each contestant she had, she had one month to match someone with another. Traditions are one thing but outdated, irrational, new age slavery is another thing, I realize that whether you marry for love or not, it can either turn out good or bad, but there should be the opportunity of choice not mandatory rule. On the whole I am against arranged marriages. I think that it is not needed to please parents and not the actual bride and groom. If you want your children to get married and fall in love then let them do it in their own time. It’s not something that can be rushed into and found straight away or first time round. Love should be experienced and not just felt.

Saturday, November 9, 2019

Process or Reality Therapy

Reality therapy is an active, directive, and didactic model for change that stresses the person’s present behavior. A basic tenet of reality therapy is that individuals are responsible for their own behavior. It is a common sense approach an can be used by a wide variety of persons as well as highly trained professionals (Videbeck, 2007). The focus of reality therapy is behavior, not attitude, insight, feelings, one’s past, or unconscious motivation. This model refutes the medical model and encourages positive growth and success.It concentrates on what the clients can do practically to change behavior to fulfill their needs. The client is asked to identify wants and needs. They are asked to evaluate their behavior, formulate a plan for change, and follow though with their plan (Read, 1997). Reality therapy is grounded in the assumption that we all create our inner world. How the real world exists is not important, but rather what is important is the way we perceive it t o exist. Behavior is an attempt to control our perceptions of external world to fit our internal and personal world (Fatout, 1992).The process of reality therapy is: 1) Make friends – establish a warm, supportive relationship, and insist that clients take a look at the lives they are choosing to lead. 2) Focus upon daily activities and ask what they are doing now. 3) Ask the question: Is what you are doing helping you? 4) Help the client make a plan to do better. Using reality therapy requires a lot of time used in planning and checking with the client on how the plans are being carried out. 5) Commitment to the plan. 6) No excuses.7) No nourishment.These two go together, when there is commitment to plan, there is no excuse for not following through. 8) Never give up. To approach a person with the idea that, if things don’t work, we’re going to give up. Always have as your motto â€Å"We have just begun to fight. † 9) Once the relationship has developed a level of trust and friendship, introduce the client to Jesus Christ and present the plan of salvation. Incorporating biblical principles is the area of problem solving (Watson & Watson, 2005).

Thursday, November 7, 2019

Library Information System Essays

Library Information System Essays Library Information System Essay Library Information System Essay Information System: We are living in the 21st century which is known as the †computer age†, where almost every kind of work is carried out with the help of computer. From the smallest work to the most critical works are carried out with the help of computers. What is more, now with increasing popularity of the internet many important applications have sprung up to make use of this wonderful technology. Many important applications have been designed with the view to communicate information to people all around the world. An information system is an open system that allows input and facilities interaction with the user. In our case †Library Information System† is an open system which allows taking input from the user provide interactive environment to have di? erent output according to user’s need. The library information system maintains the record of Library for the following purpose: 1. For day to day issuing of library books. 2. For fast retrieval of books information. 3. Maintaining information about journals, magazines ,newspapers etc. 4. Information about the vendor’s of books ,journals,newspaper. 5. To produce di? rent reports against di? erent query as per our need. 6. Information about the students and sta? to whom books has been issued. 7. Maintain the record of ? nes. 8. Maintain the record of billing the newspapers, journals etc. 9. Maintain the record maintenance of books. 10. Record of bindings of journals. 1 2. 1Introduction to Initial Investigation: Initial i nvestigation determines whether an alternative system can solve the problem. 2. 2Existing System The present library management system of AEC is to keep record of various books, journals, newspapers, magazines etc to whom they are issued and the vendors and ? es related to the books. The present Library system of AEC is manual, means the librarian maintain the various records in ? les. There is no computer based information system. 2. 