Friday, May 31, 2019

Justice for All Ages Essay -- Justice Philosophy Essays

Justice for All Ages The question of What is Justice? plagued the ancient philosophers and continues to plague the professional and amateur academic philosophers of today. The question is so hard, because it is quite difficult to know where to begin. Socrates1 spoke of justice in relation to the gods, Plato in relation to an individuals duty in society, and Achilles, in a slimly indirect way, in relation to honor and loyalty. All three of these men had very convincing arguments about the true nature of justice, but it is impossible to sound out now, or most likely ever, whether any of them actually got it right. The current goal is to synthesize their ideas with those of Aristophanes, Euripides2, and even Richard Kraut, representing the modern academic philosopher, in an effort to further contract and test the concept of justice. In order to approach this daunting task, it is important which medium is chosen through which to proceed. Following in the footste ps of Plato and Socrates, it seems fitting to do implement the dialogue format. The dialogue format consists of a conversation in which a discussion ensues, questions are asked, hypotheses are formed and challenged, and hopefully, in the end there is nigh clearer understanding of the issue at hand. This dialogue takes place on the Isle of the Blessed where the now-immortals Achilles, Socrates, Aristophanes and Euripides live. Lasthenia3, a philosopher from ancient Greece, has brought Plato to the island and, naturally a discussion begins. The discussion, as promised, brings in the ideas of justice from many different points of view and ends with the unannounced entrance of Richard Kraut to add yet another twist. Characters of the dia... ...versity Press, 1998.Euripides. Bacchae. Translated by Paul Woodruff. Cambridge Hackett Publishing Company, Inc., 1998.Homer. The Iliad. Translated by Robert Fagles. New York Penguin Books, 1990.Kraut, Richard. The defensive structur e of Justice in Platos Republic. Platos Republic Critical Essays, edited by Richard Kraut. New York Rowman & Littlefield Publishers, Inc., 1997.Plato. Apology of Socrates. Translated by Thomas G. West and Grace comet-like West in Four Texts on Socrates. Ithaca Cornell University Press, 1998.Plato. Euthyphro. Translated by Thomas G. West and Grace Starry West in Four Texts on Socrates. Ithaca Cornell University Press, 1998.Plato. Republic. Translated by G.M.A. Grube, rewrite by C.D.C. Reeve. Cambridge Hackett Publishing Company, Inc., 1992.Vlastos, Gregory. Socratic Studies. Cambridge Cambridge University Press, 1994.

Thursday, May 30, 2019

The Problem with Being Gay Essay -- Personal Narratives Homosexuality

The Problem with Being Gay About a year agone one of my best friends and I bought some glow-in-the-dark stars to paste on my ceiling. After about four hours of neck-straining work, we shut off all the lights in my room, closed the door, jumped onto my prat and looked up to admire the green glowing wonders above us. After a few minutes of quiet talking, my friend said something that totally blew me away. It might behave been that he was tired from the days work, or maybe a little light-headed from all the dust and stucco we inhaled while placing those stars on my ceiling. Or maybe it was the duskiness that made him feel as if he had some kind of security. But something about the situation made him say one of the most serious things he ever said to me. He turned to me, almost touching my face, and whispered in my ear, I think I am homosexual. I responded almost instantaneously Are you sure? And we talked and cried that night for three hours, he about how his life would be totally ruined and all his hopes and dreams crushed if he really was gay, and I about how it was probably just a phase he was going through. So I decided to see what happened to let time run its contour and see what results it brought. And although the subject did come up a couple more times throughout our senior year, we never discussed it with as much seriousness as that night. I admit that at that time I was still controlled by the immaturity and superficiality of the high school years and was not as accept of my friends revelation as I could have been as a good friend should have been. Conformity to the adolescent laws of popularity was a must, and it prevented me as well as him from being absolutely clear and aware of our feeling... ...-in-the-dark stars? I said, yeah and he said, I AM, IM GAY. As this huge burden was lifted off his shoulders, as his unavowed became mine, I felt a strange mixture of emotions run through me. I was speechless. I didnt do it what to say . So I cried because I was both knowing and sad. I know he was smiling when he told me that, but I soon realized that it was my fault that he never told anyone. He had held it in for an good year because of my initial reaction and firm belief that it was just a phase. I figure that was my way of avoiding the subject at the time, but now I know that I am okay with my friends sexuality because of my own feelings. And I am happy for him. But I still cry because I know that, in reality, his discovery and its social complications have changed the path of his lifelong hopes and aspirations, and that there is a rough road ahead of him.

A Cold Day In Seattle :: essays research papers

(this is a paper i wrote for englishthe grade was an A)A Cold Day In SeattleIt was a cold winter day on that dreadful morning. School was closed because of a holiday. Justens friends Jeremy and billystick came over to see if he could go to Capitol Hill with them. He agreed and their friend Ryan drive them. It was about 100pm when we they there, but the three boys would of never have gone if they only knew. Ryan dropped the trio of and said he would be back at 800pm in the same spot, because he had band practice at 300. They started our journey on 5TH Avenue going north. While they were walking Billy noticed something strange about the stores they were closed the boys forgot that holidays applied to stores too. Thats when it happened, Jeremy got a headache. He started to scream and use profanity. As they were trying to find at to the lowest degree one store that was open, some drunk cowboy eating pudding started following the boys. What was some drunk cowboy eating pudding going t o do to three teen-age boys? Then he jumped in front of them and screamed, Billy thats when Billy remembered him. It was the drunk guy that Billy had met a year ago, when he took the heap to Seattle. They were a piddling shocked, but they let him join in. Jeremy thought he had gone mad considering he thought he was in the war and unplowed saying, dont worry I got your back soldier, to Billy. There the boys were walking down the street. Jeremy was raging about his headache, Justen was wondering what was going on, Billy was a little confused, and the drunk cowboy obsessed with pudding was walking behind Billy with his hands together making a gun whispering, when the race starts run sincerely fast, and, I got your back soldier. It was very cold, so Billy, Jeremy, and Justen had their trench coats on, but the drunk cowboy was wearing a tie-die shirt and bell-bottoms. They walked for an hour when it started to snow. Good thing they were wearing trench coats. I bet I could fix ya up n ice soldier, whispered the cowboy. The boys were all a little confused. I got a special birth control pill you could take for that vice on your head there soldier, he exclaimed. Jeremy was a little nervous considering Advil usually isnt red and comes in a little black film canister.

Wednesday, May 29, 2019

Huck Finn :: essays research papers

The Adventures of Huckleberry Finn Modern American (1885) 1. The Author and His Times Mark brace, the pen name of Samuel Clemens, was born in Florida, Missouri in 1835. When he was four, his family moved to Hannibal, Missouri, the setting for many of his books. His father died when he was 12. After his father died, he went to work as a printers apprentice and eventually as a printer in Missouri, St. Louis, and New York often writing a few works himself for periodicals. He worked as a printer and a reporter selling much of his work to newspapers. He continually moved from town to town. In 1857, he decided to move to South America to acquire a fortune there. He boarded a riverboat and headed for New siege of Orleans where he would arrange the rest of his trip. However, he never made it past New Orleans and never into South America. He begged the riverboat to teach him how to pilot the riverboat. The riverboat pilot agreed to teach him for $500. Mark Twain went west during the civil war and established himself as a writer during this time. He wrote humorous stories about his experiences which lead to a job as a newspaper reporter in 1862. The following category he began signing his work Mark Twain, a riverboat term meaning two fathoms deep. Mark Twain went to Hawaii in 1866. This trip was the beginning of his vocation as a travel correspondent. The next year he went to Europe and wrote a successful book there titled, The Innocent Abroad. In 1876, he create The Adventures of Tom Sawyer. This book was such a success that he decided immediately to write a sequel. The sequel, which became much more complex than the original was make seven years later in 1883 and titled, The Adventures of Huckleberry Finn. After Huckleberry Finn, Twain wrote nearly a dozen more books but none were as successful. By 1939, Twain had lost all of his money investing in various schemes and inventions, almost all of which were failures. After this, he went on a world lecture offer a nd was able to pay his debts by 1896. While on the tour, one of his daughters died. His wife later in 1904. In 1909 his daughter died leaving him unhappy. 2. Form, Structure, and Plot The Adventures of Huckleberry Finn consists of 43 chapters and is told in the first person with

Pros and Cons of E-Commerce Essay -- essays research papers

Pros and Cons of E-CommerceElectronic commerce or e-commerce involves the buying and selling of products or operate over the internet. Put simply, e-commerce means conducting business online. E-commerce software programs run the main functions of an e-commerce web site, including product display, online ordering, and inventory management. This software resides on a commerce waiter and works in conjunction with online payment systems to process payments. E-Commerce can help a small business off to a great start or can make it fizzle into bankruptsy. It can have a positive and negitive impact on the success of a small business.There are just about(prenominal) pros to e-commerce. One factor is that e-commerce provides service and performance by offering a user-friendly experience. In a regular business, the retailers may have to go some way before achieving such a responsive goal. E-Commerce also provides an attractive website. The colors, graphics, and animation can help an e-comm erce site become successful. The website can also tempt the customers to purchase and return. Promotions, coupons, and discounts increase the chances for a customer to use the site more frequently. Websites can provide the customers with personal attention. The customer can personalize the website to better scenery their likes and remove their dislikes. Purchase suggestions and personalized special offers can most of the time substitute person to person in...

