Tuesday, December 24, 2019

The First Ten Amendments For The United States Constitution

Civics The first ten amendments added to the U.S. Constitution, now known as the Bill of Rights, have played a fundamental role in the Constitution. Still in effect today, the Bill of Rights has become a necessity in order to protect the individual rights of American citizens. In order to prevent an oppressive centralized government, James Madison, America’s fourth president, decided to lay the foundation of civil liberties in ten amendments. The First Amendment allows citizens the freedom of religion, speech, press, assembly, and petition. In other words, the government is prohibited by the Constitution from interfering with practices regarding religion, nonviolent protests/rallies, with what citizens have to say, and where citizens†¦show more content†¦In protection of an individual’s Fourth Amendment rights, the exclusionary rule was established - restricting illegally obtained evidence to be used against a defendant in a court of law. An exception to the Fourth Amendment would be a â€Å"probable cause,† indicating that enough evidence is already gathered to prove that a crime has likely been committed. A probable cause would give officials the permission to do searches. In essence, the Fourth Amendment isn’t a guarantee against all searches and seizures, but against those that are lawfully unreasonable. The Fifth Amendment covers the right to due process of law, freedom from self-incrimination, and double jeopardy. Due process gives any citizen charged with a crime a fair trial that follows a defined procedure through the judicial system. Freedom from self-incrimination forbids the government from forcing someone to testify against themselves and requiring police to tell people that they have the â€Å"right to remain silent† to remind citizens that they don’t necessarily have to confess. Double jeopardy keeps people from being tried for the same exact crime more than once. To clear it up, it wouldn’t be considered a double jeopardy if the murder wasn’t committed at the exact time and place; it wouldn’t be considered the sameShow MoreRelatedUnited States Of America Constitution845 Words   |  4 PagesUnited States of America Constitution The United States of America is by far the most successful Republic governed country in the world and has managed to survive for over 223 years. The success can be contributed to the foundation that the farmers created, which is the United States Constitution. The framers knew that with time the needs of the people would evolve due to changes in society. That being said, they knew that the regulations in the Constitution would need to be adjusted or expandedRead MoreThe Bill Of Rights And The Amendment Of The Constitution962 Words   |  4 Pagesand not be disgraced for it (Bodenhamer, 1993). The first ten amendments to the constitution of the United States established basic American civil liberties (Schweikart, 2004). The Bill of rights and the amendments of the constitution were written about the same time by the same people. The Bill of Rights and amendments both focused on limitation of state tyranny. The Bill of rights has been used for defining civil liberties in their own con stitution (Bill of Rights, 2015). The Bill of rights is a documentRead MoreThe United States Constitution and Its Various Amendments766 Words   |  4 PagesThe United States Constitution is a healthy document which still serves our nation exceptionally well and does not need drastic change or revision. Since June twenty first of 1788, when the United States Constitution was ratified in Washington D.C. it has been considered The Law of the Land. Ever since that date, we have followed those rules as the Federal law and overall â€Å"ruling† of our lives. For almost two hundred twenty four years, this has been what our country has been following to thisRead MoreThe Bill Of Rights By James Madison And Influenced By George Mason1078 Words   |  5 Pagesinfluenced by George Mason was the United State of America in the late seventeen hundreds. The bill of rights has many differences from an amendment. The constitution is the bases of the bill of rights. The federalist and the anti federalist had different views in which the bill of rights came into play. Many people in the United States did not want a government that reflected the England government. One will look at what is the bill of rights, what is an amendment, and how the two differ. Read MoreThe United States Bill Of Rights882 Words   |  4 PagesThe United States Bill of Rights was created in September 25, 1789 and ratified December 15, 1791. The Bill of Rights are the first ten amendments to the Constitution that were established to defend our rights as individuals and as American citizens. The Bill of Rights describes the rights of its people. The first four articles of the amendments deal specifically with the balance of power between the federal government and state government. There were some people who opposed to the Constitution becauseRead MoreThe Bill Of Rights Of The United States Constitution914 Words   |  4 PagesWhat is a bill of rights? What is an amendment? How are the different? A bill of rights is a formality such as the Declaration of Independence and it is the outline of what the citizens feel their born rights are as people of a union. An amendment is the changing or altering of a legal or civil document. Specifically amendments in the United States Constitution include the changing or detailing of what the people need. These two phrases differ in what their purposes are. The bill of rights was setRead MoreThe Rights Of The Citizens Of A Country973 Words   |  4 Pageslimitations serve to protect freedoms of religion and speech, a free press, free assembly, and free association, and the right to keep and bear arms. The U.S Bill of Rights is a document that officially became part of the constitution in 1791, consisting of the Constitution’s first ten amendments. It is the embodiment of the one true revolutionary idea in all history, and played a major role in laying the framework for rights as citizens of America. It was written by James Madison in response to the need ofRead MoreI Had A Dream Speech By Martin Luther King Jr.1684 Words   |  7 Pagesgatherings have impacted the United States civilization as we know it. Our freedom of speech and the freedom to associate ourselves with who we please has helped the United States nation grow in development and tolerance. The ability to speak and act on our actions will have an effect on our posterity and how they will live and how their generation will think. Our capability to say and protest what we think was accustomed to us by the first amendment in the United States constitution’s bill of rightsRead MoreThe Constitution Of The U nited States National Government1456 Words   |  6 PagesThe Constitution The American Constitution is â€Å"a system of basic laws and principles that establish the nature, functions and limits of a government or other institution† (Harr, Hess Orthmann, 2012). The purpose of the Constitution was to make it so that no single person would be able to have power over all others. Before the Constitution even came about, there was the first development of the Articles of Confederation. The Articles of Confederation were written after the United States hadRead MoreGeneral George Washington And His Continental Army Had1643 Words   |  7 Pagesdefeated the English Army. In 1776, the founding fathers of the United States of America signed the Declaration of Independence, according to ushistory.org 60 delegates signed the document that granted the country we know today as the United States free from British rule.Some of the men that inked their name into American history were Thomas Jefferson. Benjamin Franklin, John Adams, and John Hancock. From that point on the United States was an independent nation. Being an independent nation means the