3Drawback of the Existing System: The present library system of AEC keeps all its records in paper ? les, which lead to maintaining a lot of ? les and document. This take a lot of time, e? ort and space from the cost involved in it. The addition and maintenance of personnel details of new student to whom books are issued at the beginning of every session as well as the old students who are promoted to the next class, in paper ? es is tiresome, time consuming and costly a? air. The information is kept in an unstructured and unsystematic manner and scatt ered among huge number of ? les. So ? nding of speci? c information needs going through a lot of papers, as proper indexing system is not there. Apart from these, billing of newspapers, journals, calculating total ? ne collected at the end of the month ,year needs a lot of calculation. Then for generating reports separate manual type machine is employed. 2. 4Proposed System: The proposed system aims at making the above system automated and online. The computerized system allows the librarian to calculate the ? ne, the bill by just click of a mouse. The status of a book could be known by knowing the title or author or the accession number of the book. The library form can also be downloaded from it. The software is required to perform the tasks as narrated below: 1. Online membership. 2. Keeps the track of issues and submission of books. 3. Status of b book. 4. Status of a member. 5. Status of the student who has taken the book. 6. Status of the book yet to be returned. 7. Calculation of ? ne. Also various reports will be generated on these topics. The system is also required to provide for 3 levels of access. These are as follows: General User: They have permission to search books in library, change their own password, and can view their own details. Librarian: The librarian is allowed to add, delete and modify the various records related to books and members. He/she can issue books to users. In brief we can say that he/she can maintain the information of the system. Administrator: The administrator has the highest level of access. He/she can creates, modify and delete the account of a member. FEASIBILITY AND REQUIREMENT ANALYSIS 3. 1Introduction Feasibility study is carried to check the workability of the candidate system. It’s impact on the organizational ability to meet the user need and the e? ective use of the system. The object of the feasibility study is not to solve the problem but acquire a sense of its scope. During the study of the de? nition is centralized and aspect of the problem to be included in the system are determined. Consequently cost bene? ts are with great accuracy at this stage. The result of this feasibility study is a normal proposal. There are three key considerations involve in the feasibility study analysis. They are as follows: 3. 1. 1Economic Feasibility Economic Feasibility looks at the ? nancial aspects of the project. It is most frequently used technique for evaluating the e? ectiveness of a proposed system. Economic feasibility is more common known as Cost Bene? t Analysis. The procedure is to determine the bene? ts and savings that are expected from a proposed system and compare them with cost. It bene? t outweighs costs, a decision is taken to design and implement the system. Otherwise, further justi? cation or alternatives in the proposed system will have to be made if it to have a chance of being approved. The proposed system, no doubt require some initial investigation , but it will bene? t the organization in its long run in the form of reduce total number of employees, quick decision making capacity to the management to capture the market occur etc. So, we can say that our project will help the organization in ? nancial gaining at its long run and so it is economically feasible. So, the bene? t expected from the system is much more compared to the cost incurred in computerizing. Hence the system is economically feasible. 3. 1. 2Technical Feasibility Technical Feasibility determines whether the technology needed by the proposed system is available and how this technology can be integrated within the organization. The technical needs of the system may vary considerably but might include: 1. The facility to produce output in a given time 2. Response time under certain conditions 3. Ability to process a certain volume of transaction at a particular speed. 4. Facility to communicate data to distant location During examining the technical feasibility, we have given more importance to the con? guration of the system than the actual make of the hardware con? guration. It provides us a complete picture about our system requirements; like how many workstations are required, how these units are interconnected so that they could operate and communicate smoothly, what speed of input is achieved at particular quality of printing. The proposed system is technically feasible as it examined that the hardware and software is enough at the workplace to carry out the system and also can support addition. The proposed system presents a technically feasible picture since all the resources necessary for the developments of the system under considerations are present in the AEC Library. 3. 