Monday, September 30, 2019

Factors affecting math performance of the students

The actual coding of a program is done by a(n) a) systems analyst b) software engineer c) end-user d) database administrator Answer: B Difficulty level: Easy page: 389 Response: Software engineers would complete the coding of a program. . Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in the a) program tracking log project management database program specifications document c) d) management information system Answer: C Difficulty level: 389 page: 390 Response: All of these items are outlined in the program specifications document. 4. The information software produces after it has processed the input is called a) flowchart b) output c) objective prototype Response: The output is what has been produced after the input has been processed. 5.The information that a program requires in order to accomplish its objective is called the a) data contribution c) effort input Answer: D Response: Once you know the output, you then determine the inp ut data and the source of this data. 6. The program's processing steps are grouped into logically-related programming statements called a) modules unit c) object component page: 392 Response: Processing steps are called program modules (modules). 7. Flowcharts and pseudopodia are examples of tools used in the program phase. A) specification b) design c) code d) test page: 393 Response: Pseudopodia and flowcharts are tools used in program design. . The programming tool that uses linked symbols to show the sequence of steps needed to solve a programming problem. A) grid table pseudopodia c) algorithm d) flowchart Response: Flowcharts graphically present the detailed sequence of steps needed to solve a program by using symbols. 9. In a(n) structure, one statement follows the other with no conditions having to be met. A) selection b) loop sequence conditional Response: In the sequence structure, one program statement follows another. 10. The structure involves repeating a sequence until a condition is met. A) loop selectionResponse: A loop structure will repeat so long as a certain condition remains true. 11. An IF-THEN-ELSE statement is part of the structure. A) loop Response: IF-THEN-ELSE structures are part of the selection structure. 12. In the course of creating program specifications, the end-user should sketch out the desired a) splash logo icon Response: The end-users should sketch out the desired output that they want out of the computer system. 13. The control structure used to perform a series of statements one after the other is called a) sequential c) loop random Response: In the sequential structure, one program statement follows another. . When a program makes a true or false decision, it is an example of a(n) logic structure. A) if-then-else b) do until c) do while d) what-if Response: If-then-else resembles a true/false decision. 15. When a program repeats a portion of software code as long as a certain condition doesn't exist, it's using a(n) str ucture. A) Response: This is an example of the do until structure. 16. The actual writing of a program in a programming language is called a) program design b) logic structure language translation d) coding page: 396 Response: Writing the program is called coding. 17.Which of the following is not necessary for a good program? A) reliability catches common errors colorful graphics d) well-documented Response: Colorful graphics are not necessary for a good program. 18. Eliminating errors in a program is also called the program. A) debugging b) modularizing c) coding clarifying page: 399 Response: Debugging is testing a program and eliminating errors. 19. A program error that violates the grammar rules of the programming language is a(n) error. A) modular b) logic syntax language Response: Syntax error is a violation of the grammar rules of the programming language. . Error could be the result of the programmer making an incorrect calculation. A) b) general protection c) logic breakpoi nt Response: Logic errors are created by incorrect or missing specifications. 21. Refers to testing by a select group of potential users in the final stage of testing a program. A) Manual testing b) Desk checking c) Attempt at translation d) Beta testing page: 400 Response: Beta testing refers to testing by a select group of potential users in the final stage of testing a program. Re explanations that tell other programmers In programming, what's happening in the software code. ) restrictions b) tables c) documentation d) selections Response: Documentation is written to explain what is happening in the software code. 23. As much as percent of the total lifetime cost for an application program is for maintenance. A) d) 75% Difficulty level: Hard page: 402 Response: As much as 75% of the total lifetime cost for an application program is for maintenance. 24. Which of the following refers to tools that are used to design, code, and test software? ) XML b) CAD c) CASE d) pop page: 403 Re sponse: CASE tools are used to automate the development process. They can aid n program design, coding, and testing. 25. Software that helps programmers prepare reports, draw flowcharts, and generate software code for prototypes is a(n) a) CAUSE (computer assisted Unix software environment) tool b) CASE (computer aided software engineering) tool c) COOL (computer licensed operations code) tool d) CULL (combined users licensed protocols) tool Response: CASE tools help programmers prepare these items. 26.Object-oriented programming is a type of assembler language a) b) allows you to interact with objects when coding software c) is a type of machine language inverts source code into machine language code Answer: B page: 404 Response: Object-oriented programming focuses on letting you interact with the objects (defined procedures) when coding software. 27. POP languages use combinations of objects natural and nonprocedural statements binary coded instructions d) abbreviations and mnemon ic Difficult level: Easy Response: Object-oriented programming uses combinations of objects. 8. Machine language is composed only of a) keyword statements b) hexadecimal numbers c) memory address toggles d) So and Is page: 405 Response: Machine language is composed of Is and So. 9. Language is made up only of binary digits. A) Procedural b) Machine c) Assembly d) Natural Response: Machine language uses binary code. Which of the following lines of code comes from a first generation computer language? A) b) 00010 1010 1101 0001 1010 this Total=Total + Totals set total to sum of totals Response: Machine language (first generation) used So and Is. 1. These languages use abbreviations and mnemonics that make it easier for humans to understand. A) assembly b) machine language d) COBOL Response: Assembly language uses abbreviations or mnemonics that make it easier or humans to understand and use. 32. Languages are designed to express the logic used instead of Just performing calculations. A) Machine b) Procedural d) Low level Response: Procedural languages are designed to express the logic – the procedures – that can solve general problems. 3. Procedural languages are part of the generation of computer languages. A) first second third fourth Response: Procedural languages are part of the third generation of computer languages. Procedural languages must be translated into machine language using compiler or interpreter a(n) a) b) assembler interpolator ) application generator Response: Procedural languages must be translated into machine language using a compiler or interpreter. 35. A compiler performs the following function. ) translates and executes each program statement one at a time b) converts the source code into machine language code c) translates instruction codes from assembler language into machine language d) uses statements to tell objects to perform actions on themselves Answer: B Response: Compiler converts procedural language program (sour ce code) into a machine language code (object code). C++ is considered a A) machine language ) assembly language c) procedural language natural language Response: C++ is a procedural language. 7. Converts the programmer's procedural language program into a machine language. A) interpreter compiler d) analyst page:405 Response: A compiler converts procedural language program into machine language An interpreter performs the following function. A) translates and executes each line of code one at a time b) translates high-level language statements uses statements to tell objects to perform actions on themselves d) translates software code from assembly language into machine language Answer: AResponse: Interpreter converts the procedural language one statement at a time into machine code Just before it is executed. 39. Problem-oriented languages are which generation of language? A) first page: 406 Response: Problem-oriented languages are fourth generation languages. Fourth-generation la nguages use a) procedural statements nonprocedural statements c) assemblers symbols Response: Fourth-generation languages are nonprocedural languages.

Sunday, September 29, 2019

Introduction Of The Guest Speaker Essay

To our dearest Principal Mrs. Nihma N. Ismula, beloved juniors and seniors, co- mentors, visitors today, a very pleasant afternoon. I have the honor to introduce our very prolific and generous guest of honor. I underscored I am honored because I am proud to say that she is my classmate, batchmate and an amiable friend. Though we had separate groups sila RIALS M tapos kami LDS but were clicked and BFFs,nasabi ko lang yan kasi andyan din yung mga back ups namin na mga friendships sa likod,tnx guys for coming and sa moral support. Our guest is a graduate of our institution LAPUYAN NATIONAL HIGH SCHOOL and once was an honor student. She graduated elementary here at Central School and took her tertiary at Mindanao State University, Iligan Institute of Technology. She is a very profound woman because despite of the hardships and having a single mom, she managed to finish and pursue her studies. After those hardships, she is successful enough and had been working at DAR- Department of Agrarian Reform last 1991- 2001. She was a very workaholic and had proven her worth once again as she was working as Secretary to the Board Member for almost a year and presently a local Legislative Officer II at Capitol office, Pagadian City. She’s a chef, she bakes delicious cakes and a very lovable wife to a very handsome Mr. Ian Mariquit, a nurse and a clinical instructor of Medina College, Pagadian City. Ladies and gentlemen, I am honored to present to you our beloved Guest of Honor today, Ms. Miriam Ismael Mariquit a Big round of applause for her.

