Monday, September 30, 2019

Patent Nonuse and the Role of Public Interest as a Deterrent to Technology Suppression Essay

Patents are contracts between the society and the inventor to encourage development in the field of science and technology. It helps the society by enabling them to utilize this technology, and the inventor by protecting his rights and rewarding him appropriately for this intellectual efforts and innovations. Once a patent is given by the patent office, the inventor has to work the invention by himself or through somebody else by means of an assignment or a license. The patent office does not look at the potential commercial value of the invention whilst giving the patent. The invention should have a specific use and should fulfill what it is meant to do. Many inventions given patents have turned to be commercial failures. However, there are several instances in which neither the patentee has worked the invention by himself, nor has he allowed others interested to do so. This is a very serious situation, because it goes against the very intention of granting the patent. The patent system grants patents only to those inventors who are willing to reveal their invention with others, so that it can benefit society. Some patentees may not work their invention due to several reasons, one of which may be to wrongfully hide or suppress technology from the public. One of the first such cases was the Continental Paper Bag Co. v. Eastern Paper Bag Co. case of 1908. In this case, the patentee had invented a machine that could make a folded paper bag with a rectangular bottom. However, he had not made his invention available to the public, thus preventing others from working the invention. At that time, this invention was a breakthrough, and many people felt bad, because the very intention of giving a patent was not fulfilled. No concrete rules regarding nonuse of patents and compulsory licenses were existent at that time, and everything was left at the mercy of the patent holder. Lower courts also found that the patentee was unreasonable. They in fact tried to draw a line between ‘reasonable nonuse policy’ (inventor unable to use his invention because or some understandable problems) and ‘unreasonable nonuse policy’ (purposefully suppressing technology). However, as no concrete rules existed at that time, the higher court had to give its decision in favor of the rightful owner of the invention. Many breakthrough technologies exist which are being currently suppressed from the public. A plastic that is strong, long-lasting, and can be utilized to make houses that last forever, was granted patents, but not accessible to the public by the owner. New rubber for tires is invented which does not blow up. If this technology could be utilized currently, the lives of many people who die in road accidents could be saved. A new material has been invented for use in toothpastes, which protects the teeth from developing cavities. These technologies are being suppressed due to the anticompetitive intentions of their owners. Some patentees may not use or license their technology so that others may be forced to infringe up on their patents. Lawsuits for infringements could be filed, which could give them earning in millions. An instance of this is a case between Minolta and Honeywell’s, in which Minolta had to pay $127 million to Honeywell for infringing their auto-focus camera patent, although the owners were not using their patent. The patent office should come up with strict rules such that all the patentees have to give an annual report of how their patent is being worked commercially, and in case it is not being worked, the reasons for the same. In case the inventor does not respond, the patent should be revoked. Instances of patent nonuse can be used as evidence in the court, against individuals who indulge in anticompetitive practices. Such practices are strictly considered unlawful under the US Antitrust Laws. The Sherman Act was one of the first such as to protect against unfair trade practices. According to this act, any individual monopolizing or attempting to monopolize, or combines with other people or with other nations to monopolize any trade business in the US, shall be held guilty of an offense under the act. Patent is a monopoly granted to the owner, but they are also contracts between the owner and the public, to permit the later to access the technology. Patent laws are likely to be misused. The exclusionary right (to prevent others from using or making the invention without the license of the owner) is limited and should be more meaningful. The patent system does not give absolute monopoly to the owners. In the case Pfizer V. Government of India [434 US 308 (1978)], the US permitted foreign nations to sue under the Section 4 of the Clayton Act. The Government of India was asking Pfizer to grant licenses for certain broad spectrum antibiotics. However, the company refused to give reasonable licenses. Several antitrust violations such as price-fixing, fraud, market-division, etc were being imposed by the Indian Government against Pfizer and group. The respondents also said that petitioners were trying to limit and monopolize the production, sale and distribution of their patents. The respondents also said that these practices had destroyed businesses. The Company said that the Indian Government could not bring this case forward, as they belonged to another nation. However, the court went on to say that foreign nations could also claim under antitrust laws. The court said that the case was similar to having a citizen having his rights under the antitrust laws being violated. In the case Remington Products V. North American Philips corporation [107 FRD 642, 1985], Remington alleged that the company Philips, a leading Dutch MNC, was indulging in anticompetitive behavior by not disclosing information needed to work the discovery. The defendant claimed that certain clauses in a Dutch statue did not permit disclosure. However, the US court granted the case in favor of Remington saying that the defendant wrongfully withheld information regarding the discovery. The plaintiff had previously approached the defendant to provide information regarding the discovery. However, the defendant refused to give this information needed saying that the information was irrelevant. In the Chevron Research Company’s patent [1970; RPC, 580], the court said that the patentee has to disclose full and relevant information regarding the patent. In the Image Technical Services V. Eastman Kodak Co. [504 U. S. 51 (1992)] provides an association between the antitrust laws and the intellectual property rights regime. Kodak Company had a patent for a photographic device. The case was alleged by companies that serviced Kodak’s products. In this case, a distinction is being made between ‘attempting monopolization’ and ‘attaining monopolizing by exploiting’. The court had to study the market situation to determine if the company was trying to control prices or destroy competition. Kodak in fact monopolized manufacture of components of its photographic equipment and even monopolized servicing of its equipment. The court had said that both patents and copyrights did not come under antitrust laws. An inventor had the right to license or refuse license of his invention. However, a patent owner may be held for developing practices against the antitrust laws (that could destroy competition). The extent to which antitrust laws could be applied to patent laws had to be determined by studying the market situation. The plaintiffs had gathered enough proof that Kodak were trying to monopolize their market situation by limiting the availability of its components to the service companies Nowadays, exclusive license holders may also try to misuse their rights by monopolizing their licensed to make or use the patent. This can be demonstrated in the Medtronic Sofamor Danek, Inc. v. Michelson case. Dr. Michelson had invented a new spinal treatment device and had given a license to Medtronic which manufactured medical equipment. However, the company did not promote his treatment device, and hence the doctor had to grant licenses to other companies that would compete with the original license holder. The company filed a case in the court claiming that the patent holder breached clauses of the contract. However, the Court felt that the company had adopted certain anticompetitive principles that did not promote the patent. Patent holders are trying to maximize their monopoly, by indulging in anticompetitive acts. Often there is a clash between patent laws and antitrust laws. Patent laws provide the holder with rights to eliminate competition, whereas antitrust laws enable protection of healthy business competition practices. A clear border line has to be drawn between these two conflicting legal regimes. In the case Illinois Tools Works V. Independent Ink, the question of the manufacturer having a market power over a patented product or process could be presumed whilst granting the patent, was being asked. A patent holder may hold so much of powers in the market such that he/she may dominate the scene. A patent holder will usually violate antirust laws if he or she feels that they are in a situation to dominate the market. In this case, Illinois printers invented a printing device and had prohibited the customers from using non-patented ink. The defendant felt that such terms were against the true spirits of competition, and were under the impression that Illinois tool works were trying to dominate the market situation. It may be difficult in such a case to determine the party that would carry the burden of proof. The patent holder had tried to extend his patent. In this manner, they had created both, primary and secondary market rivals. The primary rivals included other manufacturers of printers, and the secondary rivals included other manufacturers of printer inks. The court gave its decision in favor of Independent Ink, citing that patents could not be extended to non-patentable areas. A patent had only specific boundaries, and crossing such boundaries constituted infringement. In another case, Schering-Plough held a patent for a drug. A company that manufactured a generic version of the same drug felt that the original company’s patent was invalid. They wanted to file for a patent opposition, but Schering-Plough decided to pay the generic drug manufacturers to withdraw the case and also stay out of the market for some period. Federal Trade Commission filed a case before the Supreme Court, saying that Schering-Plough was trying to destroy all competition in the market by wrongfully preserving its invalid monopoly. The Court felt that the agreement between Schering-Plough and the generic manufacturers was invalid and was executed to destroy competition in the market. Patent laws should make it easier to obtain a compulsory license in case the patentee wrongfully suppresses the invetion from the public. A compulsory license should be given to anybody in case:- The patentee is unable to meet the reasonable requirements of the public with relation to his patented process or product. †¢ The patentee does not make the invention available to the public at an affordable cost. †¢ The invention is not being worked in the jurisdiction of the patent office. †¢ Special considerations should be given to inventions that relate to public health and nutrition, and emergency situations. Compulsory license should be a sanction (for the patentee) and a remedy (for the public); in case the patentee indulges in anticompetitive practices. The concept of compulsory licenses developed following the African AIDS crisis situation. The continent was in a crisis situation with the HIV/AIDS pandemic. A few companies such as Glaxo, Merck, etc held a patent for an antiretroviral drug which could be life-saving for people suffering from HIV/AIDS. However, these companies had indulged in several anticompetitive practices. The cost of treating each AIDS patients in Africa was exceedingly high (US$ 10,000 per patient per year). Hence, the drugs were inaccessible for many poor patients who belonged to underdeveloped nations. Cipla, an Indian pharmaceutical company volunteered to supply the drug at a fraction of the overall costs the other companies were offering (US $ 350 per year per patient). Some of the African Nations had to modify its trade laws so that parallel imports and compulsory licenses could exist. However, the original companies that held the patents for antiviral drugs began to sue for infringement. These companies had to later withdraw their infringement cases, as there was a worldwide agitation against the anti-public health policies adopted by the patent holders. Later, at the WTO conference in Doha, a comprehensive agreement to protect public health issues was adopted to prevent unhealthy practices by the patent holders (through compulsory licenses). Some people feel that the patent system can create an obstruction in the development of science and technology, as instances of nonuse often arise. Once a patent is granted, it may even prevent others from inventing around a particular invention or inventive concept. This will seriously hinder the developments in that particular field. Inventors, who tend to sit on their inventions by refusing access to the public, should be henceforth refused patents.