Monday, December 16, 2019

Attitude Toward Quality Of Community Health And Social Care Essay Free Essays

string(47) " and give them intending \( Munhall, 2007 \) \." This chapter presents the design and research methodological analysis that was implemented to look into attitudes toward quality of community pharmaceutics services of consumer position in London. It is besides included research doctrines, research attacks, research designs, research method and informations aggregation. Finally, this chapter describes the instruments for informations aggregation and informations analysis process. We will write a custom essay sample on Attitude Toward Quality Of Community Health And Social Care Essay or any similar topic only for you Order Now 3.2 RESEARCH PHILOSOPHY Research doctrine can be defined as the development of the research background, research cognition and its nature ( Saunders and Thornhill, 2007 ) . Research doctrine defined with the aid of research paradigm. Research doctrine guides how the research is to be conducted ( Gliner and Morgan, 2000:17 ) Figure 3.1 The research onion M05NF001 Beginning: The research procedure ‘onion ‘ ( Saunders et al. , 2009 ) In direction research which province of Saunder et Al ( 2009 ) There are four research doctrines which are positivism, pragmatism, interpretivism and pragmatism ( see Figure 3.1 ) . 3.2.1 Positivism The Positivism construct is straight associated with objectivism which are collapsible shelters to roll up general information and information from a big sample of societal alternatively of concentrating on research inside informations. Ester-by-smith et Al 2006, province Positivism attack to roll up the informations chiefly related to observations and experiment. It is a free position which has a certain valued place which could be somewhat biased 3.2.2 Realism Realism doctrine chiefly belief of world that are already bing in the environment. There are two chief attacks in pragmatism, which believing direct and critical pragmatism that what we sense are in direct relation to our esthesiss, it is lone portion of a bigger image. 3.2.3 Interpretivism In the field of direction research interpretivism can be referred as the societal constructionism. This philosophical attack research gives importance to their beliefs and value to give equal justification for a research job. Some writers use the term phenomenological instead than inter pretivist but a term of philosophical do some people confuse with a methodological analysis known as phenomenology ( Collis and Hussey, 2003 p. 47 ) 3.2.4 Pragmatism Pragmatism usage in any research can non find that which one doctrine should be used or which is better. Pragmatism is a assorted methods ( Saunder, 2009:110 ) . Harmonizing to Tashakkori and Teddie ( 1998 ) pragmatism contend the base on experiencing instead than facts or cogent evidence approaching. 3.2.4 Research Philosophy Justification For this research, â€Å" Positivism â€Å" paradigm is the best tantrum to research job because it investigates the attitude toward quality of community pharmaceutics service of consumer position in London. Base on the Gallic Philosopher August Comte, province that positivism paradigm agencies of understanding human behaviors. 3.3 RESEARCH APPROACH Research attack means the manner in which the research worker will form their research in effectual manner base on two attacks as shown in the given figure 3.2 Figure 3.2 Deductive and Inductive Approach Tax write-off Initiation Beginning: Create by the writer, 2013 adopted from Wyk ( PowerPoint research design and methods part1 ) 3.3.1 Deductive attack Hussey and Hussey ( 1997:19 ) have explained the deductive attack as survey of theoretical and conceptual construction. It tested by empirical observation. Deductive attack stairss are theory, hypothesis, observation and verification informations ( see figure 3.2 ) . 3.3.2 Inductive attack Inductive attack is a survey of developed from the observation of empirical world to bring forth of Torahs or general form ( Hussey and Hussey, 1997 ; 13 ) . The measure of the inductive attack are observation, forms and create theory. Some research can unite utilize both inductive and deductive attacks. ( Convaye1996 ; 236 ) which the research worker can derive several advantages. 3.3.3 Research Approach Justification This research uses the deductive attack because the survey is based on upon the bing theory with respect to measuring and experimental the attitude of the consumer or patient. This research is related to the positivism paradigm because the deductive attack is used to give acceptable concluding for a the fact and base on bing ordinances, regulation and jurisprudence ( Crowther and Lancaster, 2009 ) RESEARCH DESIGN Research design is the procedure to bespeak what type of survey was undertaken to supply acceptable answer the research inquiry. Research design needs to stipulate the beginning of the informations aggregation and demo the right ground for taking the design. There are three types of research design ; explorative research, explanatory research and descriptive research ( Saunder et al, 2009 ) ( see figure 3.3 ) . Figure 3.3 The categorization of research intent. Beginning: Created by writer,2013 adopted from Saunders et al,2009 Exploratory research Exploratory research helps to ease the job. It is widely used in the direction research. If any information occur, the research can set or alter into the new way. The manner to carry on explorative research for illustration a hunt of literature, carry oning focal point group interviews and to interview experts. Explanation research Explanation research is a survey of the relationship between variable ( Saunder et al, 2009 ) , to propose to alter and give grounds for events ( Hart, 2006 ) 3.4.3 Descriptive research Descriptive surveies report aim to depict a common and uncommon phenomenon by detecting the the elements and study frequences, mean and per centum. ( Glatthorn and Joyner, 2005 ; 43 ) ( Hart, 2006 ) 3.4.4 Research design justification The the type of research which is the most appropriate for this research is explanatory, due to the fact that this research is evaluated of client ‘s position in community pharmaceutics services. 3.5 RESEARCH METHOD Research Method is specific techniques use to roll up informations with regard to the research job. In direction research is divided into two types as figure 3.4 Figure 3.4 Types of research method Beginning: Create by the writer, 2013 adopted from Saunders et Al, 2009 3.5.1 Quantitative derives from a rationalist epistemology, which holds that there is an nonsubjective. Typically, the quantitative research emphasizes surveies the that are experimenting and hunt for a relationship. If a survey has used a quantitative position † variable, controls, dependability, hypothesis, statistically important. 3.5.2 Qualitative is a systematic, subjective attack usage to depict life experience and state of affairs and give them intending ( Munhall, 2007 ) . You read "Attitude Toward Quality Of Community Health And Social Care Essay" in category "Essay examples" Qualitative research emphasizes a phenomenological position in which research of single It â€Å" embraces the position that every bit far as peoples ‘ position are concerned, there is on one individual truth â€Å" ( Hurtley and Muhit 2003 ; 103-104 ) . In other word, different people interpret things otherwise, in different topographic points at different times. 3.5.3 Research Method justification For this survey will follow a â€Å" Quantitative â€Å" research as it intends to research consumer ‘s position in service of community pharmaceutics in London. Hence, the writer has chosen quantitative research as it the lone method that seeks to happen the reply to research inquiries related to people ‘s attitudes and beliefs, in giving contextual scene by utilizing an unfastened – terminal questionnaire 3.6 RESEARCH STRATEGIES Typically, research scheme picks will be conducted by nonsubjective and research inquiries, clip, cognition, and handiness of resource ( Saunder et al, 2009 ) . There are many research schemes that can be used in research such as Experiment ( which normally use in pure scientific research ) Action research ( normally in field experiment ) Grounded theory ( which help to explicate and foretell behavior by constructing through deductive and inductive ) Case survey ( which try to understand the existent life context and utilize a assorted of informations ) Archival research ( which focus on the past papers and administrative records ) Ethnography ( usually use with a phenomenological methodological analysis to detect of human activity forms ) Survey ( normally use with quantitative methods and big volumes of informations ) . The study scheme normally uses in concern and direction research with deductive attack. The study scheme allows the research worker to roll up quantitative informations. The research worker demand to guarantee that the sample represent the population, design and pilot instrument for roll uping the information will supply a good responds rate. ( Saunder et al, 2009 ) . There are many types of studies such as Personal Interview Surveys, Telephone studies, Mail studies and On-line studies. Figure 3.5 Comparative advantage/disadvantage of mail, telephone, interview and online study Beginning: create by the writer, 2013 adopted signifier www.zeepedia.com 3.6.1 Research Strategy justification This research survey is influenced by a positivism paradigm, therefore, a study would be used to accomplish the aim of research in quantitative method. The study type that research worker usage is online and manus bringing aggregation. 3.7 DATA COLLECTION METHOD Is a specific technique usage to roll up informations with related to the research job. It depends on what type of information that needed to analyze in the research. In this research, the writer selects chiefly two methods. Fist informations aggregation method is a questionnaire for roll uping a primary information to construe and analyze determination by doing a critical analysis, mentioning to the theory and pattern. Questionnaire study is less time-consuming and cheaper than interviews, extra it is a popular for roll uping informations ( Collis and Hussey, 2003:174 ) . The 2nd research method is an observation on the medical service diary and client outlook has been done in order to organize the inquiries by looking at type of service, merchandise and criterion of druggist competencies in community pharmaceutics that are offered or need to be fitting demand of The Royal Pharmaceutical Society of Great Britain ( RPSGB ) . The writer has conducted the study by utilizing self-administered questionnaires which are closed inquiries. Harmonizing to Collis and Hussey ( 2003 ) close inquiry should be used in positive attack. There are assorted ways to roll up data.These include postal studies which can be used to roll up informations when the questionnaire are easy to understand and reply ( Holt,1997 ) .Another drawback of this method is one of the lowest response rates ( Tan,2002 ) .The postal study was non adopted in this research.Personal interview was non used because the limited dependability and repeatability of research survey and this method demand trained skill interviewers. ( Tan,2002 ) .For information aggregation method of this survey manus delivered and online questionnaires conducted at different location in cardinal of London from 25th January 2013 to 9th February 2013. This on-line study was conducted by utilizing the SurveyMonkey which provides package to roll up informations. The questionnaire on-line will direct to the participant through Facebook or Twitter fan page, electronic mailing study and Web link ( SurveyMonkey, 2012 ) 3.7.1 Questionnaire design The questionnaires divided into two subdivisions. The subdivision one was designed with comprised statements sing the quality of community services. The 2nd subdivision required the respondents to supply information about their background and demographics for case gender, age, income, cultural beginning, instruction, etc. A transcript of the questionnaire is shown in Appendix A Section 1. Question about Attitude toward quality of community pharmaceutics services. The inquiry will be divided into three constructs objective of the rating on measuring quality which identifies by Donabedian ‘s Theory of Quality wellness attention ; construction, procedure and result. It consisted of 24 inquiries and one inquiry ask about How do they normally use their pharmaceutics. The contents of the quality: construction Staffs A specialized druggist is present at the pharmaceutics Sufficient staffs are available Facilities degree Celsius ) The waiting countries are comfy and convenience for the services vitamin D ) Consultation room is provided for a private treatment 3. Topographic points vitamin E ) The pharmaceutics is clean degree Fahrenheit ) The pharmaceutics layout is clear and good organized 4. Merchandises g ) The medical specialties or contraptions are in stock H ) Many picks of wellness merchandise such as a nutritionary addendum, milk pulverization, medical supply, etc. are available The contents of quality: Procedure General services a ) Polite and take the clip to listen to what you want B ) Answer any questions you may hold 2. Essential services degree Celsiuss ) Provide advice on a current wellness the job or a long- term wellness status vitamin D ) Provide general advice on healthy life styles vitamin E ) Keep patient medicine records efficaciously H ) Provide clear label of medical specialties I ) Dispose of the medical specialties that the patients no longer necessitate 3. Complementary wellness services degree Fahrenheit ) Offer services such as blood force per unit area measuring or cholesterin testing, etc. g ) Offer complementary wellness service such as stylostixis, needle exchange strategies, influenza inoculation, etc. The content of quality: Result Clinical result Increase benefit of the medicine usage Reduce the hazard of safety of medicine usage Better your understanding about medical specialty Better your quality of life Cost Provide medical specialties with the sensible monetary value Satisfaction Supply an efficient service Supply a satisfactory service The questionnaire consisted close-ended inquiries and were constructed utilizing the Likert graduated table. Harmonizing to Collis and Hussey, ( 2003:184 ) the advantage of Likert graduated table is easy for the respondent to finish the statement by bespeaking their degree of sentiment and easy for the research worker to analyze the information or cryptography. The Numberss were imputed to each ground tackle, for a statistical analysis intent. The ground tackles use in Section one were: Strongly agree ( = 5 ) ; Agree ( = 4 ) ; Undecided ( = 3 ) ; Disagree ( =2 ) ; Strongly disagree ( =1 ) . Section 2. Participant item The socio- demographic inquiry is about gender, age, cultural beginning, business, education income and how long the participant has been populating in the UK. 3.7.2 Survey bundle A screen missive for presenting the aim and the subject of the survey was delivered to each of the questionnaires ( see Appendix B ) . The missive provided an option for the participant to hold a transcript of the survey consequences and voluntary for replying the question.The participants were asked to return the completed questionnaire by research worker collection every bit early as possible. 3.7.3 Pilot trial Harmonizing to Offredy and Vickes ( 2010 ) The ground of running pilot trial is that to prove the informations aggregation instruments including method and sampling in order to work out the job before the chief survey was implement.The questionnaire was pre-tested by 5 participants in order to evaluated possible barriers and to guarantee that it is comprehendible and coherent.There are remarks on the questionnaire were that some inquiry were hard to understand, some inquiry were repetitive.The statement of inquiry were reworded to better upon the pre-test questionnaires.Some participants besides suggested to do it shorter and more appealing by rearranging the questionnaire layout. 3.7.4 Cogency The content of questionnaire cogency was checked by in Pharmacy Practice. The cogency was revised before and after carry oning the pilot trial. 3.8 Sampling Technique There are two different ways can be used in the sampling techniques ( Saunders et al ; 2009 ) : chance and non-probability Figure 3.6 Sampling techniques. C07NF002 Beginning: Create by Saunder et Al, 2009 3.8.1 Probability Sampling Typically, usage for survey-based experimental research schemes ( Saunders et al ; 2009 ) . The population in chance sampling can be classified to random sampling, stratified random sampling and bunch sampling. 3.8.2 Non- chance sampling This alternate technique that selects the sample base on research subjective opinion ( Saunders et Al ; 2009 ) . This technique is easier to generated and less cost ( Jackson ; 2012 ) . Rubin and Babbie ( 2001 ) stat that it is normally used in qualitative research.The non-probability sampling can be used in research that follows mix method, quantitative and qualitative research designs.The drawback of non-probability techniques is an unequal opportunity of being included in the sample ( Fox and Bayat ( 2007:59 ) . The most popular non- chance trying such as convenience or handiness sampling, purposive sampling, self-selective sampling, quota sampling and sweet sand verbena sampling. 3.8.3 Justification of sample technique The most appropriate for this research is non-probability techniques and used a convenient sampling of grownup work forces and adult females who live in London. 3.9 SAMPLE SIZE The choice of the sample for this study was based on non-probability sampling, utilizing an inadvertent sampling technique or sometime call convenience trying technique or haphazard sampling. Harmonizing to Saunder et Al ( 2009 ) there are no regulation for all non-probability sampling technique except for quota sample. In peculiar, the sample size is depending on research aim and inquiries what will be suited for the research survey within available resource ( Patton 2002 ) . Creswell ( 2007 ) recommends that, expected interviews which undertaken for general survey is between 25 and 30 interviews. There are many expressions for ciphering the require sample size.According to Anderson et Al. ( 2009 ) determined the expression as Figure 3.7 Figure 3.7 Sample size for an Interval Estimate of Population Proportion expression formula2.jpg Beginning: Created by Andeson et al.,2009 Calculation for minimal sample size Ns = 1.96 2 * ( .5 ) * ( 1-.5 ) 0.1 2 n = 96 In 2011, London population about 8.2 million with approximative 3.2 million people lived interior London and 4.9 million were staying in outer London ( London poorness profile, 2012 ) . Due to restriction of this survey with time-limited, the research worker could non attempt big figure of sample size.The sample size of this survey approximates 100 samples 3.10 Data processing of questionnaire study Once the informations have been collected and checked, analyzing of the informations will be arranged.They were coded and entered into the Statistical Package for Social Sciences ( SPSS 17.0 ) . Socio-demographic informations: gender, ages, cultural beginning, instruction, income were selected for independent variables. In order to find the socio- demographic information for this research, descriptive statistic such as frequence and per centum was calculated. Attitudes toward quality of community pharmaceutics were coded strongly agree = 5, agree = 4, undecided = 3, disagree = 2 and strongly differ = 1 ) . Descriptive statistic such as mean, frequence, per centum and criterion variable was calculated. The association between socio-demographic features ( independent variable ) and attitude toward quality of community pharmaceutics services ( dependent variable ) was assessed for statistical significance utilizing the chi-square trial of association harmonizing to the aim of this research. 3.11 Ethic The writer should be cognizant about ethical concerns when the the research was undertaken ( Diedericks,2012 A ; Saunder et al.,2009 ) .The questionnaire were conducted a clear history of intent, utilizing appropriate linguistic communication that is simple to understand by participants. All informations collected will stay anon. and confidential.All paper informations roll uping usage will be destroyed by chopped paper machine. Every participant has right to retreat at any clip while finishing the questionnaires. The participant no demand to make full their names or identifiers were on the questionnaires. All informations are safely stored in a password-protected computing machine. 3.12 Decision This chapter explains the research methodological analysis which is used in this research.In sum-up, the overall methodological analysis is based on positivism philosophy.It is more subjective instead than nonsubjective and deductive attack in footings of theory testing is implemented.Quantitative method employs the attitude questions.Data sampling and informations collection and analysis method besides reference and presented in the Figure 3.8 Figure 3.8 Represents the research procedure for this research Beginning: Created by the writer, 2013 How to cite Attitude Toward Quality Of Community Health And Social Care Essay, Essay examples