Saturday, September 28, 2019

Nursing Research Paper Example | Topics and Well Written Essays - 2000 words

Nursing - Research Paper Example For example, the abstract concludes by the statement that qualitative and quantitative differences in the sialylation of superficial glycolipids in CF epithelial cells may contribute to the colonization of CF lung by P.aeruginosa. This creates suspense on the reader and a desire to read more of the article. Introduction: The introduction provides sufficient information concerning the study since it identifies the significance of the study. This is portrayed in last paragraph where Saiman and Prince (1993) identify the purpose of the research as to prove that asioloGM1 is a receptor of P. aeruginosa and it plays a role in increasing the surface of CF respiratory epithelial cells (p. 1875). The introduction outlines the contents of the study, and it identifies various terms used in the study. Terms such as cystic fibrosis trans membrane and pulmonary failure are identified. The major weakness of the introduction is that it doesn’t identify the methods of conducting the study and the problem statement. The purpose of the study is clearly identified in the introduction that is to prove that asioloGM1 is a receptor of P. aeruginosa and it plays a role in the surface increase of CF respiratory epithelial cells. The authors have used the population and the variable of the title in the introduction and the body of the article. For instance, P. aeruginosa has been identified as the basis of the articles research in the introduction (Saiman and Prince, 1993, p.1876), and they give the properties of the medical condition. The authors have succeeded in highlighting how P. aeruginosa affects C.F epithelial cells by increasing their surface. Basing on this, the authors have succeeded in integrating the population and its variable in the text.... The article does not have a section labeled literature review, however, in the introduction part of the paper, the authors have used the term various â€Å"studies† to denote that they have used other sources in coming with the results of the study. A major weakness in this is that they do not mention the studies they are quoting in the introductory part; therefore it is difficult to know the source of their literature review. This article contains clearly labeled theoretical framework section and the framework seems appropriate since no framework from nursing libraries could be located to guide the production of this particular kind of study. From the study, there are three assumptions made by the two authors. The authors have not provided challenges and limitations they encountered while conducting this study. This study has a broad implication for many areas of nursing such as nursing education, administration and practice. In administration, the nursing fraternity should support the conduction of research in areas highlighted by the text, and nurses should be trained on how to deal with the mentioned medical condition. this is a well-structured article, with proper identification of the scope of the conducted research. The authors have partly achieved the objective of their study, which is to prove that asioloGM1 is a receptor of P.aeruginosa. The researchers have also properly used APA citation techniques, and all in text citations are in the references section and due to these facts, I will strongly recommend a colleague to read it.

Friday, September 27, 2019

The Rime of the Ancient Mariner by Samuel Taylor Coleridge Essay - 1

The Rime of the Ancient Mariner by Samuel Taylor Coleridge - Essay Example This paper intends to discuss how this poem is considered as a poem of sin and redemption though the â€Å"physical and soul journey† (Nelson, 2001, p.148) of the mariner. Poem of Sin The poem is generally considered as a poem of sin. The mariner and his sailors got stuck in a thick and foggy ice field while trying to escape the thunderstorm in the Antarctica. They found an albatross that steered them through the thick fog, so that they might find good winds for their ship. But, we see that the mariner killed the albatross for no reason. This was actually the sin that the poem talks about. The reader is left surprised upon this decision of the mariner, regarding why he shot the albatross that had come there for their help. This perplexity is what irritates the reader in the first read, but as the reader follows the poem, he finds it really rich in context and theme. The albatross is shown as a symbol of Nature, or God’s presence. Read: â€Å"At length did cross an Alba tross, /Thorough the fog it came; /As if it had been a Christian soul, /We hail'd it in God's name† (lines 63-66). When the mariner shot the albatross, God became angry for him for his sin, and denounced upon him much woe and misery. The sailors confronted with slimy things on the oceans, and ghosts and spirits, which finally killed all sailors, and destroyed the mariner’s journey. Buchan (1969) writes in his essay, ‘The Sad Wisdom of the Mariner’: â€Å"The shooting is an act, unpremeditated and unmeant, that nevertheless must be accounted for†¦.† (p.97). The curse, that befell the mariner due to his â€Å"unnatural act† (Voglino, 1999, p.53), made him lose his ship and his companions; but finally, he met a rescuer, the Hermit, who brought him ashore. Also, we see that when the mariner shot the albatross, the curse struck the sailors, and they got so angry with the mariner that they hung the albatross around his neck. This was a constant reminder for the mariner about his sin, which had brought immense suffering to the whole crew. An albatross around one’s neck has become an idiom since. An albatross refers to a mistake that one has done and cannot undo it, and which is constantly adding to the suffering. For example, a person bought a motor car, spends money on it to recondition it, but the car is not selling. It is only demanding more expenditure, because of going out of order frequently. So, the car is an albatross around his neck. The old mariner also had this albatross around his neck which constantly reminded him of his mistake or, in this case, sin. Whenever he looked at it, he was reminded of what he did that angered the Nature. Sagar (2005, p.15) writes that, â€Å"When the Ancient Mariner wantonly kills that Albatross, the other sailors think it as an unpardonable sin. They believe that no human being has the right to decide who is to live and who is to die. So they decide punishment for his sin.à ¢â‚¬  The sin has also been understood in terms of the mariner’s pride, in literature. Pride has been known as man’s earliest sin, which dates back to Adam and Eve. Literature suggests that mariner’s act of shooting the bird of good omen has something to do with human pride. The albatross came with a lot of good luck for the ship. But the mariner decided to shoot it because he thought that he could do well without it, that he was enough to

Thursday, September 26, 2019

Critical Thinking Research Paper Example | Topics and Well Written Essays - 750 words

Critical Thinking - Research Paper Example When HP, Compaq, and Dell developed PCs and offered to the individuals at an affordable cost, the market grew at an exponential rate. It was too late for IBM then to grab a respectable share in PC market. A critical and creative thinking on part of the IBM to serve large small consumers at an affordable cost would have prevented others to grab the huge market that it culminated into within a decade or so. Free will is a philosophical term for which most philosophers believe that the free will is related with moral responsibility. Acting with free will means one is responsible for ones action. Free will, according to Rene Descartes, means freedom of choice to do or not to do something (Stanford encyclopedia of Philosophy, 2010). Socrates rightly said that truth can be approached by complete ignorance and not by any preconceived notions and beliefs. When one questions all established belief system then one goes nearer to the truth. Usually, it is believed that knowledge is an observational phenomenon but according to ‘rationalists’, knowledge can also be gained purely by thinking. This contrasts the view point of ‘empiricists’ that all knowledge is gained through observations. In order to understand what knowledge is and how it will be available, one needs to ponder over what role knowing might play or what inherent value it may offer – if there is any (Internet Encyclopedia of philosophy (2012). Usually, opinions are formed before hand before going deeper into the details. Each one of us has preconceived beliefs and opinions about so many things and that come in our way in finding the truth. Opinions without any basis are great impediments to our free thinking. Egocentrism is hindrance to critical thinking because it revolves around self-centered thinking. It has two major forms known as self-serving and self-interested thinking. Egocentrism develops due to superiority feeling in