Tuesday, May 28, 2019

Swift Achilles :: Essays Papers

Swift Achilles There was once a time of great warriors, heroes that fought for their keep an eye on and the honor of their people. This was the time of Homers Iliad when the great armies of the Achaeans charged Ilium, the Trojan Citadel. Although this ten-year epic battle, called the Trojan War, was supposedly fought over Helen, the face that launched a thousand ships1, the confessedly heart of the Iliad is the characterization of the Homeric hero. These men possessed seemingly superhu earth strength and courage, they fought and risked their lives for their people and their comrades in arms, and many of them were descendants of the gods themselves. Among the Achaeans, there emerged one man above all others in greatness. The son of the goddess Thetis, it was swift Achilles who defeated Hector, the capacityy Trojan prince. When trying to classify a man as a Homeric hero or to decide which from a group is the greatest hero, there are certain characteristic s that must be evaluated. In this process, it is also imperative to hold from consideration the ideals and characteristics that are used to judge people in the present. It is important to remember what Homer counts as goodness is not the sort of thing that we might most readily think of as such. (T. Irwin, Classical Thought, pp. 7-8)2. For example, the fact that Agamemnon, Achilles, and just about every other male character from the Iliad treat women like situation should not come into play when deciding the level of their greatness. Although such an attitude towards women is despicable today, it was accepted in their time and therefore must be overlooked. So, the characteristics that must be examined are, in no particular order, defending and honoring your comrades, respecting the unwritten rules of Homeric battle, and pure strength on the battlefield. Achilles earns the title greatest of the Achaeans by gathering points in all of these categories. When Patrocl us, Achilles best friend and comrade, is slain by Hector in Book XVI, Achilles vows, I shall not bury you Patroclus, no, not till I drag back here / the gear and head of Hector, who slaughtered you (Homer, The Iliad, 18.

Swift Achilles :: Essays Papers

Swift Achilles There was once a period of great warriors, heroes that fought for their honor and the honor of their people. This was the time of Homers Iliad when the great armies of the Achaeans charged Ilium, the Trojan Citadel. Although this ten-year epic battle, c entirelyed the Trojan War, was supposedly fought over Helen, the face that launched a thousand ships1, the true heart of the Iliad is the word picture of the Homeric hero. These men possessed seemingly superhuman strength and courage, they fought and risked their lives for their people and their comrades in arms, and many of them were descendants of the gods themselves. Among the Achaeans, there emerged one man above wholly others in greatness. The son of the goddess Thetis, it was swift Achilles who defeated Hector, the mighty Trojan prince. When trying to classify a man as a Homeric hero or to decide which from a group is the greatest hero, there are certain characteristics that must be evaluated. In this process, it is also imperative to remove from consideration the ideals and characteristics that are used to judge people in the present. It is important to remember what Homer counts as goodness is not the sort of thing that we might most quickly think of as such. (T. Irwin, Classical Thought, pp. 7-8)2. For example, the fact that Agamemnon, Achilles, and just about every other male character from the Iliad treat women like property should not fill out into play when deciding the level of their greatness. Although such an attitude towards women is despicable today, it was accepted in their time and therefore must be overlooked. So, the characteristics that must be examined are, in no particular order, defending and honoring your comrades, respecting the unwritten rules of Homeric battle, and pure strength on the battlefield. Achilles earns the title greatest of the Achaeans by gathering points in all of these categories. When Patroclus, Achille s best friend and comrade, is slain by Hector in Book XVI, Achilles vows, I shall not bury you Patroclus, no, not till I drag natural covering here / the gear and head of Hector, who slaughtered you (Homer, The Iliad, 18.

Monday, May 27, 2019

Dos Attack & Mitigation

D disk operating system Attack and its Mitigation Simulation in GNS3 Summary A private local bea interlocking network comprising of hundreds of end devices and several waiters in DMZ is protected by Cisco ASA (Firewall). In the internet the most commonly found network assail is to take down enterprise reextractions by D res publica(Distributed Denial of Service) advance either on Servers(which leave behind impact hundreds of end users) or on the network resources equivalent routers itself.In this practical seeming we will analyse how a res publica attack happens on mesh server placed in DMZ from the internet via traffic cloudbursting, and how we can fine tune ASA to mitigate and stop further attacks on the network. Devices use a) b) c) d) e) Attacker PC Windows XP Service Pack3 Web server (Simulated in GNS3) ASA meter reading 8. 4 (Simulated in GNS3) Cisco Router 3750 (Simulated in GNS3) Ethernet Switch (Simulated in GNS3) Software used a) Wireshark ( recitation 1. 6. 8) b) GNS3 (Version 0. 8. 3. 1) c) Net tools (Version 5. 0. ) look 1 Install Windows XP (SP3) on a virtual(prenominal) tool, (in this case we arrive at used Oracles virtual box). This stones throw is to make sure that the system may not get infected with the virus which comes packed with hacking and network monitoring tools. Furthermore, as we are using a virtual operating system, we will be sure that, our true working pc may not be affected with our experiments. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 foliate 1 Image 1 The Oracle virtual box manager showing windows XP(SP3) Step 2 Install GNS3 (Graphical lucre Simulator) at heart the virtual XP.Image 2 Image of GNS3 installed and streak on virtual XP In the above image, the circle shows the virtual network public conveniences, i. e. routers, switches, bridges, firewall and IPS/IDS are available for simulation using GNS3. In most cases GNS3 comes with Putty, Wireshark bundle d. In case if GNS3 doesnt have Wireshark, we have to install Wireshark on the virtual XP machine too. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 rascal 2 Image 3 This image represents the Wireshark software, installed and running on virtual XP.Step 3 Install Net Tools (Network monitoring & Hacking Tool) in the same virtual XP machine. This tool can be used to monitor Network activities and can be used as a potential hacking tool. In this simulation we will use this tool to flood the server with icmp packets, which will lead to a DOS attack on the server. Image 4 This represents the Net Tools, which is installed and running on Virtual XP. Step 4 Now, we will setup the devices required to simulate a DOS attack, in the GNS3 software. a) Setup a Microsoft loopback adaptor in Windows XP and assign a public IP address to this.This virtual XP will act as the attacker PC from the internet. b) To create a loopback adapter, the first step is to go t o command prompt and type the command hdwwiz. exe, this is the shortest way to add a brand-new hardware. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 3 c) Now the Add new hardware wizard will come up and consume the second option which says, Install the hardware manually, as shown in the above image. d) On the next screen, please select Network Adapters, from the hardware list, as shown in the above image. ttps//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 4 e) On the next screen, please select Microsoft from the vendor list and Microsoft Loopback Adapter from the Network adapter list as shown in the above image. f) Now Microsoft loopback adapter is added to windows XP, and this can be viewed under Network Connections in Control panel, as seen in the below image. g) Next step is to configure an ip address to this loopback adapter, so that this adapter can be machine-accessible to one of the routers i n the simulated internet cloud in GNS3.At this point we have to make sure that the Loopback adapters ip address should be something in the public IP range and the interface of the router which is pointing towards the internet should be in the same, public IP range. h) Let us configure the loopback adapters ip address as 20. 1. 1. 100/24, and set the default portal as 20. 1. 1. 1 as shown in the below image. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 5 i) The above configuration means that the virtual XP can also be access by the ip address 20. 1. 1. 100 and the default gateway i. . routers interface which is connecting to the switch has an ip address of 20. 1. 1. 1. j) In the next step, we are going to create a topology, through which we can simulate the DOS attack, after we create the topology, we have to connect our virtual XP to the topology, which actually represents the internet cloud, a server placed in the DMZ of a corporate (in actual configuration it is placed in Inside zone) and the attacker PC in the internet (i. e. the virtual XP). Between the internet(outside) and the Corporate LAN, we have placed an ASA(Adaptive guarantor Appliance) version 8. , which is has all the functionalities of a firewall and features like NAT, Routing, VPN, AAA services etc. hence it is called UTM(Unified Threat Management) device. The topology which we are going to use for the DOS simulation is in the below image. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 6 Configuration a) Web Server IP address 10. 1. 1. 100/24 Zone Inside Device Router c7200 used as a web server. Running configuration of this device version 12. 2 interface FastEthernet0/0 ip address 10. 1. 1. 100 255. 255. 255. speed motorcar duplex car ip http server no ip http secure-server ip route 0. 0. 0. 0 0. 0. 0. 0 10. 1. 1. 1 b) Firewall IP address https//www. elance. com/s/feroz_sm/ https//www. odesk. com/user s/013128626566145b05 Page 7 Inside zone interface 10. 1. 1. 1 (which acts as gateway for LAN users) Outside zone interface 1. 1. 1. 1 Access-lists Configuration before DOS security on firewall ASA Version 8. 4(2) hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI. 2KYOU encrypted names interface GigabitEthernet0 nameif outside security-level 0 ip address 1. 1. . 1 255. 255. 255. 0 interface GigabitEthernet1 nameif inside security-level 100 ip address 10. 1. 1. 1 255. 255. 255. 0 access-list out-in extended permit icmp any any access-group out-in in interface outside route outside 0. 0. 0. 0 0. 0. 0. 0 1. 1. 1. 2 1 c) Gateway router for attacker PC Ip address Interface towards firewall 1. 1. 1. 2/24 Interface towards attacker PC 20. 1. 1. 1/24 Configuration https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 8 interface FastEthernet0/0 ip address 1. 1. 1. 2 255. 255. 255. 0 duplex auto speed auto nterface Fast Ethernet0/1 ip address 20. 1. 1. 1 255. 255. 255. 0 duplex auto speed auto ip forward-protocol nd ip route 10. 1. 1. 0 255. 255. 255. 0 1. 1. 1. 1 no ip http server no ip http secure-server Attacker PC Ip address 20. 1. 1. 100/24 Operating system Windows XP SP3 jam Internet Connectivity Tests Now that we have all the devices setup and connected, we should test whether the attacker PC can actually reach the web server, after all if in that location is no reachability, the DOS attack is not possible. We can find this using a simple and trace route test, as shown in the below images. https//www. lance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 9 https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 10 By the above images, we can find that, the attacker pc has access network reachability to the webserver from the internet. Launch of the attack on webserver using Net tools In our simulation task we use Net tools 5, whic h is a network monitoring tool and a hacking tool as well. In the first step, we will check whether the Net tools is able to hit the webserver, by going into network tools - impinge on option, as shown in the below image. ttps//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 11 We can verify that the software is able to send successful ICMP packets to the web server. This is possible, as we have opened an access control list (ACL) in the firewall which allows any ICMP packets from the internet to the LAN or DMZ. We will analyse what is happening during the Ping, at the packet level using Wireshark. As we can see, four-spot ICMP packets have been sent from the source 20. 1. 1. 100 to destination 10. 1. 1. 100(web server) and the ping is successful.We can also observe that all the 4 packets we sent and received from the internet to the web server in 2 seconds. In the next step we are actually going to deliver the DOS attack on the server, without e nabling DOS security on the firewall. To create the DOS attack, first we need to go to Network tools and Http flooder (DOS) in the NetTools, as shown in the below image. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 12 In our case we need to give 10. 1. 1. 100 as the Ip to flood instead of 127. 0. 0. 1.As soon as we hit the start button, the web server is under DOS attack as seen in the below wireshark analysis. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 13 As we can observe that hundreds of syn packets from the source 20. 1. 1. 100 are flooded to destination 10. 1. 1. 100 in less than one second. The below image from Ciscos website, clearly elaborates, what happens in a typical syn flood attack, which represents the above Wireshark capture. The description of each packet says it is a SYN packet, that means it is a half(a) open familiarity, without the TCP 3 way handshake.With these SYN packet s, a certain heart and soul of buffer is allocated for each SYN packet and in less than a minute all the server resources are allocated to these half open companionships and the servers failed to respond to genuine queries, stating that it us under Denial Of Service (DOS) attack. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 14 Mitigation techniques As we have already discussed, a Cisco ASA firewall can be in truth helpful in mitigating and stopping DOS attacks on LAN or DMZ servers. The above image from Ciscos website, describes how ASA firewall stop syn flood attacks can.In this answer we will limit the number of embryonic or half open connections a lymph node can have. If the embryonic connection limit is reached, then the security public toilet responds to every SYN packet sent to the server with a SYN+ACK, and does not pass the SYN packet to the internal server. If the external device responds with an ACK packet, then the security appliance knows it is a valid request (and not part of a potential SYN attack). The security appliance then establishes a connection with the server and joins the connections together.If the security appliance does not get an ACK back from the server, it aggressively times out that embryonic connection. In this scenario we have used Modular Policy Frame work, which limits number of half open connections to the server and thus stops DOS attack. We have used the below configuration in the Firewall to stop half open connections, which will have a maximum of 100 open connections, a maximum of 200 embryonic connections, and a maximum of 10 embryonic connections from a particular client (identified by an IP address).Furthermore we have set connection timeout timer for a normal connection as 2 hours, timeout for embryonic connections as 45 seconds and 25 minutes for a half closed connection. Firewall(config)class-map tcp_syn Firewall(config-cmap)match port tcp eq 80 Firewall(config-cmap)e xit Firewall(config)policy-map tcpmap https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 15Firewall(config-pmap)class tcp_syn Firewall(config-pmap-c)set connection conn-max 100 Firewall(config-pmap-c)set connection embryonic-conn-max 200 Firewall(config-pmap-c)set connection per-client-embryonic-max 10 Firewall(config-pmap-c)set connection per-client-max 5 Firewall(config-pmap-c)set connection random-sequence-number enable Firewall(config-pmap-c)set connection timeout embryonic 0045 Firewall(config-pmap-c)set connection timeout half-closed 0250 Firewall(config-pmap-c)set connection timeout tcp 200 Firewall(config-pmap-c)exit Firewall(config-pmap)exit Firewall(config)service-policy tcpmap global Now we will run a DOS attack on the server after the security is enabled and check what will be Wireshark output. The below image shows that the attacker PC is still able to ping the web server, after we have enabled DOS security, but it is able to ping b ecause, this is a normal ping. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 16 The above image represents the wireshark capture surrounded by the Internet router and the firewall, which clearly shows that syn flood attack is happening from source 20. 1. 1. 100 to destination 10. 1. 1. 100, and we can see hundreds of packets flooding 10. 1. 1. 100 in less than a second.At the same time the above image shows the wireshark capture between the firewall and web server, which clearly explains that all the syn-flood packets have been dropped by the firewall as soon as they reach it. At the same time we can obser ve normal ping packets which came from the attacker pc which have been passed by the firewall. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 17 Inference The above simulation experiment shows that the firewall before the corporate network has halt one of the most common attacks over servers, i. e. the DOS attack, using Modular Policy Frame work, which can be used to define intersting traffic and the actions to be taken on that traffic. https//www. elance. com/s/feroz_sm/ https//www. odesk. com/users/013128626566145b05 Page 18