Sunday, December 8, 2019

Holocaust free essay sample

Death is part of life. I understand it now. But it just seems wrong that the last part of your life should be brought on so quickly, without consent, without reason. My English teacher shows us what hell looks like. It is gas chambers, and guns, and hatred, Hitlers face emblazoned upon banners scowling down at you. It is seeing your friends die before your eyes. It is being forced to shove your own mother into an oven. It is saying goodbye to your only sister, knowing that she will escape through the chimney, murdered by the cruel, sadistic inglorius guards trying to uphold Hitler. I see hell with my own two eyes, walk through it with my own two feet. I close my eyes and let the wind take me to a different time, in a different world. I think of what it would have been like to live there. We will write a custom essay sample on Holocaust or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A pink triangle pinned on me. Why pink? Pink is for the homosexuals. Gulping, I look left, to the right. People thread off in both directions. The sky is gray with spirits rejocing in their freedom. People in stripes loom at me, their faces pointed and harsh, hungry eyes meeting mine. Their shoes are worm and blackened with dirt. A mother cradles her child, holding it to her breast. Someone calls my name, jerking me to the present. The wind whispers in the trees, the hushed screams of millions of murdered people. My friend stands in front of an exibit, motioning for me to join her. At first it seems unremarkable. Shoes litter the floor, feet deep, all different sizes, styles and colors. Then I realize with a sickening jolt what this is. These shoes are the only remanents of their owners. My jaw hits the floor as my blue eyes scan this sea of shoes, fixating on a single babys shoe. A baby, not yet old enough to walk, killed. A high heel, in the same style as I like. Sneakers. Fla ts. Mary-Janes. Sandals. Every shoe imaginable, blackened by the ashes of its owner and caked with dirt, lies in front of me. My throat goes dry and my blood rushes out of my face as I see a pair just like the ones adorning my feet now, the same size, the same color, once. I imagine her walking through here, terrified every day of not seeing the light of the next one, and then having her worst fears realized. Tears choke me. I pick it up, feeling the rough leather crumble under my gentle touch. I cradle it to my breast, wishing I could show its owner the same affection. Next comes the boxcar, where Hitlers prisoners were kept as they were brought from the ghettos to the concentration camps, without food or water, for days! I close my eyes again. The wailing of a baby pierced my eardrum. Its mother stroked it, whispering promises everyone knew were futile. Some looked out the window at Germany as it sped by, said their goodbyes to this world. We were strong. We all had someone to be strong for. The present jarrs me awake again, and I find tears lingering in my eyes. Next is the crematorium. Candles are the only light here, giving it an eerie, omnious glow. I feel the pain and suffering radiate off these walls, hear their shrieks, smell their fear, can almost taste the anger in the air anger well placed, anger at Hitler. Anger at the Nazis. Angry at the world for this to be able to happen. Trembling, I lift a finger to the names ingraved on the walls of the people who died here. My heart stops when I see W. Wa. Wal My family was killed here too, murdered brutally by sadistic, pediophilic Nazi bastards! Anger rises up in my chest, choked back with sobs. They ravage my body, leaving me whimpering, a small, quivering, helpless thing. Warm arms wrap around me, arms comforting me from the past, arms setting me apart from Hitlers terrible deed, restraining me from tearing apart this entire damned place. I sob in my friend Rachels arms. She sobs with me when she finds her relatives etched on the wall. We must never forget what happened here in the Nazi concentration camps. What happened to innocent, ordinary people like you or I. It makes me so bitterly resentful of my mop of golden hair, of the sapphire blue eyes that peek out from under it. The kind of complexion Hitler sought to make as the only one. I was furious to be under Hitlers thought of perfection, a hatred so strong I long to dye my hair black. But doing so will solve nothing. We must remeber that love is infinatly strong, happiness is subjective, and words are endlessly powerful.

Saturday, November 30, 2019

Music Concert Report Essay Example

Music Concert Report Essay Concert Report Guidelines Listening to live performances is an essential part of learning to appreciate and understand music. Treat this report as though you were a music critic writing for your local newspaper. In other words, what did you like/not like and why? Here are some general guidelines to help you listen, think, and write about a concert. Basic Information to Include When and where did the concert take place? How many pieces were performed? What were they called and how many movements were in each? Who composed each piece? Who were the performers (name of the ensemble and/or names of the soloists)? If there was a conductor, what was his or her name? What types of instruments were played and/or what types of voice parts were featured? Was there any special purpose to the concert? If so, explain. General Questions to Keep in Mind What was your general reaction to the concert? How did the performance sound to you? Was the music performed well? Were the musicians rhythmically â€Å"together†? Were they playing/singing in tune? Did any instruments or voices stick out? How would you rate the musicians’ technical ability and the energy of their performance? Did they seem well prepared for the concert? We will write a custom essay sample on Music Concert Report specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Music Concert Report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Music Concert Report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Which composition did you like best? Why? (e. g. , what specifically did you like about the piece itself or the way it was performed? ) Which composition did you like least? Why? Did any of the compositions trigger an emotional response from you? What were your specific feelings or thoughts in response to the music? Specific Points to Consider You may want to focus your discussion and analysis of the concert on one or more of the following points. Describe what you heard and observed using the following musical terms, elements, and concepts discussed in class when applicable. Genre (symphony, concerto, string quartet, etc. ) Stylistic period (Baroque, Classical, Romantic, etc. ) Mood (emotion conveyed by the music and performers) Pitch To what extent does pitch vary throughout the piece? How do changes in pitch reflect changes in mood? Rhythm (beat, accent, tempo, meter, syncopation) How were the elements of rhythm used to create special or interesting musical effects? Dynamics (level of sound) Identify changes in dynamics and discuss the effect these changes create. Tone color (bright, brassy, warm, ringing, hollow, etc. Mode (major, minor) Harmony/Melody Discuss the balance (or lack of it) between the melody and its accompaniment. Did you hear consonance, dissonance, or a combination of both? Motives/Themes Identify and note where individual motives and themes are first introduced and subsequently reappear in each piece. Texture (monophony, homophony, polyphony, etc. ) Form (sonata form, A B A, theme and variations, etc. ) Using the musical terminology and concepts covered in class, discuss the most interesting musical elements or features of the pieces that were performed. Compare the pieces from this performance with other compositions you have studied in class, noting similarities and differences. (Note: In selecting a composition from class, you may want to look for a piece by the same composer, from the same style period, or of the same genre as the piece(s) from the performance. ) How does this concert compare to the performance(s) you attended previously? Describe the behavior of the performers and the audience. What, if any, interaction occurred between the two? What kind of behavioral expectations do performers and audiences bring to the concert? How are these expectations satisfied or frustrated? Other VERY Important Information Concerts should be semi-professional/collegiate level or above. (For example, attending a younger sibling’s high school band concert will not be accepted. ) The purpose of these concerts is to attend a concert you might not normally attend in an attempt to expand your horizons. This means attending a rock/country/pop concert is out of the question. A good rule of thumb is when debating whether a concert is appropriate or not, ask your professor! Once you attend a concert, please submit the report within five days of the event. Any papers handed in beyond that point will NOT be accepted. Paper requirements: a minimum of two pages, double-spaced, 12-point font, one-inch margins. Please edit your paper for accuracy. Include the program (or ticket stub if no program is given out) with the report. Organizations With Community Events Calendars on the Web: AM: http://performancestudies. tamu. edu/ Blinn: http://www. blinn. edu/odonnell/index. htm MSC OPAS: http://opas. tamu. edu/ Arts Council – Brazos Valley: http://www. acbv. org/ KBTX: http://www. kbtx. com/ KAMU: http://events. publicbroadcasting. net/kamu/events. eventsmain

Tuesday, November 26, 2019

Prohibition in the 1920s essays

Prohibition in the 1920's essays Following the year 1919 came a decade of corruption and many changes in the way people lived. For a while in the United States people lived as though their reputation mattered more than anything, and letting go and having fun were not the appropriate things, especially for woman to do. With the many changes came one of great importance that actually made American citizens appear more innocent Prohibition in the 1920s came hard to many Americans, mostly men. The banning of selling, making, and transporting alcohol was enforced through the Volstead Act. Effective on January 16, 1920, at 12:00 pm, the Volstead Act was the start of a new experiment in the United States. The chief prohibition leaders Mr. Volstead, Mr. Bryan, Mr. Wheeler, and Mr. Sheppard all gathered at the First Congregational Church to watch the act become legal. Prohibition and the Volstead Act were induced to reduce crime and corruption, solve social problems, reduce the tax burden created by prisons and poorhouses, and improve health and hygiene in America. Although many people thought that Prohibition would help society, it changed it once again for the bad. Although consumption of alcohol fell at the beginning of Prohibition, it subsequently increased. Alcohol became more dangerous to consume, crime increased and became "organized", and the court and prison systems were stretched to the breaking point. It led many drinkers to switch to opium, marijuana, patent medicines, cocaine, and other dangerous substances that they would have been unlikely to encounter in the absence of Prohibition. During prohibition people made their own bath tub gins producing alcohol that many people died from. Speak easies were many peoples escape from prohibition, where they could drink alcohol in a bar, but illegally. Bootleggers, who made their own alcohol and ran it ...

Friday, November 22, 2019

What Is the JavaScript TypeOf Function How Does It Work

What Is the JavaScript TypeOf Function How Does It Work SAT / ACT Prep Online Guides and Tips We’ve all stumbled on a web page that just doesn’t work. You know the type: the links aren’t clickable, the scrolling is all over the place, and sometimes...they automatically play music. (The worst.) When a website misbehaves, bad JavaScript is usually at fault. That’s because JavaScript is the scripting language that controls the interactive elements of a website. In fact, JavaScript is actually a robust, powerful scripting language that automates processes like animating images or providing autofill suggestions. Basically, JavaScript is one of the fundamental coding languages of the web. Like any language, there’s lots you can do with JavaScript. But today, we’re going talk about one specific type of JavaScript command: the TypeOf function. In this article, you’ll learn about the JavaScript TypeOf function, including what it is, how it works, and its most common uses. So let’s dive in! What Is a JavaScript Data Type? Before we start talking about the JavaScript TypeOf function, we first have to talk about JavaScript data types. A data type is a classification given to different kinds of data used in programming. There are seven data types that can be used in JavaScript, and we’ve broken them down in the table below: Data Type Use Number Deals with any number, including decimals. You can also do operations (like multiplication, division, etc.) with this data type. String A string of characters surrounded by single or double quotes. Boolean Sets a true/false (or yes/no) value. Null Indicates the intentional absence of a value. Basically means â€Å"nothing,† â€Å"empty,† or â€Å"value unknown.† Undefined Also indicates the absence of a value. Unlike â€Å"null,† â€Å"undefined† is usually used when a variable is declared but a value is unassigned. Symbols Unique identifiers for objects. Object Collections of related data. Unlike other data types, which can only contain a single thing, objects store collections of data. Why Are Data Types Important? In JavaScript, a data type is basically a category of data that can be stored and/or manipulated within a program. Depending on the type of data you’re using, JavaScript will treat the data differently. So for example, JavaScript deals with an undefined data set much differently than it deals with an object! The other reason data types are important is because they dictate what you can do with the data you provide- and whether that data will work or not. For example, if you try to assign a value to a â€Å"null† data type, it won’t work because null indicates an empty value! Likewise, there are some data types that only do one thing, like the boolean data type, while others can work with collections of data. In other words, data types are one of the fundamental building blocks of JavaScript. What Is the Javascript TypeOf Function? Now that you know what data types are, the typeof function will make more sense: that’s because the JavaScript TypeOf command is used to check the data type of a particular operand, which is a JavaScript array, data type, or object. In order to use the TypeOf command, you would write it like you would any operation that uses a single value (also known as a unary operator). That means the script would look like this: typeof x You can also use the TypeOf operator like you would a JavaScript function. The syntax would look something like this: typeof(x) Using the JavaScript TypeOf function is particularly useful for checking the value of JavaScript expressions! How Do You Use the Javascript TypeOf Function? When you use the JavaScript TypeOf function to check the data type of an operand, it returns a string, or text, that contains the data type! Here’s an example of how you might check to see if an object is undefined: If (typeof object === ‘undefined’) The TypeOf function is an important tool when dealing with complex code. It allows a programmer to quickly check a variable’s data type- or whether it’s â€Å"undefined† or â€Å"null†- without going through the code line by line! Additionally, the TypeOf function can also check whether an operand is an object or not. Depending on the output of the TypeOf function, a programmer can adjust their previous code or quickly pick up where they left off on a project. In other words, the TypeOf function is a quick way to check data to make sure that a script will work. What Are the Possible Outputs of the TypeOf Function? Because the JavaScript TypeOf function is used to check data types, the possible outputs of the TypeOf operator are all data types, too. Here’s a quick summary of the different type of outputs you might see: Value TypeOf undefined â€Å"undefined† null â€Å"object† Boolean (true or false) â€Å"boolean† all numbers â€Å"number† all strings â€Å"string† all symbols â€Å"symbol† all functions â€Å"function† all arrays â€Å"object† native objects â€Å"object† host objects Dependent on implementation other objects â€Å"object† What’s Next? If you’re interested in coding, it might be worth considering a computer science major. But how do you know if computer science is really right for you? Here are five key factors to consider when choosing your major. If you do want to go into computer science, it’s important to get into a good college. One of the best ways to do that is to make sure you’re taking the right courses in high school. Check out this expert guide to the classes you should- and shouldn’t- take before you start your college applications. You might have heard that AP classes look good on your college application. If you’re not sure what AP classes are or how they affect your college admissions chances, take a look at this AP overview.

