.

Saturday, August 31, 2019

Designing a process of Intercultural aspects of conflict resolution Essay

In the course to evolve a systematic cultural response to conflict, the first step is to breed familiarity among cultures that adds plurality and multicultural dimension to broaden existing views. In the process of evolving cultural familiarity communication, approaches towards conflict, cultural interpretation of life and identities and roles are identified as essential parameters (Carbaugh, 1990). Out of these, role and range of communication has already been discussed. Now it is time to look at rest of three factors. Responses towards a conflict situation are largely culture dependent, guided by the ways each culture has systemized itself towards conflict. Direct and straightforward ways of approaching conflict, generally acceptable in western society, may seem threatening and offensive in eastern cultures accustomed to third party negotiations. Similarly, cultures that follow calm and reasonable response to conflict, may feel intimidated by emotional and passionate response to conflict situation (Carbaugh, 1990). Cultural interpretation of life sets the starting point for people that forms basis of their thinking, values and philosophy, eventually deciding the role they would play in every conflict and their outcome they come across. It is the cultural orientation that makes societies disciplined or diffused, generalized or specific, value oriented or bohemian, and cooperative or isolated (Carbaugh, 1990). Hence cultural conflict resolution ultimately depends on the depth of understanding attained through interaction. References Burrel, N. A, 1990. Theory and Research in Conflict Management. edit M. Afzalur Rahim – editor. Praeger Publishers. :New York Rahim, M. A (2001), Managing Conflict in Organizations. Contributors: M. Afzalur: Quorum Books. Westport, CT Handbook of Conflict Management. (2003) . Jerri Killian ,William J. Pammer Jr. (edits): Marcel Dekker. New York. Womack, D. F, 1990. Theory and Research in Conflict Management. edit M. Afzalur Rahim – editor. Praeger Publishers.:New York. Leborn, M. 2003. Culture and Conflict. Accessed online on 17. 11. 2007. http://www. beyondintractability. org/essay/culture_conflict/ Grosse, C. U. 2002. Managing Communication within Virtual Intercultural Teams Business Communication Quarterly, Vol. 65, 2002. Holliday, A. , Hyde, M. ,, Kullman, J. 2004. Intercultural Communication: An Advanced Resource Book; Routledge, Carbaugh, D. 1990 Cultural Communication and Intercultural Contact; Lawrence Erlbaum Associates.