Wednesday, September 25, 2019

Design a Marketing Metrics system for a commercial organisation of the Essay

Design a Marketing Metrics system for a commercial organisation of the group's choice - Essay Example The authors have aptly summarized the difference between yesteryears and the current day marketing where it has become a science rather than an art. Art and skills are definitely required but the scientific factor is a much needed factor. Here comes the metrics portion of the marketing activity. â€Å"A metric is a measuring system that quantifies a trend, dynamic, or characteristic. In virtually all disciplines, practitioners use metrics to explain phenomena, diagnose causes, share findings, and project the results of future events† (Farris et al., 2006). The executive summary gives a comprehensive and compact picture of the importance of Marketing Metrics in today’s business world. If the marketers are unable to quantify their projections they would not even know what they are looking forward and then all planning and marketing activity becomes vague. By quantifying it is meant that marketing requires numbers like percentage of customers requiring their products, judg e the change in market conditions, explain customer habits and purchase trends. All the quantitative measures can be put in the form of metrics which will define the future course of marketing activity in an organization. This marketing metrics is being done for Coca Cola who needs no introduction in the beverage market where they have a huge presence for decades. Even though Coca Cola has established its brand over the years but still it requires a dynamic marketing team to work round the clock to ensure that it reaches out to its customers in a market which is volatile and can change in a matter of no time. Therefore marketing metrics is required to constantly analyze the changes in trend, the purchasing habitat of people, customer tastes, and inclination to reward systems or accumulation of points on coca cola consumption. The report also emphasizes the background of the company, its non financial resources and its financial resources. The non financial resources include market s hare, customer relationship management, awareness, competitor analysis, product lifecycle and customer satisfaction. The financial resources include Sales and Revenue as well as the Return on Investment (ROI). A lot of planned marketing metrics is done by Coca Cola Company so that it can stay competitive in the market. Marketing metrics involves quantitative analysis based on which important business judgments are made and the marketing managers needs to be spot on and accurate in this analysis to use it to the good effect of the organization as a whole. Introduction Marketing metrics is a complex phenomenon and corporate like Coca Cola needs a range of metric to come to a definite and logical analysis. To achieve the marketing metrics a range of parameters and phenomenon needs to be derived and appropriate data input and analysis needs to be done. Customer satisfaction survey is one of the key input areas where customers quantify their satisfaction level. Similarly trend analysis i s done with customer survey which gives an insight to the company as to the market trends and habits of the consumers. This section gives a comprehensive insight into the method and manner of producing a marketing metric which would serve the purpose of getting quality and quantitative information of the market situation which will enable the marketing department to come to marketing decisions based on analysis. â€Å"The challenge, of course is knowing what to measure and exactly how to measure it. That is where Marketing

Tuesday, September 24, 2019

Business Law Essay Example | Topics and Well Written Essays - 2000 words - 8

Business Law - Essay Example This paper finds that implied terms, as it has long been considered to be integral component of the structure of employment contract, plays vital role in the formation of terms and conditions that are applicable to the employment contract. The research is structured considering the doctrine of precedence and the employment relationship. An employment contract forms to be the basis on which an employee is employed under an employer. If there is no employment contract, the employee cannot be categorized to be an employee (Bell, p. 27). The employment contract is legally binding relationship between an employer and his employee that defines the structure and contents of the relationship between each of them and it strengthens all the claims to employment tribunals and litigates legal risks and liabilities (Leighton, p. 11). Recruitment, one of the fundamental functions of HRM, is a basic step to create an employment contract and relation between employer and employee and this, if conducted effectively, can ease the procedure of forming employment contract by including relevant terms and contents in it. The contract of employment is very similar to any other legal contract in many aspects. Generally, a contract of employment will be expressed in writing, but this not the case always as in the case of other contracts (Bell, p. 28). It is legally and strongly advisable to the employer to issue a written contract so that it will help mitigate all legal risks associated with employment and also to avoid misunderstandings between both the parties. There can be temporary of full time employment contracts as well in which contract is agreed between the parties that it will end within a specific period of time or it is of unlimited duration (Macdonald, p. 36- 37). The contract of employment may consist of a number of terms and conditions and these can either be expressed or implied. Expressed terms are those that both the parties

Monday, September 23, 2019

Java applets and JavaScript scripts Essay Example | Topics and Well Written Essays - 750 words

Java applets and JavaScript scripts - Essay Example There are few links to visit java applets: java.sun.com/applets and csis.pace.edu/~bergin/Java/applets.htm Java Applets presents a rich familiarity on the user/client area as well as there are a lot of activities they are able carry out like that graphic manipulation, custom data streaming, advanced GUIs and threading. The Java is able to talk to JavaScript by means of the Live-Connect Application Programming Interfaces (APIs) (AjaxProjects, 2009). Java Applets are utilized to give interactive distinctiveness to web applications that can not be presented by using HTML. They are able to have powers that counter to the client input, as a result re-computing the given web based graphic content. This creates Java-applets well appropriate for visualization, expression as well as teaching reasons. Java Applet is able to as well make use of JFrame to go away the devoted area as well as execute like detached window (Ackermann, 2002). For the commercial settings of the Java applets Java application developers are able to debug and build up an applet straightly and basically through developing a major routine. This main routine is built in applets class or in a different class as well as call start () and init () on the applet, for that reason permitting for development and customization for the commercial setting in their preferred J2SE development setting (Sosnowski, 2009). The most important commercial settings of the Java applets we can use same applet that will work on "every" installed edition of Java at the similar time, and will carry out same activities in all operating system working environments (Ackermann, 2002). Java script is an interpreted language that facilitates a programmer to insert dynamic components and interactive elements to a web page. These elements consist of alert messages, animations, drop down menus, scrolling text, data input forms, interactive

Sunday, September 22, 2019

Masters of science in I.T. progam Personal Statement

Masters of science in I.T. progam - Personal Statement Example After doing a lot of background research and soul searching, I have made a decision to pursue a Master of Science in Information Technology (MSIT) at the Endicott College. Soon after graduating with a degree in criminal justice, I worked closely with individuals who were experts in the field of information technology. My experience with these colleagues woke me up to the fact that the world faces a lot of challenges in relation to information technology and security. My interest in the field of information technology has continued to grow ever since. It is this interest, my great passion for new technologies, and my desire to see the world get more secure that informed that ideally informed my decision to pursue a Master of Science in Information Technology. With the current knowledge and experience I have in IT, I am confident that I am geared toward success in this course. Among the numerous colleges and universities that offer MSIT, I chose the Endicott College for a number of reasons. A research on the college reveals that the academic staffs of the university are highly trained and experienced and are drawn from different professional backgrounds. The college also has the kind of resources that are invaluable to students learning online including an e-library and resource database. The Endicott College MSIT offers the flexibility that I need as I continue working and gaining more experience. I particularly like the fact that I will be able to choose elective courses that are aligned to my specific areas of interest as I take my course at Endicott College. I am confident therefore that the college will see me develop in my career path, equipping me with skills and knowledge to solve complex problems, manage projects, and develop and work with information systems. Upon graduating with my Master degree from Endicott College, I hope to work with a reputable organization in the U.S. to gain more experience in

Saturday, September 21, 2019

Choice Theories and How They Relate To Crime Essay Example for Free

Choice Theories and How They Relate To Crime Essay Choice Theories are a rational choice that actors act upon because of the thoughts and feelings they have. It is an immediate instinct to do what’s needed for your immediate survival at the time. Also Known as a personal conscious choice. Rational people think that the act will benefit them more than cause harm to themselves. They do not know if it will cause harm to anyone else around them but honestly they normally do not care. Criminals are a great group of people whom commit these acts. They feel that they are restrained and that their choices are constricted. They use this as a last and sometimes only resort. Criminals are seen as inherently anit-social. This gives the criminals a sense of control, power, and in their minds gives them an alternative career. For example look at drug dealers. They live their lives selling drugs not because they enjoy doing it and disobeying the law but because they can work for two hours and they can make more money than I do in two weeks working 40+ hours. They love quick easy money and over look the consequences. The only way to stop this major crime rate and help keep our justice system a little more organized and not so stressful is to make the cost of crime so high that no rational human will commit the crime. All of this does not go for a criminal whom sits down and thinks of the cost/benefit portion of things. A choice theory to some is simply nothing other than a resort.