Wednesday, November 20, 2019

INFOSYSTEMS SLP3 Research Paper Example | Topics and Well Written Essays - 250 words

INFOSYSTEMS SLP3 - Research Paper Example This can be compared to California, which has a higher average annual base salary of $77,448, Maryland, which has an average annual base salary of $69,703, and Idaho, which has an average annual base salary of $41,304. The average annual base salary for a teacher throughout the United States is $50,887. The differences indicated above can be attributed to the cost of living in different states. The cost of living in the state can be attributed to five main factors: groceries, housing, utilities, transportation, and healthcare. In California, the cost of housing is expected to be higher by 84% over the New York residence, while the only reducing cost of living is healthcare, which is expected to be lower by 2% (CNN Money, 2012). The cost of living factors are lowest in Idaho, where the only increasing factor is transportation, which will cost 5% more than in New York (CNN Money,

Tuesday, November 19, 2019

Law Essay Example | Topics and Well Written Essays - 1250 words - 2

Law - Essay Example (Zander, 2004, p 701). While solicitors are the ones who hire barristers and apprise them of the facts of the case, they were not permitted right of audience in the higher courts, therefore this often entailed double the costs for clients, since they had to hire a solicitor and a barrister as well, and in difficult cases to be contested in the highest courts they were also obliged to hire a Queen’s Counsel. Since these legal professionals charge by the hour and costs are particularly high for Queens Counsels who are allowed audience in the High Court and Crown Courts, this has often pushed the option of litigation right out if the province of poorer clients. Barristers function on the lines of the â€Å"cab rank† principle which could be projected as an advantage, however the reality is that in some cases there are returned briefs and the question of an unprepared barrister appearing in Court on behalf of a client instead of a solicitor who is better acquainted with the case, which â€Å"may be a major source of unfairness and poor justice for offenders and litigants.†(Darbyshire, 2001, p 263). Moreover, as demonstrated in the Report by the National Association of CAB (www.unece.org), few clients are properly informed about costs and this is part of the reason why the fees associated with processing a case are most often the cause of customer complaints. Duplication of costs has been inevitable because both the solicitor and the barrister must be paid and it is often difficult for a client to comprehend why he is faced with the necessity of paying two people for one case. Moreover, the lack of audience in the higher Courts has been the biggest grievance of solicitors, who are often the best acquainted with the facts of the case after their close association with the clients. It is the solicitors who brief the barristers but since there is no guarantee that the barrister who has been briefed will be free to appear in court

Saturday, November 16, 2019

Climate Change and Poverty Essay Example for Free

Climate Change and Poverty Essay Over the past few decades, a major concern is the threat climate change possess for today’s economy. Millions of people are affected each and every day by climate change but this is just the beginning of the worst. One thing that seems to go unharmed by climate change is social status; how long will money last as a barrier to the effects of Mother Nature? How does poverty increase the risks associated the devastating powers of climate change? When speaking in terms of poverty many different categories arise. Poverty in America is different than poverty in Asia or Africa. Every country has faced poverty. It is inevitable; some countries however, face a disproportionately high percentage of poverty. Climate change affects many different aspects of each country. Each country is at risk of poverty due to climate change; however, poverty stricken areas are more economically, socially, and politically unprepared. Country’s economic standings are greatly affected by climate change Many people are confused as to how the changing climates affect the economy. Every country depends on agriculture and specific levels of water to generate specific revenues. The more poverty stricken areas rely on farming and water levels more so than well off countries. Most of these countries have not yet been fully developed like USA, Europe or some parts of Asia. Climate change threatens the potential future crop yields. Climate change could place an additional 5 to 170 million people at risk of hunger by the 2080’s (Rosenzwig and Parry). We are talking about a vicious never ending cycle of devastation. Countries depend on rain fall for agricultural growth; climate change affects the amount of rain fall from droughts to monsoon levels. Farming is at the mercy of water, leaving communities with the threat of possible starvation. Most of the poverty stricken areas rely solely on farming, not only for revenue, but also for nutrition. This being said, climate change drastically threatens a country’s economic status not just for the more poverty stricken areas but every country as well. Climate change and agriculture are intertwined processes; both take place on a global scale. The problem about climate change is that it has a very slow increase, such as one or two degrees a year. This does not seem to be that devastating. However, many crops are climate based such as grains and coffee, grapes used for wine production, and other fruits; even the slightest increase of temperature will and can affect these crops. Thus climate change is leaving already poverty stricken areas like India and northern Africa to await their drastic fate. Although low and middle income countries are only responsible for a small percentage of greenhouse gas emissions, the adverse health effects associated with climate change will fall disproportionately on the lower income countries; this inequity will further exacerbate global health disparities. The greatest social peril of climate change is how it affects health issues, especially those in poverty stricken areas. The changing of temperatures will further effect the ecology of diseases such as yellow fever, malaria, and dengue fever; socially the people most at risk are the elderly, very young, and the poor (McMichael). Millions of people below the poverty line and those in rural areas represent high risk populations who are exposed to myriad health risks, including poor sanitation, pollution, malnutrition, and a constant shortage of clean drinking water (Dhiman). Climate change is already taking a toll on the economical standings of poverty stricken countries; proceeding with the vicious cycle of social destruction, climate change seems to have no weakness. For instance, the summer of 2010 was the hottest summer on record in India, with temperatures reaching a record average of 122 degrees Fahrenheit. The effects were limitless: crops perish, livestock were killed, and thousands of people were hospitalized or killed (Burke). A study of 12 globally urban areas noted a 2. 80 – 5. 08 percent increase in mortality rate for each one degree increase above 29 degrees Celsius (Hajat). India has the highest amount of people living and suffering with AIDS; climate change affects the research and possible solutions of fighting off AIDS and other diseases. With limited resources such as water available not only would it be hard to make vaccines and cures it opens up an unprecedented amount of possible deaths. When looking at the corporate businesses and the undoing of the human habitat; the United Nations has sanctioned many organizations to track climate change such as the UNEP, the World Meteorological Organization and the IPCC. Since the mid-eighties, these agencies have monitored the changes, yet have failed o convey the significance. Studies done by these agencies have concluded that the last fifty years are attributable to human activities and big corporations which lead to the changing in the compositions of the atmosphere throughout the 21st century (Saltori). These activities that are mentioned are those by means of businesses that grew into national conglomerates. Concurrent with business growth, the greenhouse gas emissions have grown seventy percent from 1970 to 2004 (Lehner). Recent studies have shown that 122 corporations produce eighty percent of greenhouse gases (IPCC). The climate is going to drastically change the world forever, but at whose expense? What exactly does the political eminence of these companies have to do with climate change and poverty? The answer lies in yet another vicious never ending cycle. Corporations employ millions of people enabling the stimulation of the economy. The people in return purchase and live off of the money from the corporations. However, not only are people living off the companies, but they are also contributing to and enabling to the production of greenhouse gas emissions. Globally, we as a civilization have become accustomed to these conglomerates to survive, or so we ruminate. Poverty stricken areas lack these 122 multinational companies, yet they still feel their wrath. There is, however, undoubtedly a silver lining; the businesses and their bringing of our destruction may also be the key to our survival. We know that these 122 companies have in a way sealed our fate; yet they also bring many more attributes to the table. These companies are capable of stimulating the economy, advancing technology and are accomplished enough to lead the world to better health conditions. The UN established an adaption fund to help developing countries cope with climate change. With all these efforts only eighty million dollars was raised, which was miniscule to the actual amount needed. The United Nations and their sanctions also developed a refugee program for these underdeveloped countries; becoming a refugee country is harder than conquering world peace. They developed a three level program to help these countries with rules and regulations in place that become more drastic at each level. This program has developed these strict rules, so as to not have a recurrence of the refugees after World War II. The revenue from the businesses would easily be able to help the disadvantages they have created. Once these sanctions made from the UN and conglomerates can realize that they are the bringer of destruction and also the possible savior, the world may be able to breathe more easily. These companies are reporting constant growth in income. The company’s net worth is constantly on the rise while the poverty stricken areas are in need of help and rendered useless to the businesses devastating effects on climate change. The abundance of revenue would be a great help if donated to those sanctions created by the UN. In today’s world we face a harsh time ahead. Poverty stricken areas are more economically, socially and politically unprepared. The world is changing and it is for the worse. Climate change is affecting every national resource we as a global community need to survive. Underdeveloped countries are limited to their amount of resources and depend on those to survive. With the climate in the rise the production of many fruits, vegetables, grains and every country’s staples are all at risk. Countries’ livestock are included under the climate change’s pressure. The changing of the weather affects not only the heat, but also the rain fall from droughts to monsoons’ and floods and leads to unstable clean drinking water supplies. Poverty stricken areas are not able to produce certain health vaccines; climate change and the changing of waterfall seriously hinder their abilities to create more vaccines and provide accurate health care. Many viruses and illnesses â€Å"power countries† have and are able to treat and even cure are not as easily treatable in those underdeveloped countries. The most devastating aspect is realizing how the companies we take for granted are leading us to our doom. Producing eighty percent of greenhouse gases is unimaginable. What is more mind-boggling is that these 122 conglomerates hold the key to our salvation. These companies have the power, the wealth and time to fix their undoing and help right their wrongs. Millions of people are at risk to the effects of climate change. Going â€Å"green† is a simple yet wonderful way to help save our planet however, our efforts are useless to those in severely poverty stricken areas. The time to make awareness is now; the time to stand up is now; the time to act is now!

Thursday, November 14, 2019

Deutsche Bank AG :: essays research papers

Walker, M. (October 23, 2000). Deutsche Bank Plans to Make Its Retail Unit A Stock Outlet. The Wall Street Journal (pg A29-30) This article is about Deutsche Bank AG tried to sell its retail business in order to concentrate on corporate and investment banking six month ago and it is now working on a plan to change its retail unit into a pan-European outlet for stocks, mutual funds and other investment products. Today, top executives of the world's largest bank by assets, Deutsche Bank, are going to present their new ideas to their supervisory board. The board planned to consider the management proposals earlier this year before big steps were taken. The bank’s powerful investment-banking division Global Corporates & Institutions encourages the new idea. GCI oversees the retail network as a distribution channel to the growing class of wealthy Europeans who are changing their savings into stocks and investment funds. Mr. Breuer had been told to rethink his previous plan to sell a majority stake in Deutsche Bank 24 by the supervisory board. The bank's top investment bankers believe that retaining the retail business and focusing its efforts on selling investment products is profitable than traditional banking services. In addition, Michael Philipp, the manager of the Deutsche Bank's asset-management division, is also pushing the retail restoring to increase the sales of fund-management unit DWS, Europe's biggest mutual-fund company. These plans aren't limited with only Deutsche Bank 24, it is also for the group's private-banking unit, serving high net-worth clients because of its aggressive expansion as a European sales channel for the GCI and asset-management units. Deutsche Bank also plans to win retail customers in the United States. It was that was followed a bid for National Discount Brokers Group Inc. earlier this month. It is up to the supervisory board’s decision to accept the plan in order to keep the retail bank. On the other hand, they can oppose a strong shift away from basic retail banking. In today’s meeting, there may be an understanding that leaves Deutsche Bank still well established in traditional domestic retail banking, as well as the retail investment services that stimulate its GCI bankers. Deutsche Bank had budgeted $109.3 million to build up Deutsche Bank 24 in Europe in August that includes redesigning branches abroad, merging information technology and marketing the new business. Management consultants have expected that it would cost about 300 million euros to achieve credit across Europe in marketing.