Friday, August 30, 2019

Database Management System

Dinky Hire firm is a small family business that stocks general equipment such as garden tools, car maintenance tools etc. For hiring to its customers. A database system is required to simplify management of the business and to provide some financial information and maintaining stocks. Equipment's are classified under various categories.Equipment's are of different brands within each category. Brands are varies in their prices and obtained from various suppliers. The known categories are: a) Gardening Equipment d) Decorating Equipment g) Heating and Lighting b) Building Equipment e) Car Maintenance h) Miscellaneous c) Access Equipment f) Power Tools Prices of equipment offered by the various suppliers as well as the delivery time for that equipment must be kept in the DB. The firm arranges for business customers only, a 24-hour support to replace any Rosen or faulty equipment that on hire.Upon receiving a customer complain, an immediate delivery will be arranged to replace the faulty equipment provided that it is in stock. Otherwise, a refund for the full charged amount will be administered. Private customers though, in similar cases, must bring the faulty equipment(s) themselves and replace them with working ones or get a full refund if there isn't any available in stock. Business customers are given various membership categories for discount purposes. These are silver, gold and diamond memberships.Silver members get 10%; Gold members get 25% and Diamond members get 40%. Hiring equipment's for private customers are restricted to those who live within 5 miles radius from their address. This distance from the private customer address is measured on map on the wall and the information stored on the customer record the first time the hire equipment's. No such restriction exists for business customers. Requirements: The following sections specify the requirements of the system. The computer is to be used when a customer visits the company to hire equipment's.At this time the following processing is necessary for each transaction: ; If not already known (I. E. Not previously entered into the DB), the customer's details are recorded. ; The equipment to be hired, with expected return date, is recorded. ; The equipment stock as recorded in the database is updated automatically. When business customers' call for support to replace any broken or faulty equipment's on hire, a log must be made in the DB and whether replacement equipment is arranged and delivered or a full refund is given.When the equipment is returned, the following processing is required: ; The actual return date is entered. ; An invoice is printed which shows the item borrowed and calculates the total cost including VAT. The cost should be based on a rate for one day plus a rate for each additional day. The daily rate varies between weekdays and weekend days. ; The stock figures are adjusted. ; Business customer discounts will be calculated according to the membership category, whil e no discount is given to private customers. 2. 3. 4. Design and create a database to the above scenario.State any assumptions made (if any). Map the diagram in to Relational Schema and Proof your answer is normalized up to BC. Create the Database using Myself. Final report should contain: 0 Assumptions 0 Entity Relationship Diagram 0 Relational Schema 0 Proof of Normalization 0 Myself commands which you have used to create the database Assignment Background A Database Management System (DB'S) is a set of programs that enables you to store, modify, and extract information from a database, it also provides users with tools to add, delete, access, modify, and analyze data stored in one location.A group can access the data by using query and reporting tools that are part of the DB'S or by using application programs specifically written to access the data. Assignment Requirements 1 . The final document should be Professional and systematic computerized document. 2. It is essential to ha ve References (if any). 3. Assignment should be word-processed and should be spiral bound. 4. The page after the Cover page should be as the assignment marking scheme (Attachment No 001). 5. Submit the softwood of the assignment along with the bound hard copy. Written Assignment Format:To receive full credit, assignments should maintain the following format: 0 Font: Caliber, Size: apt. 0 Spacing: standard. 0 File type (for electronic submission by prior arrangement): MS Word (â€Å". Doc† only) 0 Name/headers/footers on each page. Page number on each page. Cover page/ Contains page. Rules and Regulation of the Assignment 1 . Assignments will NOT be accepted after the last date of acceptance under any circumstance. Database Management System BABCOCK UNIVERSITY ILISHAN REMO OGUN STATE PROJECT PROPOSAL IN PARTIAL FULFILLMENT OF THE COURSE SOFTWARE ENGINEERING COMPUTER SCIENCE ON HOTEL MANAGEMENT SYSTEM GROUP 8 PROJECT MEMBERS: 1. XXXXXXX 2. XXXXXXXXXXX 3. XXXXXXXXXXXX 4. XXXXXXXXXX 5. OBRUTSE ONAJITE 09/1635 6. OKOROSOBO TEMITOPE 7. OLAJIDE SEGUN 8. XXXXXXXXXX 9. XXXXXXXX 10. XXXXXXXXXX PROJECT MANAGER: MRS AYITE 1. INTRODUCTION A. BACKGROUND ‘Online Alumni System' An Alumni Management System is a system that helps in keeping the records of the past students in which that it can be sorted by the year or by their major.Alumni management system is implemented in various schools around the globe, so it can help the student to get together when there is the need to get together, maybe for a get together Dinner and so on. B. SCOPE /OVERVIEW The Online alumni system is designed to maintain the details of the past student, so when the school wants to check the year a student graduated for some unforeseen circumstances. Usin g this project, the administrator registers each past student into the directory and gives them their username and password so they can login and update their profile. The Alumni Management System provides following features. Members Directory * Online photo gallery * Comment posting facility C. STATEMENT OF PROBLEM The aim of the software is to develop a software that helps the university to keep good record of their old students, in order to refer to them when necessary, even on occasions where they want to make a year book for the graduating class or something. D. PROJECT OBJECTIVES OBJECTIVE: The central objective of this project is to provide facility for record system for the university committee. In previous system (i. e. Manual System), the student has to queue up to register his/her name in the alumni register on paper.Database Management System and DataThis was the fully time consuming, expensive etc. Through this product, he can update his database maybe when he is marrie d and he wants to change his status to married and so on. 2. SYSTEM ANALYSIS System analysis is the process of gathering and interpreting facts, diagnosing problems and using the facts to improve the system. System analysis specifies what the system should do. A system is a set of components that interact to accomplish some purpose. * Identifying the drawback of the existing system * Identify the need for conversion * Perform feasibility study * Identify hardware, software and database requirements Create a system definition that forms the foundation for subsequent work A. SYSTEM STUDY Overview of the Existing System In the existing system user can face so much problems. They have to waist so much time for the registering. This is the time consuming task. Sometimes user is very tired then they face the so much problem. Sometimes user feel the laziness, this is also failure for the existing system. B. FEASIBILITY STUDY The feasibility of a project can be ascertained in terms of techn ical factors, economic factors, or both. A feasibility study is documented with a report showing all the ramifications of the project.Technical Feasibility Technical feasibility refers to the ability of the process to take advantage of the current state of the technology in pursuing further improvement. The technical capability of the personnel as well as the capability of the available technology should be considered. Technology transfer between geographical areas and cultures needs to be analyzed to understand productivity loss (or gain) due to differences (see Cultural Feasibility). Since we are using PHP 5, Tomcat 6. 0 and so on technically our project is feasible. Economic FeasibilityThis involves the feasibility of the proposed project to generate economic benefits. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new industrial projects. The tangible and intangible aspects of a project should be translated into e conomic terms to facilitate a consistent basis for evaluation. Cultural Feasibility Cultural feasibility deals with the compatibility of the proposed project with the cultural setup of the project environment. In labor-intensive projects, planned functions must be integrated with the local cultural practices and beliefs.For example, religious beliefs may influence what an individual is willing to do or not do. Social Feasibility Social feasibility addresses the influences that a proposed project may have on the social system in the project environment. The ambient social structure may be such that certain categories of workers may be in short supply or nonexistent. The effect of the Project on the social status of the project participants must be assessed to ensure compatibility. It should be recognized that workers in certain industries may have certain status symbols within the society. Scope of Feasibility AnalysisIn general terms, the elements of a feasibility analysis for a pro ject should cover the following: I. Need Analysis This indicates recognition of a need for the project. The need may affect the organization itself, another organization, the public, or the government. A preliminary study is then conducted to confirm and evaluate the need. A proposal of how the need may be satisfied is then made. Relevant questions that should be asked include: * Is the need significant enough to justify the proposed project? * Will the need still exist by the time the project is completed? * What are the alternate means of satisfying the need? What are the economic, social, environmental, and political impacts of the need? II. Process Work This is the preliminary analysis done to determine what will be required to satisfy the need. The work may be performed by a consultant who is an expert in the project field. The preliminary study often involves system models or prototypes. For technology-oriented projects, artist's conception and scaled-down models may be used f or illustrating the general characteristics of a process. A simulation of the proposed system can be carried out to predict the outcome before the actual project starts. III. Engineering & DesignThis involves a detailed technical study of the proposed project. Written quotations are obtained from suppliers and subcontractors as needed. Technology capabilities are evaluated as needed. Product design, if needed, should be done at this time. IV. Cost Estimate This involves estimating project cost to an acceptable level of accuracy. Levels of around -5% to +15% are common at this level of a project plan. Both the initial and operating costs are included in the cost estimation. Estimates of capital investment and of recurring and nonrecurring costs should also be contained in the cost estimate document.Sensitivity analysis can be carried out on the estimated cost values to see how sensitive the project plan is to the estimated cost values. V. Financial Analysis This involves an analysis of the cash flow profile of the project. The analysis should consider rates of return, inflation, sources of capital, payback periods, breakeven point, residual values, and sensitivity. This is a critical analysis since it determines whether or not and when funds will be available to the project. The project cash flow profile helps to support the economic and financial feasibility of the project. VI. Project ImpactsThis portion of the feasibility study provides an assessment of the impact on the proposed project. Environmental, social, cultural, political, and economic impacts may be some of the factors that will determine how a project is perceived by the public. The value added potential of the project should also be assessed. A value added tax may be assessed based on the price of a product and the cost of the raw material used in making the product. The tax so collected may be viewed as a contribution to government coffers. Conclusions and Recommendations The feasibility study s hould end with the overall outcome of the project analysis.This may indicate an endorsement or disapproval of the project. Recommendations on what should be done should be included in this section of the feasibility report. 3. SYSTEM DESIGN System design provides the understanding and procedural details necessary for implementing the system recommended in the system study. Emphasis is on translating the performance requirements into design specifications. The design phase is a transition from a user – oriented document (System proposal) to a documented oriented to the programmers or database personnel. A. GRAPHICAL REPRESENTATION I.Entity Relationship Diagram It is clear that the physical objects from the previous section the administrator, rooms, customer all correspond to entities in the Entity-Relationship model, and the operations to be done on those entities. Date of Birth Date of Birth SEX SEX NAME NAME Student Student Email Email Address Address IS A IS A Alumnus Alumn us IS A IS A GRADUATION YEAR GRADUATION YEAR GRADUATE STUDENT GRADUATE STUDENT POSTGRADUATE POSTGRADUATE COURSE COURSE DEGREE PROGRAMME DEGREE PROGRAMME COMPUTING TOOLS A. METHODOLOGIES B. PROGRAMMING LANGUAGES TOOLS USED FOR DEVELOPING: Language -> PHPDatabase -> My SQL Web Server -> APACHE TOMCAT 6. 0 IDE -> NETBEANS Programming language choice affects the productivity and code quality in several ways. Programmers working with high level language achieve better productivity and quality than those working with low level language, because former is more expensive in nature. We have used HTML, PHP scripting languages for the coding as we have to make the software and these languages provide great compatibility and flexibility. Overview of Programming Languages Overview of PHP The PHP technology will be used to interface HTML.The PHP technology provides a seamless connection and presents an easy to use, PHP-like programming constructs that can be scripted within HTML files. Hypertext preprocessor is a technology for developing web pages that include dynamic content. A PHP page contains standard markup language elements, such as HTML tags, just like a regular web page. A PHP page also contains special PHP elements that allow the server to insert dynamic content in the web page. ADVANTAGES OF PHP 1. PHP supports both scripting and element-based dynamic content. 2. Allows developing custom tag libraries. . PHP pages are precompiled for efficient server processing. 4. PHP pages can be used in combination with servlets that handle the business logic. 5. High Security. . 6. High Quality tool supports. 7. Write Once, Run Everywhere. 8. PHP is vender Neutral Overview of Java Script Java script is a general purpose, prototype based, object oriented scripting language developed jointly by sun and Netscape and is meant for the WWW. Java script borrows most of its syntax from java but also inherits from awk and perl, with some indirect influence from self in its object prot otype system.Java Script is almost as easy to learn as HTML and it can be included directly in HTML documents. Java Script was developed independently of java. Java script is a high level scripting language that does not depend on or expose particular machine representations or operating system services. FEATURES OF JAVA SCRIPT Java script is embedded into HTML documents and is executed with in them. Java script is browser dependent. JavaScript is an interpreted language that can be interpreted by the browser at run time. Java script is loosely typed language. Java script is an object-based language.Java script is an Event-Driven language and supports event handlers to specify the functionality of a button. The Struts framework provides the flexibility to develop the much less coupled applications. It generalizes and strictly implements MVC-model View Controller Architecture. That is the basic need of our architecture. Overview of Apache Tomcat Apache Tomcat is a servlet container d eveloped by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a â€Å"pure Java† HTTP web server environment for Java code to run.Tomcat should not be confused with the Apache web server, which is a C implementation of an HTTP web server; these two web servers are not bundled together. Apache Tomcat includes tools for configuration and management, but can also be configured by editing XML configuration files. Overview of MySQL MySQL is a multithreaded, multi-user SQL database management system (DBMS) which has, according to MySQL AB, more than 10 million installations. MySQL is owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, which holds the copyright to most codebase. Libraries for ccessing MySQL databases are available in all major programming languages with language-specific APIs. In addition, an ODBC interface called MyODBC allows additio nal programming languages that support the ODBC interface to communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server and official libraries are mostly implemented in ANSI C. C. PLATFORM I. HARDWARE SPECIFICATIONS Processor: Pentium III or higher RAM: 128 MB or More Hard Disk: 20 GB or More Modem: 56KBPS / LAN Card II. SOFTWARE SPECIFICATIONS Operating System: Windows XP, VISTA 7. Web Server: ApacheFront End: JSP Back End: MySQL Scripts: JavaScript Language: JAVA III. User Interface Requirements The user of the proposed system requires that the developed software should be user friendly, have security access, and ensure the privacy of the administrator and produce results in timely manner. The users are not frequently exposed to the on-line hotel management, so the system interface to the user must be simple and understandable. The web pages must be user-friendly and must be in an easy-to-use style. The user must be able to easily switch among various I/O scree ns.The product is well designed so that it can be used easily by layman and also the users who are novices to the system. The system should be designed in such a way that only authorized users should be allowed to login to the system. The user interface should be as interactive as possible. A user-friendly interface must be provided so that the user can easily interact with the system and comprehend things in a quicker and easier way. The system must provide reliable and up-to-date information. The application should be efficient so that the user does not spend much time in training.Consistency will increase the confidence of the user in the reliability of the application. The user must be limited with a small set of operations to achieve the result. The application should be visually and conceptually clear. The interface should accommodate user mistakes easily and fast. It should minimize the errors and should handle them peacefully. IV. Database Requirements The database should be designed in such a way that it enhances the efficient storage, retrieval and manipulation of all the information associated. For instance all general information regarding an item attribute should be stored in a particular table.The concerned users should have the facility to query to the database and supply the basic information easily. Security mechanisms should be provided so that no confidential details should be accessible to unauthorized persons. The database should be organized in such a way that it helps in preparing various essential summaries needed for users. V. Functional Requirements The various functional requirements of the system can be summarized as: 1. A home page that is user friendly and ambiguous. 2. Administrator Login Facility 3. Links to other related sites. 4.Ability of Administrator to perform any tasks which you can see in my snapshots (below) and in my running project. 5. A login page for alumnus to create a new user if not registered VI. Non-Functional Requirements Non-functional requirements define the system properties and constraints that arise through user needs, because of the budgeted constraints or organizational policies, or because of the need for interoperability with other software or due to the external factors such as safety regulations privacy registrations and so on. VII. Other Requirements and ConstraintsPerformance Requirements * The database should be centralized and secure. * The system should be user friendly and easily accessible * The system must be reliable. Design Requirements The main objectives of input design are: * Controlling the amount of input * Keeping the process simple, avoiding errors. * The best thing in the input design is to achieve all the objectives mentioned in the simplest manner possible. The main objectives of output design are: * Identifying the specific outputs. * Creating reports for displaying and storing information. 4. MILESTONES A.TIMELINES I. DISTRIBUTION OF TASKS AND SUBTASKS II . TEAM MEMBERS RESPONSIBILITIES Each project member has been given a role to perform which will make the project work go smoothly. | | | | | | | | | | | | III. PROPOSED TIMEFRAME FOR EACH TASK AS ASSIGNED B. DEADLINES FOR EACH TASK AND MODULES C. PROPOSED DUE DATE 5. POSSIBLE TEST CASES AND PLANS 6. LIMITATIONS The Hotel Management System can be used for any organization that may require detailed information at one time or the other. This application covers a relatively large scope more than is highlighted in this project work.There is always room for improvement depending on the intending area of application. For the purpose of this project, however, we will use Arzu Hotels as a set case. The limitations of this project are: * Unavailability of sufficient time due to tight academic schedule. * Lack of internet connection to perform necessary research Despite these limitations, we will be able to design a functional Hotel Management System. 