1. Operational Feasibility Proposed project are bene? cial only if they can be turned into information systems that will meet the operating requirements of the organization. In general, people resist to changes and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user sta? is likely to have towards the development of a comp uterized system. It is common knowledge that computer installations have something to do with turnover ,transfer, retaining and changes in employee job status. Therefore it is understandable that the introduction of a candidate system requires special e? rt to educate, sell and train the sta? on new ways of conducting business. With the co-operation and understanding of the project development, the whole endeavor becomes not only di? cult but meaningless too. Hence, the operational feasibility is one of the vital factors for the overall success of the project. The proposed system is operationally feasible as: 1. Suitable codes are used to generate reports and queries 2. Although the client organization has not computerized the proposed system but most of the employees are quite familiar with the computer as they have other system already computerized. Moreover, we are providing user manual and help for better understanding and operating system. So , the proposed system is operationally feasible. 3. 1. 4Conclusion From the observation made in the feasibility study described above, it was recommended that proposed system is feasible and justi? ed that the feasibility study could be followed by the system analysis phase. 3. 2Requirement Analysis Information gathering is usually is the ? rst phase of software development project. The purpose of this is to identify and document the exact requirements for the system within the framework of the organization. The requirement analysis must be based upon the user need, the developer and the organization. 3. 2. 1Information Analysis There are four strategies available for determining information requirement. They are as follows: 1. Asking (interviewing) 2. Deriving from the existing information system 3. Review the written documents 4. Synthesizing from the characteristics of the running system In the purpose system the strategies asking and reviewing of the written documents has used for requirement analysis. Presently in the existing system all record are maintained manually. For the development of the proposed system review written documents has done the requirement analysis. Again rule and regulation of the management information system are determined by asking strategy to implement in the proposed system. 4. 1Hardware Requirements: 1. System Type : IBM compatible PC’s 2. Processor: Intel(R) Pentium(R) 4 processor 3. RAM: 512 MB 4. HDD: 40 GB 5. Monitor: Any standard color monitor 4. 2 Software Requirements: 1. Platform: Asp. Net 2. Language Used: C# 3. IDE Used: Microsoft Visual Studio 2008 4. Database: SQL Server 2005 5. OS Used: Windows XP 6. Internet Browser: Any web browser . 3 Technology and Tools Used Microsoft Visual Studio 2008 In computing, Microsoft Visual Studio is an Integrated Development Environment (IDE) from Microsoft. It can be used to develop console and graphical user interface applications along with Windows Forms applications, web sites, web applications, and web services in both native code together with managed code for al l platforms supported by Microsoft Windows, Windows Mobile, Windows CE, . NET Framework, . NET Compact Framework and Microsoft Silver light. Visual Studio includes a code editor supporting IntelliSense as well as code re factoring. The integrated debugger works both as a source-level debugger and a machine-level debugger. Other built-in tools include a forms designer for building GUI applications, web designer, class designer and database schema designer. It accepts plug-ins that enhance the functionality at almost every levelincluding adding support for source-control systems and adding new toolsets like editors and visual designers for domain-speci? c languages or toolsets for other aspects of the software development lifecycle (like the Team Foundation Server client: Team Explorer). Visual Studio supports di? erent programming languages by means of language services, which allow the code editor and debugger to support (to varying degrees) nearly any programming language, provided a language-speci? c service exists. Built-in languages include C/C++ (via Visual C++), VB. NET (via Visual Basic . NET), C# (via Visual C#), and F# (as of Visual Studio 2010). Support for other languages such Python, and Ruby among others is available via language services installed separately. It also supports XML/ XSLT, HTML/ XHTML, JavaScript and CSS. Individual language-speci? versions of Visual Studio also exist which provide more limited language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++. Microsoft provides †Express† editions of its Visual Studio 2010 components Visual Basic, Visual C#, Visual C++, and Visual Web Developer at no cost. Visual Studio 2010, 2008 and 2005 Professional Editions, along with languagespeci? c versions ( Visual Basic, C++, C#, J#) of Visual Studio 2005 are available for free to students as downloads via Microsoft’s Dream Spark program. Visual Studio 2010 is recently released. Designer Visual Studio includes a host of visual designers to aid in the development of applications. These tools include: Windows Forms Designer The Windows Forms designer is used to build GUI applications using Windows Forms. It includes a palette of UI widgets and controls (including buttons, progress bars, labels, layout containers and other controls) that can be dragged and dropped on