Friday, September 20, 2019

Radio Frequency Identification and Intelligent Parking

Radio Frequency Identification and Intelligent Parking Executive summary This report is an introduction of two sensor related technology used in modern life. Radio frequency identification (RFID) lock system and Intelligent parking assist system (IPAS) are two topics maintained in the report. In each of the topic there will be at least three parts: history and development, principle of the technology and limitations. The aim of the report is to give reader a brief knowledge of these technology. Radio frequency identification technology is mostly used on door lockers. These kind of products are commonly used in hotel rooms or the front gate of some buildings. The user can unlock the door by swiping a card or tag through the device without using the key. There is no physical contact though this process. RFID lock system (Fig.1) is identified to be safer then traditional key lock system. Additionally, it is more convenient for people to use such as to open the garage door when you are in the car. RFID technology have also been used in a variety of applications: Access management, Tracking of goods, Tracking of persons and animals, Toll collection and contactless payment, Machine readable travel documents, Smart dust (for massively distributed sensor networks), Tracking sports memorabilia to verify authenticity, Airport baggage tracking logistics, Timing sporting events FIGURE 1:Radio frequency identification (RFID) hotel lock system 1.1 History and development In 1945, Russian inventor Là ©on Theremin invented a covert listening device called The Thing which transmit audio signal through incident radio waves. Sound waves collected by a resonant cavity microphone which oscillated the resonator, which generates the reflected radio wave. This device was not an identification tag when it was built. Due to its passive, being energized and activated by electromagnetic energy from an outside source, The Thing is considered a original form of RFID technology, see Fig.2. [7]   Ãƒâ€šÃ‚   FIGURE 2: the thing'(listening device) invented by Là ©on Theremin Similar to The Thing, the IFF transponder, was used in World War II by the German allies to identify aircraft (Identity: Friend or Foe) [3]. Transponders are still used nowadays. In 1948 Harry Stockman predicted that considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.[4] is another early work exploring RFID. Mario Cardullos device a passive radio transponder with memory, patented on January 23, 1973, was the first true prototype of modern RFID[8]. The initial device designed as a toll device was first demonstrated in 1971 to the New York Port Authority and other potential user. It was passive, powered by the interrogating signal, with 16 bit memory. The basic Cardullo patent take RF, sound and light as transmission media. The original business plan was targeted to transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history) in 1969. In 1973, Steven Depp, Alfred Koelle, and Robert Frayman performed an early demonstration of reflected power (modulated backscatter) RFID tags, both passive and semi-passive at the Los Alamos National Laboratory. [5] The portable system operated at 915 MHz and used 12-bit tags. Today, the majority of UHFID and microwave RFID tags is using this technique. The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983. [6] 1.2 Principles of RFID technology Radio frequency identification system use radio wave to transmit information between tags and readers, see Fig.3. Certain information in the tag can be identified by the reader which can be used to unlock a door. In the tag there is a coil and a micro chip, the chip will respond when the tag is close to the reader through electromagnetic field. The coil in the reader act as a power source, meanwhile it is also an antenna to receive the data transmit by the tag, see Fig.4. [1]    (b) FIGURE 3:(a) RFID reader, (b) tags FIGURE 4: Working of RFID 1.2.1 Tags Radio frequency identification system use tags or labels as identifications. Two-way radio transmitter-receivers as known as interrogators or readers send a signal to the tag and read its response. There are three type of RFID tags passive, active or battery-assisted passiveà ¯Ã‚ ¼Ã‚ »9à ¯Ã‚ ¼Ã‚ ½. An active tagà ¯Ã‚ ¼Ã‚ »10à ¯Ã‚ ¼Ã‚ ½ is battery charged and its ID signal is periodically transmitted. One example of an active tag is the transponder attached to an aircraft that identifies its national origin [2]. Olivetti Research Ltds Active Badge, used to determine the location of people and objects in a building is an example of a small wearable active tag with a lifetime of about 1 year [11]. A battery-assisted passive (BAP) has a small on-board battery and is activated when in the range of an RFID reader. A passive tag is the cheapest and smallest among these three there is no battery in it the tag uses the radio energy from the electromagnetic field cause by the reader instead. However, passive tag requires a much stronger radio transmitter than for signal transmission. Tags could be read-only or read/write. Read-only tags have a serial number wrote in from the factory that is used as a key into a database, while read/write ones can have data write by system users. Field programmable tags can be write-once, read-multiple; blank tags can be written with an electronic product code by the user. Passive RFID tags contain at least three parts: a circuit, an antenna and some form of encapsulation, see Fig.5. [3]. The integrated circuit is used for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader signal, and other specialized functions; and the antenna for receiving power and transmitting the signal. The RFID tag includes either fixed or programmable logic for processing the transmission and sensor data, respectively. FIGURE 5:Logical components of an RFID tag. Note that the antenna can take many forms including a coil and a dipole depending on the tag type An RFID reader send an encoded radio signal to the tag. The tag then receives the message and communicates back with its identification and other information. This may be a unique tag serial number, product-related information, a password or other specific information. Since tags have individual serial numbers, the RFID system can discriminate among several tags and read them simultaneously when they are within the range of the RFID reader. 1.2.2 Readers Radio frequency identification system can be defined into 3 types by different tags and readers. A Passive Reader Active Tag (PRAT) system is a combination of passive reader (only receives radio signals) and active tags (battery operated, transmit only). The operation range of a Passive Reader Active Tag system reader can be adjusted from 0-600 m. Which allows flexibility in applications such as asset protection and supervision. An Active Reader Passive Tag (ARPT) system has an active reader, which transmits interrogator signals and also receives authentication replies from passive tags. An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a small battery to power the tags return reporting signal. The signal intensity of readers can be set up to create a specific interrogation zone. A highly defined reading area can be created for when tags go in and out of the interrogation zone. Mobile readers may be hand-held or mounted on carts or vehicles. 1.3 A comparison between traditional KC system and RFID locking system The keycard (KC) lock system can be a lock operated by a keycard, a flat, rectangular plastic card with identical dimensions. The card stores a physical or digital signature which can be accepted by door mechanism. There are several common types of keycards in use, including the mechanical hole card, barcode, magnetic stripe, Wiegand wire embedded cards, smart card (embedded with a read/write electronic microchip), and RFID cards. Corresponding systems operate by physically moving detainers in the locking mechanism with the insertion of the card, by shining LEDs through a pattern of holes in the card and detecting the result, by swiping or inserting a magnetic stripe card, or in the case of RFID cards, merely being brought into close proximity to a sensor. RFID locks operate differently to the traditional magnetic and chip card hotel locks, using Radio Signals in order to communicate between the guests Keycard and the Lock. The older Magnetic Swipe and Chip Card systems have several drawbacks including short life cycle, impact on magnetic field, limited data storage. The older Keycard have to be inserted into the door lock. Scratches appears on the reading surface due to the physical contact between the magnetic stripe (or the Chip) and the reader. This eventually makes the cards unreadable by the lock. It will also cause failure when writing the card at the encoding station. The average life span of such a magnetic strip Key Card or chip cards is about 200 to 500 uses[3]. The older Keycard can easily be affected by small magnetic field (even interference from Mobile Phones), which makes the card unreadable and hence needing replacement. The traditional cards have a small memory capacity which makes it difficult to integrate cards with equipment like Lifts, Car Park Barriers, Vending Machines. The RFID Locks are contactlessà ¯Ã‚ ¼Ã…’it operates by presenting the Key Card to the lock. The lock then reads the information stored on the card by means of RFID, and grants access to the room to valid cards. There is no physical contact between the lock and the card. With the help of RFID technology, magnetic strip or visible micro chip can be discard from the card and hence eliminates damage cause by physical contacts. This gives RFID card virtually unlimited life span. There is no need to replace or clean the reader heads. In addition the locks are free from opening slots preventing ingress of dirt, dust and other outside influences, prolonging the lifespan of the lock itself. 1.4 Limitations Although Radio frequency identification offers the benefits of relatively low cost compared to other wireless technology, being physically unobtrusive and enabling detailed stock tracking, it still has limitations. The cost of tags depends on their type. In the 2003 report RFID Systems in the Manufacturing Supply Chain [14]. Thought RFID tag can cost as little as a few cents and the cost has fallen over time, however, it still requires investment to install on a good. Comparing to the value of some goods it is not economically viable for tagging them. Especially for active tags (those that require a local power source), which can cost up to a dollar each. Different signals from the tags may interfering with one another. A February 2011 paper for the International Journal of Computer and Electric Engineering notes that it isnt easy to read multiple RFID tags simultaneously [1]. There is Computerized techniques for detangle such signals, but implementing and managing these techniques increases costs. [12][13] NFC and EPC global standards are two wide-scale adoption standards for RFID, but they are fundamentally incompatible [3]. Lack of standards is an issue when two different companies attempt to share and tracking RFID information. The IJCEE paper notes that RFID does not have fixed technical standards. Cooperating partners in RFID industry need to agree in standards concerning communication protocols, signal modulation types, data transmission rates, data encoding and frames, and collision handling algorithms. [1] There are three large regions of frequency allocations in the world the Americas; Asia and Australasia; and Europe and Africa. The variations in wireless frequencies ranges limits companies that want to use RFID tracking for international inventory management.[1] Intelligent Parking Assist System is a comfort function in some of the vehicles. The first system coming in the market monitored the front and rear of the vehicle and warned the driver if there is any object beside the vehicle. Ultrasonic sensors are wildly used in this technology. Together with ultrasonic sensors, video technology and some algorithms the vehicle itself is able to measure the length of a parking space and steer itself to the parking lot. Drivers must care only for the longitudinal control of his vehicle. 2.1 History and development In 1999 Toyota Motor Corporation developed The Advanced Parking Guidance System (APGS) for Lexus models in the United States initially for the Japanese market hybrid Prius models and Lexus models. The system assists drivers in parking their cars.[15][16]Vehicles equipped with the IPAS can drive itself into a parking lot with little control from the user. The Prius Hybrid sold in Japan in 2003 installed the first version of the system.