7. CONCLUSION From a proper analysis of po sitive points and constraints on the component, it can be safely concluded that the product is a highly efficient GUI based component.This application is working properly and meeting to all user requirements. This component can be easily plugged in many other systems. 8. APPENDIX I. Programming Programming is not only a creative activity but also an intellectually rigorous discipline. It is the part where the design is actually translated into the machine readable form which is called program. II. Programming Principles The main activity of coding phase is to translate design into code. If we translate the structure of the design properly, we will have structured programs. A structured program doesn’t just â€Å"happen†.It is the end product of series of efforts that try to understand the problem and develop a structured, understandable solution plan. It is all impossible to write a good structured program based on unstructured poor design . The coding phase affects bo th testing and maintenance , profoundly the time spent in coding is small percentage of the total software cost, while testing and maintenance consume the major percentage . The goal of coding phase is not to simplify the job of the tester and maintainer. III. Programming style A well written program is more easily read and understood both by the author and by others who work that program.A good Programming style is characterized by the following: * Simplicity * Readability * Good documentation * Changeability * Predictability * Good Structure IV. Selection of Coding Language All the programs coded should be based on a standard which can tend to the needs of all readers, i. e. it should provide degree of predictability in programs of a common type. There are many aspects to what the programs must do so to enable the different users to comfortably work on it. For example the program should: * Be corrective of the solution * Have maximum speed of execution * Be comprehensive and east to maintain Database Management System BABCOCK UNIVERSITY ILISHAN REMO OGUN STATE PROJECT PROPOSAL IN PARTIAL FULFILLMENT OF THE COURSE SOFTWARE ENGINEERING COMPUTER SCIENCE ON HOTEL MANAGEMENT SYSTEM GROUP 8 PROJECT MEMBERS: 1. XXXXXXX 2. XXXXXXXXXXX 3. XXXXXXXXXXXX 4. XXXXXXXXXX 5. OBRUTSE ONAJITE 09/1635 6. OKOROSOBO TEMITOPE 7. OLAJIDE SEGUN 8. XXXXXXXXXX 9. XXXXXXXX 10. XXXXXXXXXX PROJECT MANAGER: MRS AYITE 1. INTRODUCTION A. BACKGROUND ‘Online Alumni System' An Alumni Management System is a system that helps in keeping the records of the past students in which that it can be sorted by the year or by their major.Alumni management system is implemented in various schools around the globe, so it can help the student to get together when there is the need to get together, maybe for a get together Dinner and so on. B. SCOPE /OVERVIEW The Online alumni system is designed to maintain the details of the past student, so when the school wants to check the year a student graduated for some unforeseen circumstances. Usin g this project, the administrator registers each past student into the directory and gives them their username and password so they can login and update their profile. The Alumni Management System provides following features. Members Directory * Online photo gallery * Comment posting facility C. STATEMENT OF PROBLEM The aim of the software is to develop a software that helps the university to keep good record of their old students, in order to refer to them when necessary, even on occasions where they want to make a year book for the graduating class or something. D. PROJECT OBJECTIVES OBJECTIVE: The central objective of this project is to provide facility for record system for the university committee. In previous system (i. e. Manual System), the student has to queue up to register his/her name in the alumni register on paper.Database Management System and DataThis was the fully time consuming, expensive etc. Through this product, he can update his database maybe when he is marrie d and he wants to change his status to married and so on. 2. SYSTEM ANALYSIS System analysis is the process of gathering and interpreting facts, diagnosing problems and using the facts to improve the system. System analysis specifies what the system should do. A system is a set of components that interact to accomplish some purpose. * Identifying the drawback of the existing system * Identify the need for conversion * Perform feasibility study * Identify hardware, software and database requirements Create a system definition that forms the foundation for subsequent work A. SYSTEM STUDY Overview of the Existing System In the existing system user can face so much problems. They have to waist so much time for the registering. This is the time consuming task. Sometimes user is very tired then they face the so much problem. Sometimes user feel the laziness, this is also failure for the existing system. B. FEASIBILITY STUDY The feasibility of a project can be ascertained in terms of techn ical factors, economic factors, or both. A feasibility study is documented with a report showing all the ramifications of the project.Technical Feasibility Technical feasibility refers to the ability of the process to take advantage of the current state of the technology in pursuing further improvement. The technical capability of the personnel as well as the capability of the available technology should be considered. Technology transfer between geographical areas and cultures needs to be analyzed to understand productivity loss (or gain) due to differences (see Cultural Feasibility). Since we are using PHP 5, Tomcat 6. 0 and so on technically our project is feasible. Economic FeasibilityThis involves the feasibility of the proposed project to generate economic benefits. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new industrial projects. The tangible and intangible aspects of a project should be translated into e conomic terms to facilitate a consistent basis for evaluation. Cultural Feasibility Cultural feasibility deals with the compatibility of the proposed project with the cultural setup of the project environment. In labor-intensive projects, planned functions must be integrated with the local cultural practices and beliefs.For example, religious beliefs may influence what an individual is willing to do or not do. Social Feasibility Social feasibility addresses the influences that a proposed project may have on the social system in the project environment. The ambient social structure may be such that certain categories of workers may be in short supply or nonexistent. The effect of the Project on the social status of the project participants must be assessed to ensure compatibility. It should be recognized that workers in certain industries may have certain status symbols within the society. Scope of Feasibility AnalysisIn general terms, the elements of a feasibility analysis for a pro ject should cover the following: I. Need Analysis This indicates recognition of a need for the project. The need may affect the organization itself, another organization, the public, or the government. A preliminary study is then conducted to confirm and evaluate the need. A proposal of how the need may be satisfied is then made. Relevant questions that should be asked include: * Is the need significant enough to justify the proposed project? * Will the need still exist by the time the project is completed? * What are the alternate means of satisfying the need? What are the economic, social, environmental, and political impacts of the need? II. Process Work This is the preliminary analysis done to determine what will be required to satisfy the need. The work may be performed by a consultant who is an expert in the project field. The preliminary study often involves system models or prototypes. For technology-oriented projects, artist's conception and scaled-down models may be used f or illustrating the general characteristics of a process. A simulation of the proposed system can be carried out to predict the outcome before the actual project starts. III. Engineering & DesignThis involves a detailed technical study of the proposed project. Written quotations are obtained from suppliers and subcontractors as needed. Technology capabilities are evaluated as needed. Product design, if needed, should be done at this time. IV. Cost Estimate This involves estimating project cost to an acceptable level of accuracy. Levels of around -5% to +15% are common at this level of a project plan. Both the initial and operating costs are included in the cost estimation. Estimates of capital investment and of recurring and nonrecurring costs should also be contained in the cost estimate document.Sensitivity analysis can be carried out on the estimated cost values to see how sensitive the project plan is to the estimated cost values. V. Financial Analysis This involves an analysis of the cash flow profile of the project. The analysis should consider rates of return, inflation, sources of capital, payback periods, breakeven point, residual values, and sensitivity. This is a critical analysis since it determines whether or not and when funds will be available to the project. The project cash flow profile helps to support the economic and financial feasibility of the project. VI. Project ImpactsThis portion of the feasibility study provides an assessment of the impact on the proposed project. Environmental, social, cultural, political, and economic impacts may be some of the factors that will determine how a project is perceived by the public. The value added potential of the project should also be assessed. A value added tax may be assessed based on the price of a product and the cost of the raw material used in making the product. The tax so collected may be viewed as a contribution to government coffers. Conclusions and Recommendations The feasibility study s hould end with the overall outcome of the project analysis.This may indicate an endorsement or disapproval of the project. Recommendations on what should be done should be included in this section of the feasibility report. 3. SYSTEM DESIGN System design provides the understanding and procedural details necessary for implementing the system recommended in the system study. Emphasis is on translating the performance requirements into design specifications. The design phase is a transition from a user – oriented document (System proposal) to a documented oriented to the programmers or database personnel. A. GRAPHICAL REPRESENTATION I.Entity Relationship Diagram It is clear that the physical objects from the previous section the administrator, rooms, customer all correspond to entities in the Entity-Relationship model, and the operations to be done on those entities. Date of Birth Date of Birth SEX SEX NAME NAME Student Student Email Email Address Address IS A IS A Alumnus Alumn us IS A IS A GRADUATION YEAR GRADUATION YEAR GRADUATE STUDENT GRADUATE STUDENT POSTGRADUATE POSTGRADUATE COURSE COURSE DEGREE PROGRAMME DEGREE PROGRAMME COMPUTING TOOLS A. METHODOLOGIES B. PROGRAMMING LANGUAGES TOOLS USED FOR DEVELOPING: Language -> PHPDatabase -> My SQL Web Server -> APACHE TOMCAT 6. 0 IDE -> NETBEANS Programming language choice affects the productivity and code quality in several ways. Programmers working with high level language achieve better productivity and quality than those working with low level language, because former is more expensive in nature. We have used HTML, PHP scripting languages for the coding as we have to make the software and these languages provide great compatibility and flexibility. Overview of Programming Languages Overview of PHP The PHP technology will be used to interface HTML.The PHP technology provides a seamless connection and presents an easy to use, PHP-like programming constructs that can be scripted within HTML files. Hypertext preprocessor is a technology for developing web pages that include dynamic content. A PHP page contains standard markup language elements, such as HTML tags, just like a regular web page. A PHP page also contains special PHP elements that allow the server to insert dynamic content in the web page. ADVANTAGES OF PHP 1. PHP supports both scripting and element-based dynamic content. 2. Allows developing custom tag libraries. . PHP pages are precompiled for efficient server processing. 4. PHP pages can be used in combination with servlets that handle the business logic. 5. High Security. . 6. High Quality tool supports. 7. Write Once, Run Everywhere. 8. PHP is vender Neutral Overview of Java Script Java script is a general purpose, prototype based, object oriented scripting language developed jointly by sun and Netscape and is meant for the WWW. Java script borrows most of its syntax from java but also inherits from awk and perl, with some indirect influence from self in its object prot otype system.Java Script is almost as easy to learn as HTML and it can be included directly in HTML documents. Java Script was developed independently of java. Java script is a high level scripting language that does not depend on or expose particular machine representations or operating system services. FEATURES OF JAVA SCRIPT Java script is embedded into HTML documents and is executed with in them. Java script is browser dependent. JavaScript is an interpreted language that can be interpreted by the browser at run time. Java script is loosely typed language. Java script is an object-based language.Java script is an Event-Driven language and supports event handlers to specify the functionality of a button. The Struts framework provides the flexibility to develop the much less coupled applications. It generalizes and strictly implements MVC-model View Controller Architecture. That is the basic need of our architecture. Overview of Apache Tomcat Apache Tomcat is a servlet container d eveloped by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a â€Å"pure Java† HTTP web server environment for Java code to run.Tomcat should not be confused with the Apache web server, which is a C implementation of an HTTP web server; these two web servers are not bundled together. Apache Tomcat includes tools for configuration and management, but can also be configured by editing XML configuration files. Overview of MySQL MySQL is a multithreaded, multi-user SQL database management system (DBMS) which has, according to MySQL AB, more than 10 million installations. MySQL is owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, which holds the copyright to most codebase. Libraries for ccessing MySQL databases are available in all major programming languages with language-specific APIs. In addition, an ODBC interface called MyODBC allows additio nal programming languages that support the ODBC interface to communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server and official libraries are mostly implemented in ANSI C. C. PLATFORM I. HARDWARE SPECIFICATIONS Processor: Pentium III or higher RAM: 128 MB or More Hard Disk: 20 GB or More Modem: 56KBPS / LAN Card II. SOFTWARE SPECIFICATIONS Operating System: Windows XP, VISTA 7. Web Server: ApacheFront End: JSP Back End: MySQL Scripts: JavaScript Language: JAVA III. User Interface Requirements The user of the proposed system requires that the developed software should be user friendly, have security access, and ensure the privacy of the administrator and produce results in timely manner. The users are not frequently exposed to the on-line hotel management, so the system interface to the user must be simple and understandable. The web pages must be user-friendly and must be in an easy-to-use style. The user must be able to easily switch among various I/O scree ns.The product is well designed so that it can be used easily by layman and also the users who are novices to the system. The system should be designed in such a way that only authorized users should be allowed to login to the system. The user interface should be as interactive as possible. A user-friendly interface must be provided so that the user can easily interact with the system and comprehend things in a quicker and easier way. The system must provide reliable and up-to-date information. The application should be efficient so that the user does not spend much time in training.Consistency will increase the confidence of the user in the reliability of the application. The user must be limited with a small set of operations to achieve the result. The application should be visually and conceptually clear. The interface should accommodate user mistakes easily and fast. It should minimize the errors and should handle them peacefully. IV. Database Requirements The database should be designed in such a way that it enhances the efficient storage, retrieval and manipulation of all the information associated. For instance all general information regarding an item attribute should be stored in a particular table.The concerned users should have the facility to query to the database and supply the basic information easily. Security mechanisms should be provided so that no confidential details should be accessible to unauthorized persons. The database should be organized in such a way that it helps in preparing various essential summaries needed for users. V. Functional Requirements The various functional requirements of the system can be summarized as: 1. A home page that is user friendly and ambiguous. 2. Administrator Login Facility 3. Links to other related sites. 4.Ability of Administrator to perform any tasks which you can see in my snapshots (below) and in my running project. 5. A login page for alumnus to create a new user if not registered VI. Non-Functional Requirements Non-functional requirements define the system properties and constraints that arise through user needs, because of the budgeted constraints or organizational policies, or because of the need for interoperability with other software or due to the external factors such as safety regulations privacy registrations and so on. VII. Other Requirements and ConstraintsPerformance Requirements * The database should be centralized and secure. * The system should be user friendly and easily accessible * The system must be reliable. Design Requirements The main objectives of input design are: * Controlling the amount of input * Keeping the process simple, avoiding errors. * The best thing in the input design is to achieve all the objectives mentioned in the simplest manner possible. The main objectives of output design are: * Identifying the specific outputs. * Creating reports for displaying and storing information. 4. MILESTONES A.TIMELINES I. DISTRIBUTION OF TASKS AND SUBTASKS II . TEAM MEMBERS RESPONSIBILITIES Each project member has been given a role to perform which will make the project work go smoothly. | | | | | | | | | | | | III. PROPOSED TIMEFRAME FOR EACH TASK AS ASSIGNED B. DEADLINES FOR EACH TASK AND MODULES C. PROPOSED DUE DATE 5. POSSIBLE TEST CASES AND PLANS 6. LIMITATIONS The Hotel Management System can be used for any organization that may require detailed information at one time or the other. This application covers a relatively large scope more than is highlighted in this project work.There is always room for improvement depending on the intending area of application. For the purpose of this project, however, we will use Arzu Hotels as a set case. The limitations of this project are: * Unavailability of sufficient time due to tight academic schedule. * Lack of internet connection to perform necessary research Despite these limitations, we will be able to design a functional Hotel Management System. 7. CONCLUSION From a proper analysis of po sitive points and constraints on the component, it can be safely concluded that the product is a highly efficient GUI based component.This application is working properly and meeting to all user requirements. This component can be easily plugged in many other systems. 8. APPENDIX I. Programming Programming is not only a creative activity but also an intellectually rigorous discipline. It is the part where the design is actually translated into the machine readable form which is called program. II. Programming Principles The main activity of coding phase is to translate design into code. If we translate the structure of the design properly, we will have structured programs. A structured program doesn’t just â€Å"happen†.It is the end product of series of efforts that try to understand the problem and develop a structured, understandable solution plan. It is all impossible to write a good structured program based on unstructured poor design . The coding phase affects bo th testing and maintenance , profoundly the time spent in coding is small percentage of the total software cost, while testing and maintenance consume the major percentage . The goal of coding phase is not to simplify the job of the tester and maintainer. III. Programming style A well written program is more easily read and understood both by the author and by others who work that program.A good Programming style is characterized by the following: * Simplicity * Readability * Good documentation * Changeability * Predictability * Good Structure IV. Selection of Coding Language All the programs coded should be based on a standard which can tend to the needs of all readers, i. e. it should provide degree of predictability in programs of a common type. There are many aspects to what the programs must do so to enable the different users to comfortably work on it. For example the program should: * Be corrective of the solution * Have maximum speed of execution * Be comprehensive and east to maintain