Sunday, September 29, 2019

One Day in the Life of Ivan Denisovich Analysis Essay

Joseph Stalin strategically came into power in communist Russia in the 1930’s. Within just a few years, he turned Russia from a communist state into a totalitarian dictatorship. Few people chose to speak out against Stalin, but those who did were put into Siberian work camps or gulags. Alexander Solzhenitsyn was one of the few that chose to speak out against Stalin and his totalitarian regime. He used his years in the work camps to illustrate a vivid portrayal of what camp life was like in his book, One Day in the Life of Ivan Denisovich. The novel is a criticism against Stalin’s communism, and is a commentary on why a communistic system will never work. Three of the biggest ways the novel critiques communism are: by attempting to dehumanize Russian society, displaying forms of unjust punishment, and arguing the importance of faith. Solzhenitsyn propagates the radical idea that communism doesn’t work. Communism is the idea that everyone in society receives equal shares of the benefits resulting from labor. It teaches the poor to rise up and attain financial and social status equal to that of the middle-class. In order for everyone to be on the same level, wealth is redistributed so the members of the upper class are brought down to the same financial and social level as the middle class (Coffin 660-665). In theory, communism is presented as to be a utopia where everyone has adequate food and shelter but in the novel One Day in the Life of Ivan Denisovich, it is clear communism in practice is very different from communism in ideology. The communism Solzhenitsyn presents in this novel actually tries to take away any form of human dignity. The story takes place in a Russian prison camp after World War II. The protagonist is a man named Ivan Denisovich Shukhov, but referred to as Shukhov for most of the novel . The author refers to Ivan as Shukhov to emphasize the how the camp sets him at a cold, official distance. â€Å"Ivan† is Shukhov’s first name and Denisovich is his patronymic, a name that is derived from one’s father’s name. In Russian society, addressing someone by his or her first name and patronymic is cordial but respectful. The early Soviet Communist regime tried to eradicate this form of address because the respect it entails suggested class differences among people, something communism seeks to destroy. On the other hand, addressing someone by his or her last name has an official meaning. The Soviet manner of addressing people as â€Å"Comrade† followed by their last name was an attempt to replace the old way of addressing someone with a new one better adapted to a class-free nation. â€Å"Even in the camp they were polite to people and addressed them by their full name† (Solzhenitsyn 26). The prison camp workers always addressed each other with the same degree of respect in order to preserve each other’s dignity. The labor camp in which Ivan is imprisoned is designed to oppress and dehumanize its prisoners. The living conditions are simply unbearable. The mattresses do not have sheets, prisoners share tiny portions of bread and porridge per meal, and the guards force the prisoners to undress in sub zero temperatures for body searches. The camp replaces the prisoner’s names with letter and number to erase all hints of individuality, â€Å"S 854†¦three days penalty work,† says the new warden to, Ivan as punishment for not getting up on time (Solzhenitsyn 7-8). The camp gives everyone numbers and makes them all dress identically take away their identities, â€Å"from the outside, everyone in the squad looked the same- their black coats were identical-but within the squad there were great distinctions† (Solzhenitsyn 15). However, Denisovich does not accept the camps attempts to dehumanize him. He shows maintaining human dignity does not have to be achieved through violent rebellion but rather, through developing a system of personal rules. For example, at meal time, no matter the conditions, he always removes his cap before eating, â€Å"then he removed his hat from his clean-shaven head- however cold it might be, he could never bring himself to eat with his hat on† (Solzhenitsyn 16). From his childhood, this practice gives Ivan a sense that he is behaving in a civilized manner. No matter how famished he becomes, he never stoops to Fetyukov’s level, begging for scraps. He scorns Fetyukov’s behavior, which he believes is inhuman. Ivan may be treated like an animal by the Soviet camp system, but he subtly fights back and refuses to submit. In one instance, Shukhov is tempted to ask a fellow prisoner for a cigarette which the other man has already half smoked but, â€Å"but he would never lower himself†¦ he would never look at a man’s mouth† (Solzhenitsyn 27). Ivan never allows the labor camp to get the best of him but gets punished for things one in his control on top of being imprisoned. Another criticism of communism throughout the novel is the description of unjust punishment upon the prisoners. In the beginning of the novel, Shukhov does not get up on time because he is sick and is then threatened with three days in the hole. Similarly, Buynovsky receives ten days in the hole for trying to bundle up against the cold with a flannel vest. Neither Shukhov’s illness nor Buynovsky’s attempt to stay warm harm anyone, but the camp treats both as strict violations of the law, worthy of severe punishment. Such harsh punishment for such petty offenses is absurd. These men are already locked into arduous prison sentences, heaping on unfair and illogical punishment upon them is just a brutal exercise of power by the guards. Through this unjust treatment one thing that help the prisoners survive was having faith in something whether it is a strict moral code or faith in god. One of the main goals of communism was to eradicate religion from society. According to the founders of communism religion hinders societal progress; it was Marx who said â€Å"religion is the opium of people.† Solzhenitsyn implies it is much easier to get through hardships with faith in something rather than without. During a march, Shukhov thinks of Alyosha, the devout Baptist, he wonders, â€Å"What had he to be happy about? His cheeks were sunken, he lived strictly on his rations, and he earned nothing. He spent all his Sundays with the other Baptists. They shed the hardships of camp like water† (Solzhenitsyn 38). Shukhov is making the point when you believe in something, like religion, it is much easier to keep a positive attitude and survive a terrible situation. Although Ivan does not mention religion for most of the novel, his final conversation with Alyoshka, reveals faith can be a means of survival in the oppressive camp system. Ivan adheres to a strict set of rules, like always taking off his hat before eating or trying to waste as little as possible. Alyoshka, has faith in god and the human spirit â€Å"for my part I am not ready merely to be bound but even to die for the name of the Lord Jesus† (Solzhenitsyn 163), this comment really affects Shukhov to a point where he begins to reflect on his own philosophy. Shukhov’s s sense of inner peace in the novel’s last paragraph, which resembles Alyoshka’s sense of inner peace throughout the novel, demonstrates that religious faith offers strength in the face of difficulty. Having any type of faith can carry someone through hardship, religious faith is simply one type of such a faith. Though the labor camps were filled with suffering and misery, the men continued to exhibit acts of humanity in their day to day lives. The only way these men could have survived this inhuman treatment was by subtly fighting the system in their own personal way. Solzhenitsyn uses three simple yet powerful ideas: the dehumanization of the human society, displays of unjust punishment, and the importance of having faith in no matter how awful the situation is, to speak out against Stalin and the terrible consequences of Russian communism. Works Cited Coffin, Judith G., and Robert C. Stacey. Western Civilizations: Their History & Culture. New York, NY: W. W. Norton, 2008. Print. Solzhenitsyn, Aleksandr Isaevich. One Day in the Life of Ivan Denisovich. New York: Dutton, 1963. Print.

Saturday, September 28, 2019

Bringing Ethics Into Business

Outline the arguments for and against bringing ethics and corporate social responsibility into business The question of whether or not to bring ethics and corporate social responsibility into business is an ongoing one. â€Å"Business ethics is the study of proper business policies and practices regarding potentially controversial issues such as bribery, discrimination and corporate social responsibility† (www. investopedia. com/terms/b/business-ethics. asp). The objective of this essay is to discuss the arguments for and against bringing ethics and corporate social responsibility into business. There are three arguments against bringing ethics into business. The first argument is that the availability of free markets and the pursuit of profit can be guaranteed benefit to all members of the community (Velasquez, 1998). This means that regardless of ethics, companies can contribute to the production requirements of the public. For example, there are some companies in Saudi which contribute to the provision of some modern medical equipment to the general hospitals to improve the health care. There is a counter-argument to this. Most companies have as their target only profit and the reduction of costs without paying attention to the interests of society. For instance, some factories flow chemical waste in rivers and lakes, therefore affecting fish, which is considered an important food source for humans. The second argument is the loyal agent’s argument (Velasquez, 1998). In some cases in business people have the right to reject something which is conflict with their ethics. For example, a Muslim woman was working in a clothing store and the boss asked her to take off her headscarf and adorn herself to attract customers, but the woman told him that her religion did not allow her to do that and the manager tried forcing her. Then she left her job and resorted to the law and won the case. In terms of the counter-argument, behaviour in business is covered by law of agency which states that in business, ethics have to be considered. The third argument is related to the law. Velasquez (1998) says that the law is all that is required in order to be ethical. This means that it should be enough for people to obey the law but the law and ethics are not the same for everyone. When it comes to the counter-argument there are aspects in ethics which is in some countries are legal but other countries would consider immoral. The laws of Saudi Arabia for example, require that business discriminate against women in ways people in other countries would not agree are ethical. However, there are four arguments in favour of ethics in business. The first argument is that all business should be based on morality which is achieved by humans (Corballis, 2011). This means that each person has factors that help him to do the right. The second argument argues that business cannot exist without ethics standards (Corballis, 2011). This means that standards of morality should be available for the continuation of work. There is a counter argument to this. There is a counter argument to this because business could collapse if stakeholders behaved unethically. The third argument is that ethics produce profit. According to Corballis (2011), there is evidence that certain companies have combined the ethical and the economic together. They make a profit and they are apparently ethical such as Hewlett- Packard, Levi Strauss and Starbucks. In terms of the counter-argument, this is a cynical view because a company which has ethics should not necessarily say that. The last argument is reward and punishment in business. Companies that have ethics they will be rewarded in turn will boycott companies that do not behave morally (Corballis, 2011). There is evidence of this: people still believe The Body Shop is totally ethical because the owner of this factory who is a woman was based in the manufacture of its products on natural products. However, when the company grew and it became big, it was coveted by one of the major companies which bought the company from the owner. Therefore, they did not change the principal name and people believe it still has the same ethics. When it comes to the counter-argument, companies pay a huge amount of money to specialists for publicity and advertising to hide their unethical dealings, such as HSBC. In conclusion, this essay has discussed above the arguments for and against bringing ethics and corporate social responsibility into business. From the above arguments, it can be seen that the arguments which support the importance of a morality in business are the most convincing because business without ethics will collapse. References:- Corballis, T. , (2011), Argument for and against business ethics and corporate social responsibility, lecture given at Middlesex University. Velasquez, M. G. , (1998), Arguments for and against Business Ethics, Business Ethics, New Jersey: Prentice Hall. Investopedia. com/terms/b/business-ethics. asp, Retrieved August 7, 2011 from http://www. investopedia. com/terms/b/business-ethics. asp.