Sunday, May 26, 2019

Cafr Instructions

ACC 4043/6043 Governmental Accounting CAFR CASES Instructions Obtain a copy of a recent worldwide yearbook Financial Report (CAFR). You ar to answer the attached top dogs for CAFRs 1 to 5. You do not flummox to do the new(prenominal) ones. In responding to the questions, recognize that yes and no answers argon generally not sufficient. I am allocating signifi ceaset points to these cases, and I want your answers to indicate that you have read and under(a)stood the in setion presented in your CAFR.For example, in question (d) in Chapter 1, dont just say yes the CARF does contain an organizational chart, a table of contents, a add up of principal officials, and so on, but heed them and be descriptive of what you examine. If you run into terms that you are not familiar with, check the index at the back of the book to find where it is discussed, or you can ask me. I am available to help if you have questions or run into difficulties. CAFR 1 Obtain a copy of a recent Comprehens ive Annual Financial Report.If I dont have sufficient numbers for everyone, these may be obtained by writing or calling the conductor of finance in a city or state of your choice. You will have questions related to the annual pass over dealing with a number of the chapters in the schoolbookbook. Answer the following questions related to your CAFR. a. What are the inclusive dates of the fiscal year? b. Write the name and address of the independent auditor. Is the auditors opinion unconditional If not, describe the qualification.Is the opinion limited to the basic pecuniary statements, or does the opinion include trust and individual stock statements? c. Is the report straighten disclosed into the leash evident sections introductory, fiscal, and statistical? Does the report have a single audit section at the end? (A few CAFRs include their single audit report in the CAFRsee Chapter 13 for more detail of the single audit requirements. ) d. Does the report contain an organizat ion chart? A table of contents?A itemisation of principal officials? A letter of transmittal? Is the letter of transmittal dated and signed by the chief financial officer? contention the major items of discourse in the letter of transmittal. e. Does the report include a Managements Discussion and Analysis? List the major items of watchword. f. Does the report include the government-wide statements ( direction of Net Assets and didactics of Activities)? g. Does the report reflect fund financial statements for political, proprietary, and fiduciary bills?List those statements. List the major governmental and proprietary money (the notes that have get around columns in the governmental and proprietary fund statements. ) CAFR 2 Using your CARF, answer the following questions a. Compare the items discussed in the MD&A in your CAFR with the nominate of items in this chapter. Which topics makeed in this chapter are not in your CAFR? Which topics are in CAFR that are not listed i n this chapter? Do you think your CAFR has a reasonably complete discussion? b.From the MD&A in your report, write a short summary of (1) the financial condition of your government, (2) a comparison of revenues equated with the forward year, (3) a comparison of expenses compared with the prior year, and (4) a comparison of budgeted and actual activity. c. From the command of Net Assets, write down the following (1) unrestricted unclutter assetsgovernmental activities (2) unrestricted exculpate assetsbusiness-type activities (3)restricted net assets by restrictiongovernmental activities (4) restricted net assets by restrictionbusiness-type activities and (5) unrestricted and restricted net assetscomponent units. . From the Statement of Activities, write down the following (1) net program expense (or revenue)governmental activities (2) net program expense (or revenue)business-type activities (3) net program expense (or revenue)component units (4) salmagundi in net assetsgovernme ntal activities (5) change in net assetsbusiness-type activities and (6) change in net assetscomponents units. Do the ending net asset figures in this statement agree with the net asset figures in the Statement of Net Assets? e.From the Statement of Revenues, Expenditures, and Changes in Fun Balances for Governmental stores, identify the names of the major governmental specie. CAFR 3 A. ) appearance at the Statement of Revenues, Expenditures, and Changes in Fund Balances for the governmental funds. List the revenue source classes. Do they agree with those sources discussed in this chapter? be expenditures account by character? List the functional classifications under the current character classification. Do those classifications agree with those listed in the example shown in this chapter? atomic number 18 Other Financing Sources and Uses presented separately?Does your report show transfers in? Transfers out? chief city leases? Proceeds of bonds? B. ) nip at the Budgetary C omparison Schedule in the RSI section of your annual Report (or Budgetary Comparison Statement, if that is used by your government) for the normal Fund. Is the budgetary initialize used, or is the schedule in the format used for the Statement of Revenues, Expenditures, and Changes in Fund Balances? Does the report reflect the original budget, revise budget, and actual figures? Are variance columns presented comparing the actual with the revised budget? Comparing the original with the revised budget?Is a balancing between the budgetary basis of accounting and GAAP presented on the budgetary comparison schedule or in a separate schedule? What are the major differences, if whatsoever? Are budgetary comparison schedules (or statements) presented for special revenue funds? Are all special revenue funds include? C. ) Look at the grade that describes the basis of budgeting (usually in the Summary of Significant Accounting Policies). Is the budget prepared on the GAAP basis or some for mer(a) basis? Are the differences, if any between the budgetary basis and GAAP clearly explained?Do unexpected encumbrances lapse at year-end? If unexpected lapse, are they normally expropriated in the following year? Do the accounts describe the budget calendar (a separate note may have this development)? Do the notes describe the legal level of budgetary control and the levels at which certain budget revisions might be make? Were budget revisions necessary during the year? CAFR 4 A. ) Look at the General Fund column of the Balance Sheet for governmental funds. What are the major assets? Liabilities? What reserves have been established for fund balance? Are any designations shown?Are taxes receivable offset by Deferred Revenues? Are the amounts the same? (If so, this would indicate cash accounting for property taxes. ) B. ) Look at the General Fund column of the governmental funds Statement of Revenues, Expenditures, and Changes in Fund Balances. Prepare a schedule showing percen tages of revenues by source. Prepare a schedule showing percentages of expenditures by function. Does your government have significant transfers in or out? spate you identify the fund that provide or receives these resources? Does your government have any other financing sources or uses?Special and/or extraordinary items? C. ) Does your government report any special revenue funds as major funds in the governmental fund statements? What are they? What are the major revenue sources? Expenditure functions? D. ) Review the notes to the financial statements to determine the measurement focus and basis of accounting used to prepare the governmental fund financial statement. Do the notes describe modified accrual accounting in a manner consistent with this book? Which revenue sources are suit to accrual? Are expenditures generally recognized when goods and services are received?Which specific modifications to accrual accounting are mentioned in the notes? E. ) Look at the General Fund co lumn of the governmental fund statements from the point of view of a financial analyst. Is the Fund Balance as the balance sheet dater larger or smaller than at the beginning of the year? Are reasons for the change apparent from the statements? Compute a ratio of fund balance/general fund revenues and compare it with your class members. CAFR 5 A. ) Look at the governmental fund financial statements. Are any major keen projects funds included? If so, list them.Attempt to find out the nature and purpose of the projects from the letter of transmittal, the notes, or MD&A. What are major sources of funding, such as bond sales, intergovernmental grants, and transfers from other funds? Were the projects perfect during the year? B. ) Again looking at the governmental fund financial statements, are any major debt service funds included? If so list them. What are the sources of funding for these debt service payments? C. ) Does your report include supplemental information including combinin g statements for nonmajor funds? If so, are any capital projects and debt service funds included?If so, list them. Indicate the major revenue and other financing source categories for these funds. D. ) Look at the governmental fund Statement of Revenues, Expenditures, and Changes in Fund Balances, specifically the expenditure classification. Compute a ratio of capital outlay/total expenditures. Again compute a ratio of debt service/total expenditures. Compare those with your classmates ratios. explanation on the possible meaning of these ratios. E. ) Look at the notes to the financial statements, specifically the note (in the summary of significant accounting policies) regarding the definition of modified accrual accounting.Does the note specifically indicate that modified accrual accounting is used for capital projects and debt service funds? Does the note indicate that debt serve payments, both principal and interest, are recorded as an expenditure when due? F. ) Does your govern ment report capital lease payable in the government-wide Statement of Net Assets? If so, can you determine if tender capital leases were initiated during the year? Can you trace the payments related to capital leases? G. ) Does your government report everlasting funds, either major or nonmajor? If so, list them.What are the amounts of the permanent resources available for governmental purposes? What is/are the governmental purpose(s)? CAFR 6 A. ) Find the Statement of Net Assets for the proprietary funds. Is the Net Asset or the Balance Sheet format used? List the major enterprise funds from that statement. Is the statement classified between current and noncurrent assets and liabilities? Are net assets broken down into the three classifications shown in your text? Is a separate column shown for internal service funds? B. ) Find the Statement of Revenues, Expenses, and Changes in Net Assets for the proprietary funds.Is the all-inclusive format used? Are revenues reported by source ? Are expenses (not expenditures reported by function or by object classification? Is depreciation reported separately? Is operating income, or a similar title, displayed? Are nonoperating revenues and expenses shown separately after operating income? Are capital contributions, extraordinary and special items, and transfers shown separately? List any extraordinary and special items. C. ) Find the Statement of Cash Flows for the proprietary funds. List the four categories of cash flows. Are they the same as shown in the text?Are interest receipts reported as cash flows from investing activities? Are interest payments shown as financing activities? Is the direct method used? Is a expiation shown from operating income to net cash provided by operations? Are capital assets acquired from financing activities shown as decreases in cash flows from financing activities? Does the ending cash balance agree with the cash balance shown in the Statement of Net Assets (note that restricted asset s may be included)? D. ) If your government has a CAFR, look to any combining statements and list the nonmajor enterprise funds.List the internal service funds. E. ) Look at the financial statements from the point of view of a financial analyst. Write down the unrestricted net assets balances for each of the major enterprise funds, and (if you have a CAFR) the nonmajor enterprise funds and internal service funds. Look at the long-term debt of major enterprise funds. Can you tell from the statements or the notes whether the debt is general obligation or revenue in nature? Write down transfers for each of the funds. Compare these numbers with prior years, if the information is provided in your financial statements.Look at the transfers. Can you tell if the general government is subsidizing or is a subsidized by enterprise funds? CAFR 7 A. ) Look at the Statement of Fiduciary Net Assets. Which fund types are included? Is the Statement prepared in a format in which Assets Liabilities = Net Assets? Are net assets shown as being held in trust for employee benefits and other purposes? Look at the Statement of Changes in Fiduciary Net Assets. Has the government refrained from including agency funds in that statement? Are increases and decreases shown as additions and deductions, rather than revenues and expenses?What are the main additions? What are the main deductions? B. ) Are agency funds included in the Statement of Fiduciary Net Assets? If so, look to the notes or combining schedules and list the individual agency funds. Has the government limited itself to agency funds that are held for individuals, organizations, or other governmentsnot for other government funds? Do agency funds report only assets and liabilities, not net assets? Does the government report a Statement or Schedule of Changes in Assets and Liabilities for agency funds? C. ) Does the government have private-purpose funds?If so, list them. Describe the purposes for which they exist. Can you tell if any of those funds are endowments, and have resources permanently restricted? How much income was generated by each of the private purpose funds, and how much was released for use? Does the government report escheat property as private-purpose funds? Is so, indicate the nature of the process by which property is released and for what purpose. D. ) Does the government report investment trust funds? If so, describe the nature of the external investment pool. Which other governments are included?Has your government refrained from including its own investments in the investment trust funds? E. ) List the pension funds included in the financial statements. From the notes, list the other pension plans that are available to employees of your governmental unit. Are those plans agent plans or cost-sharing plans? Defined contributions or defined benefit? Are required disclosures made in the notes for all pension plans, whether or not the plans are included as trust funds? Are the two RSI S chedules included in your report (when defined benefit plans are reported)?Look at the actuarial status of the plans and comment about the potential impact of pensions on the financial condition of the government. F. ) Look at the note disclosures regarding investments. Are investments reported at fair value? Do the notes disclose the realized gains or losses on investments? Do the notes categorise investments based on risk? When the government created internal investment pools for management purposes, does the government report the individual investments and income from those investments in the funds that provided the resources?CAFR 8 A. ) Find the reconciliation between the governmental fund balances and the governmental-type activities net assets. This might be on the governmental fund Balance Sheet or in a separate schedule in the basic financial statements. List the major differences. What is the amount shown for capital assets? How much is due to the incorporation of internal service funds? Was an leeway made for deferred property taxes or any other revenue? What is the adjustment due to the inclusion of long-term liabilities? What other adjustments are made?B. ) Find the reconciliation between the governmental fund changes in fund balances and the governmental-type activities changes in net assets. This might be on the governmental Statement of Revenues, Expenditures, and Changes in Fund Balances or in a separate schedule. List the major differences. How much is due to the difference between depreciation reported on the Statement of Activities and the reported expenditures for capital outlays on the Statement of Revenues, Expenditures, and Changes in Fund Balances?How much is due to differences in reporting expenditures versus expenses for debt service? How much is due to the incorporation of internal service funds? How much is due to differences in reporting proceeds versus gains on sale of capital assets? How much is due to excess revenue accruals? How much is due to additional expense accruals? What other items are listed? C. ) Look at the Statement of Net Assets, especially the net asset section. Attempt to prove the Net Assets Invested in Capital Assets, Net of Related Debt figure from the information in the statement or the notes.List the individual items of net assets that are restricted this might require examination of the notes to the financial statements. D. ) Look at the Statement of Activities. List the net exenses (revenues) for governmental activities, business-type activities, and component units. List the change in net assets for governmental activities, business-type activities, and component units. Attempt to find from the notes the component units that are discretely presented. E. ) Look throughout the annual report for disclosures related to capital assets.This would include the notes to the financial statements, any schedules, and information in the MD&A. iterate what is included. What depreciation method is used? Are lives of major classes of capital assets disclosed? F. ) Look throughout the annual report for disclosures related to long-term debt. This would include the notes to the financial statements, any schedules in the financial and statistical sections, and the MD&A. Summarize what is included. Are the schedules listed in this chapter included? What is the debt limit and margin? What is the direct debt per capita? The direct and overlapping debt per capita?