a form surface. Layout can be controlled by housing the controls inside other containers or locking them to the side of the form. Controls that display data (like textbox, list box, grid view, etc. can be data-bound to data sources like databases or queries. The UI is linked with code using an eventdriven programming model. The designer generates either C# or VB. NET code for the application. WPF Designer The WPF designer, codenamed Cider, was introduced with Visual Studio 2008. Like the Windows Forms designer it supports the drag and drop metaphor. It is used to author user interfaces targeting Wi ndows Presentation Foundation. It supports all WPF functionality including data binding and automatic layout management. It generates XAML code for the UI. The generated XAML ? le is compatible with Microsoft Expression Design, the designer-oriented product. The XAML code is linked with code using a code-behind model. Web designer/development Visual Studio also includes a web-site editor and designer that allow web pages to be authored by dragging and dropping widgets. It is used for developing ASP. NET applications and supports HTML, CSS and JavaScript. It uses a codebehind model to link with ASP. NET code. From Visual Studio 2008 onwards, the layout engine used by the web designer is shared with Microsoft Expression Web. There is also ASP. NET MVC support for MVC technology as separate download and Dynamic Data project available from Microsoft Class designer The Class Designer is used to author and edit the classes (including its members and their access) using UML modeling. The Class Designer can generate C# and VB. NET code outlines for the classes and methods. It can also generate class diagrams from hand-written classes. Data designer The data designer can be used to graphically edit database schemas, including typed tables, primary and foreign keys and constraints. It can also be used to design queries from the graphical view. Mapping designer From Visual Studio 2008 onwards, the mapping designer is used by LINQ to SQL to design the mapping between database schemas and the classes that encapsulate the data. The new solution from ORM approach, ADO. NET Entity Framework, replaces and improves the old technology. Properties Editor The Properties Editor tool is used to edit properties in a GUI pane inside Visual Studio. It lists all available properties (both read-only and those which can be set) for all objects including classes, forms, web pages and other items. Object Browser The Object Browser is a namespace and class library browser for Microsoft . NET. It can be used to browse the namespaces (which are arranged hierarchically) in managed assemblies. The hierarchy may or may not re? ect the organization in the ? le system. Solution Explorer In Visual Studio parlance, a solution is a set of code ? les and other resources that are used to build an application. The ? les in a solution are arranged hierarchically, which might or might not re? ect the organization in the ? le system. The Solution Explorer is used to manage and browse the ? les in a solution. Team Explorer Team Explorer is used to integrate the capabilities of Team Foundation Server, the Revision Control System into the IDE (and the basis for Microsoft’s Code Plex hosting environment for open source projects). In addition to source control it provides the ability to view and manage individual work items (including bugs, tasks and other documents) and to browse TFS statistics. It is included as part of a TFS install and is also available as a download for Visual Studio 2005 and 2008. Team Explorer is also available as a stand-alone environment solely to access TFS services. Data Explorer Data Explorer is used to manage databases on Microsoft SQL Server instances. It allows creation and alteration of database tables (either by issuing T-SQL commands or by using the Data designer). It can also be used to create queries and stored procedures, with the latter in either T-SQL or in managed code via SQL CLR. Debugging and IntelliSense support is available as well. Server Explorer The Server Explorer tool is used to manage database connections on an accessible computer. It is also used to browse running Windows Services, performance counters, and Windows Event Log and message queues and use them as data source. Microsoft SQL Server 2005 SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it de? ned an xml data type that could be used either as a data type in database columns or as literals in queries. XML columns can be associated with XSD schemas; XML data being stored is veri? ed against the schema. XML is converted to an internal binary data type before being stored in the database. Specialized indexing methods were made available for XML data. XML data is queried using XQuery; CLR Integration was the main features with this edition where one could write SQL code as Managed Code these are those code which are being executed by CLR (Common Language Runtime). SQL Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in T-SQL. In addition, it also de? nes a new extension to XQuery, called XML DML that allows querybased modi? cations to XML data. SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed over web services, results are returned as XML. For relational data, T-SQL has been augmented with error handling features (try/catch) and support for recursive queries (Common Table Expressions). SQL Server 2005 has also been enhanced with new indexing algorithms and better error recovery systems. Data pages are check summed for better error resiliency, and optimistic concurrency support has been added for better performance. Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more e? cient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier. SQL CLR was introduced with SQL Server 2005 to let it integrate with the . NET Framework. SQL Server 2005 introduced †MARS† (Multiple Active Results Sets), a method of allowing usage of database connections for multiple purposes. 5. 1Introduction: The design process translates requirements into a representation of the software that can be assessed for quality before coding begins. Once the requirements have been collected and analyzed, it is necessary to identify in detail how the system will be constructed to perform the necessary tasks. The design activity is often divided into 2 separate phases. One is system design and the other is detail design. System Design: System design aims to identify the modules that should be in the system, the speci? cation of these modules and how they interact with each other to produce the desired result. System design describes what components are needed. Detail Design: During detail design the internal logic of the modules speci? ed in the system design is decided. Detail design focuses on designing the logic of each of the modules. Detail design describes how the components identi? ed during system design can be implemented on the system. 5. 2System Design The web enable system for Asaam Engineering College Library has at present three modules with a number of sub modules. The following system design documents focuses detail on these modules and the speci? cation of these modules. The software modules of this web enable system are : Administrator Module 1. Create and delete account 2. System backup 3. View record Member Module 1. View record 2. Compile record 3. Enter record 4. Update record 5. Delete record 6. Generate reports User Module 1. View record 5. 3Detail Design During detailed design the internal logic of each of the modules speci? ed in system design is decided. The main aim of the detail design is to explain how the system work or how the ? ow of data takes place within the system. Detailed design deals with system speci? cation. 5. 3. 1 Abstract Representation of the proposed system Before making the detailed design of a system, ? rst the most abstract representation of the problem is worked out. The following use case diagram gives the working of the proposed system. 5. 3. 2The Uni? d Modeling Language: The uni? ed modeling language (UML) is a language just as sure as C, C++, Pascal, German, English etc. And the UML is probably the newest languages invented by human kind, invented around 1997. The UML is used to build models that will later be used to build real products, in our case Software. A model is a collection of text and diagram that represents something. A model is to software that a blueprint is to a house. Models are valuable for many speci? c reasons. Models are valuable because they consist of pictures to a large extent and even simple pictures can convey a lot of message then a lot of text. The UML is an o? cial de? nition of a pictorial language where there are common symbols and relationships that have one common meaning. The UML supports all aspects of SDLC from requirements gathering to design to development. There are mainly types of diagrams in the UML. The major types are: 5. 3. 1. 1Use Case Diagrams: Use case diagrams are a part of the requirements gathering process and are used in highlevel design to identify fundamental requirements of a system. It describes the participants and is also helpful in developing test plans. A use case’s main symbols are the actor and the use case oval. Use case diagrams are called the mother of all other diagrams of the UML. It gives the static view of a system and focuses on goals not processes. 5. 3. 1. 2Activity Diagram: Activity diagram are like ? ow charts but are more ? exible by supporting parallel application and by dividing areas of responsibility into swim lanes. Activity diagrams are used to analyze processes and if necessary, perform re-engineering. 5. 5 Data Tables A database is a collection of inter-related data, stored with minimum redundancy to serve many users quickly and e? ciently. The primary objectives of a database are fast response time to queries, more information at low cost, control redundancy, clarity and ease of use, accuracy and integrity of the system, fast recovery, privacy and security of information, data and program independence and availability of powerful end user language. The heart of a database is the DBMS. System analysis clears that all data used by process must be derived directly from input documents and reports are to be retrieved from the database ? les. The database of Library Information System† is a collection of di? erent types of information. So it has di? erent tables to access the information easily and e? ciently. Also the data redundancy is checked in the database. To get a nice understanding of the database, we have divided the database into several tables which are as follows. 