Monday, November 11, 2019

All high school graduates should be given a chance to get a free college education

The skyrocketing costs of modern higher education are a serious threat to national economy and well-being. Students who are presented with formidable barriers on their way to college, such as the need to take time to complete their degree, staying out of the workforce for the time period, and serious entrance tests, have to cope with a problem that is insurmountable for many: the cost of higher education.Although in the US student loans are available, this is a serious consideration that may prevent many from getting an education. It seems feasible that students are provided with a no-cost public college education in the way it is done in many European countries. This policy would have many benefits for the labor market and educational system.1. Finding Ways to Finance Public educationWhat is the way to finance public education? The money is typically raised through the taxation system involving federal and local taxes. This setup involves a more equal distribution of the financial b urden implied in the higher education system.After all, the advantages of higher education are later consumed by the whole society as educated specialists are working in many spheres of society for the benefit of all. Students who are investing time, effort and money in their education are not only toiling for themselves – they are leveraging their talents to create a better world for all.However, when the system is financed out of funds provided by students and their parents, the distribution of burden is unequal since it lies exclusively on the shoulders of those who are studying and ignores the positive social effects of education. Education is a communal affair and it should be treated as such by all relevant parties, who should attempt to turn it into a powerful vehicle for social development. Providing a public education out of public funds will ensure a more equitable distribution of the financial responsibility for supporting college education.2. Giving Talented Stude nts a ChanceRising tuition costs place heavy demands on family and personal budgets, making financial background of a student an important factor in determining the decision to go to college. As of now, the constant rise over the past decade gives no indication of stopping. Quite soon, education may be affordable (excluding students loans) only to a select few. In fact, policy-makers have already expressed concern about the steep rise in costs.The National Commission on the Cost of Higher Education established in 1997 stated that â€Å"the federal and state governments may elect to impose price controls on higher education† given uncontrollable rise in tuition fees (Martin 2002:88).In determining the factors for financing and tuition, society should ask itself what it really wants in terms of enrolment in colleges: a more affluent or a more talented class. If the answer is the latter, enrolment clearly has to be determined by intellectual ability and leadership potential, not by the ability to cover the costs. If we take affluence and talent to be unrelated, there is no reason to desire the enrolment of students from wealthier families.Quite the other way round, wealthy parents may have ways to promote their children other than through education, and if they have connections, it is possible to make it even to a top position with an online degree or even without any.Thus, free college education is a way to harness the potential of all talented students regardless of their parents’ financial possibilities. In contemporary American society, individuals from needy backgrounds may rely on education as their only way to success. If society denies them this way, they will never gain a chance in those jobs that could reveal their full leadership potential.3. Are Fees Inevitable?Despite students’ protests against costs of higher education, education experts continue to insist that fees are inescapable. As reasons for increases in college tuition, t hey cite the need to maintain an adequate economic basis including development of new technology in universities and colleges. Some college officials insist that students should be happy with fees because they are â€Å"fire-sale bargain considering what it actually costs the school to educate an undergrad each year† (Sausner 2001:20).Evaluating those arguments, one should keep in mind what should be the ultimate purpose of education. If this is taken to be the benefit of the overall society, if should be structured in such a way as to ensure this maximum benefit for all. For example, imposing taxes in order to finance education will gather more money from the rich and less from the poor. Putting these funds into tuition-free education, the government will give all equal access so that cost is not an issue.As a result, the education provides the nation with more efficient professionals who will be able to contribute to economic growth. Tax payments can be maintained at levels that correspond to the needs for technological and other development of colleges. Surely, this means higher taxes, but this will be offset by absence of tuition for citizens.

Saturday, November 9, 2019

Discuss the importance of Roman construction

Roman architecture is a fusion of Etruscan elements and traditional Greek. Horizontal beams are supported by columns and arches are developed. The arch is further developed into dome. The basic building materials are stones, highly expensive marble and developed concrete. Colorful chips of stone inset into the cement are widely in vogue. One can see in Roman homes mural decorating floors, grottoes in geometric and pictorial designs, on walls. Different regional tastes, choice of the patrons dominates the scene of Roman Architecture.It goes to the credit of Roman Engineering that concrete for building practices is adopted The style relating to designing and construction of the domes, can still be seen in North America and throughout Europe. The finest example of Roman Architecture is the Roman Colosseum, the well-known amphitheatre in the world. It is also known as Amphitheatrum Flavium, after the dynasty of Flavian. â€Å"Construction was initiated by the Emperor Vespasian around 72 AD. His son Titus reigned over its completion and the official opening ceremonies, about 8 years later, in 80 AD.The huge theater was originally built encompassing four floors. The first three had arched entrances, while the fourth floor utilized rectangular doorways. The floors each measured between 10, 5-13, 9 meters (32-42 feet) in height. The total height of the construction was approximately 48 meters (144 feet). The arena measured 79 x 45 meters (237-135 feet), and consisted of wood and sand. Nets along the sides protected the audience. † (The Colosseum ) The spectator capacity is between 45,000-55,000. Travertine is outside, and tufa and brick in the interior.Each marble block used for the main pedestal weighs 11,000 pounds. They are held together by metal pins. Later mortar is used, when thieves strike to remove the metal pins. The total amount of marble devolved in the construction is approximately 100,000 cubic metes. The numbers of entrances are 80, 76 for the gene ral spectators and 4 for the VIPs and the gladiators. For the audience, the first row is throne-types seat with backs. These are also the seats of honor. Women, when permitted to attend the programs, sit in a separate section.Upper diazomata seats are reserved for foreigners. The architectural design is so imaginative and great from the point of view of light that no artificial lighting is necessary, as the performances are held during the day. Sound effects are, however, used. The Pantheon-temple of all Gods: According t Michelangelo, Pantheon is â€Å"angelic and not human design. † The present Pantheon is about 1900 years old . Many legends prevail regarding the earlier structures of Pantheon. This is planned and designed by Hadrian, in 120 AD.â€Å"His plans called for a structure with three main parts: a pronaos or entrance portico, a circular domed rotunda or vault, and a connection between the two. The rotunda's internal geometry would create a perfect sphere, since t he height of the rotunda to the top of its dome would match its diameter: 142 feet (43. 30 m). At its top, the dome would have an oculus or eye, a circular opening, with a diameter of 27 feet (8. 2m), as its only light source. † (Parker–) Many imaginative and spiritual ideas are experimented on the design of this structure. This is conceived to be the sanctuary of all Gods.Timber forms layered with pozzolana cement are used in the foundation of the structure. This cement is made by grinding together lime and a volcanic product of Italy. The structure is supported by 16 gray granite columns. Each is 39 feet (11. 8 m) tall, five feet (1. 5 m) in diameter, and 60 tons in weight. The dome is constructed in tapering course. The base is 20 feet and thinnest at the oculus, 7. 5 feet. Pantheon is one of the marvels of the engineering skill, as this structure, with the awesome dome span, built on marshy land, is still perfect after the lapse of 2000 years.â€Å"The technical de tails are as under: Built: 120-126 AD under Emperor Hadrian, Foundation: 24†² thick at base and steps to 21†² at ground level, Rotunda: concrete, 20†² thick; 142†² diameter, Oculus: concrete: 7. 5†² thick; 27†² diameter, Interior Columns: 3†² diameter, 29†² tall topped with a Corinthian capital, of 4†² totaling 32†² 9†³ tall, 25 tons each, Portico: 16 granite columns 39†² tall, 5†² diameter, 60 tons each. † (Parker–) Other Roman Engineering skills to improve the lifestyles: Roman aqueduct at Segovia: Water supply to the entire city of Rome is done through using a system of 4=640 kilometers of aqueducts.The aqueduct at Segovia in Spain is one such creation of the engineering skill of Romans. The system stands the test of time. Many roads in Western Europe built with Roman engineering skills are still in use. The baths at Bath, England are used now also. The churches, palaces and lighthouses built by Romans are currently in use. The Hadrian’s Wall built in an inhospitable part of England is an engineering marvel. It is 117 kilometers long and in some areas, 6 meters high and 3 meters thick.This wall is built to protect soldiers from the onslaught of wind and cold. The forts can hold up to 1000 men. The facilities like washrooms and toilets are adequate. The wall has stood the test of time, though poorly maintained, and the precious marble part of it are removed and utilized for private use by the unscrupulous farmers. Roman houses for the rich are single-story houses, built around an atrium. â€Å"Beyond an atrium was a second open courtyard known as a peristylum. This area included a garden and it also had rooms opening up off of it.In the homes of the wealthy, the gardens served as a meeting point so they were designed to be shady and comfortable so that people could meet in them regardless of whether the sun was fierce. † (Roman) One of the famous houses where Roman mo saic has been extensively used is Fishbourne Palace in West Sussex. A unique under floor heating known as hypocaust is used to keep the houses warm. Architecture and the Engineering skill to execute a perfect project are alternative beats of the same heart—and Romans have many standing witnesses to prove this point.

Thursday, November 7, 2019

System I designed in order to produce a promotion package for her newly formed company selling music CDs Essays