Thursday, August 29, 2019

Issue 11 taking sides clashing views on political issues seventeenth Essay

Issue 11 taking sides clashing views on political issues seventeenth edition - Essay Example Nobody can know what will happen to them tomorrow and when they will exactly fall ill. The indispensability of health insurance is best understood at the time someone is critically ill and he/she cannot pay the hospital bill immediately. If he/she is assured of health insurance the person need not worry about how he/she will pay for the medical treatment. By this way it is within their reach to safeguard their health and future Apart from providing financial security the health insurance promotes good health. Reduced cost of health services offered by the insurance plans induces people to go for health checkups and to take preventive medical care thereby avoiding any impending major illness. Health insurance takes care of old people as well. Most of the working families have no time to look after elderly people and they are left in old age homes. The old people often feel helpless when they are ill and have no money to pay for the hospital fees. If health insurance is available to them it will come to their rescue at the time of crisis Many people believe that in addition to providing financial stability, health insurance promotes good health. By reducing the personal cost of medical services, insurance induces people to go for regular checkups there by avoiding any impending threat to their health. On comparing the health care system in US with the other industrialized nations in the world Ezra Klein says that Canada, France Great Britain and Germany provide better health care for their people at lesser cost than US Canada is a single payer, rather than a socialized system. That means the government is the primary purchaser of services, but providers themselves are private (Ezra Klein. The Health of Nations, the American Prospect, May 2007 (1820). In the single payer system the cost of medicines as well as administrative costs is less In the French system, which is appreciated for its

Wednesday, August 28, 2019

Immigrants and the City Essay Example | Topics and Well Written Essays - 1750 words

Immigrants and the City - Essay Example United States of America is one of the developed countries in its economic, political, social, and environmental sectors and is amongst the super powers of the world since decades. Fifty-two states in total makes up the U.S. as a federal constitutional nation.  U.S. touches its borders with Canada and Mexico and Washington D.C. is its capital state (United States Bureau of the Census, pp. 640-715, 2004). Due to its gigantic land mass and huge population, United States comes under the world rankings. Diversity dominates the culture of U.S. as people from several races, civilizations and backgrounds reside in it. It is one of the most powerful nations with the strongest and most established economy (Kleniewski, pp. 167-190). U.S. economy comes under handling by the capitalist economical structure and subjects to domination by industrial and service segments. Advanced telecommunication, transportation, and technology govern the success of the financial sector of America. Its economy i s trade based and it is one of the leading importers and exporters of manufactured goods and some fossil fuels. It is also a nuclear power and is rich in resources, which makes it potential of producing electrical energy in gargantuan amounts (Kleniewski, pp. 167-190). Agriculture sector contributes a small part in U.S. total income; however, U.S. cultivates some of the important crops on its land. The value of U.S. dollar plays a critical and significant role in governing the currency value of most of the countries in the world (United States Bureau of the Census, pp. 640-715, 2004). United States is a country with the populace from all around the world. The immigration history dates back to several centuries. According to some schools of thought (Fisher, pp. 6-50, 2007), the earliest immigrants were from several regions of European continent and marked the beginning of influx of people in America from different corners of the world, whereas, few believed that Asians were the initi al migrants (Kleniewski, pp. 167-190). Where numerous people came to America by their own will, many coercively came under bringing as slaves and labors. The migration pattern experienced a fluctuating trend as many historical events had influenced the happening (Fisher, pp. 6-50, 2007). The purposes with which the immigrants migrated to United States were either religious, slavery and to have a wealthy life or future. The early migrations did not involve any kind of immigration policies and visas as people mostly migrated via sea routes. Consequently, United States observed a major escalation in the population growth and cultural diversity as people from different ethnic backgrounds came and settled there. The discrimination factor has always been present when considering the immigration matter. This enormity became noticeable and got official recognition under an act when countless people inhabited the U.S. territory and government came into formation (Kleniewski, pp. 167-190). Ac cording to this Act, white people received higher preference over people of other skin tones such as browns and blacks (Fisher, pp. 6-50, 2007). This practice came under eradication in late twentieth century when legal steps gave equal immigration rights to everyone regardless of their color, race, and religion. The entrance to America