Friday, September 27, 2019

LIFE EXPERIENCES ESSAY; Essay Example | Topics and Well Written Essays - 500 words

LIFE EXPERIENCES ; - Essay Example That is one of the most important life lessons that I have learned. This experience has informed my application to the college. I have had many obstacles in my life, but I’ve persevered through them. They’ve shaped my personality but not overcome it. I remember how much my parents valued education; that kept the flame of a better life living on within me. Today, I do my best to strive towards excellence with obstacles knocking every day at the door. My mother and father have been a major inspiration in my life. Their stories are the basis to my life and they allow me to know how far they have risen from; they teach me to focus not only on my current state, but to yearn for more. Their stories taught me how to be mature and to realize that no matter how life gets you down, you have to get back up again and fight for your dreams and what you believe in. That is the most important lesson of my life. I do my best to always remember it. Next to my family, pharmacy is the most important thing in my life. I live, breathe, and sleep it. Throughout my education I have worked hard to establish good analytical and critical thinking capability. I have big plans and big dreams which I want to fulfil. I know in my heart I will achieve them. An pharmacy degree would be the first step in accomplishing my goals in my plan. My plan is to get an pharmacy degree to benefit younger pharmacy students and future generations. All we really do in life is pass on our accomplishment to our children in order to make their lives a little bit easier. I would do anything for my parents to make them proud of me, because they have done a lot for me and I really owe them. Part of my plan to make them proud is to earn entry into the pharmacy college. But I am not doing it for them alone, I am also doing it for me and for my future. I believe in my future with all my heart. So much can be accomplished when one

Thursday, September 26, 2019

During the 1980s and early 1990s recessions, British manufacturing Essay - 1

During the 1980s and early 1990s recessions, British manufacturing management restored profitability, sacked employees, and tran - Essay Example The depression had been caused by the great value of the pound, towering rates of interest, a firm fiscal policy, the economic boom and bust, high charges of mortgage interests, and the use of the Exchange Rate System Since the recession in the 1980s, British manufacturing has not been able to regain its position as the world’s top manufacturing nation. Although the decline experienced by Britain has been inevitable, a number of measures have been taken to improve British manufacturing. Among these is the New Growth Economics, which focuses on growth policy, convergence and catching-up, social capability, human capital, and investment. The United Kingdom has also made efforts to sustain a high level of foreign direct investment, which is one of the foundations to the revival of British manufacturing. Keywords: Recession, British Manufacturing, Gross Domestic Product, Inflation, Manufacturing Sector, Competitors, Unemployment, Economy A recession is a â€Å"downturn in the bus iness cycle during which real GDP declines, business profits fall, the percentage of the work without jobs rises, and production capacity is underutilized† (Tucker, 2008, p.252). GDP means, â€Å"the value of a country`s overall output of goods and services during one fiscal year at market prices, excluding net income from abroad† (â€Å"gross domestic product (GDP),† n.d.). ... Source: (â€Å"Causes of recessions,† n.d.). A recession consists of two quarters, whereby the decline in the GDP; during a recession the economy is functioning inside and further away from its production possibilities curve. During a recession the economy is affected in a downfall, demands begin to slowly go down; this is because the market is saturated and the demands for goods and services becomes weak (Montgomery, 2011). Factors that lead to the recession in Britain during the 1980s and early 1990s include: 1. Great value of the pound: This reduced the demand for exports since they became more expensive. British manufacturing was the sector that was mostly affected. 2. High rates of interest: Inflation in the UK was above 15% in 1979 (â€Å"Causes of Recessions,† n.d.). High inflation was inherited by the conservative government, which made a commitment to reduce it. The government focused on tight fiscal and monetary policies, which reduced inflation, but caused a reduction in investment, spending, and output. 3. A firm fiscal policy: The government focused on reducing its borrowing level to reduce inflation, which was necessary for the economy. To achieve this, taxes were increased, consequently reducing consumer spending due to the fact that their disposable income was reduced by the tax increase. 4. Economic boom and bust: There was rapid economic growth during the 1980s. As a result of this inflation increased above 10% (â€Å"Causes of Recessions,† n.d.). The UK government embarked on reducing the inflation by increasing the rates of interests, which led to a reduction in spending. 5. Use of the Exchange Rate System: The UK

Nursing Advocacy Essay Example | Topics and Well Written Essays - 250 words

Nursing Advocacy - Essay Example As such, when nurses spend more time with their patients, as part of the advocacy role, they would risk jeopardizing the undertaking of other responsibilities needed in their respective units. The patient advocacy role has always been regarded to be imbibed in the nursing profession (Wood, 2010). The benefits associated with being patient advocate include promotion of the core values of preserving human dignity, respecting patient equality, and recognizing the need for patients to free them from pain and suffering (Jacksonville University, 2014). In addition, assuming a patient advocate role would assist in gaining the trust of patients so that more accurate assessment of the patients’ conditions from their own perspectives are relayed in the most accurate manner. The honest and accurate disclosure of the patients’ feelings and conditions from their points of views would assist in providing the appropriate interventions to facilitate treatment, as required. Negarandeh, R., Oskouie, F., Ahmadi, F., Nikravesh, M., & Hallberg, I. (2006, March 1). Patient advocacy: barriers and facilitators. Retrieved from BMC Nursing:

Wednesday, September 25, 2019

Community Emergency Preparedness and Response Oral Presentation Research Paper

Community Emergency Preparedness and Response Oral Presentation - Research Paper Example The five boroughs make up the counties. The Staten Island is in Richmond County, Brooklyn is in the King County, the Bronx is in the Bronx County. The Queens is found in Queens County and Manahattan, New York County. In 1898, the five boroughs were merged to form a single city. In area,Queens is the largest County, because it holds 108 square miles,while Brooklyn has the highest population containing 2.3 million residents as estimated by the census conducted in 1990. The 2012 census in New York estimated the population to be 8,33697 within an area of 783.8 square kilo meters. New York City is referred to the most diverse city in terms of linguistics because residents there speak over 800 different languages. The Metropolitan Area, in New York City is the most populated in The United States, with 18.9 million residents occupying an area of 17,1400 square kilo meters (Carroll, 2012). See the illustration below Retrieved on March 26, 2013, from, http://freepages.genealogy.rootsweb.ances try.com/~genealogylinks/dmst/%20-dmstgfx/NY/NYC-5B.gif Population New York is the third greatest state in population. California and Texas take first and second place respectively. As portrayed by the 2010 census, the population of New York residents was at 19,378,102, an aggrandizement of more than 400,000 people. The 2000-2006 transition in population was as a result of natural causes such as birth and death. During that period, the total population was 601,779 persons in that; the number of births which was 1,576,125 deduct the number of deaths which was 974,346 less the residents migrating who added up to 422,481 persons. Retrieved on March 26, 2013, from, http://climatechange.thinkaboutit.eu/scripts/tinymce/jscripts/tiny_mce/plugins/imagemanager/files/nyc_population.png Geographic New York City is situated at the meeting point of the Atlantic Ocean and River Hudson, South East of The State Of New York. The city is surrounded by three islands, Staten Island, Manhattan And Wester n Long Island. This is the reason why the city is densely populated due to the scarcity of land. River Hudson flows the Hudson Valley and enters New York Bay, resulting to a tidal bay, demarcating Northern New Jersey from Manahattan and Bronx. Harlem River, is another tidal anchorage, separating the Bronx from Manhattan. The New York City counties sprawl between two Eastern North American provinces bordering each other. Long Island, the location of Queens and Brooklyn are constituted in the plains of East Coast. Long Island, a huge ridge was formed at the Southern Borderline of the Laurentide Ice Sheet in the last glacial period. Newark Basin is an incrustation of the earth that subsided during the decomposition of the Supercontinent Pangaea in the Triassic period. The area which New York City occupies is approximated to be 831.4 square kilometers. Be that as it may, an estimation done more recently states that the area is now at 784.4 square kilometers. Todt Hill is said to be the most apical natural point situated on Staten Island at 124.9 meters above sea level. Retrieved on March 26, 2013, from, http://www.ny.com/images/nycmap-s.gif Physical Features The City Of New York has many physical features including The Broklyn Bridge, a historical landmark which has an earth bound footer and a bicycle alley set above the avenues of traffic. The bridge is used by residents and tourists to cross from one view point on the river to the other.