1. Book Information: The Book Information store the all related information regarding a book. Table 1: Book Information ELEMENT NAME DATA TYPE CONSTRAINT Accession no nvarchar Not null Title nvarchar Not null Author nvarchar Not null Publisher nvarchar Not null Volumme nvarchar Not null Edition year nvarchar Not null nvarchar Not null Source 2. Member Information: Member Information table store the details of a member. The member may be a student, stu? or the librarian. 3. Card Inforamtion: This table stores the information regarding a card. 4. Transaction Table:: This table stores the transaction information of a book. Table 2: Member Information ELEMENT NAME DATA TYPE CONSTRAINT Member id nvarchar Not null nvarchar Not null Roll no Name nvarchar Not null nvarchar Not null Branch Session nvarchar Not null Town/Vill nvarchar Not null nvarchar Not null Dist Table 3: Card Information ELEMENT NAME DATA TYPE CONSTRAINT Card no nvarchar Not null nvarchar Not null Issue date Due date nvarchar Not null Table 4: Transaction Table ELEMENT NAME DATA TYPE CONSTRAINT User id nvarchar Not null Accesion no nvarchar Not null Issue date nvarchar Not null Return date nvarchar Not null Due date nvarchar Not null 5. User Login Form: This table contains data regarding log in information. Table 5: Transaction Table ELEMENT NAME DATA TYPE CONSTRAINT User id nvarchar Not null nvarchar Not null password roles nvarchar Not null Database normalization for the Library Information System The Library Information System is normalized up to BCNF (Boyee Coded Normal Form). st Normal Form: No column in the database contains multiple values, so the database is in the 1st Normal Form. 2nd Normal Form: Every Non key attributes fully functionally dependant on the primary key. Hence it is in 2nd Normal form. 3rd Normal Form: All non key columns do not depend on any other columns . Hence the database is in 3rd Normal Form. 4th Normal Form: A relation R is in BCNF if and only if every determinant is a candidate ke y. All the tables in the Library Information System ful? ll the condition. Hence the database is in BCNF. 6. 1Introduction: A system should always be tested thoroughly before implementing it with regards to its individual programs, the system as a whole, user acceptance etc. This is because implementing a new system is a major job which requires a lot of manpower, time and other resources. There are many levels of testing which ultimately leads to an error free system. The testings which are carried out is described below: 6. 1. 1 Program Testing: The program testing is carried out during the programming stages itself to test the logical and syntax error. 6. 1. 2 Unit Testing: In the unit testing di? rent modules were tested against the speci? cation produced during design of the module. When this testing was done with di? erent modules, some errors were detected and debugged and when modules were found to be working properly independently, next round of testing was followed. 6. 1. 3 String Testing: String testing is a method in which each program is tested to see whether it conforms to the related progra ms in the system. Each portion of the library management system was tested against the entire module with both test and live data before the entire system is ready to test. 6. 1. 4 System Testing: It was done to uncover the weakness that was not found during string testing. The whole system tested to see whether it works properly with valid and invalid data. The system was also tested for recovery after various major failures such as power failure etc. 6. 1. 5 Acceptance Testing: It is the system testing and performance tests performed by the customer to determine whether or not to accept the system. The library information system was accepted by the system. Implementation includes those activities that take place to convert the older system to the new one. The new system may be totally new or replacing an existing. In either case proper modi? cation is essential to provide a reliable system to meet the organization requirements. System implementation describes how the di? erent parts of the system are interacting with each other to give us a feasible software solution. The project is implemented on 3-tier architecture. It is installed on SQL server and which can be accessed by all users. This application is secured by putting user name and password, a user has to enter login details to the system. Figure 1: How the Application works The web server receives a request for some processing. Depending on the sent request the web server passes the request is forwarded to the respective request handler class and after the processing is done. The required data is fetched from the database, the required result i. e. response is passed to the client. Any further request from the client to the server goes through the same procedure. Once the software is developed, delivered and deployed, it enters the maintenance phase. Changes are inevitable when computer based systems are built, therefore mechanism for evaluating, controlling, and making modi? cations has to be adopted. These are called the maintenance activities they include: 