[17] In 2006, an upgraded version of the system on the Lexus LS luxury sedan[18] featured the automatic parking technology among other brand new inventions from Toyota. In 2009, the third generation Prius sold in the U.S has this feature. In Asia and Europe, the automatic parking technology is labelled as the IPAS for both Lexus and Toyota models, while in the U.S. the Advanced Parking Guidance System is only used for Lexus cars. Intelligent Parking Assist System initially was designed for reverse parallel parking.[17] The system estimated the location of the parking lot and steered the vehicle without Drivers intervention. Onboard computer used a camera and sensors built into the forward and rear of the car to detected the proximity of nearby vehicles. The dashboard showed an real-time image of the lot with a box, and the driver have to determine the exact final position of the vehicle in the lot by using arrows appeared on the screen. When satisfied, the user pressed the Set button, which will activated the IPAS. The system then took over steering control to maneuver the vehicle.[19] Early versions of this system cant detect objects properly, including cats, baby prams and pedestrians. Secondly when the driver used IPAS in a small space, the system continuously warning the user of the danger of hitting the object. User assistance is required in such situations. In 2005, recognition capability is added to the system for parking stripes.[19] A later version of this parking technology integrated the system with parking sensors in 2006.[19] This version calculated the steering movements needed for parallel or reverse parking, and help determine weather the car has enough clearance for a particular space with colored screen display. 2.2 Function Intelligent parking assist system is widely used in some of the Toyota, Lexus cars, even worlds top sport car McLaren P1 has IPAS. Following information is the instruction of IPAS in Toyota Prius Owners Manual.[20] Step 1: Drive your Toyota Prius up until you see the spot youd like to park in. It may be behind you or in front of you (unlike those of the Ford models, where the only thing you can do with their system is parallel park the car using its system).(Fig.6) FIGURE 6:IPAS instruction 1 Step 2: Press the ParkAssist button near the drivers side of the dashboard. (Fig.7) FIGURE 7:IPAS instruction 2 Step 3: Make sure that the back end of your vehicle is further forward than the spot your vehicle has been designated to be parked in.(Fig.8) FIGURE 8: IPAS instruction 3 Step 4: Look at your screen up on the dashboard. The vehicle will light up spots that it thinks there is a viable enough parking space located in. Not only will it light up the screen, but it will beep to alert you that there is a parking spot nearby that it can choose. Look for spots that turn into blue square areas. The vehicle can already determine that these spots are big enough and well suited enough to park the car there. (Fig.9) FIGURE 9: IPAS instruction 4 Step 5: Touch to fine-tune the parking space you believe would be a working space to park in. Use the arrow points on the screen to fine-tune the spot. Look for the car to find out what area you may be indicating as you move around the parking lot. The arrows will select the spot, and will highlight the spots. (Fig.10) FIGURE 10: IPAS instruction 5 Step 6: Adjust the parking space its designated.(Fig.11) FIGURE 11: IPAS instruction 6 Step 7: Touch the OK button in the bottom right corner of the dashboard screen.(Fig.12) FIGURE 12: IPAS instruction 7 Step 8: Put your car in Reverse gear and only keep your foot on the brake pedal. Operate only the brake pedal, as you park the car. (Fig.13) FIGURE 13: IPAS instruction 8 Step 9:Put your foot on the brake pedal, when youve backed up far enough without running through the building or into any designated non-parking areas.(Fig.14) FIGURE 14: IPAS instruction 9 Step 10: Cancel the guidance feature on your vehicle by pressing the X button on the display. (Fig.15) FIGURE 15: IPAS instruction 10 2.3 Principle of IPAS technology The IPAS use computer to process signals from the vehicles sonar warning system, backup camera and two additional forward sensors on the front side fenders(Fig.16). The sonar park sensors including multiple sensors on the forward and rear bumpers which detect objects, allowing the vehicle to calculate optimum steering angles during regular parking. [19] The Intelligent Parking Assist System expands on the function of these sensors and is accessible when the vehicle is shifted to reverse (which automatically activates the backup camera). The central processor calculates the best parallel or reverse park steering angles and then implement with the Electric Power Steering systems of the vehicle to guide the car into the parking spot. FIGURE 16: front sensors 2.4 Sensor technologies in Intelligent parking assist system 2.4.1 Ultrasonic sensor In the past 20 years, Ultrasonic sensors are used for many applications for military application in submarines, in Medicine for diagnostics, and as sensors for distance measurement in industry. Automotive applications use piezoelectric ultrasonic transducers since 1993 as they are small and robust.(Fig.17) The piezoelectric effect describes electromechanical property of a crystal. a mechanical deformation appears when a piezoelectric crystal is applied an electric field on its two sides. A mechanical deformation of the crystal can also generate an electric voltage measured at the crystals electrodes. The voltage is proportional to the deformation. Thus piezoelectric materials can be used as high frequency (ultrasonic) oscillation generators and sound wave receiver. An ultrasonic piezoelectric element can be considered as a loudspeaker and a microphone in one unit, therefore it is known as transducers. [21] FIGURE 17: the cross section of the car ultrasonic sensor 2.4.2 Video technology 2.4.2.1 CCD and CMOS technology CCD and CMOS are wildly used as image sensors. In a charge-coupled device (CCD), electrical charge move within the device to an area where the charge can be manipulated. Linear array of MOS capacitances are combined so that a stored photo charge can be moved. Photo charge pairs are generated in the semiconductor under the influence of incident light. Interline-transfer CCDs are the mostly used type in automobile applications. (Fig.18) The charges are sequentially and vertically transferred to a register. [22] FIGURE 18: Interline-transfer CCD [21] CMOS sensors use non-integrating photodiodes which are independent from the exposure time. It has a characteristic similar to the human eye which means CMOS has a high dynamic range. CMOS sensors have more advantages than the more generally used CCDs: they have lower costs by taking advantage of submicron CMOS technology. Several functionalities can be integrated on the sensor itself. The power consumption is low as the circuitry in each pixel only activated during the readout period, there is no clock signal driving large capacitance as well. Readout speed can be enhanced by parallel access to multiple taps of the pixel array. As a result, CMOS sensors are favored using on automotive. 2.4.2.2 Video Cameras and Vision System FIGURE 19: structures and camera system structures of Parking and maneuver assistance systems There are four structures of video cameras, see Fig.19. The camera for photo only has a standard NTSC- format of its video data. Meanwhile, digital cameras with a LVDS interface are mostly used. The camera parameters can be controlled by an external CPU with the optional LIN/CAN interface. With the help of internal Graphic Processing Unit (GPU), smart cameras can extract features from the picture and thus provide additional information to the device. Due to the space and thermal conditions, these cameras are limited in its functionality. They are a combination of a digital camera with an external GPU called smart system in which two components can be connected via LVDS. An multi-camera system typically has more cameras in used. 2.5 Limitations on Parking Assistance Systems Ultrasonic technology has some limitations in functionality as follow. Sound absorbing materials are hardly seen by the system. The system has a short detection range for people who wears absorbing cloths. The system will be influenced by objects in the vicinity of the own vehicle, in particular the noise of compressed air like truck brakes. The detection range may differ by mud or snow covered on it under severe weather conditions.[23] Video technology has also restrictions: visibility range of cameras may reduced by poor weather conditions (Silicon sensor technology will have a significant impact). Like the ultrasonic sensor, camera lenses may be covered with mud or snow at poor weather conditions and must be cleaned frequently. Due to their limited performance, Parking systems based on ultrasonic sensors and cameras are therefore defined as comfort systems.[23] Ultrasonic sensors and video cameras are excellent supplement to each other for their different physical principles. Each technology has individual strengths supporting the weaknesses of the other. The camera-based system can be improved by being combined with an ultrasonic system with the ability to measure the distance to objects. This allows the detection of objects while visual quality is poor for the camera system. The video picture together with an ultrasonic parking system contains much more information for the driver. This is an important step towards more detection security and functional safety.[23] Radar sensors with a longer detection range can be mounted behind the bumper of the vehicle. They may be used for IPAS as well as for safety functions like collision avoidance or collision mitigation. [23] Radio frequency identification (RFID) and Intelligent parking assist system (IPAS) are wildly used in our daily life. This report discussed RFID in the field of electrical lock system and IPAS in car industry. The first RFID device was developed to be a mobile toll system, and the similar technology was invented to be an espionage tool back in 1945. Radio frequency identification use radio wave as a medium in communication between reader and tag. An RFID tag can be either passive or active. A passive tag is powered by electromagnetic field generated by the reader, while an active tag has its own battery. The reader send signal to interrogate the tag, the tag will respond when it is in the range of the reader. The data in the tag can be used as a key to unlock doors so that RFID lock system are generally used in hotels. Since the RFID has its contactless characteristic, RFID locker is better than traditional keycard mechanism. Locks with RFID technology have a longer life cycle and low maintain expense. However, it still has some drawbacks in cost, signal interference, frequency, standard. IPAS was first developed on Lexus models, the technology integrated ultrasonic sensor, camera system, electrical steering system and on board computer. The vehicle will drive itself to the parking lot without the drivers assist. The two main components ultrasonic sensor and camera supporting the weaknesses of the other. The ultrasonic sensors are used to detect surrounding objects while the camera is used to locate the parking area. The system has its limitations in signal interference, natural factors. References [1] Mandeep Kaur, Manjeet Sandhu, Neeraj Mohan and Parvinder S. Sandhu, RFID Technology Principles, Advantages, Limitations Its Applications, International Journal of Computer and Electrical Engineering, Dec. 2011. [2] K. Finkelzeller, The RFID Handbook, 2nd ed., John Wiley Sons, 2003. [3] Roy. Want, RFID Explained: A Primer on Radio Frequency Identification Technologies, Morgan Claypool, 2006. [4] Stockman, Harry (October 1948), Communication by Means of Reflected Power, Proceedings of the IRE, 36 (10): 1196-1204. [5] Real Time Location Systems (PDF). clarinox. Retrieved 2010-08-04. [6] Charles A. Walton Portable radio frequency emitting identifier U.S. Patent 4,384,288 issue date May 17, 1983 [7] Hacking Exposed Linux: Linux Security Secrets Solutions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN [8] Genesis of the Versatile RFID Tag. RFID Journal. Retrieved 2013-09-22. [9] R. Want and D. Russell, Ubiquitous electronic tagging, IEEE DS-Online. [10] D. J. Moore, R. Want, et al., Implementing phicons: Combining computer vision with infrared technology for interactive physical icons, in Proc. ACM UIST99, Ashville, NC, pp. 67-68, Nov. 8-10, 1999. [11] R. Want, A. Hopper, V. Falcao, and J. Gibbons, The active bad