Tuesday, September 24, 2019

Fears Grow That Oscars' TV Allure May Be Resistible Essay

Fears Grow That Oscars' TV Allure May Be Resistible - Essay Example However, in the recent past some proponents have fronted that the popularity of the award’s ceremony has been dwindling. This argument is evident from reports, which insinuate so. For instance, in the article by Brookes Barnes and Michael Cieply, the overall assessment is that the writers are supposedly confirming the fears that the popularity of Oscars is waning away. In the proceeding part of the paper, a critical evaluation of the report provided by the two in the New York Times is given. The first analysis is on the allusion from evidence in the recent past that Oscars’ popularity is waning. The second part focuses on the imminent biases in the report by Barnes and Cieply which compromise the objectivity of the argument they front. Evidence from recent reports allude that Oscars’ popularity is waning. Barnes and Cieply (2012), in Fears Grows That Oscars’ TV Allure May Be Resistible, give written article which summarily gives the reader an overview of what has been happening. From the start, the Barnes and Cieply (2012) give like brief background on the issue. Oscars is presented from the perspective of recent reports. For instance, Nielsen ratings are quoted as having a forecast into the reducing interests in the ceremony. In so doing, the two authors provide a backing for the argument fronted. The logical expectation in every argument is that they have to be supported by empirical evidence. Giving evidence from credible sources to back up arguments confers on the arguments credibility to be accepted as empirically valid. In view of this, the article exhibits the essence of evidence in supporting empirical arguments. The report by Barnes and Cieply has obvious biases which arguably compromise its objectivity. It is also notable to highlight the biases that are imminent in the report. In as much a the tow authors have been fairly managed to front their argument without obvious biases, the argument in insisting that the popularity of Oscars

Sunday, September 22, 2019

Cool Moose Creamery Essay Example | Topics and Well Written Essays - 1750 words

Cool Moose Creamery - Essay Example In the new franchisee, a new product will added with the existing product line up of this company. This report is about the financial assessment of the overall business plan. This financial analysis report is related to the feasibility of this new franchisee development by four partners who are willing to invest equally for this business. So, this financial planning assessment determines the feasibility of this business according to the current demand of the product and growth of the parent company Cool Moose Creamery. In this report a qualitative analysis has been made by supported by facts and data from the Cool Moose’s business. The new franchisee of this company will be taken and set up by total four partners among one has already invested $10,000 for developing new product and other three are interested in this business who will equally invest $10,000 each in cash this business. The amount they are willing to invest is $10,000 in cash each. One of the partners already dev eloped a new product related to the product line up of this business. The name of the product is Snofroze which is confectionary food like frozen snacks. The partners have decided that this product will influence the demand of itself as well as the existing products of the company whose franchisee will be taken. The partners agree to take a quarter of the new business each in return of $30,000 each. The partners will set up a shop where they will set up the franchisee business of the company. Actually the main aim of them is to get a brand name to include their developed product in the existing product line up of the brand. For developing this shop the company need to buy fixtures and fittings for the shop and other machineries. One of necessary machineries, the company need buy is single-head soft-serve machine. The partners have decided to take bank loan for buying the necessary fixed assets and initial cost for setting up the ice cream shop. Apart from, purchase of fixed assets r elated cost the company need to pay a flat fee upfront for taking up the franchisee. For all these initial expenses the partners have decided to take bank loan of $20,000. They are expecting to payback this amount in monthly instalments basis to the bank within a maximum payback period over 3 years. Total investment for this business is $160,000 which will be invested by the four partners equally and each of them will be getting a quarter stake of the company and also the selling writs of the new product Snofroze. Another $20,000 will be added in the total initial investment that will be taken from bank loan. So, total initial capital is $180,000. The company has decided to break even this initial investment from the total profit of 3 years. So, in the first three years the company needs to earn an average profit of $60,000 per year. If the company only focus on selling the product Snowfroz then it needs to sell total 60,000 pieces of the Snoforze and approximately 167 pieces daily if the profit per unit of the product is assumed as $1. So, the competitive price of a single Snowfroz is assumed as $2 and the cost of sells is assumed as 1 which includes production cost and other contributed cost per unit. 360 opening days of the shop is considered in this analysis and 5 days is deducted for closing of the shop regarding any issues. So, if the company can 167 unit per day at a assumed price of $2 per unit then the company can breakeven in next three years from the starting of its operation. The company will sell the products in the shop and also they will distribute in the many restaurants in the city. The product will get a good demand in the market as it is a confectionary snacks product. So, the company will do business selling also apart from retail

Saturday, September 21, 2019

Is Credit Card Necessary in Our Life Essay Example for Free

Is Credit Card Necessary in Our Life Essay A credit card is a card issued by a financial company to the holder in order for an individual to borrow funds often at a point of sale. It is important to note that credit cards charge interest and are basically use for short-term financing. Moreover, the interests charged on credits cards are enacted usually one month after purchasing is made and borrowing limits are pre-set. This is with regard to the individual`s card rating. Significantly, credit cards contain a higher interest rate that is about 19% per year than majority of the consumer lines or loans of credit. Consequently, many consumer stores allow payment through credit cards, an aspect that has seen the vast growth of these cards. Suze denotes says â€Å"For Americans who don’t pay their entire credit card bill each month, the average balance is close to $4,000. † In addition, they are a mode of payment in the current world by most companies and even the civil servants. However, the various limitations like dent limit make credit cards insignificant in our life. Credit cards are not necessary in our life because they impose various limitations to the card holders. First, charging items, goods, and services on plastic can be convenient but encourage poor spending habits. Credit cards are readily within one`s reach. Moreover, people walk with these cards in their wallets and handbags. This is not only, a limiting factor, but also encourages the issues of money expenditure. For instance, online stores have become a considerable element in the current American society. Buying of goods and services can be done within seconds, especially with the home delivery services at hand. Suze in her argument emphasizes, â€Å"But also realize that some of you are broke by circumstances. I believe you are Broke by Choice. † This is to indicate the practices that we engage with the accessibility to the cards. Credit cards expose high rate expenditure among people with even little goods they would purchase locally. Credit card debt is a considerable problem that each ground people every year. Rise in the interest rates is a limit factor towards the use of credit cards. It is evident that financial companies vary their rates within days and even a month. For instance, the interest rate may change frequently if the economy of the nation keeps alternating. This puts the credit card holders in a chilly spot. The fluctuation of interest rates has resulted to individuals going for loans since they cannot support their bills. Suze denotes, â€Å"The average interest rate charged on credit is 15 percent, with plenty of folks paying 18 percent † Moreover, the financial companies are after profits, and to ensure they have established this, they enact interest rates that are merely undistinguishable by the credit card holders. This exposes the card holders to vulnerability of inevitable charges by the organizations. Moreover, at times payments through the credit cards get missed. This is usual among the card holders. Various companies have emphasized on credit card payment mode. However, it is imperative to note that during the transfer of money from the corporative, some instances of money loss have been identified. Efficiency is a factor that cannot be relied on from payment and service coherence. Furthermore, online vandalism in the form of account hacking is a current problem facing credit card issuing financial corporations. For instance, payoneer company accounts that are issued online to individuals from various regions of the world have faced vandalism with clients and card holders losing millions of cash. Hacking online credit card accounts has become a common practice in the present society. This has forced people to limit the utilization of the credit cards. Credit cards are likely to accumulate debts if the monthly charges are not paid in time. â€Å"†¦if you are late on any other card, your zero deal can be in jeopardy. † In addition, credit card scores are trashed by the financial companies rendering to discrimination of the individual card holders. On the other hand, credit cards can be regarded to be very significant in the modern world. This is because they solve the issue of distance payment. For instance, an individual living in Great Britain can receive his/her salary even if working for a company established in the United States. This is because the credit cards allows funds to be deposited on the card holder`s card. Furthermore, the card holder can withdraw money from any card supporting Automatic Teller Machine (ATM). This is not only an advantage to the credit card holders but a limitation to knowing their bank ledger rates and various banking processes within the account. Majority of the credit card holders neglect the various conditions and terms they are subjected to during account application. Considerably, for the people who do not pay their credit card bill every month, it is significant to note that their average balance is estimated to $4,000. Considerably, the higher earning individual with an annual income that ranges $75000 and $100000, the average balance is approximately $8,000. â€Å"To see if you have been late on any card, not just their car. † This is a remarkably high cost in incorporating credit card in aspects of payment and other financial areas. It does not make meaning if an individual is paying, for example, 18 percent interest on a $7,000 balance and he/she makes just 1. percent minimum payment each month. This is because the individual will end up paying $20,000 in the averagely 50 years he/she will take to decline the balance to zero. It is important to note that those people who like buying goods on credit are at a big risk of ending up in great debts. The various transactions or credits that are made on the credit cards are crucial since they gain more interest to the related financial company. It is important to limit the rate at which one uses the credit card. Suze denote â€Å"Push yourself hard to make that extra payment as large as possible. Otherwise, an individual will end up accumulating a good amount of dents. Paying for groceries and friends drinks at the restaurant at your expense is a practice will finally get one to the unpaid credit balance. The card sets an individual for many snares and traps though the card companies in order for you to spend more creating more debts. The strategy for getting out of rid of the credit card debt is only by maneuvering the credit card companies with strategies that will ensure individuals pay the least amount possible interest rate. Considerably, the average interest charged on a credit card is about 15 percent. However, Suze says that, â€Å"majority of the people pay at around 18 percent and any balance carried by a credit calls for the rate lowered as possible. † In conclusion, it is important to note that credit cards are not necessary to our life. This is with consideration on the various credit debts they can amount to an individual. Further, they enhance high expenditure through online stores including groceries. Therefore, progressive use of credit cards even with minor goods and services that can be obtained readily endangers you to debts that are critical within credit card use. The most appropriate strategy in dealing with high-rate debt in the use of credit cards is ensuring that all your cards are equally used. â€Å"If you have a FICO score of at least 720, and you make at least the minimum payment due each month, on time, you should be able to negotiate with your current credit card issuer to lower your rate. If other cards are frequently used unlike others an individual would be paying the monthly charges and other interests for free. Therefore, credit cards are a critical aspect in the financial ground of an individual.