Tuesday, August 27, 2019

International Students Care Assignment Example | Topics and Well Written Essays - 2500 words

International Students Care - Assignment Example The people I interviewed were involved with marketing responsibilities primarily in publicly traded corporations and small businesses, chosen because of their expertise in the field and professionalism. The following is a summary of what I learned from the questions in the interviews with the three subjects: Person#1 - Lindsey (Marketing Department – GEICO Insurance): Marketing is a busy job and the markets are always changing. Marketing is a field of possible under-employment for a M.B.A. graduate, though may lead to company career progress. Marketing is people and image oriented, requiring a professional demeanor and conduct. There is a vast difference in the quality of marketing jobs from company to company. Person #2 - Keith (Accounting – Lee’s Golf Superstores) You have to love math and numbers to enjoy accounting because lots of people find it a boring job. There is lots of work in the accounting department in any company, so search for the company that ref lects a wider personal interest. The accounting department may lead to direct management or training in some instances such as small business. Accounting is heavily related to IT (Information Technology) in modern business. Person #3 - Holly (Hospitality – Best Western Hotels): Social people seek success in this career realm because being social is a needed aspect of personality for most people. Working in groups is much easier in the business world than in university. You learn in the business world more than what you learn in university. Technology has made marketing easier, more inexpensive, and faster to reach its market audience. Challenging preconceptions in the marketing field is what keeps you moving forward in your career I chose these three people for the interview because of my interest in working in similar fields, as well as because of their expertise displayed in the career. I also had the advantage of knowing these people personally, and wanted to use my connec tion with them to explore the ideas of networking and gain more understanding of practical business management issues. Interview #1 - Marketing My interview subject in Marketing was Lindsey, who works in the GEICO Insurance Company as an advertising representative. Her job duties primarily incorporate the management of local advertising campaigns with national or corporate plans and material. She maintains networking contacts with over 100 different publications, advertisers, direct-mail printers, and other groups. She does not have responsibility for the GEICO website, as it is a national job. However, she does have to work intensively to manage central corporate policies and strategies related to marketing in the local environment. To do that, she values personal skills and positive thinking in business contacts and activities. Nevertheless, she feels underemployed in this position with an M.B.A. and would like to move up to more senior level management positions in the company. G EICO is owned primarily by Warren Buffett’s Berkshire Hathaway Group, making this potentially one of the better companies in America to work for in terms of salary and benefits. Lindsey said, â€Å"

Monday, August 26, 2019

IRAC Brief Essay Example | Topics and Well Written Essays - 500 words

IRAC Brief - Essay Example As the employer of the victims, was Mariano Prime LLC dba MD Wholesale cognizant of the harassment that took place and was it required to put an end to this type of behavior? Rule: Harassment can include undesirable sexual advances, solicitation for sexual favors as well as verbal or physical harassment that are sexually attuned. A client, employee or a customer of either male or female gender can experience sexual harassment. Analysis: The EEOC, upon conducting its investigation, filed a lawsuit with the U.S. District Court for Guam District in September 2011 (EEOC v. Mariano Prime LLC dba MD Wholesale, Case No. 11-00029). This came after futile attempt to settle the case through conciliation process. During the EEOC’s investigation, it established reasonable evidence suggesting that MD Wholesale facility breached Title VII of the Civil Rights Act of 1964 ("Marianas Variety",  2013). The case has also made apparent that there was no training whatsoever on sexual harassment, sexual assault, or reporting procedures. We can further assume that from management throughout subordinate levels, were totally oblivious of the consequences due to violations of a persons civil rights. Conclusion: MD Wholesale made a settlement with EEOC in the amount of $77,500 for the victims and accepted to change its policy and procedures for dealing with grievance on workplace sexual harassment. In addition, MD Wholesale is also required to retain an EEOC as a way of ensuring that their staffs are educated about their rights in light of workplace discrimination, harassment as well as retribution. Further, the company is expected to implement training program for its management to ensure compliance with future complaints. MD Wholesale agreed to offer extra training for its management and human resources personnel in order to ensure that they are capable of dealing effectively with future EEO grievances. Apart from monetary compensation to

Sunday, August 25, 2019

Marriott Hotel Ansoff matrix Essay Example | Topics and Well Written Essays - 1000 words

Marriott Hotel Ansoff matrix - Essay Example Market penetration refers to a strategy where the organization enters a new market with its existing products (Oh, 2009). Through the market penetration strategy, a company can increase consumption of existing customers through rebates or overhauling of the business (Waters, 2006). According to Reid and Bojani (2010), this strategy aims at increasing the usage and number of the present customers either by attracting new consumers those from the competitors. In order to attract new customers, Marriot Incorporation has undergone a revamp of its promotional determinations that lay emphasis on the consumers (Olmsted, 2014). The company had recognized that though they would regard themselves as one of the best brands in the world, they lacked the zeal to appease customers. Starwood’s chain of hotels, one of Marriot’s rivals, challenged Marriot to look for the younger people in order to increase its market share and customers. Marriot hotels have in the past few years concent rated on offering their brand online to customers who like surfing all day. The company has a blog called â€Å"Marriot on the move† that accommodates people online (Marriott News Center, 2014). This blog has become an outstanding channel of providing entertaining stories and news on the company’s present, past and future prospects. This blog has gained a huge audience through the high number of followers in social media. As with other industries, user-targeted content is particularly vital in hospitality. Organizations that do not take advantage of the use of social media in the present age may miss out on a cheap platform that allows the company to interact directly with the clients (Bhttarai, 2014). In this regard, Marriot Incorporation has successfully expanded its operations across the world through revamping the organization to target new customers and

Saturday, August 24, 2019

Inmates perspective Law Research Paper Example | Topics and Well Written Essays - 750 words

Inmates perspective Law - Research Paper Example This essay focuses mainly on the features like the challenges in the prison, causes for violence with a detailed discussion of the constitutional rights entitled by the inmate prisoners. Life Inside the Prison As the number of crime increases with the technology in its growth, a number of sophisticated crimes is reported very frequently whose punishment is often awarded with the confinement in isolated unitary cells for round the clock locking up. Real stories of the prisons reveal the hardships of the prisoner s in the super-maximum security centers with the real-life effect of a mythological hell. A majority of the prisons were meant for inflicting sensory deprivation on the inmates. They were locked up for the whole day within a congested cage with a direct exposure to direct lights and unpleasant noises causing acute levels of sleep deprivation. As Kamel and Kerness (2003) point out, most of this isolation was constituted as a result of the situation of life threat to the prisone rs as expected by the jail authorities. Apart from the peripheral woes of isolated prisoners, a large number of prisoners are subject to physical and mental harassment of the organized groups of existing prisoners who largely target on political prisoners. In some other cases, there are serious threats of violent behavior from gangster prisoners who target new inmates for assault. Gruesome incidents of sexual abuse of female prisoners and homosexual harassment of young male prisoners are common miseries apart from the routine torture at dining halls and bathrooms of American prisons. Many a prisoner complains about the cruelty of the jail guard using mechanical and electrical devices for torture, beating and shackling in painful positions and sleep deprivation. Many of such extreme tortures results in deaths or at least permanent disfiguration or physical disability. Amidst the strict laws of regulation of constitutional ways of the punishment with guaranteed rights to the inmate pr isoners, prisons are filled with various negative elements that badly affect the lives of inmate owing much to the lenience of the jail authorities. Overcrowding in Prisons Increased number of reported crimes is the indicator for the excessive influx of the prisoners in recent years. The government is ignorant about the fact that the prison supervision and healthy lives of prisoners cannot be guaranteed if the prisons are overcrowded. The impact of this scenario is intensive as the prisoners are deprived of their constitutional rights of health and sanitation, and in most of the cases, their lives are at stake as the supervisory authorities do not maintain a strict control of discipline among violent inmates. â€Å"Overcrowding directly affects prisoners’ mental and physical health by increasing the level of uncertainty with which they regularly must cope† (Prison Overcrowding, p.3). A continuous exposure to unpleasant situations results in aggravated demoralization am ong the target groups inside the prison. Moreover, overcrowded situations inside the prison account for the imposition of cognitive and emotional strain on them. Repeated sessions of heavy physical strains of performing the tasks assigned by the authorities as well as the deprivations of their rights accumulate frustration among them. As such, even a minute case of