System I designed in order to produce a promotion package for her newly formed company selling music CDs Essays System I designed in order to produce a promotion package for her newly formed company selling music CDs Essay System I designed in order to produce a promotion package for her newly formed company selling music CDs Essay My friend was impressed with the system I designed in order to produce a promotion package for her newly formed company selling music CDs. The business has expanded rapidly with the large number of music CD titles in stock and has many regular customers. She would also like to develop a mail order service within the business. All the information at the moment is kept on paper based records and she is finding it difficult to locate information due to the increasing volume of sales in the business. My friend has been advised to convert her records onto a computer-based system and was given a floppy disk to containing sample data on current music titles available on CD to start her off. She has no idea how to access this information and has commissioned me to evaluate this data and devise a system that will allow her to keep her records of music CDs in stock, and customers for the mail order section of the company. My system will include: * Data capture sheets for CD data and customer details * Collection and input of data * Evidence that I have chosen a data-handling package and constructed a database. * * Presentation of the results in the form of printouts demonstrating the information which can be obtained from searching * A comprehensive User Guide so that my friend and her employees can use the system * An explanation of what has been done at every stage of my work, giving details of the software used and how it enabled me to create and develop my work. My work will be presented in five labelled sections as shown below: * Analysis * Design * Implementation * Testing * Evaluation My work will be secured in a plastic folder with a front sheet, which includes the following details: * A bold large heading; * A sub heading; * A graphic; * My name; * My centre number * My candidate number My work will also include a contents page so it is easier to examine my work and all pages will be numbered. Candidate No.- 6071 Centre No.- 20860 Action Plan The following is a list of jobs I need to do in order of priority: 28/9/00 Look at databases: identify weaknesses 30/9/00 Read through booklet carefully so I understand the task set 3/10/00 Write a statement giving details of the task 5/10/00 Arrange task criteria 7/10/00 Gather information about the task (How do other mail order companies and retail businesses store and process their data.) 9/10/00 Find out, and analyse the views of, potential users of mail order services and CD shops 11/10/00 Use an analysis of my completed questionnaires etc justify my design specification. This should include statements about structure, ease of use, quality of user documentation, types of output and presentation 13/10/00 Make a statement giving reasons which hardware and software is required for my system to run effectively 14/10/00 Check through Analysis section 15/10/00 Start Design section and examine and evaluate alternative methods of creating my system and explain what changes will be required based on my research evidence 17/10/00 Produce two or three database structures and explain strengths and weaknesses 19/10/00 Choose design that is most suitable and explain the decision 21/10/00 Explain how the hardware and software available influenced the design 23/10/00 Obtain views of potential users of my system using feedback to improve my system 25/10/00 Prepare data collection sheets and enter a suitable sample by hand 27/10/00 Produce database as detailed in design specification 29/10/00 Produce user guide for client 1/11/00 1st Submission date. Research completed and data files created with evidence of testing 3/11/00 Explain why I used the specific software and produce user guide for users explaining what the system can do 4/11/00 Check through Implementation section 5/11/00 Start Testing. Investigate verification and validation techniques and produce a testing plan 7/11/00 Check results of data entry correcting any errors and show any improvements made prior to this. 9/11/00 Create table to show how different parts of the system were tested, with evidence 11/11/00 Produce a series of simple and complex searches to demonstrate what the system can do. 13/11/00 Describe changes made as a result of testing, with evidence 14/11/00 Check through Testing section 15/11/00 Start Evaluation section. Explain reasons for software use giving clear features 17/11/00 Analyse the results of my searches and compare with the original stated requirements of the files 19/11/00 Include comments from third party about the viability of my new system and explain the changes made as a result of those comments 21/11/00 Compare design I have produced with original design specification. 22/11/00 Double check through entire coursework to make sure nothing is missing 24/11/00 Final Submission date. Hand in coursework Design I used Microsoft Access to create my database design structures. I followed the wizard and created four database design structures. I also explained and criticised each one. I then chose the best database design structure that I thought was most suitable to the task. Finally I printed all the structures on a Lexmark Z31 color jetprinter. Contents 1. Analysis Page 3 2. Design Page 18 3. Implementation Page 31 4. Testing Page 61 5. Evaluation Page 68 Questionnaire Analysis I recently visited the Virgin Megastore and MVC in Walsall with a couple of friends and interviewed both managers. We got them to fill the client questionnaires in that we designed together. We did this because we knew that both managers would be very busy so we designed it together to speed the process up and to have ideas on alternative methods of creating the system and database design structures. We found out that both companies are potential users of mail order and both agree that it is very reliable to store and process their data by using the system and agree that the system is not completely perfect as some errors do occur once in a while. The cost of mail order depends on how many products are purchased. Both use database and word-processing to store and process their data respectively. The mail order service is for any age group and both companies have a wide variety of music CDs available for the users of the system. Virgin Megastore uses the Internet mainly for their systems but both head offices decide the hardware and software that the companies use for their systems to run effectively. Their opinions on mail order are that it is very easy to use and that it is reliable enough, as they have been using the system for years. We were told that you get what you want out of mail order and we were given Virgins website to find out more information on mail order: [emailprotected] We got both managers to sign our questionnaires as evidence that we visited the companies. I also did a customer questionnaire to find out the views of the public and customers. I got many people to fill my customer questionnaire in and left a copy inside my folder to show an example of what it looked like after a member of the public filled it in. I found that Pop music was the most popular with people and classical the least popular. Most people would pay between à ¯Ã‚ ¿Ã‚ ½10-15 for a music CD. This is because the best CDs are highly priced therefore most customers are prepared to take that risk and spend over the limit just to get the latest music. Very few people order their music of the Internet because not all people are connected to the Internet and the people who are think that the system is unreliable. Virgin Megastore is the most popular music store as it has many customers and WH Smith has the least amount of customers who buy music from the shop. Most people I did a survey upon were between the 10-20-age category. Now that I have analysed my questionnaire, I will justify my design specification. Design Specification The following shows details about the design structures, ease of use, quality of user documentation, types of output and presentation. I will show this by doing the following: * Do printouts to show an exploration of data in a computer database to obtain specific information. * Do printouts that I have thoroughly checked and edited the databases. (I.e., correct errors, add and delete records, fields). * Show my data collection methods suitable for the printouts and other output that I may require. * Do printouts showing simple and complex searches for specific information. * Show evidence that I have chosen a data handling package and constructed a database. * Write an explanation of what has been done at every stage of my work, giving details of the software used and how it has enabled me to create and develop my work. Candidate No.- 6071 Centre No.- 20860 Data File I obtained my data using my data collection sheets and entered by hand a suitable sample. I received feedback from my family, friends and relatives. I later typed the data up in Microsoft Access. The table is shown below: Customer ID Last Name First Name Gender Birthdate Place of Birth 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Data File Below is the data that I typed up in Microsoft Access: Customer ID Last Name First Name Gender Birthdate Place of birth 1 BASRA SUKHPINDER M 10/05/85 WALSALL 2 SANOBAR MANSOOR M 27/12/84 WALSALL 3 HUSSAIN AKHTAR M 06/03/85 WALSALL 4 GANI BODRUL M 14/01/85 WALSALL 5 BHANGAL HARPREET M 04/12/84 WALSALL 6 AHMED NABEEL M 16/11/84 KASHMIR 7 UDDIN AZIR M 24/10/84 WALSALL 8 BOULTON KERRY F 29/11/84 WALSALL 9 BEGUM SHAHEENA F 25/02/85 WALSALL 10 AZIZ ARZOO F 18/01/85 WALSALL 11 QAMAR NAFISA F 19/07/85 WALSALL 12 MANN HARBAJAN M 11/04/65 GLASGOW 13 GINOLA DAVID M 03/05/68 TOTTENHAM 14 DEL PIERO ALESSANDRO M 10/11/75 ROME 15 BATISTUTA GABRIEL M 02/04/69 ROME 16 KLINSMANN JURGEN M 25/12/67 MUNICH 17 REBROV SERGEI M 12/12/75 WALSALL 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 21 VIERI CHRISTIAN M 04/03/74 MILAN 22 CARR STEVEN M 27/05/77 TOTTENHAM 23 LES FERDINAND M 03/01/67 TOTTENHAM 24 GAREWAL MANDEEP M 17/08/84 WALSALL 25 AFZAL IRFAN M 12/09/84 WALSALL 26 MICHAELS SHAWN M 21/07/67 NEW YORK 27 AUSTIN STEVE M 07/06/85 TEXAS 28 NAGVI ASADULLAH F 10/06/85 WALSALL 29 SINGH PIARA F 01/01/39 SLOUGH 30 CUBRA ROGER M 04/07/59 HALIFAX Data File 1 The data file below is very useful because the customer names are in ascending order by their first name, which makes it easier for the user to find a specific person. Customer ID Last Name First Name Gender Birthdate Place of birth 3 HUSSAIN AKHTAR M 06/03/85 WALSALL 14 DEL PIERO ALESSANDRO M 10/11/75 ROME 10 AZIZ ARZOO F 18/01/85 WALSALL 28 NAGVI ASADULLAH F 10/06/85 WALSALL 7 UDDIN AZIR M 24/10/84 WALSALL 4 GANI BODRUL M 14/01/85 WALSALL 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 21 VIERI CHRISTIAN M 04/03/74 MILAN 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 13 GINOLA DAVID M 03/05/68 TOTTENHAM 23 LES FERDINAND M 03/01/67 TOTTENHAM 15 BATISTUTA GABRIEL M 02/04/69 ROME 12 MANN HARBAJAN M 11/04/65 GLASGOW 5 BHANGAL HARPREET M 04/12/84 WALSALL 25 AFZAL IRFAN M 12/09/84 WALSALL 16 KLINSMANN JURGEN M 25/12/67 MUNICH 8 BOULTON KERRY F 29/11/84 WALSALL 24 GAREWAL MANDEEP M 17/08/84 WALSALL 2 SANOBAR MANSOOR M 27/12/84 WALSALL 6 AHMED NABEEL M 16/11/84 KASHMIR 11 QAMAR NAFISA F 19/07/85 WALSALL 29 SINGH PIARA F 01/01/39 SLOUGH 30 CUBRA ROGER M 04/07/59 HALIFAX 17 REBROV SERGEI M 12/12/75 WALSALL 9 BEGUM SHAHEENA F 25/02/85 WALSALL 26 MICHAELS SHAWN M 21/07/67 NEW YORK 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 27 AUSTIN STEVE M 07/06/85 TEXAS 22 CARR STEVEN M 27/05/77 TOTTENHAM 1 BASRA SUKHPINDER M 10/05/85 WALSALL Data File 2 The data file below is in ascending order by the place of birth. It is not very useful because many customers are from the same birthplace so it would be difficult for the user to search a customers record. Customer ID Last Name First Name Gender Birthdate Place of birth 12 MANN HARBAJAN M 11/04/65 GLASGOW 30 CUBRA ROGER M 04/07/59 HALIFAX 6 AHMED NABEEL M 16/11/84 KASHMIR 21 VIERI CHRISTIAN M 04/03/74 MILAN 16 KLINSMANN JURGEN M 25/12/67 MUNICH 26 MICHAELS SHAWN M 21/07/67 NEW YORK 15 BATISTUTA GABRIEL M 02/04/69 ROME 14 DEL PIERO ALESSANDRO M 10/11/75 ROME 29 SINGH PIARA F 01/01/39 SLOUGH 27 AUSTIN STEVE M 07/06/85 TEXAS 13 GINOLA DAVID M 03/05/68 TOTTENHAM 22 CARR STEVEN M 27/05/77 TOTTENHAM 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 23 LES FERDINAND M 03/01/67 TOTTENHAM 2 SANOBAR MANSOOR M 27/12/84 WALSALL 3 HUSSAIN AKHTAR M 06/03/85 WALSALL 4 GANI BODRUL M 14/01/85 WALSALL 5 BHANGAL HARPREET M 04/12/84 WALSALL 7 UDDIN AZIR M 24/10/84 WALSALL 8 BOULTON KERRY F 29/11/84 WALSALL 9 BEGUM SHAHEENA F 25/02/85 WALSALL 10 AZIZ ARZOO F 18/01/85 WALSALL 28 NAGVI ASADULLAH F 10/06/85 WALSALL 1 BASRA SUKHPINDER M 10/05/85 WALSALL 25 AFZAL IRFAN M 12/09/84 WALSALL 17 REBROV SERGEI M 12/12/75 WALSALL 24 GAREWAL MANDEEP M 17/08/84 WALSALL 11 QAMAR NAFISA F 19/07/85 WALSALL Data File 3 The data file is in ascending order by the customers date of birth. As you can see it is very useful because it shows the date of birth from the oldest to the youngest person in order, the way the customer pays and their address which makes it relatively easy for the user of the system. All the user has to do is to type in a birthdate using the search to find the customers age. Customer ID Last Name First Name Gender Birthdate Place of birth Address Pay by 1 BASRA SUKHPINDER M 10/05/85 WALSALL 27 Willoherb Close Cash 2 SANOBAR MANSOOR M 27/12/84 WALSALL 24 Lord Street Cash 3 HUSSAIN AKHTAR M 06/03/85 WALSALL 12 Maple Drive Cash 4 GANI BODRUL M 14/01/85 WALSALL 123 Broadway West Cash 5 BHANGAL HARPREET M 04/12/84 WALSALL 2 Poppy Drive Cash 6 AHMED NABEEL M 16/11/84 KASHMIR 15 Tarsemir Close Cash 7 UDDIN AZIR M 24/10/84 WALSALL 5 Milton Street Cash 8 BOULTON KERRY F 29/11/84 WALSALL 17 Bell Lane Cash 9 BEGUM SHAHEENA F 25/02/85 WALSALL 69 Milton Street Cash 10 AZIZ ARZOO F 18/01/85 WALSALL 33 Caldmore Road Cash 11 QAMAR NAFISA F 19/07/85 WALSALL 44 Milton Street Cash 12 MANN HARBAJAN M 11/04/65 GLASGOW 27 Rosehip Close Cheque 13 GINOLA DAVID M 03/05/68 TOTTENHAM 77 Park Lane Cheque 14 DEL PIERO ALESSANDRO M 10/11/75 ROME 17 Honeysuckle Drive Visa 15 BATISTUTA GABRIEL M 02/04/69 ROME 19 Santi Bernabeau Cheque 16 KLINSMANN JURGEN M 25/12/67 MUNICH 64 Stadio Olimpico Visa 17 REBROV SERGEI M 12/12/75 WALSALL 24 White Hart Lane Cheque 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 9 Bow Street Cash 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 67 White Hart Lane Cash 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 34 Trafalgar Square Cheque 21 VIERI CHRISTIAN M 04/03/74 MILAN 21 Las Palmas Visa 22 CARR STEVEN M 27/05/77 TOTTENHAM 7 Oxford Street Visa 23 LES FERDINAND M 03/01/67 TOTTENHAM 137 Broadway West Visa 24 GAREWAL MANDEEP M 17/08/84 WALSALL 56 West Bromwich Road Cash 25 AFZAL IRFAN M 12/09/84 WALSALL 121 Newman Street Cash 26 MICHAELS SHAWN M 21/07/67 NEW YORK 97 HBK Merchandise Cheque 27 AUSTIN STEVE M 07/06/85 TEXAS 44 Rattlesnake Willows Cheque 28 NAGVI ASADULLAH F 10/06/85 WALSALL 27 West Bromwich Road Cash 29 SINGH PIARA F 01/01/39 SLOUGH 4 Poppy Drive Cheque 30 CUBRA ROGER M 04/07/59 HALIFAX 23 Lord Street Visa Best Data File I think my third data file was the best because it is the easiest and quickest way for the user to locate a customer. All the user has to do is type in a birth date and it will give a list of birthdates. This depends if the user uses AND, OR, LIKE or NOT in their search. They can also do this to find the customer address or the way in which the customer wants to pay. I rejected my second data file because if the user used AND, OR or LIKE I their search, there would be a big list say if the user chose to search by Walsall or Tottenham so it would take longer for the user to access a specific customers data. I rejected my first data file because if say the user of the system typed in Chris in their search then Christian would also come up too because Chris is the first part of Christian. This suggests that the data file is not very reliable to the user. Changes to the system After examining and evaluating alternative methods of creating my system I have made a few changes to my databases. I looked at the original data given to me and wrote down the things that I needed to change. Here are some of the things I need to do/change to the database: * Create a data structure that holds record information * Create a database structure that holds customer information * Add a few extra fields * Change the layout of the page slightly * Update the information to the modern day. CD Sample This is a bad database. It has only four fields and does not tell you any details of the potential user or how many CDs are in stock. The data is placed in any order so it is difficult for the user to find the Title of the CD or CDs they want to order. Also the prices are not in ascending order so the user has to look carefully whether the CD is in their price range or not. Older users of the system tend to like older music and the Year of release is not in ascending order so it is hard for the older user to locate the era in which the CD was produced. How the Hardware and Software I used influenced me to my design The hardware I used influenced me very much. I used a printer, which printed all my database design structures and data collection sheets very quickly. I printed all the structures on a Lexmark Z31 color jetprinter. I also used a photocopier to copy my data collection sheets and for my questionnaires. Record Information Design Structure Design View Datasheet View Artist Title Year Price Quantity A1 Take me on 2000 à ¯Ã‚ ¿Ã‚ ½10.00 3 Architechs Body Groove 2000 à ¯Ã‚ ¿Ã‚ ½7.00 8 Bon Jovi Crush 2000 à ¯Ã‚ ¿Ã‚ ½5.00 5 Bon Jovi Its my life 2000 à ¯Ã‚ ¿Ã‚ ½5.00 16 Britney Spears Oops I did it again! 