Friday, September 20, 2019

Input Output And Storage Devices Computer Science Essay

Input Output And Storage Devices Computer Science Essay To interact with a computer we use external devices called input-output or peripheral devices, this is the way a computer has to receive and give information to the user, and without it a computer is practically useless, so the need of input and output devices are the first path to computer organization. First is the input, input device was there for humans to communicate the data to the computer in various ways and therefor give a task to be processed into output. After, when the input of data is done the computer need to store it to be able to process it into output, because of the less amount of storage capacity of the CPU (Central Processing Unit), storage devices was there for the purpose of storing a large amount of data so that the CPU can access these data easily and faster. Output is the final step, the result of input-storage-process-output is given through output devices and before that the computer also need to re-store it in the storage device. We will see in details, what are the main uses of these devices? And the way it operates with human and computer. Input Devices: Definition: An input device is a peripheral or hardware device, generally external, that is connected or remotely connected to the computer or information appliance. Input devices are used to provide input which can be understood by the computer such as: raw data, information, command, order, signalà ¢Ã¢â€š ¬Ã‚ ¦ To process input, computer absolutely need an input device, it is the most important part of computers. Categories: Input device can be categories into four categories: Typing devices Pointing devices Optical devices Audio devices These categories represent the way to communicate with computers and the first path to the input-process-output phase. Typing Devices: Typing devices are essentially keyboard, used to insert text or command via button. They are the most effective way to input data to the computer. it use the method of binaries code to input data. Typing devices are very reliable for text and numbers data input. But they can be ergonomically unsafe if not properly used, inaccurate and difficult for bad typist or paralysis and handicapped users Basically all computers possess keyboard so it is the primary input of computer system. Pointing Devices: Pointing devices are used to input data by movement, here are some example of pointing devices: mouse, joystick, stylus, touch screen. They are usually used to operate with screen or movement based information, all of them are manually used so easy to manipulate due to simple movement, like the mouse who just consist of pointing and clicking. One of the main disadvantages is that they are limited in task, mouse and joystick means that you are limited in your work, and touch screen can be less responsive compared to keyboard. Optical Devices: Optical devices are mostly used in recognition or video and image capture, in the field of recognition there is the OMR (optical mark recognition) and the OCR (optical character recognition), and many others optical devices like: barcode reader, scanner, handheld scanner, digital camera, webcamà ¢Ã¢â€š ¬Ã‚ ¦ The OMR reader is used in barcode reader, it scan a mark which indicate the data or information input that is send to the computer to be processed, it is also used in face recognition, finger print scanner, retina scanner and so on. The OCR is for text and character recognition when scanning a text document. Basically, optical devices are faster than other devices because of a high-speed reading, and are more used by security mean due to their accuracy and reliability. The disadvantage lies in the raw data, for instance if there is a single change in it, the optical devices may not recognize and therefor give a wrong output to its user Audio Devices: Audio devices like his name indicate, is mainly to input an audio data. The devices are: microphone, headset, MIDI keyboardà ¢Ã¢â€š ¬Ã‚ ¦ its process is analogue to digital data convertor. It allows a user to send audio signals to a computer for processing, recording, or carrying out commands, sometimes the main purpose is to transfer input audio to output audio. The disadvantage is if the source of audio have a bad signals then all the process are wrong. Output Devices: Definition: Like the input, the output device is also a peripheral and hardware device used to receive the result of the processing date that comes from its input. All computer or information system absolutely need output devices. Output devices are also known as the way that the computer communicates with human. Types of Output: There are three principal types of output devices based on the way they deliver the output data: Display output Physical output Audio output Display Output: They are commonly monitors, screen or light based devices called Visual Display Unit (VDU). It is the primary output devices and it can also be used as a input device, the computer will display the contents of the information on the screen to permit the users read or see what are the processes done to the input data, that is called soft copy which mean temporary data copy. Display output devices is also the wall between computer-language and human-language, without it human cant understand what the computer try to communicate. Usually, display outputs are called video displays or 2 dimensional displays, like: Television sets Computer monitors Head mounted display But there are also called segments displays, composed of several segments that switch on and off to give appearance of desired output, they are display that can only show numeric numbers or alphanumeric character, like calculators or digital watch and so on. The advantages of display device is that you can see the output of a computer program and also use your computer easily by giving it commands from a Command Line Interface or use your Pointing device such as Mouse to point and click to do a task from a Graphical User Interface (GUI). It is fast to acquire, more economical and easily transmittable. In another hand, disadvantages are that the output is temporary because of the need of power supply and can cause visual problem for users. Physical Output: Physical output or hard copy is the permanent output; the most common way to get it is the printer. There are two type of printer: Impact printer: use the typewriter approach, impact of between the ink ribbon and the paper. E.g. dot-matrix printers. Non-impact printers: use electro-static chemicals and ink-jet technologies, can produce colour printing. E.g. laser printer, ink-jet printer So, printer is the principal output devices in terms of physical output; it can produce high-quality printing, can produce a large amount in short time. The disadvantages are the cost; printing is expensive due to its hard copies compared to soft copies that just need to be displayed. Audio Output: Audio output devices refer to any devices that are attaches to a computer for the purpose of playing sound, such as speech or music. It can also refer to the sound of a computer sound card. Here are some examples of audio output devices with their uses: Speakers: it is the most common type of audio output device; they can be attached to a computer using variety of audio plugs. It requires a separate energy supply to be operational. Headphones: they are another type of audio output device. Variations on the headphone concept include ear buds, which fit inside the ear, and headsets, which include both headphones and a microphone. It doesnt requires a separate power supply. Sound card: it is a computer component that converts information from digital audio files into electronic sound signals. These signals are then passed on to an audio output device, such as speakers or headphones. Although sound cards do not themselves play sound, they do output audio signals. For this reason, they can be considered audio output devices. Without an audio output device, you will miss audio cues from the computer such as error beeps and other important system messages alerting you to system problems. This keeps you in sync with your computer, allowing you to more effectively recognize and identify issues. There are no real disadvantages for audio output devices, just it need some additional hardware such as sound card and additional power supply, and the possibility of making noise. Storage Devices: There are primarily three types of storage a computer possess, first the primary storage, which is more popularly called simply memory; the secondary storage, which is more popularly referred to as simply storage, and finally the offline storage referred as movable storage. Primary Storage: Primary storage is where a computer stores data on a temporary basis so it can process the data. Think of primary storage as short term memory. Primary storage is a type of memory that is directly accessible to a computer processor and it is volatile because it is temporary in nature and is erased when the power is turned off. The main primary storages are: RAM (Random Access Memory) ROM (Read Only Memory) Data the computer is currently processing or data which the computer knows it is about to need for processing is stored in primary storage. Memory in primary storage can be accessed quickly by the CPU. Its storage capacity, however, is much smaller than what can be stored in secondary or tertiary storage. Computers need just enough primary storage to function and temporarily hold anticipated amounts of data for processing. Secondary Storage: Secondary storage is where a computer stores data it is not currently processing but which it may need at some later time. Secondary storage can be thought of as long term memory, or storage, and it is non-volatile in nature because data remains intact even when power to a computer is turned off. Operating systems, documents, music files and so on are typically stored in a secondary storage device. They can also be external for movement and transport. The main device for secondary storage is the hard disk drive (HDD). The computers largest secondary storage location is its hard disk drive, or just hard drive. Hard drives are platters like dishes which are stacked top, middle, and bottom to make one unit. Hard drives are mechanical devices which store data magnetically. They are considered permanent storage. Among the advantages of a hard disk drive is its storage capability, from Megabyte to Terabyte. Hard disk drives are durable, with metal casings built around their inner components. Hard disk drives are read/write. They can be read over and over and they can be modified, or written to, over and over. Offline storage: Offline storage is storage media which can be inserted into the computer and used but which can then be removed from the computer and stored elsewhere. It can also be external sources which are connected to the computer and then disconnected, like floppy drives, CD drives, DVD drives, USB flash drive, and Blu-ray drives. Floppy drive is an old form of storage, its capacity is very few up to 1 or 2 Megabytes so it isnt used nowadays, but it is categorised as offline storage because they are non-volatile and be able to read or written to over and over again. CD drive (Compact Disk) and DVD drive (Digital Video Disc) store data on shiny discs, the capacity of CD drive is up to 700 Megabytes and the DVD drive is 4.7 Gigabytes and 8.5 Gigabytes on a double layer DVD, they are very compact and portable storage with a good amount of storage, so it is the primary commercial storage device, used for video, audio, software, games and so on. But the disadvantages are that it can be infected by virus if used with bad intention, also if the layer of the disk gets damaged like scratch the computer will not be able to read anymore so a loss of data. USB flash drive, which is the most portable storage device with a great amount of storage, they can support 128 Megabytes to 256 Gigabytes, and it is the easiest way to carry data from place to place due to its connectivity via USB port. Unfortunately, USB flash drive is very fragile, easily breakable, and can be easily get corrupted or infected by viruses, so basically used for a short amount of time before it is useless. Conclusion: After describing and explaining input, output, and storage devices, we can see that the utilisation of computer in operations, functions, and processes are based within these devices, without just one of them work cant be done. These are all interaction between computers and humans that are necessary to achieve the perfect use of computer, it is studied in a field called human-computer interaction. Nowadays these interactions are appearing more and more frequent in daily life, with better speed and accuracy due to the evolution of technologies, and human are becoming more reliable in computers than before.