Friday, August 23, 2019

Sarcophagus Relief Depicting Labors of Hercules Essay

Sarcophagus Relief Depicting Labors of Hercules - Essay Example Thesis statement: In the sculpture Sarcophagus Relief Depicting Labors of Hercules, the unknown artist portrays the deep relationship between Roman mythology and the growth and development of Roman sculpture during 3rd–4th century A.D. Background As pointed out, the artist behind the sculpture Sarcophagus Relief Depicting Labors of Hercules (see Appendix-1), is still unknown. But this ambiguity related to the sculpture does not reduce its scope within the scenario or art because it represents the Roman society during 3rd-4th century A.D. The sarcophagus relief sheds light into the social setting in Rome during 3rd–4th century A.D. Generally, sarcophagus relief works are used to decorate the tombs of the elite class in the society. One can see that the myth of Hercules or Heracles was popular among the people in ancient Roman Empire. So, this sculpture can be considered as a visual example for the usage of mythical characters in sculpture. This sculpture is preserved and displayed at the Honolulu Academy of Arts, which is in Hawaii. Besides, this sculpture was contributed by Anna Rice Cooke (say, the founder of the Academy of Arts/museum). So, one can see that the sculpture’s background is interconnected with the Roman society, mythology and culture. Source The unknown artist made use of the Greco-Roman myth of Hercules. To be specific, the theme of this sculpture is interconnected with the labors of Hercules. In the Greco-Roman mythology, Hercules is portrayed as a mythical figure, powerful enough to complete impossible labors. One can see that Hercules’s deeds were popular among the Romans and the artists began to make use of the same as their theme. The popularity of Hercules’s labors represents the Roman interest in hero worship and this is cunningly portrayed in the sculpture. In the sculpture, the artist portrays two of the deeds fulfilled by Hercules. For instance, the first figure in the sculpture is symbolic of Hercule s’s fight with hydra (say, a multi-headed creature). â€Å"Hercules had to kill the many-headed hydra (HYE-druh) for his second task†.1 The second figure in the sculpture is symbolic of Hercules’s battle with the Erymanthian Boar (say, a giant creature). From a different angle of view, the position of Hercules in the sculpture is symbolic of hard labor. Besides, the seriousness that can be seen in the face of Hercules is symbolic of heroism and hard labor. Origin As pointed out, origin of the work Sarcophagus Relief Depicting Labors of Hercules is related to Roman culture and its relation with mythology and hero worship. One can see that the sculpture represents the Roman interest in the immortality of art. Besides, the usage of marble as the medium of sculpture proves the development of sculpture works during 3rd-4th century A.D. On the other side, one cannot neglect the fact that the decline of Roman Empire reduced the further development of Roman art and arch itecture. Still, some of the sculptures during 3rd-4th century A.D. are preserved in different museums. So, this sculpture is historically important because it represents the rich heritage of Roman culture. Besides, this sculpture was contributed to the Honolulu Academy of Arts, by Anna Rice Cooke (say, in the year 1932). The authorities at the Honolulu Academy of Arts show utmost interest to preserve and restore this sculpture. In addition, ArtafterDark (say, a volunteer group) at the Honolulu A

Reflection paper Essay Example | Topics and Well Written Essays - 500 words - 16

Reflection paper - Essay Example However, most of the people make judgments from looks. People sometimes try to guess my birth origin. Normally, when somebody doesn’t know me, he asks me what my ethnic origin is. Normally, my ethnic origin is guessed or asked when I come across strangers. People cannot tell confidently where I am from because I look as much British as I look American, Canadian or Australian. Basically they pay attention to my language, and try to find similarities with the type of English spoken in the different countries where English happens to be the first language. I pay most attention to the way I speak. I believe that English is a very good language, and has proper grammar and rules of speech that are being frequently overlooked in the present age. People are relying upon slangs and short-cuts and as this has become a practice, the grammatically correct English is receding. I tend to maintain English in its correct form as I speak. I try to speak it correctly so that the original form of the English language is sustained. Since I tend to speak English correctly unlike most of the people with whom I share my ethnic origin, people who don’t know me try to judge my ethnic origin from my accent, but very few actually make the correct judgments. I have noticed that when they find that they have guessed my ethnic origin wrong, they tend to be sorry and respectfully ask me where I belong. Yes, I do trick people about my origin just for fun. I have noticed that people have preconceived notions about people belonging to specific ethnic origins. I like to experience how people would deal me if they thought that I was from a different ethnic origin than what my ethnic origin is. Usually, when I tell lie to someone telling him that I am from the same ethnic origin as he, the other person’s attitude becomes much more over-whelming and welcoming. People tend to develop friendship with people

Thursday, August 22, 2019

TUFS Value Proposition Essay Example for Free

TUFS Value Proposition Essay The Technical Underwriting Financial System (TUFS) (McKeen Smith, 2012), like any Information Technology (IT) project requires a value assessment. This value assessment is intended to help business leaders weigh the possible benefits and risks associated with the project. In the case of TUFS, some of the anticipated benefits included financial savings through improved efficiency and e-business capabilities. As noted in the case, the company had not made use of the e-business feature two years after it was released. This may point to an IT failure, but it may be as likely that a communication failure among those responsible for defining company strategy produced the unused feature. The anticipated benefits represent expectations, which in this case don’t appear to have been clearly defined by IT or their business counterparts. It may be of more interest in this case to ask how the project fit into the company strategy. One reason this is important is that the expectations (benefits) mentioned are tactical in nature. In other words, improved efficiency and e-business may be good business tactics, but in the absence of a clear strategy, it’s difficult to say how these features would give the company an advantage . External Investment and Commitment IT projects require buy-in from stakeholders. There are several reasons to get buy-in before starting an IT project, some of which include investment during development and commitment to transition away from old processes to the new system upon completion. Unilateral IT projects often lack the level of investment and commitment required for a successful IT project. This becomes even more critical as the scope and size of the project increases. The TUFS project had low stakeholder involvement in the beginning and early stakeholder abandonment when issues arose. In IT projects, there is a risk of going to one of two extremes: analysis paralysis or inadequate requirements planning. In some projects, the analysis phase can reach a point  at which no work is getting done and stakeholders are moving away from consensus rather than toward it. This situation may signal a project that’s poorly aligned with company strategy or even a faulty strategy. For example, a strategy may be to improve the reception of new products by targeting tighter integration between sales and research and development (RD) organizations. In such a scenario it could be plausible to devise an IT project that would synchronize the efforts of sales and RD. However, with two very different groups, salespeople and engineers, consensus may be difficult to reach. In this case, the lack of consensus may be a good sign that either a modified strategy or a different tactical approach would be preferable to pursuing the project. The alternative of inadequate requirements planning may indicate a lack of strategy altogether. Projects that lack careful requirements are often conceived and executed unilaterally. This presents significant risks when original time lines require modification. There are other risks associated with adoption and adaptation. Failure to view the system as a whole, which must include training, support and feedback mechanisms, may be another indication that the project is being pursued unilaterally or that analysis is failing to  achieve consensus. When there is lack of investment and commitment, the safest, although sometimes frustrating, course of action is to pause the IT project and return to strategy discussions for better alignment with all stakeholders. Monolithic, All or Nothing Systems Many significant IT projects have the objective of replacing systems that have been in place for years. In most cases, those systems have evolved over time to become what they are. As the business grew, so did the systems that enable that business. A significant implication of this is that the current systems in use by a company required many years and significant financial investment to become what they are. Surprisingly, many business people believe that a complete replacement of such a system is possible in a very short period of time. The amount of effort and cost involved in implementing a new system is underestimated. The required changes to existing business processes is underestimated. The amount and duration of required training is underestimated. This tendency to underestimate creates a set of unrealistic expectations, which can product tension between IT and other departments. The result is that many attempts to put a new, monolithic system in place fail. Furthermore, monolithic systems will rarely satisfy the requirements of the broad spectrum of stakeholders who have an interest in its outcome. The human tendency to view desired changes as all or nothing sometimes makes opportunities for incremental replacement of functionality difficult to sell. It is often true that there is a minimum viable product (MVP) required for an initial release of a new IT system. One factor in the success of an IT project is in accurately identifying that MVP and limiting the scope to only essential functionality. After that, continuous improvements are much lower risk and more likely to be prioritized based on actual business needs  and value. One way to approach this is to think in terms of segmented job functions rather than think monolithically. Define the intersection of job functions and allow systems to develop independent of one another with well defined interfaces between them. Role Myopia A common pitfall in IT projects relates to a narrow view of job role. This myopia of roles within a company interferes with communications and subverts accountability. When this occurs, technologists and business participants are at risk of relying on false assumptions about who is qualified and accountable for making key decisions about functionality. Narrow views of roles defeat the synergy that is desired in large projects. On the other hand, when technologists show a willingness to learn other job functions before attempting to create IT solutions for them, the outcome is often more relevant. Similarly, when individuals in key business functions take time to understand the capabilities and limitations of key technologies, the solutions they request are more likely to meet relevant needs. Define Key Success Metrics First A final observation from the case is that the postmortem discussion in which the CFO asked for the metrics that would determine success for future projects should have been discussed before the TUFS project began. A careful identification of pain points and deficiencies up front may even reveal quick and easy solutions that can be applied to existing systems. Even when quick solutions aren’t possible, this is a key step in establishing measurements for the execution of the IT project that will follow. Measurements must be able to quantify losses and gains. References McKeen, J. D., Smith, H. A. (2012). It strategy issues and practices (second ed.). Pearson.