2000 à ¯Ã‚ ¿Ã‚ ½8.00 2 Craig David 7 Days 2000 à ¯Ã‚ ¿Ã‚ ½10.00 7 Craig David Fill me in 2000 à ¯Ã‚ ¿Ã‚ ½5.00 9 Eminem The Marshall Mathers 2000 à ¯Ã‚ ¿Ã‚ ½5.00 10 Eminem The way I am 2000 à ¯Ã‚ ¿Ã‚ ½10.00 15 Five Invincible 2000 à ¯Ã‚ ¿Ã‚ ½5.00 5 Madonna Music 2000 à ¯Ã‚ ¿Ã‚ ½15.00 8 Mel C I turn to you 2000 à ¯Ã‚ ¿Ã‚ ½7.00 4 Richard Blackwood 1234 Get with the wicked 2000 à ¯Ã‚ ¿Ã‚ ½8.00 4 Robbie Williams Rock DJ 2000 à ¯Ã‚ ¿Ã‚ ½11.00 13 Ronan Keating Ronan 2000 à ¯Ã‚ ¿Ã‚ ½6.00 9 S Club 7 Reach 2000 à ¯Ã‚ ¿Ã‚ ½5.00 3 SNOOP D.D. FEAT. DR DRE ITS A G THING 2000 à ¯Ã‚ ¿Ã‚ ½9.00 1 Spice Girls Holler 2000 à ¯Ã‚ ¿Ã‚ ½5.00 11 Various Artists Gatecrasher: global sound system 2000 à ¯Ã‚ ¿Ã‚ ½15.00 6 Various Artists Fresh Hits 2000 à ¯Ã‚ ¿Ã‚ ½12.00 3 Various Artists Now thats what I call music! 46 2000 à ¯Ã‚ ¿Ã‚ ½12.00 8 Whitney Houston Greatest Hits 1999 à ¯Ã‚ ¿Ã‚ ½12.00 2 Wyclef Jean It doesnt matter 2000 à ¯Ã‚ ¿Ã‚ ½10.00 7 Design Structure 2 Design View Datasheet View Design Structure 3 Design View Datasheet View Record Information Design Structure 1 This is a better database design structure because it includes the quantity of CDs left in stock and the Title is in ascending order, which is easier for the user to find the CD that they are specifically looking for. Design Structure 2 This is a good database design structure because it has two extra fields. These are the customer ID number and the highest entry of the CD. This is therefore a lot easier for the user to access the database. Design Structure 3 This is the best database design structure for the record information out of the lot because the price is in ascending order so it will satisfy all users, especially the users that only buy CDs at a certain price. Customer Information Structure 1 Design View Datasheet View Structure 2 Design View Datasheet View Structure 3 Design View Datasheet View Customer Information Structure 1 This is not the best database design structure because it doesnt tell you all the information about the potential user. It doesnt include things like the telephone number in case the company needs to get in touch with the user of the system. Structure 2 This database design structure is slightly better because it gives you a bit more information about the potential user. It gives the system users telephone number in case the company needs to get in touch in the case of a problem. Structure 3 This is by far the best design structure as it tells you a lot of details about the potential user. It gives their ID number, name, address, age, gender, telephone number and what way they would like to pay; either by Visa, cheque or case. Influences of Hardware and Software available The software I chose did not help as much as I expected it too much. Microsoft Word is mainly to do with typing text and cant produce a table like the ones in Microsoft Access. However, Microsoft Access and the Internet were very useful to me. Access helped me quite a lot because the program has wizards, which helped me create the structures. It was also easy to do datasheets because the software is very good at guiding you through the processes. I used the Internet to find relevant information, including data structures and layouts of them. The hardware I used helped me very much. I used a printer to print my structures off and a photocopier to scan my questionnaires. These influenced me very much because they were easy to use. The records above are a database for the number of music CDs in stock. I had taken into account the views of potential users of my system and decided to leave the database how it is, keeping the price of the CDs in ascending order (from cheapest to most expensive) as it easy for the user to find a specific search price. Access 2000 System Requirements Here are the system requirements to run Microsoft Access 2000: * PC with a Pentium 75 megahertz (MHz) or higher processor * Microsoft Windows(r) 95 or later operating system, or Microsoft Windows NT(r) Workstation operating system version 4.0 Service Pack 3 or later * For Windows 95 or Windows 98: 16 megabytes (MB) of RAM for the operating system, plus an additional 8 MB of RAM for Access * For Windows NT Workstation: 32 MB of RAM for the operating system, plus an additional 8 MB of RAM for Access * 161 MB of available hard-disk space (Number indicates typical installation; your hard-disk usage will vary depending on configuration. Choices made during custom installation may require more or less hard-disk space.) * CD-ROM drive * VGA or higher-resolution monitor; Super VGA recommended * Microsoft Mouse, Microsoft Intellimouse, or compatible pointing device Additional items or services required to use certain features: * 9600 baud modem; 14,400 or higher-baud modem recommended * Multimedia computer required to access sound and other multimedia effects * Microsoft Outlook 2000 or Microsoft Outlook Express 5.0 or later required to run Office E-mail * 8 MB of additional memory required to run Office E-mail * Some Internet functionality may require Internet access and payment of a separate fee to a service provider Troubleshooting guide for Microsoft Access A database will not compact for any of the following reasons: à ¯Ã‚ ¿Ã‚ ½ You dont have enough storage space on your disk for both the original and compacted versions of the database. Delete any unneeded files and try again. à ¯Ã‚ ¿Ã‚ ½ You dont have Modify Design or Administer permission for all tables in the database. If you dont own this database, contact its owner to find out whether you can be given either of these permissions on all tables. If you own this database, you need to update your permissions for all tables. For more information on assigning permissions, click. à ¯Ã‚ ¿Ã‚ ½ If an object in a version 1.x database includes the backquote character (`) in its name, you wont be able to compact the database. Use Microsoft Access version 1.x to rename the object, and then change any references to it in your queries, forms, reports, macros, and code. Assign or remove permissions for a database and existing database objects 1 Open the database that contains the objects you want to secure. The workgroup information file in use when you log on must contain the user or group accounts you want to assign permissions for at this time; however, you can assign permissions to groups and add users to those groups later. 2 On the Tools menu, point to Security, and then click User and Group Permissions. 3 On the Permissions tab, click Users or Groups, and then click the user or group whose permissions you want to assign in the User/Group Name box. 4 Click the type of object in the Object Type box, and then click the name of the object to assign permissions for in the Object Name box. Tip You can select multiple objects in the Object Name box by dragging through the objects you want to select or by holding down CTRL and clicking the objects you want. 5 Under Permissions select the permissions you want to assign, or clear the permissions you want to remove for the group or user, and then click Apply. Repeat steps 4 and 5 to assign or remove permissions for additional objects for the current user or group. 6 Repeat steps 3 through 5 for any additional users or groups, and then click OK when you have finished. Important If you assign or remove permissions for Visual Basic code (forms, reports, or modules), those permissions will not take effect until the database is closed and reopened. Troubleshoot editing data in a field There are several kinds of fields in forms or datasheets that you cant edit. The following fields display values just as regular fields do, but if you try to enter data into them, nothing happens: à ¯Ã‚ ¿Ã‚ ½ AutoNumber fields. If a field has an AutoNumber data type, Microsoft Access automatically assigns the next consecutive number or unique random number to this field for each record you add. This type of field is often used as a record ID number or primary key. When you start adding a new record, Microsoft Access automatically fills in the fields value for you and you cant edit it. à ¯Ã‚ ¿Ã‚ ½ Calculated fields. A Calculated field displays values that Microsoft Access calculates. They are usually based on other fields in your tables, but calculated fields are not stored in tables. You cant edit calculated fields. à ¯Ã‚ ¿Ã‚ ½ Locked or disabled fields. If a control on a form has the Locked property set to Yes or the Enabled property set to No, you cant edit the data in the field. à ¯Ã‚ ¿Ã‚ ½ Fields in a locked record. If you use Microsoft Access in a multi-user environment and another user locks a record, you cant edit the data in the record. When you move to a locked record, the locked record indicator is displayed in the record selector. à ¯Ã‚ ¿Ã‚ ½ Fields in snapshots. While most queries return recordsets that you can edit, some queries return snapshots, which cant be edited. à ¯Ã‚ ¿Ã‚ ½ Field in a read-only form or a locked database. If the form youre using has the AllowEdits property set to No or if the underlying data is read-only or locked by another person, you cant edit data in the form. Why did the size of my database increase significantly more than the size of the object I added? The amount of information used to represent an object is often greater than the size of the object itself. One way to work around this is to display an icon representing the object instead of the object itself in the form or report. When you display an icon, the OLE server (the application used to create the object) sends only the information needed to display the icon. When you double-click the icon, the OLE server is launched with the data that the icon represents. My picture becomes distorted when I size it. To keep a pictures proportions when you size it, use the Picture Size Mode property (for background pictures) or the Size Mode property (for bound object frames, unbound object frames, and image controls). If the picture is a bitmap, its best to use the Zoom setting rather than the Stretch setting. You should also consider using a metafile rather than a bitmap since you can size metafiles without causing distortions. For more guidance on any queries, click on help on the menu and click- on either Microsoft Access Help, Contents and index or Microsoft on the Web where you will receive expert on-line guidance. Troubleshooting guide for Microsoft Word I changed the fill, border, shadow, or 3-D effect, but when I create a drawing object, I get the old settings. The default style is being applied to the new drawing object. à ¯Ã‚ ¿Ã‚ ½ To change the default settings for new drawing objects, select an object that has the attributes you want. On the Drawing toolbar, click Draw, and then click Set AutoShape Defaults. Prevent a table row from breaking across pages 1 Click the table. 2 On the Table menu, click Cell Height and Width, and then click the Row tab. 3 Clear the Allow row to break across pages. Word isnt automatically inserting my text or graphics. à ¯Ã‚ ¿Ã‚ ½ To turn on AutoCorrect, click AutoCorrect on the Tools menu, and then make sure the Replace text as you type check box is selected. à ¯Ã‚ ¿Ã‚ ½ When you type an AutoCorrect name, make sure to precede it with a space and follow it with another space or a punctuation mark. How can I get data from another program into Word without starting the source program? By default, when you insert database information or attach it as a mail merge data source, Word uses DDE to read the data file. DDE automatically starts the source program (such as Microsoft Excel) and then opens the data file. If you dont want to start the source program, you can use ODBC or file converters instead of DDE to read the data file directly. To do this, insert the database information, or attach it as a mail merge data source as usual. In the Open Data Source dialog box, select the Select method check box before you click Open. Then, each time you insert database information or attach it as a mail merge data source, Word opens the Confirm Data Source dialog box so that you can click the ODBC driver or file converter you want. Text that I print looks different from text on the screen. à ¯Ã‚ ¿Ã‚ ½ Word might be displaying text as draft fonts. On the Tools menu, click Options, and then click the View tab. Clear the Draft font check box. This option will be available only if you are in normal view. à ¯Ã‚ ¿Ã‚ ½ Word might be printing a draft of your text. On the Tools menu, click Options, and then click the Print tab. Clear the Draft output check box. à ¯Ã‚ ¿Ã‚ ½ The font in your document might not be available on the printer youre using. Change the font in your document to a TrueType font, or change the font to one that is available on your printer. à ¯Ã‚ ¿Ã‚ ½ Animated text effects dont print. If text in your document is animated, it will print with the underlying text formatting 3/4 such as bold or italic 3/4 but the animated effects will not print. à ¯Ã‚ ¿Ã‚ ½ The font in your document might be one that is available on your printer but that doesnt have a matching screen font. Windows substitutes a TrueType font to display the text on the screen. Try changing the font in your document to a TrueType font. When I try to save changes to a document, I get a message saying the document is read-only. You cant make changes to a read-only document. To save changes, you need to save the document with a new name. You can use the same name if you save the document in a new or different folder. My e-mail is very slow or not working correctly. à ¯Ã‚ ¿Ã‚ ½ To use WordMail as your e-mail editor, you should have at least 12 megabytes of memory available. à ¯Ã‚ ¿Ã‚ ½ Before using WordMail, close any Word dialog boxes that are open. à ¯Ã‚ ¿Ã‚ ½ Programs that work in the