Thursday, September 19, 2019

Hitlers Victory at the 1936 Summer Olympics :: World War II History

Hitler's Victory at the 1936 Summer Olympics Adolf Hitler, the leader of Greater Germany, August 1, 1936, opened the 1936 World 11th Summer Olympic Games in Berlin, Germany. Adolf Hitler was a perfect host; he welcomed the world's athletes to the Berlin Olympic Stadium, which was designed to seat an audience of 110,000. During the 1936 Summer Olympic Games, Hitler applauded both German and American athletes, as well as winning athletes from all other nations. Even though a perfect host at the 1936 Summer Olympics, Adolf Hitler was still the leader of Greater Germany. Yes, one could be a great host, and still support the home team, as other world leaders were demonstrating at that time. Each world leader, at that time, wanted their nation's team to win at the 1936 Summer Olympics. Adolf Hitler felt the same towards the German team. Hitler wanted to demonstrate two concepts at the 1936 Summer Olympics: 1. An all White Nordic Christian Olympic Team could come in first place. 2. Working Class Participants could raise their status in the world through their own efforts. Participants in all situations, could be judged on their individual actions, not on the economic status of their parents or ancestors alone. The German 1936 Summer Olympic Team did not let Hitler down. The German team, consisting completely of White Nordic Christian members, came in first place during the 1936 Summer Olympic Games held in Berlin, Germany. Among the working class German athletes to win a Gold Medal during the 1936 Summer Olympics, Karl Hein, a carpenter, won a Gold Medal for the Olympic event called: THE HAMMER THROW. Karl Hein broke a world record, which was held for 24 years. During the 1936 Summer Olympics, held in Berlin, the German team won 33 Gold Medals, and 89 Medals in total Olympic categories. Adolf Hitler was very proud of the German 1936 Summer Olympic Team. Hitler was able to prove that an all White Nordic Christian Olympic Team could come in first place, and an individual could raise one's status in life through individual efforts, in spite of coming from a humble working class background. The American team came in second place at the 1936 Summer Olympic Games. Hitler was very impressed by all American athletes at the 1936 Summer Olympics and applauded them. The Olympic Team from France, impressed by their host, Adolf Hitler, gave the Nazi solute as they entered the Berlin Olympic Stadium in 1936 the first time.

Wednesday, September 18, 2019

Constructing and Reconstructing Essay -- Constitution, Founding Father

1. Woody Holton reveals the motives of the Founding Fathers depend widely on individual judgment of the terms under the Articles of Confederation. Holton claims that historians excessively rely on sources by the Federalist which reveals a prejudiced Federalist view (Hollitz, 110). Woody Holton uses the writings of James Madison and Alexander Hamilton to expose the Founding Fathers deeper motives in writing the Constitution. The Founding Fathers were frustrated because state legislatures had been given in to popular demands to reduce taxes and increase the money supply (for relief from the recession). While citizens were behind on their taxes; states were unable to pay interest on bonds, which crippled the government operations (Hollitz, 91). The idea of Hamilton claiming that states suffered from an â€Å"extreme democracy†, the Founding Fathers establish a central government that was less responsive to the will of the popular support (Hollitz, 94). The Founding Fathers , Holton says, mistrusted the abilities of average citizens who made up much of America’s voting population, and believed that power should be left to the elites (Hollitz, 94). However, the â€Å"framers† also recognized that the Constitution did not address ordinary citizen’s concern, and it would need to be ratified by the 13 states. As Woody Holton explains, the Founding Fathers felt that the uneducated citizens had â€Å"driven the country toward economic recession†, proving that they do not â€Å"possessed the ability to govern themselves† (Hollitz, 94). Also, the Confederation demonstrates the dangers of democracy showing that common people should not have control over their government. 2. From Federalist No. 10, James Madison explains that a republic is a government i... ...litz, 306). African Americans found themselves separated from white society and segregated by class. Blacks were often educated in segregated schools and churches, punished in segregated prisons, nursed in segregated hospitals, and buried in segregated cemeteries (Hollitz, 306). African Americans were segregated and treated with inequality especially in their public life. African Americans in free states faced barriers with job opportunities and were limited to the protection of life, liberty, and property (Hollitz, 306). Republican Party refused to address social equality for African Americans and claims to be â€Å"white man’s party† and do not accept black equality. Woodward and Foner conclude Reconstruction laws proved the failure in American race policy for earlier generations and betrayed the hopes that African Americans had invested in the new governments.

Compare And Contrast The Way Plath Presents The Speaker’s Fears In Thre

Compare And Contrast The Way Plath Presents The Speaker’s Fears In Three Of The Poems That You Have Studied Sylvia Plath writes poems that are thoughtful and intriguing. They have clever and subtle suggestions that leave her poems open for interpretation by the reader. Her poems mainly have themes with either an odd or disturbing nature. The three poems I have chosen to compare and contrast are; â€Å"Mirror,† â€Å"Bluebeard† and â€Å"The Arrival of The Bee Box.† In the three poems there are several different moods that are shown throughout. In â€Å"Bluebeard† the speaker remains in control all the time, she is defiant and makes her own choices in stating, â€Å"I am sending back the key;† she is rejecting him and it is always her option whether or not to. However throughout â€Å"Bluebeard† the speaker’s tone remains constant and never changes unlike in â€Å"The Arrival of The Bee Box† in which her disposition changes constantly. At the beginning of the poem the poem begins with the speaker describing the box calmly â€Å"I ordered this, clean wood box† this creates a pleasant image even though it is a â€Å"box of maniacs.† The box is full of something very dangerous. If the box were to be opened then the speaker would be unleashing hundreds of bees and yet she describes the box as being something pleasant instead of ominous and foreboding. Then as the poem progresses the speaker becomes obsessed and fascinated with the box and is unable to leave it, absorbed by the power that she possesses over the bees. â€Å"It’s like a Roman mob,† could be referring to the fact that the emperor in ancient Rome had complete control over the lives of the many people and she now could similarly let all the bees, â€Å"die, I need feed them nothing, I am the owner.†... ...oughts in the poems, it is definitive and final. The many stanzas allow Sylvia Plath to change the speaker’s mood and thoughts in each stanza. This, along with the language used which is awkward and difficult to read, has the desired effect of reflecting her feelings of confusion. She seems to be trapped between her feelings of obsession and fear of the box she knows she can not open. This is similar to the myth of Pandora’s Box where the woman knows she can’t open the box as there is danger in it and yet is somehow strangely drawn to it In general Sylvia Plath is successful in her endeavour to portray the fears of others in her poems. She is very skilful at writing about real feeling and involving her life in her poems to help incorporate real life situations into them. And by involving her fears into the poems this helps many people to relate to them.

Tuesday, September 17, 2019

Admissions Image Choice

I have chosen this iconic image of Dr. Martin Luther King, Jr. after winning the 1964 Nobel Peace Prize in Baltimore, Maryland due to its historical and symbolic significance.   The image is representative of Dr. King’s philosophy of peace and community building thanks to the gathering of hands and bodies on a seemingly random street corner in America during the Civil Rights, which is to say a cultural and racial landscape full of historical struggles and a hope for an equal future.The image is centered on sunlit Dr. King grasping hands with a group of African American women supporters.   He is sitting in the back seat of a black convertible and he has a luminous smile that Leonard Freed captured as he turned toward his fellow citizens as his bodyguard keeps eye toward the street.There are two white uniformed police officers in the background with stoic expressions trying to carry out their duties of maintaining the public peace.   The photograph carries such an immense historical gravity due to its closeness to Dr. King’s assassination but it also has a lightness of being that lifts the veil of racism through the smiles and gratitude inherent in its subjects.This image by Leonard Freed at the height of the Civil Rights Movement illustrates the will and devotion that Dr. King mobilized in his everyday life.   The people he surrounded himself with shared a common goal for civil equality with a spirit of compassion and grace in the face of hatred and discrimination.For this reason, this image will forever remind me to keep my head high and my visions clear even in the face of the most daunting challenges and obstacles.