Saturday, May 25, 2019

Common Inventory System Problems & Solution Essay

SymptomsPreoccupation with the hope within the execution time frame. Typic completelyy, companies begin altering their forecast management processes when addressing supply chain performance. notwithstanding this is unwise without understanding the nature of your demand and the root ca go fors of forecast errors. When forecast accuracy is overemphasized, fill rates and store turns dont improve, even when forecast accuracy does. zero(prenominal)mea surely of customer service or inventory turns. Customers must be satisfied on an on termination basis for a smart set to achieve long-term sustainability.Yet, inventory managers often pick out no idea how well customers needs ar being met. Similarly, without liveing how dissolutely inventory moves through and through the value-creation-and-delivery system, a company wont be able to manage inventory levels. Daily planning is based on a back lodge report. This is an entirely reactive model. Todays fast-paced marketplace requires proa ctive inventory planning to meet current demand. Customers will switch to a contender if their needs are consistently unmet in the time frame they dictate.SolutionsMandatory tracking of fill rate and inventory turns for all product lines. Product managers should know these measures at all times. Fill rate should be measured daily, while inventory-turn measures will vary based on sales and production cycles. The important affaire is that managers are both tracking and working to improve these rates. Develop realistic forecast-error measures. Developing realistic measures for how much forecast error you can tolerate without a SKU stock-out is essential. Typically, companies estimate plus or minus 10 for this measure, which equals about two days expense of inventory-a miniscule amount considering that companies often have weeks or months worth of inventory. Effective forecast management and inventory planning require accurate data, so accurate forecast error measures are a must.Mist ake No. 2 Having unqualified employees manage inventory SymptomsA sentiment that our business is different beca employ (fill in the blank). Every company has inventory planning challenges, such as variable demand. No business is so different that it would not benefit from strategicinventory management. Decentralized inventory management. If warehouse managers, office clerks, and other employees without particularized inventory-management training are making inventory-management decisions, then it is certain that wasteful inventory is piling up throughout the system.Usually, this model reflects a company with no mop up goals or strategy for inventory planning. Lack of formal training program or professional peer interaction. Inventory management is a professional scientific discipline that requires upfront and ongoing education. Emphasizing buying over planning. Buyers make purchases, but planners make strategic decisions to meet goals. Thinking of inventory planning from a stric tly buying point of view means opportunities for improvement and financial benefits will be overlookeddaily. SolutionsRecognize that inventory management requires professional job skills, and contract and train accordingly. Just as a company with hundreds of thousands of free dollars on its balance sheet would hire professional investment advisers, a company with hundreds of thousands of dollars in inventory should have professional inventory managers. Assign accountability for inventory management. Often, companies cant answer the question, Who is in charge of making sure inventory levels support strategic goals? If no one is, then these inventory planning goals will never be met.TOP 5 SOLUTIONS1. Use reorder points on inventory items to keep purchasing streamlined and inventory manageable. Reorder points (otherwise known as min. and max. levels) are the best method for making sure you have the secure amount of inventory in your warehouse at all times. If you have too little inve ntory you could lose out on sales, but if you have too much your cash is tied up in inventory that will not be sold. One of the biggest problems many companies have is managing their cash. A quick way to solve that from an inventory standpoint is by making sure you have set the appropriate reorder points for your business. 2. Spend money on narrow down training for mission-critical software. Companies with a lot of inventory spend thousands of dollars on software they need in order to manage and track their items asthey move all over the world. This software manages millions of dollars worth of assets. After spending so much money on software, some companies dont want to spend a few thousand dollars extra to buy the specialized training they need to implement the software.This is a big mistake because this software wont do you any good if you dont spend a little bit more to learn how to use it. If you try to learn your software on your own you may suffer for months before you learn the basics of how it works. 3. Rearrange the warehouse to set up for picking efficiencies. Sometimes trainers see mistakes that are so obvious you would call in theyd be corrected immediately, but warehouse managers may be too distracted to notice them. We often see 100,000-square-foot warehouses that are organized inefficiently. These companies could save themselves large sums of money by making a few changes to where they place their inventory. The items that you sell the nigh or send out the most should be right next to the shipping dock. This keeps your employees from having to walk all the way across the warehouse to pick them up every time you are going to send them out. As companies grow, sometimes they just randomly put things where there is space.This works for a little while, but as you grow you need to think about efficiency because the minutes that your employees spend driving around the forklift cost you money. 4. Take time to get to know your technology so that you can use all the functionality. Rarely will a company use all of the functionality their software provides. Most of the time there is more that the software can do for you that you havent explored. Software companies always hear from their customers about which features they want added to the software when a lot of the time the features are already there. The more features that you use in the software the more effective you can be in managing your inventory. You should either assign someone within the company to learn the software functionality or pay someone to come in and teach it to you.5. Stop doing yearly physical inventories and move to a more regular, smaller cycle counting and conciliate routine. Businesses used to shut down for a day to a week each year to go into their warehouse and physically count everything to make sure that it matched the information in their software. This practice is mostly outdated because of the amount of time and money it takes. Doing these checks in smaller, more regular cycles keeps a company from having to shut down. We recommend picking one section each day to checkyour product levels against the information from your inventory software.

Thursday, May 23, 2019

Automobile and South Africa Essay

1.) Cultural differences have a great effect on how Renault-Nissan operates in South Africa. South Africa is known for its ethnic and cultural diversity. Therefore, in my flavour they would need managers that know the country and how its people do business. Though some of South Africa is a lot like Western Europe, there are 8 different languages spoke in South Africa, so having a person from Rosslyn managing the plant would be beneficial.South Africa has been referred to as the rainbow nation, I believe that in enunciate for Renault-Nissan to be successful they will have to do their homework and find a person that knows the countrys customs and traditions to lead them into an emerging merchandise in South Africa.2.) Culture is a huge factor in Auto sales. For example, in Europe gas is roughly $8.00 a gallon, if Ford took their F-250 (which gets around 12mpg) into the European market it would fail miserably. It is not because the Ford F-250 is not a quality truck, it is because t his truck does not fit into what is now part of the European culture. similarly Europeans do not have the same tastes in cars that Americans do so, car companies do research to find out what Europeans look for when they are buying a car. This is how culture affects the auto industry.3.) I do not believe that it is possible for a car company to transcend national culture and produce a global automobile that is accepted by people in every culture. Though car companies can get away for making a regional automobile for a specific region of the world, there are too many cultural differences that that affect each market to make a cosmopolitan vehicle. Like I said before Europeans have different tastes in automobiles than Americans, Africans, Chinese, Japanese, Indians, and the rest of the world.