Wednesday, August 21, 2019

Critical Theory in Sociology

Critical Theory in Sociology The critical theory is a social theory, which is known to criticise and trying to change society as a whole. The traditional theory only described and explained society. Theorists such as Max Horkheimer, T.W. Adorno, Herbert Marcuse, Leo Lowenthal and Reich Fromm, were the main theorists who took part in the Frankfurt School, In Germany in the late 1920s at the institute fur Sozialforschung. The Frankfurts schools theory of society is very negative about how society runs, reasons for this is the increase in capitalism, and that societies social structure has been separated, (Swingewood 200, p. 130). Throughout the essay, there shall be more information about the Frankfurt school, and what they believed and wanted to change in society, also more information about what is critical theory and what it is critical of in society, also more information about the traditional theory. The work of Frankfurt school become very influential in the social sciences in the 1960s. Culture industry wor ked to put together the role of social struggles in the production and reproduction of society. Culture industry worked like an apparatus which brought together individuals and got them doing and thinking the same. The critical theory may be defined as a theory of setting humans free of human enslavement, and manipulation. Both Max Horkheimer and Theodor Adorno argued that critical theory is the theory of human emancipation based on free capitalist society, the bourgeoisies controlled the working class through manipulation of interests of politics, media, culture etcà ¢Ã¢â€š ¬Ã‚ ¦as a silent dominant force. The critical theory argues that there are various types of manipulation, such as; Ideological, this consists of justifying decisions made by enforcing ones thoughts onto another, secondly, Cultural, this consists of the attempt to commercialise to maintain the status quo of the working class. Finally the psychological manipulation which means that we are more interested in other peoples life and this is because of the decline of the father figure in many families. Horkheimer argued that a capitalist society can only be changed if it becomes more democratic is it could be that all conditions of social life that are controllable by human beings depend on real consensus in a rational society (Horkheimer 1982, 249-250). Horkheimer argued that the only way in which we could fix problems in society, was by introducing the critical theory. There are four main points for the Critical theory these are; Reflective, this refers to that facts can be revised separately from other things that we may have to learn such as values. Dialectical; this refers to humans understanding of the world changing as the world changes too. Critical; which refers to stating what is wrong with the current society, and coming up with reasonable ideas on how to change it. Immanent critique is the main support for critical theory.(Adorno, 1991) Critical theorists argued that Marx did not foresee some key developments on capitalist society. Especially, centralisation and various mechanisms of ideological, cultural and psychological domination, associated in particular with the development of a commercialised mass media. Critical theorists conclude that the working class was no longer the revolutionary agent foreseen by Marx. The only way in which theorists could change the way society was is by firstly stating what is wrong with the current society, has to identify the actors to change it and finally it has to provide achievable goals for social transformation. Any truly critical theory of society, Has as its object human beings as producers of their own historical form of life (Horkheimer, 1992, 21). Critical theorists have argued that humans need to become more aware of how science and other type of facts and knowledge work together in creating oppression.Critical theory identifies facts and everyday life as the foundation for human beings, in waiting that people will realise the power and their influences on their lives and be able to overcome them. Fredrick Taylor introduced science in the 19th century, Henry Ford among many other people was influenced by Fredrick Taylor by his ideas on how to improve and raise production. By being influenced by Fredrick, Henry Ford creating an assembly line. By doing this Ford was able to reduce hours and save money, at the same time produce more. This idea became very popular, companies were able to produce much more with less work due to the right machinery. Instrumental reason refers to the opening up of reliable modes of organisations, the critical theory criticises the instrumental reason. The reason which why critical theory is critical of instrumental reason is because it raises action, which means this would be a means to an end. The instrumental reason sees individuals as instruments instead of humans this was introduced by positivistic science. As mentioned before, in the concentration camps humans were not seen as humans, but they were seen as objects. (Swingewood, 2000). Another example of this could be the rise in tuition fees in 2010, this change would benefit large institutions, especially the government, however it does not benefit the people who would mostly experience the change of this such as students. Critical theory is also critical of mass culture, mass culture refers to individuals following and believing what the media say. An example of this can be such as girls believe it is always best to be slim. Culture industry refers to anything that gets in the way of freedom. The Frankfurt school gives us useful information about the process of how society changed from traditional culture and modernism in the arts to a mass produced media orientated society. Society has become much more media orientated as technology has become much more advanced, The traditional theory was originally known as the positivism theory, however, Horkheimer labelled the traditional theory. The traditional theory was based more on facts, the more facts we had about everything, the more knowledge we have. The traditional theory did not see people as humans, instead humans were looked at as things for example in the concentration camps individuals who died, were not looked at as humans dying, but a specimen. Unlike the critical theory, the traditional theory only explains how society is in the present time, where as the critical theory looks at society, what is wrong with it and aims to change it. Positivism functions ideologically, this is done by promoting passive behaviour. Habermas argued that a free society should let people communicate freely without anything getting in the way, when people can do so, this would be known as a free society. Positivists ignore the roles of humans in society, they tend to treat society as a natural process. Habermas did not agree with Adorno and Horkheimer views that they can identify what is wrong with society and change it, also change the whole technological interaction with nature (Habermas, 1971). Horkheimer continued to argue that critical theory should focus on society being complete, e.g. how society became how it is in the present time. He argued this could be done by bringing together major social sciences such as geography, economics, sociology, history, science etc (Bohman, 1996). Adorno and Horkheimers book Dialectic of Enlightenment, which is a text about critical theory, which explains what the Frankfurt School considered as the failure of Enlightenment, the book was published in 1944 in New York. It is one of the main core texts about Critical theory. In the book we can see how Enlightenment norms had turned into their opposite, how democracy had produced fascism and reason had produced unreason. In conclusion to the above, we can see that there are many different views on how society runs, and as we can see is whether society is fine the way it is, or what should be changed if its not. The critical theory is obviously critical of society as it is now, The critical theory is mainly critical of how society is in terms of exploitation of humans., especially jobs such as labour work. However, the critical theory can be negatively criticised as it always looks upon society negatively. Horkheimer argued that the a theory can only be critical if it is explanatory, therefore critical theory should successfully explain what is wrong with the current society and what is needed to make it right, (Bohman, 1996). As we can see, there are many factors that affect society, also we can how society brain washes individuals to thinking that they live in an equal society system.