Monday, September 16, 2019

Describe the functions Essay

Received assignment which is to cover element 3. 1 all PCs. My initial task is to Gather all relevant information on the basic data structures for storage and retrieval. I will research through lecture notes and the books BTEC Information Technology, BTEC in Computing, File structures theory and practice, as well as to search through the CD ROM Groliers Encyclopaedia. Take notes on any relevant Information 9/5/95 – 11/5/95 Research information on the way that Basic data structures are analysed for different applications. Research through above books and CD ROM’s and take relevant notes. 11/5/95 13/5/95 Find out about logical and physical file organisation, with regards to PC3 Element 6. 1 of the log book. Take notes on relevant Information. 13/5/95 – 15/5/95 16/5/95 18/5/95 Research information using methods as above with regards to how the physical file organisation is analysed in relation to different media, PC4. Make notes Research information to cover PC 5, which needs me to explain location and access methods. Use literature as above 19/5/95 Word process first draft, and take to tutor for first review After outcome of first review take tutors advice accordingly. 20/5/95 Check work to see if any important facts have been omitted, ask Tutor for a second review. After outcome of second review finalise any missing facts. Word process final draft, check the work for mistakes and hand in finished report for 1/6/95 Nicky Wilson GNVQ Advanced IT Investigate data Structure for storage and Retrieval Element 6. 1 Introduction The report will analyse basic data structures for different applications and physical file organisation in relation to different media. The report will also explain basic data structure for storage and retrieval, logical and physical file organisation and location and access methods. A data structure is essentially a number of data items, also called elements or nodes with some relationship linking them together. Each item consists of one or more named parts called fields occupying one or more memory locations in the computer. For instance a list of numbers occupying consecutive memory locations in a computer is a simple data structure. Array: This is an ordering of the data elements so that the data is able to be extracted in a logical fashion, shown below is a diagram showing an example of this 1 6 9 3 Dim x (3) Index value 7 4 4 1 Dim y (3) Index value Dim x (3,3) Index value 9 2 6 7 Dim y (3,3,3) Index value Stack: The stack is a data structure chacterized by the expression LIFO = Last in first out this means that most recent item added to the stack is the first one which can be removed from the stack. A stack pointer is used to keep track of the last item added to the stack, which is the current top of the stack. Stacks are frequently used for data temporary storage. One common application of stacks is for storing return addresses (link values) for closed routines. TOP SP BOTTOM A stack only has two operations PUSH: Add an item POP: Remove the top item. FULL & EMPTY: Stack pointer It can define maximum values only one end used. Queue: The data structure known as a queue has the same characteristics as the queues that we encounter in everyday life. A queue in a data structure in which elements are added only at the rear of the list and removed only from the front of the list. A queue structure is often given the name FIFO which stands for first In first out. Data in what we call a queue is not moved along like people in a cinema queue, instead each datum stays in its storage location until its turn comes, thereby reducing time spent in data movement. The use of pointers makes this possible. FRONT BACK JOIN HERE Take items from the front, add items to the end. List: Lists provide a flexible way of handling data items in order. Changes to the order can be achieved with minimal data movement and little loss of storage space These can be ordered can contain N > 0 items, each data is an element, 3, 4, 41, 62, 79, 8, 11 or FRED, JIM, ANDY, CHRIS, SID. Tree: The tree structure is an Hierarchical structure, the term tree refers to a non linear data structure in which nodes have two or more pointers to other nodes forming an hierarchical structure. The top node is called the root node The bottom node are called leaf (Terminal nodes) and the nodes are connected by branches. Shown below is an example of a tree structure showing how a record in a employee file may have the structure shown below. Works Number Name County Sex Post Holidays Status Nation`ty phone Street Town Age Service Dept Years Salary Entitmnt Storage & Retrieval For example in a banking organisation, the information that must be recorded could be information on a customers checking or savings account, on loan applications, about employees of banking institutions etc. Due to the four parts of information, each part is related to as a file, so the banking organisation must record the information in four separate file shown below. Checking Savings Loan Employee Accounts Accounts Applications File File File File Records: Are a collection of related fields, an example to show this could be a record of an accounts file, which contains four fields. Illustrated below is a diagram showing this. ACCOUNT NAME ADDRESS BALANCE 9783 – 59 -812 JOE BLOGGS BLOGGS AVENUE 1000. 89 Files: Logical is referred to as the external view of the file a logical file is nothing more than a collection of all logical data. Media Access: File storage media is of two main types, Serial access and direct access, below is a short explanation of the two. Serial Access media: This means that in order to access a particular record, it is necessary to read all records which precede it in the relevant file. An example of this storage medium is in normal cassette tape. A difficulty with this storage media is that there are no readily identifiable physical access areas on the medium which can be addressed, it is non addressable. Thus to look for an individual record the software needs to examine eachreco rd key field, in sequence from the start of the file until the required record is found. Direct access media: This allows direct access to a particular record, for example floppy or Hard drives. They have physical divisions which can be identified by computer software, as well as hardware, and can be addressable so that particular locations can be referred to by name or code, to retrieve a record which is shared at the location. Basic data structures are analysed for different applications Input / output Queuing and spooling Computer and printer everytime you print work out in room 107 YCC you go into a queue, it stores the information and prints it out in the order it went in. Queuing information uses first in first out. If it was more advanced, for example you needed to have certain priorities for printing ( small files first) to make the system more efficient you would need to use a list structure. Spooling is the other way round, putting things together ready to go out. It would be possible to use a queue data structure. Storage (tables, declarations, files, databases) Table for example containing storage devices. TABLE 0 1 2 3 4 0 1 2 3 Two dimensional, one column specifies, and one column specifies the row. Stored in a two dimensional array structure. Files are made up by a number of logical records. 1 Dimensional array Dimensional array Field Record Record Record Record Record Problem must contain the same type of information Each box of array can only store the same type of Information Retrieval: All structure storage and retrieval vary from structure to structure. It may use a tree, to extract information from a tree the name given is traversing the tree or tree walking, for simplicity we will use binary trees. The reason for this is that each node can only have two branches. Left Subtree Node Right Subtree A B C D E F G. Inorder Traversal: Traverse the left subtree, visit the node. Traverse the right subtree. = DBEEAFCG Preorder Traversal Start at Node A Traverse the left Subtree. = ABDECFG Post Order Traversal Traverse the left Traverse the right Return to the Root. (Node) = DEBFGCA. Searching For searching list and array structures. Compilation: is the process of translating a High level language into machine code (Basic, Pascal, FORTRAN) There are 3 main steps   Lexical   Syntax Analysis Data structures is what we are interested in   Code generation Lexical analysis: This involves breaking the input to the compiler into chunks, also known as tokens. Syntax Analysis: This involves checking whether the input tokens form valid sentences when put together. This process is known as parsing. The second process of syntax analysis involves determining the values of arithmetic expressions. Code Generation: The final stage of the compilation process, where the machine code is generated. Methods of Syntax Analysis Parse trees can be used to evaluate whether a statement has the correct syntax. Customer 27 Customer 6 Customer 33 Customer 49 Sequential access files These are the files where the records are stored one after another in a predetermined order. This is usually around the key field, when files of data are created you need a means of access to a particular record within those files. This is done by giving each record a key field by which the record can be recognised or identified. Examples of key fields could be Customer number in a customer ledger record Stock code number in a stock record   Employee clock number in a payroll record Customer 10 Customer 26 Customer 34 Customer 47. Indexed sequential file: Records are stored in a sequence like sequential, the important difference is that an index is provided to enable individual records to be located. Strictly speaking the records may not always be stored in sequence but the index will always enable the sequence to be determined. Illustrated below is an example of an indexed sequential file. 1 INDEX 2 3 1 . . 10 . 10 11 20 12 . . . 20 21 22 Random access file structure This allows the ability to retrieve a record without having to read all the records that appear before it in the file. it allows fast access to records it is ideally suited for Interactive systems. Physical file organisation is analysed to different media Magnetic tape. Because of the physical characteristics of magnetic tape it is necessary when processing a file that the tape unit starts to read the tape unit at the beginning of the tape. Magnetic tape is a low cost high storage capacity device, its advantages are that it is very cheap. Files can be organised two ways serial and sequentially. Shown below is a diagram showing how a file is arranged on tape both logically and physically. Block or physical record File I I header R1 R2 R3 R4 B R5 R6 R7 B R9 R10 R11 R12 †¦ label G G Logical Records Inter Block Gap. Magnetic Disk: Magnetic disk provides storage facilities far more flexible than magnetic tape. The surface of the disk is divided into physical locations. It is a direct access medium. Magnetic disk supports the following file organisation methods Serial, Sequential. CD ROM Uses tracks to store the data on, the tracks are very close together . They have a mass storage capacity, they can hold about 600Mb of information and are direct access medium. Latest CDs now allow you to put information on and keep adding to it. RAM Random access memory is Electrical memory, it is a temporary store for holding programs and data that has either been put into the computer from either disk, typed at the keyboard or input from some other device. This type of memory is called volatile memory that means that the contents of main memory can be destroyed, either by been overwritten or when the machine is switched off. It is direct access and very fast access, it has a limited capacity and is relatively expensive. Location and access methods are explained serial sequential order: The lowest value is at the top, and the highest at the bottom. You would start at the beginning and work your way, the advantage of using this way is if for instance if you wanted to find number 29, if by the time it gets to number 34 the value is not found, the search will be terminated immediately. If it wasn’t sequential you would have to go through the entire list. 4 13 26 34 If number 29 is not found by here, search will be stopped 97 102 Serial search: Using a serial search you would go through the files in each order, look through data items one at a time, from the start of the data structure to the end. This can be a very inefficient type of search because all of the data items must be examined unless the data is ordered. This is the only type of search that can be used with unordered information. Serial record search: This means that in order to identify and retrieve a particular record it is necessary to read all the records which precede it in the relevant file, until the file you require is found RECORD 1 RECORD 2 RECORD 3 RECORD 4 Evaluation I am happy with the outcome of the assignment, I feel that I have covered the criteria and the range that was required. The way I approached the assignment was as such, first of all I researched Information from the books Information Technology by Roger Carter, BTEC Computer Studies, Information Processing BTEC, A level BTEC and first degree computing. The next process was to decide which way, was the best way to try and cover the PCs and ranges for the unit were covered. Eventually I reached the conclusion that it would be easier for me to work through the PCs in the order that they appear in the log book. Thus starting with PC1. The other way I thought of approaching the assignment was to start by doing PC1 first but to try and bring in other elements of the ranges in accordingly. The reason why I opted out of doing it this way was because I thought that it would make it more difficult. The way that I tried to checked the validity of the Information was by, trying to compare the information that I had it with the different books and CD ROM’s to see if it was correct. This way proved hard. In my opinion it is hard to judge the validity of the information for this assignment, because certain areas relating to this subject is hard to find a wide range of Information on. I have not done the work as instructed on my action plan, I have had reviews by tutor earlier than stated in my action plan, the reason for this is because I have other assignments that need completing. If any criticism is to be applied to my work, I feel that I have not gone into depth with certain parts of the assignment, but elaborated too much on other areas. Bibliography Books and CD ROM’s Used Computer Studies for BTEC (3rd Edition) Geoffrey Knott, Nick Waites, Paul Callaghan, John Ellison. Business Education Publisher ltd. 1993 Information Processing for BTEC 2nd Edition Geoffrey Knott, Nick Waites, Paul Callaghan, John Ellison. Business Education Publisher ltd. 1990. A level, BTEC & first degree Computing by Nick Waites, Geoffrey Knott. Business Education Publishers Limited 1992 Information Technology by Roger Carter, first published 1991, reprinted 1992. Encarta encyclopaedia, Times, Guardian, Groliers Encyclopaedia (CD ROMS).