Thursday, September 19, 2019

The Mother Should Have the Choice Essay -- Abortion, Argumentative, Pr

The Mother Should Have the Choice When abortion is being discussed in any case, there is one common question to be answered; does the mother or the fetus have the rights? Aborting pregnancies has been around for centuries, and so has all of the controversy around abortions, dealing with religious beliefs and morals. After all sides are looked at women, the mother should have the right to decide what she wants to be done with her unborn child. This essay will support the idea that women have the right to choose what is to be done with there unborn child only in the first trimester of their pregnancy. The first trimester of a pregnancy is where the decision should be made about the unborn child. After that time frame abortion should not be allowed for the damage is too great on the woman’s body and the unborn child has devolved too much. The sooner the abortion takes place the safer the outcomes. In addition, "forcing a woman to carry a fetus to term unless she meets certain criteria unrelated to her own aspirations and priorities is a profound interference with a woman’s body and thus a violation of security of the person." (Smith 105) Smith makes a good argument here, stating that forcing laws and morals on the mother is violating her right to security of persons. The mother is the individual and the fetus is part of her body, which is why the mother has the right to choose what will happen to her body, only in the first trimester. Next, "The only good solution to the moral ambiguities involved is to prevent unwanted pregnancies." (Cauthen) Preventing unwanted preg nancies would help reduce child abuse, child neglect, reduce adoption and just help control the abuse a child receives. A woman may have gotten pregnant for man... ... life and let some else love the child and provide for it. In the end the child should be able to live. With everything to take in to consideration the mother should be the one to have the choice as to what should be done to her body and her unborn child in the first trimester. While the issues apposing abortion are strong, the woman should still be the one allowed to decide what is in the best interest for herself and the unborn child. As law states now and as it will go in the future woman will be able to choose what happens to them as and their unborn child. The mother will be the only one to decide what is morally and ethically correct for her and her unborn baby. Works Cited Mason, J K, and R A McCall Smith. Law and Medical Ethics. London: Butterworths, 1994. Cauthen, Kenneth. "Abortion." 18 June. 2001 http://www.frontiernet.net/~kenc/abort.htm.