Wednesday, May 22, 2019

English – Courage

It might be said fortitude No one is born with resolution, and rather born with the probable to be undaunted. Courage is non always an act of great bravery, but cigarette also be expressed in the most average solar day to day actions. But when death is staring into your eyes, only a handful of people can persevere through the hardships and challenges using the courage in their hearts. Courage is creation scared to death and saddling up anyway.Many composers portray courage in the presence of death, danger and fear and show that to be able to go beyond the boundaries of death, danger and fear one must show the courage to stare into the eyes of death itself. Roberto Benigni in his film Life is Beautiful (1997), Sir Alfred Lord Tennyson in his metrical composition Charge of the Light Brigade (1854) and Andrew Stantons Finding Nemo (2003) all contain characters who display tremendous amount of courage and be able to stand up against life risking powers.In these texts, compose rs let implemented techniques to show that courage is fume by the pure toneings of determination, distinguish and to save a life. To be able to act upon a life risking stains one must show determination. Roberto Benignis film, Life is Beautiful is jam-packed with characters that show naturally courageous characteristics who are ambitious and make a genuine attempt to maintain them. The character Dora displays the feelings of determination as she attempts to unite with her family, as her son, husband and uncle are forced on a train which is transferring them to a concentration camp.Dora understanding that this train will lead to inevitable danger is the courage that was displayed. Dora asks the officer courteously to get on the train, when she is rejected her tone and facial expressions suddenly change into a more serious enounce when she demands, I want to get on that train. Did you hear me? I want to get on that train It is evident through this speech that Dora is determine d to reside with her family, because she moots her family is undoubtedly worth risking her life for.In addition to the speech, Doras outfit is bright red and symbolises her ambition, complete and determination. Her beautiful red coat juxtaposes with the situation and environment, as her clothing portrays courage and on the contrary the smoke filled sky and the gloomy colours of the soldiers portray the tragedy the train is headed towards. This scene clearly shows Doras determination, displaying her courage to act upon a situation leading to unknown dangers. As well as Benigni, Alfred Lord Tennyson also shows the need of determination when being courageous.Tennysons poem is about soldiers fighting for what they believe in, knowing death can be just around the corner. Similar to Dora, the Light Brigade soldiers must show determination in order to follow through and reach their goals. The repetition of Into the valley of death, Rode the six hundred symbolises a point of no return, where death is imminent. It also emphasises on the immense need for determination for them to recruit into a fearsome clash of s haggle. Volleyd and thunderd, the onomatopoeia instills a strong sense of fear into the soldiers and emphasises on the inescapable danger of the situation.The constant verbs and visual imagery allows the reader to feel and see the horrors of the battle allowing them to understand their determination. Both texts depict the necessity of determination to show courage specifically in a wartime period. It is the determination shown by Dora and the soldiers which allows their audiences to actually see the courage displayed when faced against death, danger and fear. It might be said Determination is not the solitary factor to be courageous. It is also evident that love has a crucial effect on an individual to be courageous.The central figure in Life is Beautiful, Guido, shows an intense amount of courage and it is all through out of love for his son. When they are at the concentration camp Guido sacrifices many things in order to keep is son happy and nescient of the fact that the situation is ominous. In order to keep his son nescient, Guido, pretends to be a German translator, changing the rules about the camp to be about a game he made up for his son. The strong vulturous tone of the officer is antagonised by Guidos humour and the tense situation was also juxtaposed by the constant close down ups ofJoshuas cheerful and bright face. It is this scene were Guido has placed himself in an intense situation which displays the love and courage within him. The officers are shown holding weapons and speaking in an aggressive town but it is also the background knowledge of the situation which allows the audience to understand the immense danger that is present. It is this knowledge of immense danger that portrays Guidos courage fumed by love for his son to put himself in a situation where he is gambling with his life.Alfred Tennysons Charge of the Light Brigade does not only show determination, but also emphasises the love the soldiers hold towards their country. Theirs not to make reply, Theirs not to reason why, Their but to do and die, the repetition of Theirs shows the soldierss patriotism because it emphasises the soldiers do it without question, they completely trust their commanders terminology and will do whatever necessary to bring their country to victory. The love of the soldiers is what shines their courage. Cannon to the right/left/in front, uses visual imagery to show the think audience the unavoidable danger that is present, but the soldiers advance forward, marching with courage shining with love for their country. The love Guido and the soldiers have are similar because it is purely playacting on their own will, and consecutively for the sake of someone other than themselves. It is evident the soldiers have tremendous courage to charge into the jaws of Death and doing so by acting upon the words of their commander out of love for their country which they did not question, and only obeyed.The notion that determination and love are needed to be courageous are not the only factors in this concept. It is also evident the want to save a life plays a significant impact on an individual performing a courageous act. Guido, in the climax of the film, leaves the salvation of his room in order to search for his wife and to save her from the rotting camp. With the constant sounds of explosion and gunshots and with the contextual knowledge of the situation it allows the intended audience to view his courage and his will to save his wife.By only stepping out of the sleeping rooms, Guido had put himself in imminent danger and death can hit him at any time, but Guido courageously pushed forward in order to save his wifes life. Andrew Stantons Finding Nemo is about a fish father who courageously and desperately travels across the world in search for his son. Marlin and his companion Dory en counter numerous situations where they had placed themselves in a life threatening situation.In order to perplex where his son is kept captive Marlin must keep a dangerous, aggressive and hungry fish distracted while Dory reads a piece of compose that leads to Nemo. Marlin is in an extremely dangerous position where he has become the bait and from the contextual knowledge of the situation it is evident the courage displayed by Marlin is driven by the feelings of saving his son. The speed of the music and camera shots gradually increase to a higher pace, camera angles change accordingly allowing the intended audience to feel the doubt of the situation.Both composers Bengini and Stanton used the camera techniques, and sound to their advantage to create a suspenseful scene and to show how dangerous the situation is. Both protagonists put themselves in extreme danger in order to save a life. This evidently shows the courage driven by the ambition to save a life, even when faced by i mminent danger. It might be said The composers used different techniques and ideas to show the fundamentals of courage in their texts.Through their knowledge and perception of the world they all showed determination, love and saving a life, in different forms. It is evident that courage is being scared to death and still being able to continue, as there is postal code more feared than death itself. The characters and situations discussed in the different texts proved to show that determination, love and saving a life are all a necessity to being courageous against a life threatening situation and hopefully their intended message of courage is clearly depicted to all intended audiences. finished

Tuesday, May 21, 2019

Biology Virus Essay

Biology Virus Essay A virus is a microorganism that evictnot reproduce without a host. As a result of this, there has been a lot of controversy on whether or not a virus is a living or non-living organism. The dictionary. com definition for support is, the condition that distinguishes organisms from inorganic objects and dead organisms, being manifested by growth through metabolism, reproduction, and the power of adaptation to environment through changes originating internally. Viruses fox characteristics of both living and non-living organisms, for example, a living characteristic includes reproduction. A non-living characteristic of a virus is that they cannot have both DNA and RNA. The living characteristics of viruses state that viruses can reproduce, but viruses can yet reproduce with the help of a host. As a result of viruses not being able to replicate on their own, viruses argon not living organisms. Viruses be small infectious particles that have nucleic acid.They can c ome in many different shapes and sizes. Although viruses vary in shape the common virus has four important parts, the head, DNA or RNA, tail sheath, and tail fiber. The head of a virus is a protein shell that protects the DNA inside it also known as the genome. In comparison, viruses and living organisms both be made up of smaller units that take up to make something larger. The physical appearance of a virus and living organisms atomic number 18 different and what a virus is made up of is different in comparison to a living organism.Viruses are made up of proteins and nucleic acid. The