Tuesday, August 20, 2019

The Entity Relationship Diagram

The Entity Relationship Diagram Design the database system for Petcare. Petcare is a medium sized veterinary surgery with six branches across London. They want a database system developed to handle the records of the animals they care for, prescriptions and appointments. Entity-relationship diagram An entity-relationship diagram (ERD) is a data modeling technique that creates a graphical representation of the entities, and the relationships between entities, within an information system. This diagram is often used as a way to visualize a relational database: each entity represents a database table, and the relationship lines represent the keys in one table that point to specific records in related tables. ERDs may also be more abstract, not necessarily capturing every table needed within a database, but serving to diagram the major concepts and relationships. Definition of relationship A relationship is some association between entities. Relationship is shown by line between entities. Relationship lines indicate that each instance of an entity may have a relationship with instances of the connected entity, or vice versa. Definition of entity attribute An entity is characterized by a number of properties or attributes. Values assigned to attributes are used to distinguish one entity from another. Definition of Optionality and Cardinality Symbols at the ends of the relationship lines indicate the optionality and the cardinality of each relationship. Optionality expresses whether the relationship is optional or mandatory. Cardinality expresses the maximum number of relationships. Before analyzing the entities, let have a look the definition of entity. An entity can define as a thing which an organization recognizes as being capable of an independent existence and which can be uniquely identified. In addition, an entity is an abstraction from the complexities of some domain. Each entity is shown in box within the ERD. In this case study, the entities of the Veterinary Surgery are identified as followed: Owner is represented owners of animals which included name, address, home telephone number and mobile telephone number; Animal is represented information of an animal which included sex, age and owner Breed is represented information of breed for each animal type AnimalType is represented type of animal (dog, cat, rabbit, etc) Appointment Petcare keep the following information: the animal the appointment is for, the owner of the animal who requested the appointment, which veterinary doctor the appointment is with, the time and date of the appointment, the diagnosis made and the charge made for the appointment Prescription is represented record shows the period, in days, that the drug must be taken for. The cost of the medication is also recorded Drug contains the name of the drug DrugType contains the name of the drug type (Anti-biotic, Painkiller, Behaviour modification, Ear medication, Skin medication) Vet is represented the following information kept about them: name, address, home telephone number, and mobile telephone number Branch is kept for each branch of Petcare. This records the name of the branch (Enfield, Islington, Hackney, Holloway, Chingford or Leyton), address of the branch, telephone number, opening hours and emergency contact telephone number. Identifying the relationships for the model: Relationships mean that in a relational database, all entities have bonds between them, expressed as relationships. The relationship is a link between to entities, and it tells us something about which relationships exists between our entities. In the ER approach, more than one relationship can exist between any two entities. What is one-to-many and many-to-many Entity Relationship~ One-to-Many Entity Relationship is by far the most common relationship type. It consists of either a one through many or a zero through many notations on one side of a relationship and a one and only one or zero or one notation on the other. However, we can summarize all the entities to the Entity Relationship Data Model. Diagram for Entity Relationship Data Model which describes the content and structure of the data held by Petcare. Owner Breed Animal Prescription Drug DrugType AnimalType Appointment VetAnimalType Vet Branch Fig 1 entity relationship diagram for the Petcare. Normalized Tables Table is a data (value), which is the model of the vertical columns (which identifies the name) and the horizontal lines. A specified number of columns in the table, but may be any number of rows. Each row to identify the subset of the values in the column, which has been identified as a candidate key. Table in another term relationship, although there is the difference that a table is usually a multi-set (bag) as a series, and does not allow copies. In addition, the actual data rows, the panels are generally associated with some other meta-data, such as restrictions on the table or the values in columns. Primary key: Primary key is a field or combination of fields that uniquely identify a record in the table, so each tag can be placed without confusion. Primary key is the field (s) (primary key can be made up of more than one field) that uniquely identifies each record, ie the primary key is unique to each record and the value will never be duplicated in the same table. A constraint is a rule that defines what data are valid for the area. So the primary key constraint is the rule which says that the primary key field can not be empty and can not contain duplicate data. Database systems usually have more than one table, and these are usually related in any way. For example, a customer table and an Order table relate to each other on a unique customer number. The customer table will always be a record for each customer, and the Order table has a record for each order that the customer has. Foreign keys: A foreign key (sometimes referred to as the reference key) is a key used to link two tables together. Typically, you will have a primary key field from one table and paste it into another table, which becomes the foreign key (the primary key in the original table). A foreign key constraint that the data in the foreign keys must be consistent with the primary key of the table is linked. This is called reference integrity is to ensure that data entered is correct and is not unique Definition of Normalization Database normalization is a technique to reduce to the minimum duplication of information for designing relational database tables and in doing so to maintain the database for certain types of structural and logical problems, that is to say data anomalies. For example, when a given piece of information has multiple instances to be found in a table, this possible happen that these instances will not be kept consistent during the data in the table is updated, leading to a loss of data integrity. The such kind of problems are less vulnerable to a sufficiently normalized table, because its structure reflects the basic assumptions of the multiple instances of the same information should be used when a single instance of only. There are rules for UNF, 1NF, 2NF, 3NF, BCNF, 4NF, 5NF and domain-Key NF. Most textbooks mention 5NF and DKNF only in passing and note that they are not particularly applicable to be design process. Normalization is really about the formalism of simple ideas. All too often, the simplicity is lost in esoteric terminology and papers are often excessively concerned with the formalism and provide very practical insight. In this project, why need a normalization the database, it is because normalization is about designing a good database i.e. a set of related tales with a minimum of redundant data and no update, delete or insert anomalies. Normalization is a bottom up approach to database design, The designer interviews users and collects documents reports etc. The data on a report can be listed and then normalized to produce the required tables and attributes. First normal form to second normal form: To move form first normal form to second normal form I remove part-key dependencies. A relation is in second normal form if and only if it is first normal form every non key attributes is fully functionally dependent on the primary key Take for instance the table named Animal here I have a tow compound key BreedID and AppointmentID. BreedID and AppointmentID have influence on the Animal. Hence I brake out the determinant and dependent data items into their own table. Second normal form to third normal form: To move form second normal forms to tired normal form I remove inter-data dependences (non-key dependences). A relation is in third normal form if and only if it its in second normal form and every non-key attribute is non-transitively dependent on the primary key A use full mnemonic for remembering the relation for normalization is the distortion of the legal Oath presented below: No repeating group The data items depended upon the key. The while key And nothing but the key So help me code. Boyce-Codd Normal Form (BCNF) A relation is in Boyce-Codd normal form (BCNF) if and only if every one of its important functional dependencies is a candidate key. The definition of BCNF is handling certain situations which 3NF does not deal with. To distinguish the characteristics of a relation between 3NF and BCNF are given below. Since it is such a relationship is unlikely to have these properties, in the real life design the most case of the relations in 3NF are also in BCNF. Therefore many authors propose a vaguely distinction between 3NF and BCNF when it involves about giving advice to normalize a design for long term. As the relations in 3NF and BCNF are slightly difference, it is a bit difficult to bring up with significantly examples. To be strictly conforming to the definition of 3NF does not handle a relation that: 1. Has multiple candidate keys, which 2. Those candidate keys are composite, and 3. The candidate key overlap. For example, the candidate keys have at least one common attribute. Here is all tables after normalization: OwnerID Name Address HomePhoneNumber Mobile Table 2.11 VetAnimalType Using a Database Management System (DBMS) set-up all of the above normalised tables A Database Management System (DBMS) is a set of computer software programs. It controls the creation, maintenance, and the use of the database with computer as a platform or of an organization and its end users. It allows the organizations to place control of organization-wide database development in the hands of database administrators and other specialists. A DBMS is a set of system software. It helps the use of integrated collection of data records and files known as databases. It allows the programs of different user application to access the same database easily. A DBMS is a set of software programs that controls the organization, storage, management, and retrieval of data in a database. DBMSs are categorized according to their data structures or types. The DBMS accepts requests for data from an application program and instructs the operating system to transfer the appropriate data. The queries and responses must be submitted and received according to a format that conforms to one or more applicable protocols. When a DBMS is used, information systems can be changed much more easily as the organizations information requirements change. New categories of data can be added to the database without disruption to the existing system. A DBMS includes four main parts: data structure, modeling language, database query language, and transaction mechanisms: Components of DBMS Data Definition Subsystem helps user to create and maintain the data dictionary and define the structure of the files in a database. DBMS Engine accepts logical request from the various other DBMS subsystems, converts them into physical equivalent, and actually accesses the database and data dictionary as they exist on a storage device. Data Manipulation Subsystem helps user to add, change, and delete information in a database and query it for valuable information. Software tools within the data manipulation subsystem are most often the primary interface between user and the information contained in a database. It allows user to specify its logical information requirements. Data Administration Subsystem helps users to manage the overall database environment by providing facilities for backup and recovery, security management, query optimization, concurrency control, and change management. Application Generation Subsystem contains facilities to help users to develop transactions-intensive applications. It usually requires that user perform a detailed series of tasks to process a transaction. It facilities easy-to-use data entry screens, programming languages, and interfaces. Microsoft Access 2003 to setup normalized tables and designed test data. Set-up and test all of the following queries using Structured Query Language (SQL). Structured Query Language (SQL) is a computer language which is designed for managing data in a relational database management system. It lets users to access and manipulate the database. The following task is to display how the Structured Query Language helps users to managing data in the Academic Human resources department system. An SQL query manifests itself as a series of commands or statements. Queries may include arithmetic calculations and can use query elements or procedures stored in the system. SQL databases are designed from using SQL queries The SQL language is used to ask database questions for the data stored inside the database: what is the value of the element stored in Name index?, or what is the relationship between the data name and salary?. Manipulative commands, like insert data or update record are also issued using SQL queries. A Data Definition Language allows SQL queries to create or administer the data structures, the tables of data, which constitute the database. The actual syntax used is a little more strict and regimented than these natural language phrases suggest, but in effect this is the type of communication that will take place between a relational database and the person or device querying it using SQL. Provide printouts of SQL code for each query and the output produced when you run the query in the database you have developed: Display the names and addresses of the branches of Petcare and the names of all the veterinary doctors working at each of the branches. Any specialism(s) of the veterinary doctors should also be shown. Below is the SQL code for create the table. SELECT Branch.BranchName, Branch.Address, VET.VetName, AnimalType.AnimalTypeName FROM (AnimalType INNER JOIN VetAnimalType ON AnimalType.AnimalTypeID = VetAnimalType.AnimalTypeID) INNER JOIN (Branch INNER JOIN VET ON Branch.BranchID = VET.BranchID) ON VetAnimalType.VetAnimalTypeID = VET.VetAnimalTypeID; Display all the appointments for the whole of the Petcare organisation. This should be ordered by date. The result should display the branch the appointment is at, the name of the veterinary doctor the appointment is with, the date and time of the appointment, the name of the animal the appointment is for, the type of animal and the breed of the animal. Below is the SQL code for create the table. SELECT Branch.BranchName, Vet.VetName, Appointment.Date, Appointment.Time, Animal.AnimalName, AnimalType.AnimalTypeName, Breed.BreedName FROM (Branch INNER JOIN Vet ON Branch.BranchID = Vet.BranchID) INNER JOIN ((AnimalType INNER JOIN Breed ON AnimalType.AnimalTypeID = Breed.AnimalTypeID) INNER JOIN (Animal INNER JOIN Appointment ON Animal.AnimalID = Appointment.AnimalID) ON Breed.BreedID = Animal.BreedID) ON Vet.VetID = Appointment.VetID Task 5 assumptions and Improvements Assumption For the design the Petcare database system, we have made some assumptions before the implementation of the database. The entity relationship diagramming is created to identify each entity, relationship and attributes. The assumptions are the follows: We must need to assign vet to any new appointment. Since each doctor only can work at one Branch at a time and they can specialize more than one type of animal. This mean all branch can for any type of animal to make appointment. set all the primary keys and foreign keys in all of the tables, each table have their unique ID. Each table should have a primary key, and each table can have only one primary key. In the task 3, we are using DBMS, Microsoft Access 2003, to setup normalized tables and designed test data. In the task 4, we are using SQL statements base on Microsoft Access 2003 to query our database to investigate the database system can be fulfills the requirements or not. Base on using the Entity relationship data model that describes the content and structure of the data help by the department. At the real environment, we can consider the database on three levels of abstraction: external, conceptual, and internal. The external level also has the users views of the database. This is depending on their needs, different users access different parts of the database. Improvements Object-orientation and databases Both object-oriented programming and relational database management systems (RDBMSs) are extremely common in software today. Since relational databases do not store objects directly (though some RDBMSs have object-oriented features to approximate this), there is a general need to bridge the two worlds. The core of object-relational thinking is the ability to incorporate greater levels of abstraction into data models. This idea represents a major shift in the way that data modeling is done. Current relational databases are usually highly normalized but with little abstraction. Each thing of interest is instantiated as a relational table. As a result, systems frequently require numerous database tables and an equal number of screen modules and reports. The program modules are usually based directly on these tables with user workflow only instantiated through the way that the hundreds of screen modules interact. The object-oriented (OO) approach to data modeling will be something of a change for people familiar with entity relationship modeling. Even though we still end up with tables and relationships at the end of the process, the way to think about the modeling process has to change. Object-relational data models have several advantages over traditional data models: They require fe wer entities (or classes in object-oriented terminology); They are more robust, in that they will support not only the specific user requirements gathered during the analysis phase, but will also usually support a broader class of requirements; They are more stable in that, as new requirements arise, the models will require fewer changes than traditional models Data is not information unless it is valued. Information value provides profit or gain only when accessible or used. Accessibility and use, through organized systems, provides competitive advantage. Speed determines the degree of competitive advantage. Computerized database systems are thus, the ultimate method of high-speed information retrieval. It is not difficult to build an organized database system. The difficulty lies in the laborious, mundane task of collecting, categorizing and maintaining the massive amounts of data. Information is not valued unless it is legitimate. It must be valid and true to be worthy of use in decision-making. So, it is critical that all aspects of our system provide quality. To quote statistics based on erroneous data is considered foolish or criminal. The core of object-relational thinking is the ability to incorporate greater levels of abstraction into data models. This idea represents a major shift in the way that data modeling is done. Current relational databases are usually highly normalized but with little abstraction. The database systems have become so important to organizations that the activity is devoted to planning for, monitoring and administering the systems. We can focus on the planning and managerial activities relevant to database. It is defined the concept of data administration, the scope of the data administration function, relate the costs and benefits of having a data administration functions. It also defines the concept of a data dictionary and considers the issue of database security. The data control is primary function for the database administrator (DBA). The DBA needs to be able to do three main things: Prevent would-be users from logging-on to the database Allocate access to specific parts of the database to specific users Allocate access to specific operations to specific users For the DBMS toolkit to review the database, the interface is essential function of most ICT systems it to interact with users. The three aspects are the content, control and format. The interface can be seen as collection of dialogues between the user and the ICT systems.