Wednesday, September 18, 2019

It is Impossible to Accurately Imagine What is it like to be a Bat Essa

It is Impossible to Accurately Imagine What is it like to be a Bat Insofar as I can imagine this (which is not very far), it tells me only what it would be like for me to behave as a bat behaves. But that is not the question. I want to know what it is like for a bat to be a bat... - Thomas Nagel In order to take the above request seriously, one must assume that bats have experience and consciousness. Assuming so, one must then imagine the consciousness that a bat must live with. Its brain is "designed to correlate outgoing impulses with subsequent echoes, and the information thus acquired enables the bat to make precise discriminations of distance, size, shape, motion, and texture comparable to those we make by vision." (Whereas we humans rely on sight to create our vision of the universe, bats rely on sound.) Because any argument of any creature's existence must be based on the human epistemology, the question is now not how bats perceive the universe, but how a bat's perception compares to the human perception. Such a comparison may never be genuine or correct, but by...

Tuesday, September 17, 2019

Marketing Strategy Essay

Discuss the type of product the company will offer and identify its primary characteristics The type of product the company will offer is a bracelet called Life Alert band. The characteristics of this device are size and the ease of use along with a lifetime guarantee. The Life Alert band is light and portable that no one will even know it’s on his or her wrist. It’s the size of a thick rubber band and comes in different wrist sizes. It has one easy to access button with an emergency icon that only needs to be pushed once to alert the Life Alert call center in the event of an emergency. The bracelet has several hidden sensors that monitor a person’s pulse and blood sugar and wirelessly sends this information to the Life Alert monitoring centers. If a change is detected in any of the monitors the bracelets sends a signal to the centers for immediate action. The Life Alert medical counselors immediately call the patient to see if they are ok. If no response is received they dispatch emergency responders right away. The bracelets uses flash memory to keep the device slim and flexible. It has a flexible band that can bend slightly. The material of the bracelet is a made of hard rubber that protects the electronics and its sensors. The bracelet requires a one-time setup much like a cell phone has to be programmed by Life Alert in order to ensure communication is occurring with their monitoring centers. The device has wifi built in for local communication. Users who have a wireless network can browse directly to the bracelet using a web browser. This gives them access to all the information the bracelet is recording. Discuss the product branding strategy Entrepreneur magazine states that a branding strategy is how, what, where, when and to whom you plan on communicating and delivering on your brand messages. Where you advertise is part of your brand strategy (Enterpreneur, 2011). In this case a brand is name that consumers associate with a device or service. Life Alert has many devices, all which bare its name on it. For example wireless companies such AT&T sell cell phones from different manufactures but all of them have the name AT&T on them and their logo. This goes for any large company that sells multiple products even if the products are manufactured by another company. Another good example is Apple. Apple has mp3 players, desktops, laptops, and other computer peripherals, all have the Apple logo on them. Therefore, the branding approach for the Life Alert bracelet will be the umbrella branding approach. The umbrella approach will help Life Alert in promoting their popular name even further. In a survey taken by ACNielsen International Research, 87% of Life Alert members said that Life Alert’s protection is a main or important factor in their decision to keep living at home rather than going to a retirement institution (lifealert911, 2011). Life Alert members on an average spend 6 more years living alone because of their services. The bracelet will not only enhance their product line but attract more customers. The introduction of this bracelet will increase their customer base and maybe appeal to those who have a serious illness. The bracelet will become the main entity of the product line with Life Alert’s name and logo. Discuss how the product fits within a product line and the depth and breadth of the line. Life Alert’s bracelet is a unique product that has carved a niche in the medical devices industry. It fits into health care products that offer emergency services for monitoring and addressing health related issues. It addresses a void in the industry and aims to support independence in aged adults by providing state of the art monitoring and emergency services. The distinctive aspect of the Life Alert bracelet is that it is both broadens and intensifies in scope in terms of its breadth and depth. It fits well into the product line Life Alert offers. It’s an extension of the current product offerings. Some of the functionality the bracelet offers cross’s over to other product categories. For example the bracelet now becomes competitive with blood glucose meters. Regardless, the bracelet extends the depth and breadth of the company. Explain how the product and target market strategies fit with the organizational strategy. The organizational strategy is based around a few key factors. The company’s business domain is clearly defined and is focused towards Mature 50+ adults who wish to live an independent lifestyle. The factors that are considered are mainly geographical location, age, retirement lifestyle and medical needs. The strategy is effective as it concentrates on a few key product and ervices. Life alert employs niche marketing to devise a product strategy aimed at that targets mature 50+ adults residing mostly in Florida, which is a popular retirement destination, who are currently living a retired lifestyle and desire a degree of independence and who may or may not have specific medical needs. The Life Alert bracelet fits into the organizational strategy for Life Alert. Introducing the bracelet will solidify the stance in the market. The organizational strategy for Life Alert is to be most innovative company in assisting the elderly. Life Alert can take advantage of its existing organizational strategy to support and market the bracelet. The company can further expand its diversified portfolio of services by using its existing infrastructure and the multifaceted use of its core resources. By including and expanding on existing product offerings the company can reduce cost and maximize return on resources. Life alert bracelet can utilize the infrastructure for Life Alert Necklace, security, monitoring and emergency response services with minor additions. All of these services employ the same core organizational set up, which is the monitoring center, which maximizes service offering with minimal investment. The marketing strategy includes Ads in local newspapers or niche publications, Opt-in web sites that make use of keywords to connect with potential customers, direct mail campaigns, as well publicity through Television developed for mature audiences. The bracelet can be incorporated under these existing marketing tools since it’s directed towards the same target audience. The ease of competitors’ entry into Life Alert’s market segment is minimal as the company employs a profitable business model where users pay an initial set-up charge for the systems and the company generates revenues each month through subscription-based monitoring costs. The company also distributes medical alert system to more than 300 resellers and is one of the largest wholesale medical alarm distributors in the nation, with over 200,000 medical alert devices in service. The bracelet can be an adjunct to the existing portfolio and use the same monitoring system and distribution strategies in use. The business strategy also supports innovation and product development and at present only a couple companies offer a medical alarm with two-way voice. With an additional service such as the bracelet the company will be a step ahead of its competitors and can utilize its R&D budget to support the new product. The company’s ability to customize services and marketing different price points for packages will allow customers to use the bracelet with other Life Alert products and services. The new product aligns well with the company’s organizational strategy and the same marketing strategy can be applied towards the Life Alert bracelet.