protein comes together to form an encasing shell for the nucleic acid. The protein shell is called a capsid. The nucleic acid inside a capsid can either be DNA or RNA, but never both. Viruses can be classified depending on the features they have, for example the various shapes of a capsid can determine the type of virus. A capsid can be a simple or complex structure. The most complex capsid is fo und in bacteria called bacteriophages.A virus can also have a viral envelope which contains protein and lipids. Based on shape and structure viruses can infect bacteria, animals and plants. The way in which viruses can infect theses organisms is different. The viruses that infect bacteria are the most common. The life cycle of viruses that infect bacteria are put into two categories known as the lysogenic and lytic cycles. In the lytic cycle, the virus injects its DNA or RNA into the bacteria and makes the bacteria create all the different components that form an entire virus.These parts come together to create one-on-one viruses and as a result of this mass production of individual viruses, the cell bursts. Viruses that go through the lytic cycle are called virulent phages. Phages that go through the lysogenic cycle are known as temperate phages. In the lysogenic cycle the virus injects its DNA or RNA into the host in the same way as the lytic cycle does except the injected DNA or RNA sits and stays inside the host. As a result the virus doesnt create more individual viruses and the hosts cell doesnt burst.Although the nucleic acid sits and stays inside the genome, a reaction could occur and the virus could go from the lysogenic to the lytic cycle. In conclusion, viruses have characteristics of both living and non-living organisms. Like non-living organisms, viruses cant have both DNA and RNA. They can reproduce like living organisms but that is with the help of a host. Without the help of a host viruses cant perform the characteristics of a living organism. Due to the lack of living characteristics, this shows that viruses are not living organisms.

Machende

c)Is at that place curtilage for market bewrayures or disposal failures in the provision of public services, sexual morality goods and control of mistake goods in Sub-Saharan Africa? Discuss (30 marks) Market failure is a circumstance in which private markets do not bring about the allocation of resources that best satisfies societys wants. Government failures argon inefficiencies of the public celestial sphere. exoteric goods atomic number 18 goods that would not be provided in the free market system, because firms would not be adequately management for them.Merit goods be goods that ar deemed as necessary for outgo by the state and if left to the private welkin only, such(prenominal) goods would be beneath-consumed . De virtuousness goods are goods and services whose habit is considered unhealthy, degrading or otherwise socially undesirable repayable to the perceived disallow effects on the consumers. Such goods are deemed as excess for consumption by the state. Most of the countries in the Sub-Saharan Africa desire Zimbabwe, Zambia and South Africa are operating under a mixed economy. A free-market on its own posteriort best allocate resources in a best way that satisfies the society.Market failures would arise as the camouflaged hand on its own commodet provide adequately for the society. S d1 Qp a c d2 Costs and returnss Output External benefit Welfare loss because merit goods tend to be under consumed by the free market b Qs 0 Merit goods provide externalities that if left wholly to the private sector, it is likely that merit goods allow for be under consumed. In most Sub-Saharan African countries such as Zimbabwe, Namibia and Zambia, the private sector provides education at high costs which results in the under-consumption of the good.Most Governments often provide merit goods for free but when considering Sub-Saharan African countries, this has not been in practice, for instance, public schools in Burkina Faso have since been experiencing high charges of fees. This often results in welfare loss as illustrated by the diagram below Welfare loss caused by under-consumption of merit goods As shown by the diagram above, under-consumption of merit goods in Sub-Sahara Africa results in the loss of welfare of ABC. Moreover, merit goods are often provided by the state, thus, to growth consumption of merit goods, the state has to increase spend on such goods.This has been practically impossible for most Sub-Saharan African countries as they have no incentive for spending on merit goods. For instance, countries such as Somalia, Burundi and Uganda. In most Sub-Saharan African countries the invisible hand and the state have since failed to control the consumption of demerit goods. The consumption of demerit goodscan lead to cast out externalities which causes a fall in social welfare. The free-market often fails to control the consumption of demerit goods as it whitethorn fail to take into account the negative ext ernalities of consumption (social cost exceeds private cost).This whitethorn be overdue to imperfect information as information is a commodity that costs to obtain. For example, methods of conveying information to customers is sort of poor in Africa than in European countries. Furthermore, Governments may fail to control consumption of demerit goods due to a number of reasons. For example, the government may decide to intervene in the market for the regulation of demerit goods and impose taxes on producers or consumers. This often raises prices and may produce detrimental effects to the economy like inflation in the long-run.This may restrict government from taking such decisions . In South Africa, in that location has been a proposal for the ban of advertisement of alcoholic beverage but it has been a failure since many alcohol producing companies have been responsible for sponsoring most sporting activities. Costs and benefits Social cost External costs negative externalities P rivate costs Limited information full information D2 D1 0 Failure to regulate consumption of demerit goods results in welfare loss. This is illustrated below Output Q1 Q2 Q3 Welfare loss due to unregulated consumption of demeritsAs shown above, the social optimal level of consumption would be q3, an output that takes into account the information failure of consumers and likewise negative externalities. There are also some government failures in Sub-Saharan Africa. Governments are laurels subsidies to firms but this may protect inefficient firms from competition and create barriers to entry for new firms because prices are unplowed artificially low. Subsidies and other forms of assistance by the governments cause moral hazard. Most Sub-Saharan African countries are subsidizing firms that produce fertilizer as a way of achieving long term food securities.This causes barriers to new firms which cogency want to produce fertilizers, as they cant withstand the competition due to low o utput signal costs enjoyed by the existing firms. More so, there is assure of government failure caused by make seeking. Most Governments in the Sub-Saharan countries are in charge of controlling natural resources. This causes barriers to entry in industries that require the use of natural resources like minerals. The government will now be a monopoly in that industry and it may fail to allocate resources in the most socially desirable manner.Most Sub-Saharan countries are still developing they are bureaucratic which is very slow in decision making. This causes most governments to be inefficient as it takes time for firms and institutions to be given the permission to produce goods and services. Such goods and services talent be merit or public goods and services. For example, the decision to allow Econet in Zimbabwe was slow meaning that it would earlier take long for Zimbabwean citizens to enjoy the telecommunication services to be offered by Econet.In Zimbabwe there is unspo rting distribution of some merit goods like education, for instance, universities or tertiary education institutions. In Manicaland there are no state universities as compared to other regions such as Mashonaland, Masvingo, Midlands and Matebeleland. Examples of such universities in the favoured regions include University of Zimbabwe, Midlands States University and others. When it comes to the government provision of public services in countries like Zimbabwe, there is an unequal distribution of such services.For instance, politicians may use funds which should be assigned to produce public services to campaign. Therefore they may increase spending on public goods and services in some regions at the expense of other regions in a bid to gain political millage in such regions. However, the governments of Sub-Saharan African countries have not completely failed to provide public services, merit goods and control of demerit but have intervened in correcting market failures. almost Sub- Saharan African countries have been successful in banning the consumption and importation of cocain which is a harmful drug.They are also controlling the consumption of other drugs like marijuana . Some governments have also been improving on the provision of public services such as highway networks. For instance, roads in South Africa are better off. South Africa and Nigeria have also been subsidizing the production of merit goods like education. To solve failures such as under-consumption of merit goods such as education, the Governments of Sub-Saharan African countries can increase expenditure or spending on such services. For example, the construction of more educational institutions.In Zimbabwe, there is a current project that is running the construction of a university in Manicaland (to be named Manicaland State University). The resembling can also to public service expenditure by the Governments of these countries. Zimbabwe is currently undergoing the construction of a du ple carriage way from Mutare to Harare. This reflects an increase in expenditure on public services. Therefore, in conclusion, there is evidence of market failure as reflected by Government intervention. However, the governments of Sub-Saharan African countries may also fail as discussed above.