Sunday, September 15, 2019

Element & Performance Criteria Essay

1. What documentation could you expect to receive when you are asked to undertake a project? Apart from the written documentation, you might need to obtain additional information. What could this be? Why is it important to get all this information before you start your project? Your Answer: You could expect to receive a copy of the contract or agreement, the project brief and project plans. You will also need to know who your stakeholders are and what outcomes are expected, the reporting requirements, inclusions and exclusions, timeframe for milestones, quality standards and resources available to you. You need to understand completely what is expected, what time frame and the resources available and ensure nothing has been left out as you may not be able to ask for extra time or resources once the project has commenced. 2. Why is it important to check out the relationship of your project to both your organisation’s objectives and to other projects? What could be the outcomes if you don’t check these out? Your Answer: You need to ensure your project is in line with your company’s overall objectives to ensure other departments you are working with have ample time to respond to any requests from your team and ensure less disruption to work flow. As you may have some part time staff on your team you also need to ensure project work does not take away them away from their daily duties. You need to make sure that anything you develop works into the established procedures and can easily be adapted to work straight away. Your project wouldn’t be successful if you cannot integrate the end product easily into the company functions. QUESTION 2 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria1.2 1. In any project, there are the direct or formal stakeholders as well as informal stakeholders. How would you go about determining these? Why would you need to know who the informal stakeholders are? Your Answer: You are undertaking a project on behalf of stakeholders so you need to be aware of who they are. You must remember the project mantra is â€Å"satisfying the stakeholders†. Depending on the project you need to work out if it is being undertaken for a customer, a department, funding body, management, sponsor or key personnel to establish their vested interest and better understand the outcomes required for them. As you will need to supply progress reports, you will need to understand who the stakeholder is and what information you can be disclosed to them. Knowing who your stakeholders are can also work in your favour as you can use their vested interest to gain the assets you need. QUESTION 3 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria1.3, 1.6 1. When you are asked to take on a project, you need to know the project brief, but there are many other details you need to have, including items such as legislative requirements, risks, resources and so on. What items should be on your checklist to make sure you are clear on the project, its parameters and the resources available to you? Your Answer: You will need to know the following: Legislative and quality standards – government regulations Physical, human and technical resources available – full / part time staff and how much of their time is available to you. Procurement requirements – limits of authority for sign off and purchase regulations Risks – Physical, financial, technological – a full risk assessment should be undertaken prior to commencement and a comprehensive budget developed. Reporting requirements – who to report to, what needs to be covered and how often reports are expected. How the project integrates into the company QUESTION 4 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria2.1, 2.3 1. If you are setting up a detailed project plan for your project, why must you also set up a risk management plan? How would you go about making sure your two plans are synchronised? Your Answer: Your project plan should work around any identified risks. You should undertake a risk assessment before beginning the project and identify any acceptable risks, ways to avoid or mitigate these risks and if necessary transfer the risk to a third party. You need to work the results from your risk assessment into your project plan eg outsourcing some of the risk or changing strategies to lessen the risks to the project. 2. As you set up your project plan, one of the key components is your timeline. What factors must you consider when determining the timeline? Your Answer: It is best to use a software package for accurate setup. Decide on a schedule that covers from the beginning to the end of the project and list all tasks involved. Sort which tasks can be done in parallel with others and include tasks by outside resources like subcontractors, vendors and other departments. Work out how long each task may take by using past experiences or work out how long it would take you to undertake the task and add 20% for any unseen problems. Be sure to include time for meetings, reports and documentation development. Look at the manpower available for completing the project and schedule times for part time members who also perform work for other departments. This document needs to be flexible with some slack time built into the schedule at various points. QUESTION 5 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria2.2 1.There are many project management tools available to you. Choose five  from the following list and describe the pros and cons of each of the five: †¢cost schedule control system †¢Critical Path Method †¢Gantt and bar charts †¢life cycle cost analysis †¢logistics support analysis †¢PERT charts †¢project management software †¢spreadsheets †¢WHS management system tools Your Answer: Project Management Software Helps schedule the project Assigns tasks Finds the critical path Tracks progress against the time line plan Creates you Gnatt charts for you and automatically updates these charts with adjustments in your plan Gnatt & Bar Charts Shows scheduling information about a project Shows tasks that are part of the critical path Identifies who tasks are assigned to and which tasks are to be completed by people outside of your team Shows the current status of tasks Spreadsheets These are useful for charts of data that need to be created Charts can be created in word processing documents Preforms calculations on data inserted into a document Embedded formulas allows calculations to be in real time and adjusts to any changes made Logistics Support Analysis Shows an analysis of all logistical elements required for each activity Integrates the logistics and supply chain into a seamless operation Reduces costs Increases responsiveness Life Cycle Cost Analysis This is a system of cost evaluation Shows costs throughout the expected life Used to make cost determinations between different systems proposed for a particular need QUESTION 6 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria2.5, 3.1, 3.2 1. What are the advantages of consulting your team members when setting up your project plan? What are the risks if you do not consult them? Your Answer: You can use the expertise of your team to develop a list of tasks, estimate the time needed to undertake these tasks and develop a list of equipment & materials required. As you finalise the project plan communicate with your team members their part in the project and present your plan to them prior to presentation to management. Let them help identify potential problems and suggest any solutions. If your members feel they are part of creating the plan then they will have a greater commitment to completing the project on time and within budget. Involving your staff will get them to buy into the project and will eliminate the idea that it is your plan and giving them an excuse for not meeting timelines or budgets. You want your team to work as a team with enthusiasm to the project for a successful outcome. 2.Describe the techniques you could use to make sure: †¢at the beginning of your project that team members are clear about their responsibilities †¢as the project progresses that all team members continue to be clear about their responsibilities Your Answer: Ensure each team member understands clearly the scope of the project and their individual responsibility. If you have involved the team in the planning and setting up  of the project plan they will understand the aims of the project and what you require from them and the time constraints in place. To keep them on track whilst the project progresses, be proactive and display posters reminding them of the project scope and goals, have weekly status meetings and get everyone to give an update, send a weekly project update email or motivational email and talk to your team members to see where they are up to and help them to get around any obstacles they encounter. Follow up with your team and help guide them in the right direction. You need to have your finger on the pulse a nd know what each member is doing to ensure they stay on track. 3.Some suggested techniques for supporting your project team members are: †¢encouragement †¢feedback †¢learning and development †¢regular project team meetings †¢supervision, mentoring and coaching What are at least five of the key activities you would consider when undertaking these techniques and supporting your project team members? Explain why you would choose these particular five. What communication skills would each activity require? Your Answer: Encouragement – Support your team members and recognise them for their contributions to the project. Help them to get the necessary assistance and guidance to ensure they can perform their tasks. Listening, empathy, understanding are the communication skills required. Provide feedback to members to show what tasks have been achieved and where the budget and timelines are being achieved or missed. Discussion, reporting and presenting of reports and charts to show achievements Provide learning and development opportunities to team members. Get help and guidance from outside the team to help members to get past any problems or road blocks. Coordination, discussion, problem solving and team work would be required in this instance. Conduct regular team meetings and discuss where each member is up to with their required tasks and reward and recognise high performing team members with simple gifts and acknowledgment. Presentation, coordination and discussion will be required during meetings. Supervise,  mentor and coach your team. Your job is to manage the team not do all the work. Your team are the experts in each area and you just need to support them and help them to make everything come together Mentoring, watching, looking and talking would be required when mentoring your team. QUESTION 7 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria1.5, 3.4 1. Projects often start to run over budget, milestones slip, resources don’t reach you on schedule or a key person gets ill. What do you need to have in place to manage these problems? Who might you consult when you hit a problem that you are having difficulty resolving? Your Answer: You need to have identified the potential risks at the project planning stage and factored in some time to deal with these obstacles. You need to deal with each target that is not achieved and establish a plan that can be implemented to get the project back on track. Resources need to be looked at that can be added to the project team or new ways to undertake work need to be thought of. To think outside the box is necessary to establish better ways to achieve outcomes as the traditional company way may be to time consuming when working on a project. The usual company way could be used when full production is undertaken but isn’t necessary during a project. You can approach the stakeholders when you are hit with a problem you can’t easily resolve. They have a vested interest in the outcome and may be able to assist with extra resources or ideas on where items can be procured or sub-contractors that could be engaged. QUESTION 8 0 Satisfactory 0 Not Yet Satisfactory Element & Performance Criteria5.1 1. It is the nature of most projects that there will be mistakes, problems with resources or people, changes in both the internal or external  environments, or even changes in the project scope or brief. Understanding how these happened and how they were managed can become learning experiences, but if they are not documented in some way, they become lost. How could you go about making sure the lessons learnt are not lost? Your: Accurate notes and documentation will ensure lessons learnt are not lost and can be used by future project teams who can learn from your successes and mistakes. Identifying problems encountered and the process used to find a solution and accurate documentation of the solution and the techniques or methods tried is important to have for the company to use in future work or trials. Accurately record what problems occurred, its effects, what you did to rectify the problem and the impact of the changes you made. This will help in the future to improve processes or procedures of the company and may assist future project managers when faced with obstacles.