1. Corrective Maintenance 2. Adaptive Maintenance 3. Perfective Maintenance or enhancement 4. Perfective Maintenance or reengineering Software may have some errors or bugs remaining in the system that must be removed as they are discovered. This is called corrective maintenance. Once the software system is deployed, the environment in which it operates changes. The software must adapt to the changed environment. The maintenance due to this phenomenon is called the adaptive maintenance. Software must be upgraded and enhanced to include more features and provide more services. As a result new versions of the software are released. This is called perfective maintenance or software enhancement. Reengineering is a rebuilding activity for added functionality, better performance and reliability, and improved maintainability of the software product. Unmaintainable software is subjected to rebuild following a reengineering process model. CONCLUSION 9. 1Introduction: The main concerns of the software development are software quality, programmer’s productivity and increase job satisfaction. The fundamental problems of software development are control of complexity, the lack of physical constraints, and boundaries in software and tendency to mix concerns that belong to di? rent level of abstraction. Finally, it is a people intensive activity for developing software for its use by other people. The †Library Information System† is designed and developed to satisfy the organization needs as far as possible. The Library Information System has built after an extensive research and evaluation of the existin g manual system. The main aim of the system is to maintain the records of the membership registration and the book issued to the member with the very best of accuracy and e? ciency. The purpose system is economically, technically and behaviorally feasible and is incorporated with some security measure so hat only authorized personal can manipulate the record. While developing this software we have tried to consider all the points, may be due to time constraint we may miss some valuable points for which we apologize to the concerned people. Any comments or suggestion that can improve the software are welcome. 9. 2 Overview of the System The proposed system covers the following area and processes: 1. Member’s registration 2. To maintain the record of individual member’s in detail 3. Status of the book. 4. No. of books available subject wise. 5. User friendly interfaces. Limitation of the Propose System The limitations of the purpose system are as follows: 1. † The system cannot give information about the vendors. 2. The data implementation with SQL server. 3. Security consideration and implementation is left to the database . administrator. 4. Need the help of manual system. 9. 4Scope and Further Enhancement of the Propose System: 1. The process of maintaining the detail information of the vendor can be included. 2. More enhancements can be identi? ed when the system is in the operation or used by di? rent users. ABSTRACT This report describes our group’s implementation of an online library information system. We used the Entity-Relationship model to design a database that will store and organize the library’s data. We have created the database using SQL and populated it with some sample data. The system can keep track of library cards, users, librarians, administrator, books and the relationships betwee n them. Using ASP. NET with C#, we have created an Internet-based graphical user interface that allows users and librarians to access the system remotely

Tuesday, November 5, 2019

Pendant vs. Pendent

Pendant vs. Pendent Pendant vs. Pendent Pendant vs. Pendent By Maeve Maddox A reader wants to know when to write pendant and when to write pendent. The answer is not as straightforward as I expected it to be. British usage and American usage are very clear when it comes to the spelling of the words dependant and dependent. According to Penguin Writer’s Manual, In British English, dependent is an adjective and dependant is a noun meaning â€Å"a dependent person.† In American English the form dependent is generally used both as an adjective and as a noun. For example: British usage: The Jones family includes four dependants: three children and one dependent adult. American usage: The Jones family includes four dependents: three children and one dependent adult. According to my supplementary dictionaries, the same distinction between dependant (noun) and dependent (adjective) is drawn in standard Canadian and Australian. Distinctions between pendant and pendent, however, are not so clear-cut. The OED gives only one spelling for the noun and only one for the adjective: pendant (noun): a jewel, bead, tassel, or the like [that] hangs down as an ornament. pendent (adjective): hanging; suspended from or as from the point of attachment, with the point or end hanging downwards. Of a tree: having branches that hang or droop down. According to these definitions, the following examples demonstrate correct usage: The diamond pendant at her throat glittered in the candlelight. (noun) There are several forms of this native bald cypress, some of them more weeping or pendent than others. (adjective) But Merriam-Webster and The Australian Concise Oxford Dictionary indicate that the spellings are interchangeable, although pendant is given first for the noun and pendent first for the adjective. The Google Ngram Viewer indicates that â€Å"pendant branches† was far more common in English in1800 than â€Å"pendent branches.