Monday, May 20, 2019

Taunted to Death and Bullied Girl Kills Herself †Compare and sontrast Essay

The two articles, Taunted to Death and Bul stayd Girl Kills Herself, some(prenominal) report the same incident, which happened on Sunday 28th September 1997. The incident involved a youthful girl called Kelly Yeoman who killed herself. Taunted to Death is the report from a tabloid newspaper, The passing(a) sensation, and Bullied Girl Kills Herself is from a broadsheet newspaper, The defender. Despite twain articles reporting the same story, there are numerous authoritative goings in layout, content and style. There is an enormous difference in the presentational features of the articles. The headline of the tabloid newspaper is bold and large.Compared to the article, the headline is twice the size. It is create verbally in a white font on a black background to draw the accepters attention to the paper the effect of this is that they are converse out, whereas the protector headline is small in comparison to the article although it is still in bold type. The headlines conje cture the styles of the newspapers they both contrive bold, plain lettering to create a heavy(p)er impact on the reader. The difference between the two headlines is that the everyday confidential information headline Taunted to Death is placing the blame on some unrivalled and the withstander headline Bullied Girl Kills Herself is mutual.The free-and-easy Star has a greater impact because tabloid newspapers are approached differently in order to sensationalise the story, here Taunted to Death is headline grabbing. The first two paragraphs of these articles summarise the contents of the article. The free-and-easy Star tabloid Taunted to Death uses an ample amount of emotive raillerys to make the reader read on, hate campaign, whereas the protector is straight forward, telling the reader facts. Such as, Kelly was bullied about her weight, her parents were unemployed and she had inform to the school that she was being bullied.Such facts arent in the Daily Star. They are desi gned to evoke sympathy. The Guardian article is to a greater extent genuine but does use some emotive language, terrorised. The word terrorised suggests that Kelly was being frighten through violence. You can learn from the Guardian the gender and the age of the victim, 13 year-old girl, how she killed herself, found out of work yesterday in her bedroom after taking an overdose, a possible reason why she took this course of action, bullied at school and terrorised at foundation and the probable offenders responsible for the bullying, a mob of youths.Also, the Guardian shows the bigger picture as they raise social issues. The newspapers contain photographs of both Kelly and her mother, Julie. In the Daily Star, oneness of the photographs of Kelly is in juxtaposition with the headline it is in a block and is as large as the text. This has causes great effect and impact because she looks like a vulnerable victim and it shows who the article is about which induces empathy from the reader. The two photographs of Kelly, one in each newspaper, are visibly presenting her at different ages.In the Daily Star Kelly looks younger, she is besides wearing her Salvation Army uniform, this is to illustrate that she was an innocent young girl who looks very vulnerable. The Daily Star used this photograph because it is more personal. Also, Julie, Kellys mother, looks distraught in both articles this demonstrates the impact of her daughters premature death. In the Guardian there is a picture of Kellys mother, Julie, standing outside their home, it is ofttimes larger than the one in the Daily Star and is larger than the text.This photograph is used to illustrate their family home and show that they were just an average family. Julie looks distressed in this photograph but not as oftentimes as the one in the Daily Star. They live in a council house and people gent council houses with rough neighbourhoods. In the Guardian the photo of Kellys mother is less dramatic than th e one in the Daily Star. This is because the Daily Star is a sensational newspaper, they would run through had a range of photographs to choose from and they inflexible to choose these specific ones to match the style of the paper.The Guardian detracts a less emotive approach because it is nonpersonal and wants to remain neutral. The captions are longer in the Guardian whereas in the Daily Star they are giper and the word tearful is used to emphasise her mothers intense grief. The fonts are different in both articles, the Guardian is written in the same font throughout, with no sub-headings, whereas the Daily Star has one sub-heading, Hounded, which is written in bold and in a different font to make it stand out and affiliate the quotations.The word Hounded implies a chase and is metaphorical in the respect that it shows that she was bullied. Only two conversations are in bold and italic in the Daily Star. These two quotes are in bold because they are the roughly dramatic thi s is due to the fact that the newspaper wanted to highlight these quotations because they were from Kellys family, so they are focussing on the familys emotions in order to create a sensational approach to the story. The Daily Star mainly consists of quotations and conversations to be evidence for the reader to how people are feeling to clear up their sympathy.The quotations in the Daily Star are heart felt. My daughter has been hounded to death. I dont know why they did such things. By using the word hounded, Kellys father is implying that his daughter was pursued and harassed. The article is comprised of mainly quotations from family members, so the reader can see how they have had to cope with the loss of their daughter, and so they are sympathetic. The quotes are melodramatic. Ive had enough of this. Im going to take an overdose. Kelly said this to her mother.The Daily Star concentrates on the attack and the suicide and has used these quotations from family members to create a sensational account. The Guardian only has a a couple of(prenominal) quotes of family members and a great deal from outside agencies. Also, they are not as sympathetic but more forthright. This is unacceptable. They should make sure children are safe-how many more must we lose as a resolving power of bullying? This is a quotation from Pauline Hasler, director of the Anti-Bullying Campaign. This is included in the article because the Guardian is impersonal as it just wants to remain mutual.Although in the Guardian, one quotation from Kellys father Ivan, shows strong emotion. She was a bubbly, magic little angel who would do anything for anybody and I have lost her. This serves to remind the reader that she was only a little girl whose life was curtailed. The Guardian has included this quotation to show the seriousness of this issue and they have done so by using an emotive quotation. The Guardian tends to concentrate on the broader issues such as why Kelly was being bullied and what was being done by various agencies to resolve it leading up to her death.This is because the Guardian is unprejudiced and more formal. Derby City Council was due to meet the family and the police had been called out on several(prenominal) occasions. We were made aware of one incident that occurred on Friday and were intending to go round and see members of the family today. The Daily Star revolves more around the issue that she was dictated to kill herself, and not what was going on in Kellys life before she ended it. In this case the journalist of the Daily Star focuses on the attack of the house and the suicide, which are both dramatic events.The Daily Star concentrates more on the opinions of the family, which is shown in the use of quotations. The quotations are used to have an impact on the reader. The Guardian takes a more existent approach, telling the reader the events of Kellys life which may help to understand why she may have killed herself and raising issues for d ebate concerning the circumstances of her suicide such as whether or not she really was driven to kill herself and whether that can be classed as murder. The language used in both papers differs extremely.In the Guardian the fates are longer and the language is complicated. Some emotive words, such as, terrorised and taunted are used to gain sympathy from the reader, as it shows how she was separated out and that it was persistent. In the latest incident eggs, flour and butter were hurled at the house and abuse shouted at Kelly as she watched from an upstairs window. The emotive word in this sentence is hurled. It emphasises the malicious intention behind the attack and is more effective than using the word throwing. It suggests it was thrown and twisted with force and purpose.The preposition in this quote at stresses violence as opposed to being gentle. They also interrogate Kellys head teacher and the re-housing council in the Guardian. Their words speak of Kelly as a person and her ability. The Daily Star is full of emotive words this is because it is an opinionative article. Her distraught dad found the tragic 13 year-old dead in her bedroom when he went to wake her for school at 7. 50am. Distraught shows the fathers pain and suffering tragic conveys a terrible image and has a severe impact on the reader.These are just a few examples but the Daily Star has plenty more. The sentence bodily structure in the Guardian is complex. Pauline Hasler, director of the Anti-Bullying Campaign, which was formed in 1985, said many schools did not take a hard enough line against bullying. This is classified as a complex sentence. The sheath throughout this sentence is Anti-Bullying there are two objects, Pauline Hasler and schools in general. Punctuation joins three short statements together to form this complex sentence, whereas, the Daily Star tends to rely on open sentences.My daughter has been hounded to death. It is simple but striking. It is simple because it contains a subject a verb and an object. Another example of a simple sentence is Manslaughter charges could be brought if it is believed she was driven to kill herself. The Guardian appeals to the more educated person with a better reign of the English language, as it is a broadsheet newspaper. The vocabulary and style of language is more complex than a tabloid newspaper. The two newspapers are to suit different audiences and that is shown in the amount of fact and opinion in each article.The Daily Star is based on opinion whereas the Guardian takes a more factual approach. Although, they both try to grab the attention and sympathy from the reader. The Daily Star does this more successfully than the Guardian, the qualities of which lie in its broader range of facts and interviews with outside agencies which raise important issues beyond the immediate story of the suicide. general there is an element of class distinction which is related to the reader and their intellectual capabil ity.