background, such as virus-scanning programs, may slow down WordMail and Word in general. Use System Monitor 3/4 an optional Windows 95 accessory program 3/4 to see if you are running programs that slow down your computers performance and to see which program is using the highest percentage of processor time. Graphics dont appear when I print. à ¯Ã‚ ¿Ã‚ ½ Make sure that youre not using the draft output option, which doesnt print graphics. On the Tools menu, click Options, and then click the Print tab. The Draft output check box should be cleared. à ¯Ã‚ ¿Ã‚ ½ Make sure that youre not printing field codes for graphics youve linked from files created in other programs. On the Tools menu, click Options, and then click the Print tab. The Field codes check box should be cleared. Freehand drawing is hard to control. à ¯Ã‚ ¿Ã‚ ½ Try increasing the magnification in the Zoom Control box. Its easier to draw details at 200 percent. à ¯Ã‚ ¿Ã‚ ½ Use the Freeform button instead of the Scribble button. à ¯Ã‚ ¿Ã‚ ½ Try setting your mouse to the slowest tracking speed available in Windows Control Panel. You have greater control when you draw at a slow speed. à ¯Ã‚ ¿Ã‚ ½ You can adjust the shape of freeform to make them look smoother. For more guidance on any queries, click on help on the menu and click- on either Microsoft Word Help, Contents and index or Microsoft on the Web where you will receive expert on-line advice. Troubleshooting guide for the Internet Finding the information you want You can find information on the Web in a variety of ways. * Click the Search button on the toolbar to gain access to a number of search providers. Type a word or phrase in the Search box. * Type go, find, or ? Followed by a word or phrase in the Address bar. Internet Explorer starts a search using its predetermined search provider. * After you go to a Web page, you can search for specific text on that page by clicking the Edit menu and then clicking Find. Note * If a Web address doesnt work, Internet Explorer asks if you want to search for similar Web addresses. You can change this setting so that Internet Explorer searches automatically without prompting. For more information, see Related Topics below. Protecting your identity over the Internet You can use a personal certificate to protect your identity over the Internet. A certificate is a statement guaranteeing the identity of a person or the security of a Web site. You can control the use of your own identity by having the private key that only you know on your own system. When used with mail programs, security certificates with private keys are also known as digital IDs. Internet Explorer uses two different types of certificates: * A personal certificate is a kind of guarantee that you are who you say you is. This information is used when you send personal information over the Internet to a Web site that requires a certificate verifying your identity. * A Web site certificate states that a specific Web site is secure and genuine. It ensures that no other Web site can assume the identity of the original secure site. Using accessibility features in Internet Explorer In addition to Microsoft Windows accessibility products and services, the following features make Internet Explorer more accessible for people with disabilities. Keyboard access All features in Internet Explorer are accessible to you by using the keyboard or the mouse. With Internet Explorer, you can explore the Web by using the keyboard. Just press TAB and SHIFT+TAB to move forward and backward between screen elements such as: * Links that are text or images * Hotspots on image maps * The Address bar * The menu bar * The Links bar * Frames For more information about keyboard access, see Internet Explorer shortcuts. Highlighting box As you move to or click a link or image, a thin border appears around it so you can see what is selected. Customise the font size, formatting, and colours You can specify the font sizes, styles and colours, and foreground and background colours of Web pages displayed on your computer screen, even if the author of the Web page has already specified these. You can also specify the colour used to indicate links in Web pages, or a special colour for links that is used only when the mouse passes over the link. This is useful if you have low vision, need larger fonts, or need high-contrast colours. You can set Internet Explorer to use the colours and fonts you specify, your default Windows colours and fonts, or the settings you specify in your own style sheet. For more information, see Changing fonts and background colours. Customise the toolbar You can customise the toolbar by adding or removing buttons, using small or large icons, and showing or hiding the text on the labels. Just right-click the toolbar and then click Customise. If you have low vision, you may want to add the Size button for quick access to the relative font size. If you are using a screen reader, you may want to select Small Icons in the Icon Options list and No text labels in the Text Options list to maximise the amount of screen space available for Web content. Advanced options that make Internet Explorer more accessible You can select or clear several options that may make Internet Explorer more accessible. To display these options, click the Tools menu, click Internet Options, and then click the advanced tab. * Use smooth scrolling and Enable page transitions If you use a screen magnification or screen reader program, you may want to clear these check boxes. If you use a voice recognition program, and you experience recognition errors during smooth scrolling and transitions, you may also want to clear these check boxes. * Show pictures If you have low vision, you may want to clear these check boxes to improve performance. If you are sensitive to screen flashing, you may also want to clear these check boxes. * Print background colours and images If you have low vision, you may want to clear this check box to improve print legibility. Advantages and Limitations of Software The software I used was Microsoft Word, Microsoft Access and the Internet. I used Word to criticise my three databases. Microsoft Access and the Internet were the most useful to me. I used Microsoft Access to create my tables using the Wizard for my databases. I used the Internet to find out information about the latest singles to download relevant information about prices of the CDs, the Artists and the structure of databases used in mail order companies. Advantages Microsoft Word * You can type up your data in this software using different formats of text * Copy and paste from other files * Checks any spelling errors * Gives a clear troubleshooting guide for new users Microsoft Access * Wizard for guidance of structuring techniques * Easy to do datasheets * Gives you the option of creating your database in design view or on the datasheet itself * Checks any spelling errors * Automatically stores created documents * East to change and update data Internet * Download relevant information of the web such as page layouts, data structures and modern day music * You can open a new window to see another search result with a click of a button * You can get feedback from companies via the web using the e-mail service. Limitations Microsoft Word * Cant create tables like Microsoft Access Microsoft Access * Cant type data up using different formats of text * Easy for data to be accidentally altered Internet * Downloading files can take time * Many spelling mistakes in downloaded work Verification and Validation Techniques The first stage is the database itself. This is where all the information (records) in the system are stored. It is important that a good understanding of the exact needs of the system is calculated, so that the database can be structured properly. I have used Microsoft Access to create the database for this system, because my system is based towards a small business environment. It is also widely available and widely used and is pretty simple to setup and manage. Microsoft Access is a relational database. This means that its structure is made up of tables, or entities. Each of these tables holds rows and columns of data. Each row is called a record or tuple, and each column is called an attribute. All the records in the table are in some way related to each other. The database required for the system contains two main categories: (1) A category that holds the record information (2) A category that holds a customer information. Both databases need fields that have to be unique, such as customer ID numbers. I set the database to handle this by auto generating the customer id number. This creates a new number all the time, in access the AutoNumber option is used for that field. Also in cases like phone numbers, this is selected so that you have to enter the number in the correct format. These are some of the verification and validation techniques that I used. Example the customer ID field is indexed, and does not allow any duplicates! How the system could have been improved or created in a more better way The system could have been created and have been linked directly to the Internet. So all the access to all the data by all users including customers could have been done on the Internet. This could be setup in a way where a programming language like Java is used to connect the Access database to the Internet. These kinds of internet/web databases follow the client server model. A database engine sits on some central computer somewhere and serves data to multiple clients, which are in the form of an Internet browser. Within this process, we also have a web server. This handles requests from the web browsers and then forwards them to the database. The web server then waits for the database to respond and then pass on that response to the waiting clients. In this way normal users of the database, such as the people that enter and process the orders and record information, would login using an ID and password, and they would be given access to the operations that they require. Whereas customers would log on to the Internet site, enter all the find and order the CDs they need, this would be then checked and verified, and the database would be updated, so that the order can be processed. Diagram of system model: Searches I will now produce a series of simple and complex searches to demonstrate what the system can do, with clear explanations. The complex searches will include two examples each of AND, OR and NOT. Searches with AND 1. If you wish to find out the number of males that live in Walsall, the user would do the following search: m AND walsall As a result of the search the following data will be shown: 1 BASRA SUKHPINDER M 10/05/85 WALSALL 27 Willoherb Close Cash 2 SANOBAR MANSOOR M 27/12/84 WALSALL 24 Lord Street Cash 3 HUSSAIN AKHTAR M 06/03/85 WALSALL 12 Maple Drive Cash 4 GANI BODRUL M 14/01/85 WALSALL 123 Broadway West Cash 5 BHANGAL HARPREET M 04/12/84 WALSALL 2 Poppy Drive Cash 6 AHMED NABEEL M 16/11/84 KASHMIR 15 Tarsemir Close Cash 7 UDDIN AZIR M 24/10/84 WALSALL 5 Milton Street Cash 17 REBROV SERGEI M 12/12/75 WALSALL 24 White Hart Lane Cheque 24 GAREWAL MANDEEP M 17/08/84 WALSALL 56 West Bromwich Road Cash 25 AFZAL IRFAN M 12/09/84 WALSALL 121 Newman Street Cash 2. If you wish to find out the number of females that live in Walsall, the user would do the following search: f AND walsall As a result of the search the following data will be shown: 8 BOULTON KERRY F 29/11/84 WALSALL 17 Bell Lane Cash 9 BEGUM SHAHEENA F 25/02/85 WALSALL 69 Milton Street Cash 10 AZIZ ARZOO F 18/01/85 WALSALL 33 Caldmore Road Cash 11 QAMAR NAFISA F 19/07/85 WALSALL 44 Milton Street Cash 28 NAGVI ASADULLAH F 10/06/85 WALSALL 27 West Bromwich Road Cash Searches with OR 1. If you wish to search for people living on Newman Street and Milton Street, the user of my system will do the following search: newman OR milton As a result of the search the following data will be shown: 7 UDDIN AZIR M 24/10/84 WALSALL 5 Milton Street Cash 9 BEGUM SHAHEENA F 25/02/85 WALSALL 69 Milton Street Cash 11 QAMAR NAFISA F 19/07/85 WALSALL 44 Milton Street Cash 25 AFZAL IRFAN M 12/09/84 WALSALL 121 Newman Street Cash Notice that I never included street, as there are other roads that ended in street in my best data file (data file 3). 2. If the user wishes to find out information on the people born in Tottenham and Rome, they will do the following search: tot OR rom As a result of the search the following data will be shown: 13 GINOLA DAVID M 03/05/68 TOTTENHAM 77 Park Lane Cheque 14 DEL PIERO ALESSANDRO M 10/11/75 ROME 17 Honeysuckle Drive Visa 15 BATISTUTA GABRIEL M 02/04/69 ROME 19 Santi Bernabeau Cheque 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 9 Bow Street Cash 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 67 White Hart Lane Cash 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 34 Trafalgar Square Cheque 22 CARR STEVEN M 27/05/77 TOTTENHAM 7 Oxford Street Visa 23 LES FERDINAND M 03/01/67 TOTTENHAM 137 Broadway West Visa Notice that I have used fewer characters in my search, as their no other fields except the address field that begins with tot or rom. This also saves some of the users time. Searches with NOT 1. If the user wants to find out about females only that were born in the year 1985, they will do the following search: f 85 NOT m As a result of the search the following data will be shown: 9 BEGUM SHAHEENA F 25/02/85 WALSALL 69 Milton Street Cash 10 AZIZ ARZOO F 18/01/85 WALSALL 33 Caldmore Road Cash 11 QAMAR NAFISA F 19/07/85 WALSALL 44 Milton Street Cash 28 NAGVI ASADULLAH F 10/06/85 WALSALL 27 West Bromwich Road Cash The system would first search for females and then look for the number 85. The search would now be complete, as the list above suggests. 2. If the user wants to search for the people who pay by cheque to buy music, they do the following search: cheque NOT visa NOT cash As a result of the search the following data will be shown: 12 MANN HARBAJAN M 11/04/65 GLASGOW 27 Rosehip Close Cheque 13 GINOLA DAVID M 03/05/68 TOTTENHAM 77 Park Lane Cheque 15 BATISTUTA GABRIEL M 02/04/69 ROME 19 Santi Bernabeau Cheque 17 REBROV SERGEI M 12/12/75 WALSALL 24 White Hart Lane Cheque 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 34 Trafalgar Square Cheque 26 MICHAELS SHAWN M 21/07/67 NEW YORK 97 HBK Merchandise Cheque 27 AUSTIN STEVE M 07/06/85 TEXAS 44 Rattlesnake Willows Cheque 29 SINGH PIARA F 01/01/39 SLOUGH 4 Poppy Drive Cheque The system browses for the word cheque and provides the answer to the search, for the user of the system. Results of my searches I have analysed the results of my searches and compared them with the original stated requirements. I found that my searches were successful with AND, OR and NOT, therefore the user can use my system properly. The results show that the user only needs to type in a few characters to get what they want out of the searches. Comments from third party Below are the comments made by my friend about the viability of my new system: Daljits work is very thorough and he has very worked hard to create the new system. He has tested it in different ways to see that it functions correctly and has expanded it from the previous system that he created. To show how the system can be improved he has demonstrated ways of linking it to the world-wide web, just as the leading music companies have done, therefore music can be ordered on-line. His system works accurately as his searches proved and any user that uses the system can use it efficiently and effectively. The following are the changes that I made as a result of the comment above: * I produced annotated hard copy evidence at each stage of my work to show my improvement. * I asked the views of more than one person about the viability of my system and found that the comments were similar to my friend. * I included extra fields in my design.