† The two phrases fluctuate on the graph for about a hundred years and then, in 2000, they achieve what looks like equal use. When I did a Web search for the phrase â€Å"pendent branches,† I expected pendent to come up more often than pendant. Instead, I found twice as many examples of â€Å"pendant branches† (49,600 to 25,800). I was especially surprised to find examples of â€Å"pendant branches† at these sites: The Biomathematics Research Centre, University of Canterbury, Christchurch, New Zealand The University of British Columbia Oxford Journals, Molecular Biology and Evolution British speakers have a clear mandate to spell the noun dependant and the adjective dependent. It makes sense for them to apply the same rule to pendant (noun) and pendent (adjective). The spelling pendant for the noun is well established in American usage, but confusion about pendent is sufficiently widespread for The Chicago Manual of Style to include this admonition in the â€Å"good usage vs common usage section†: pendant, noun; pendent, adj. A pendant is an item of dangling jewelry, especially one worn around the neck. What is pendent is hanging or suspended. Advice to American speakers: Do as the British do on this one. Spell the noun pendant and the adjective pendent. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Misused Words category, check our popular posts, or choose a related post below:7 Examples of Passive Voice (And How To Fix Them)Yay, Hooray, Woo-hoo and Other AcclamationsArtist vs. Artisan

Sunday, November 3, 2019

The Broadway Cafe Part II Case Study Example | Topics and Well Written Essays - 2500 words

The Broadway Cafe Part II - Case Study Example These coupons are sent through SMS, MMS, Bluetooth and other mobile media. The consumer can redeem coupon at store or through internet. The mobile coupons are better than the traditional paper coupon in such a way because the coupons are reliable means of encouraging bulk purchases. Whether the product or service is traditional or not the coupon promotes experiment among new target customers. It can promote sales. Once the product is sold through proper distribution channel, the coupon ensures that they sell through to the end user. Through mobile coupon, companies can make a database of customers, because to ‘receive their check’ the customers must provide their number and address. These databases help the company to track purchasers (Mobile Market Association, 2007). There are other benefits of using mobile coupon which include: Customers always keep mobile with them, so they can never leave mobile coupon at home Customer can use mobile coupon system whenever they pref er to buy or eat anything from shop. All they have to do is to send the coupons before lunch time Customer can forward these coupons to their friends and relatives and they will not have to pay any extra charges for forwarding coupons Young people and teenagers prefer mobile coupon system to traditional printed coupon system Uses of mobile coupon can save trees because it doesn’t need any paper unlike the tradition coupon system (Advanced Mobile Solutions, 2010). Question 2 What Are The Risks Involved With Mobile Marketing And M-Coupons? Many customers are disturbed by receiving any type of marketing messages into mobile because mobile is a personal thing (Marketing Minefield, 2007). Mobile is good for marketing, but there are many mobiles which support only 160 characters per SMS and that is not enough to display all information about any special offer (Marketing Minefield, 2007). Privacy is a big issue in mobile phone. At times, customers provide instruction to mobile subsc riber to opt out any unnecessary messages. Because of troubles related with opt-in SMS lists, this marketing technique has its own restrictions towards the customers (Marketing Minefield, 2007). Standardization is also a drawback of mobile coupon system, because each phone has their operating system, different screen size and different browsers. Marketers have to optimize their phone to the customers’ phone for delivering any kind of advertisements or WebPages (Business Link, n.d.). Customers are cautious nowadays to respond to SMS messages because of increase in fraudulent and spam SMSs. They respond negatively to unwanted messages (Business Link, n.d.). Question 3 What Are The Privacy Issues Involved With Mobile Marketing And M-Coupons? In mobile marketing system, securing privacy is a ‘commercially valuable benefit’ which protect customer’s privacy in online environment. Customers always value their privacy. They are always cautious whether a wireless s ite is tracking and receiving any private information about them. It is common that every company needs demographic and behavioral information about their customers for business purposes, but customer feel that no company has the right to sell their information to other organization. The ultimate solution to this conflict is to make a partnership with customers where company can control the ownership of customer’