Sunday, May 19, 2019

What Is Mercantilism

What is mercantilism? According to the definition in the America Past and Present history book is an economic scheme that shaped imperial policy judgement let on the colonial period, mercantilism was built on the conjecture that the worlds wealth was a fixed supply. In order to increase its wealth, a land needed to export more goods than it imported. Favorable trade and protective economic policies, as well as new colonial possessions rich in raw materials, were important in achieving this balance.During the reign of Charles II incline policy makers assumed they established a well-integrated set of concepts about the nature of international commerce and a carefully planned out set of mercantilist government policies to implement them. However, they only were interested in closure their own problems. Since there wasnt laws or anything to regulate these groups their needs lead to the rise of the English mercenary regulations.The Navigation Act was passed in 1660 which stated t hat no ship could trade in the colonies unless it had been constructed in every England or America and carried a crew that was at least 75% English and that certain enumerated goods of striking value that were not produced in England could be transported from the colonies only to an English or another colonial port.Thru out the years more and more regulations were set the last major legislation came in 1696. This statute tightened enforcement procedures putt pressure specifically on the colonial governors to keep Englands competitors out of American ports. American colonials thought they were in unity with England that would later prove false.

Saturday, May 18, 2019

Focus Group Essay

qualitative investigateDefinition- it is a question, which is undertaken development an unstructured research, approach with a sm every last(predicate) good turn of cargonfully selected undivideds to produce non-quantifiable insights into behavior, motivations and attitudes.Qualitative and quantitative research as two distinctly separate bodies of research m some(prenominal) studies encompass two approaches, with qualitative research being practise to explore and understand attitudes and behavior, and quantitative research being used to measure how widespread these attitudes and behaviors argon.Qualitative research toilette be used when managers need exploratory research. Managers use exploratory research to understand customer attitudes, emotions, preferences and behaviors. It can likewise be used in wise product development or creative development research. Individual discretion interviewIt is an interview that is conducted face-to-face, in which the subject matter of t he interview is explored in detail using an unstructured and flexible approach. As with all qualitative research, depth interviews atomic number 18 used to develop a deeper understanding d of consumer attitudes and the reasons behind particular behaviors. This understanding is achieved through responding to an various(prenominal)s comments with extensive probing. The flexibility of this probing sets this interview approach isolated from oter questionnaire-type interviews. Although there is an agenda of topics to be covered, the interviewers go out use their knowledge of the research objectives, the information gained from other interviews and the comments of the answerer to select which parts of the dialogue with the respondent to explore further, which to ignore, and which to return to later in the interview. Not only when is the depth interview flexible, it is in any case evolutionary in nature.Focus assortFocus groups are depth interviews undertaken with a group of respon dents. It is different to individual interviews in the number of respondents and interaction between participants. Several factors discover focal point groupRecruitment is a very critical element of group interchanges and has long been a major quality-control issue in the UK marketing research industry. Group newss are unlikely to achieve their research objectives if the wrong types of participant are recruited. The research proposal will set out the type of participants needful for a group discussion. For example, if Colgate is researching a new type of toothpaste for a sensitive teeth. Their specification may quest respondents who regularly purchase toothpaste with sensitive protection function. Respondents age (for example 25-64), living area, etc. Managers can also use Screening questionnaire to identify suitable respondents for its group discussion. The area that respondents are recruited normally should be in street or telephone interviews.The location that group discuss ions were held should let respondents feel comfortable. Locations such as display rooms or hotels for business should have no special facilities apart from audio type recorder. solid food or snacks will also be provided to assist in relaxing the atmosphere.Time to hold the discussion should be well scheduled. Times should be lendable to target group. For example, outside working hours, times of available public transport etc.The number of groups should be 3-4. As the 3rd and 4th group can used to exam atypical views. * There are problems involving focus groups. For example in the case of overlap dialogues from different speakers which may affect the transcript. * Moderators must learn to control such people and encourage those little willing to speak up and let their opinions be heard.Comparing to traditional group discussion, online group discussion or confabulate room is becoming popular. Apart from lower cost and possible time-saving, it can give much people to be moved i n observing the research, particularly if it is being carried out in a different region or country. However, a cheaper version of online group discussion or chat room where a group is recruited who are willing to discuss a subject online usually using text. It can be difficult to develop any real group dynamics and it is impossible to agree peoples facial expression. Even with webcams, the icon picture is usually so poor. Participants may also be distracted by events within their own office or home, as the environment is non under the control of the moderator. However, it may be useful with people who could be unwilling to attend a group discussion because of their geographical dispersal or their introverted nature.Projective techniquesProjective techniques are techniques used in group discussions and individual interviews to facilitate a deeper exploration of a respondents attitudes towards a concept, product or situation. They enable respondents to express attitudes that they find difficult to verbalize. Projective technique projective techniques may gather richer entropy than do shopworn questioning and discussion.There are many types of projective techniques. The most common three techniques are projective questioning. It is a projective technique that asks the respondent to consider what other people would think about a situation. An example of this could be What do you think people in your street would think if they saw a BMW parked in your course? The advantage of projective questioning is that it usually reflect the opinions of the respondent without causing them any embarrassment. Managers can get more objective answers.Word association testsIt is a projective technique that involves asking respondents what brands or products they associate with specific contrives. In marketing research, word association is typically used in conjunction with brand names or celerity endorsers. This can assist marketers in developing communication objectives an d strategies to position or differentiate their brands from those of competitors. In addition to the direct outputs of word association, the technique is also very useful as a modality of warming up a group by getting everybody contributing and involved. Brand personalitiesBrand personalities involve respondents imagining a brand a person and describing their looks, clothes. Lifestyles, employment etc. For example, if Nokia was a person, what type of person would he or she be? The answer could be such as a modern, relatively young roughly quirky male. This could compare with other brands. Developing brand personification can help to verbalize the resource and vocabulary associated with the brand.Sentence completionSentence completion involves providing respondents with an incomplete sentence or group of sentences. Respondents are then asked to complete them. For example, Tesco, as a supermarket, is in many way, sentence completion is similar to word associations, although it can enable researcher to put the respondents thinking process into a suitable context.Observation researchObservation is a data-gathering approach where information on the behavior of people, objects and organizations is collected without any questions being asked of the participants. Observation can take a quantitative format where a large number of events or people are observed and the outputs are analyzed using statistical method. The major advantage of it over surveys of respondents is that the data collected do non have inaccuracies as a result of holding error or social desire bias. The data recorded reflect the actual behavior that took place. For example, video record gives a true representation of rental behavior.Observation overcomes the high refusal rates that may inhabit for some survey research. However, honoring cannot investigate reasons behind behavior. Also, only public behavior is observed. Examples of what can be observed are consumers behavior in store, family c onsuming behavior at home, comments on the internet. Typical methods of reflectivity are internet monitoring (club card, cookies), in-store observations (CCTV), mystery shopping(researchers participant into observation to look at process not the outcome of number of satisfaction), content analysis(how many time that the word appear in the article), ethnography(could be dear(p) and have ethical issues). Ethical problemQuestionnaireA questionnaire is the research instrument designed to generate the data necessary for accomplishing a projects research objectives. Questionnaires have advantages over some other types of surveys in that they are cheap, do not require as much effort from the questioner as focus group, and often have standardized answers that make it simple to compile data. However, questionnaires also have many of the homogeneous problems relating to question construction and wording. The effect of questionnaire might also limited by the location that respondents do the questionnaire. For example, respondents who did questionnaire in high street could be affected by noise. There are many types of questionnaire. There are open-ended question, closed question, scaling questions.There are many factors when comparing Focus group, depth interviews, projective techniques, observation and questionnaire. In terms of degree of structure, focus group are relatively high as managers will guide and control the whole discussion until all tasks are finished. In terms of probing of individual respondents, depth interviews are high and focus group and questionnaire are low. Moderator bias in depth interviews are high and others are medium. Observation has none effects in terms of both probing of individual respondents and moderator bias. Focus group is also high in discovering innovative information. Projective techniques and observation are high in uncovering subconscious information and obtaining sensitive information. Questionnaire and projective techniques ar e involving unusual behavior or questioning.