Monday, September 16, 2019

Different examples of power Essay

What is power? What are different examples of power? How can people gain and maintain power? Power is being able to make something happen or prevent something from happening. You know if someone has power if they are leaders or if they are respected. If you’re a good influence you can also gain power because people begin to follow in your footsteps. Examples of power are political, economic, and social. Political power is an authority held by a group within society that allows for the administration of public resources and implement policies for society. The President has political power and the governor has political power. Social power is the degree of influence that an individual or organization has among their peers and within their society as a whole. Martin Luther King had social power and Malcolm X also had social power. Economic power is organization of the money, industry, and trade of a country, region, or society. Jay Z has economic power because he has money. My essay is going to be about stop and frisk and how often it is being used by police officers and how it affects the people in neighborhoods it is constantly happening in and the statistics on the frisking. In New York City police officers have a program called stop and frisk which is when a person is stopped by a cop and patted down to examine if the person is carrying a weapon or if the person is engaging in illegal activity. This type of limited search occurs when police confront a suspicious person in an effort to prevent a crime from taking place. A stop is different from an arrest. An arrest is a lengthy process in which the suspect is taken to the police station or booked and a frisk is only a temporary search. If the officer uncovers further evidence during the frisk, the stop may lead to an actual arrest, but if no further evidence is found, the person is let go. Unlike a full search, a frisk is only limited to a patting down of the outer clothing. If the officer feels something like a weapon, the officer may then reach inside the person’s clothing. If no weapon is felt, the search may not go any further than the outer clothing. In 2011, New Yorkers were stopped by police 685,724 times by police officers and 88 percent of them were totally innocent. 34 percent were African Americans & 34 percent where Latinos. 51 percent were though age 14 to 24, only 9 percent were Caucasian.. In the first nine months of 2012, New Yorkers were stopped by police 443,422 times. 89 percent were completely innocent. 55 percent were  black and 32 percent were Latinos, 10 percent were white. Stop and frisk causes people to be afraid of the police because when they are around they have to worry about being frisked by them. â€Å"Stop-and-Frisk abuses corrode trust between the police and communities, which makes everyone less safe. I know people that get very scared when the police come around because he had been frisked a lot of times. Police officers also sometimes use physical force when frisking people. For example, if you are getting frisked and you try to resist, the police will sometimes use physical force on you because they may feel like you’re disobeying them. Stop and frisk is a violation of the Fourth Amendment. The Fourth Amendment says â€Å"people have the right to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.† Mayor Bloomberg and police say stop and frisk has helped New York reach a low crime rate. New York has the lowest crime rate among the nation’s biggest cities, said by the FBI. People call the stop and frisk practice racial discrimination. Aggressive stop-and-frisk practices are having a profound effect on individuals, groups and communities across the city. Residents of some New York City neighborhoods describe a police presence so pervasive and hostile that they feel like they are living in a state of siege. w deeply this practice impacts individuals and they document widespread civil and human rights abuses, including illegal profiling, improper arrests, inappropriate touching, sexual harassment, humiliation and violence at the hands of police officers.

Sunday, September 15, 2019

The New Digital Era called “MP3 Technology”

Downloading of music has been a long time subject of piracy. In the 1920’s, radio stations played records that are not tracked. It is a not-so obvious manner of piracy but did impact writers who were losing money due to public performance of their works without proper accountability. No one was making money through this procedure but only radio stations via their sponsors. (Wicknick, par. 1) With this, the performance rights societies including ASCAP and BMI worked with the Congress and the FCC to change legislation to ensure that radio stations will track airplay and pay blanket licenses that were given to writers based on airplay. (Wicknick, par. 1) It is impossible to copy a record before the invention of blank tape. Its either you bought it or borrow a copy and played it until the needle lost its tip. (Wicknick, par. 3) In the mid 1960’s, even after the invention of blank tapes, copying a record is sill a clunky process. (Wicknick, par. 3) In the advent of cassette tape, people learned to do dubbing. But marketing of these tapes are low because it is still evident that it is dub due to sonic integrity has been compromised. ASCAP and BMI, together with the FCC, they began to collect blanket license fees on the sale of blank media and give them to writers and publisher members. (Wicknick, par. 4) In 1982, in the faà §ade of CD in Europe, Japan and in the United States by 1983, it was read-only. Burning to a CD is impossible before. But advancement in technology made it possible. In the year of 2003, you can burn CD from mp3 and sources like iTunes. However, MP3 and iTunes do charge for licensing, worked out deals and propose duplication allowances. (Wicknick, par. 5) The onslaught of the digital wave in 1999 started with the newly created MP3 file sharing software called Napster, stated Catherine Edwards, in her article â€Å"The Napster Challenger.†Ã‚   Lee Bockhorn, in his article â€Å"MP3 and Me: How I Stopped Worrying and Learned to Love Online Music File Sharing (sort of)† stated that on one side of the wave is the estimated 60 million MP3 Internet users that enjoy the advantages of ala carte collection choice, downloading these selections for free and testing music before purchasing. On the other side are the artists and recording companies making strong claims for illegal sharing of copyrighted material states John Healey and Jeff Leeds in their article â€Å"Tone Deaf to the Moral Dilemma?†Ã‚   The new MP3 file sharing technology has brought to us into a new digital age madness designed for music lovers.   Claiming violation of copyright laws, the greedy recording companies and music artists do not wish to give up the present business structure and refuse to embrace the exploding expansion of digital technology that will allow ‘ala carte purchases’. The start of this digital age software began with a 19-year-old freshman at Northeastern University in Boston in 1999.   His name is Shawn Fanning.   He revolutionized the music industry, developing a software program called Napster.   Napster allows music fans to share and download music files via the Internet for free.   Shawn received $15 million to start the corporation and is now a famous CEO (Edwards 160). Then, one and a half years later, in 2001, 2 famous bands, Metallica and Dr. Dre, sued Napster. The Recording Industry Association of America (RIAA) sued as well, claiming Napster violated record label copyrights.   This case is still on appeal.   Since this time, Napster has joined with BMG Entertainment (a $50 million dollar deal) offering a new fee-based system (Edwards) The RIAA has been taking drastic measures to limit piracy. Consumers of music sees file-sharing or downloading as the wave of the future and legal in their own right. The lawsuits include a twelve year old for downloading contents online and an 80 year-old grandfather who were sued for his computer activity wherein he claimed that he don’t even know how to turn a computer on. Many of the grandparents bought computer for their grandchild as a treat whenever they come to visit their place. But a twelve year old may be well aware on the usage of the computer technology as well as a graduate student but doesn’t know or understand the violations of what they have done. (Wicknick, par. 2) The next approach for RIAA is to target college students and parents with further lawsuits alleging copyright violations.   â€Å"One goal is to persuade parents to crack down on their children’s file sharing before an entire generation comes to expect music to be free† (Healey and Leeds 175).   This may prove to be a futile effort with the millions of Internet users copying music for free on the new sites that have popped up, such as Kazaa or Limewire.   Also, many parents condone students’ downloading even though it’s unethical.   RIAA lawsuits will attempt to target the Internet account that is used to share the file (Healey and Leeds 177).   These lawsuits may change the attitudes of 12-22 year-olds, that when surveyed said that 70% of them would stop if at risk of a fine or jail (Healey and Leeds 178). According to the Pew Internet Project’s national survey of adult Internet users conducted last January-February 2005 resulted that about 7 million adults downloaded files from someone’s iPod or MP3 player. (Madden and Lee par. 2) Approximately, 10 million people get their music and video files through email and instant messages. But there are people who use both the same sources. Other alternative sources of downloading include music and movie websites, blogs and online reviews. There is also a legislation being pushed in Congress by the record companies.   If approved, it would use software to flood peer-to-peer sharing with dummy files, search public folders for illegally copies music and block users from downloading.   Even though it’s difficult to empathize with rich artists and greedy record companies, it is still, according to law, an illegal practice to share and download copyrighted music online.   Millions of people through MP3 technology are sharing files, making the concept of ‘fair use’ ridiculous (Bockhorn 163). Further in his article, Bockhorn writes of his personal exposure to the Napster era.   At the start of the Napster take-off he felt that it just wasn’t right to not pay an artist for his/her music.   He explains that his first temptation came after attending a Norah Jones concert.   He later downloaded her performance of the ‘Tennessee Waltz’ thru I-Tunes. His justification was that he had paid to see the concert and had bought previous albums (Bockhorn 162).   In a forum done by eight graders, some students thought that the music industries have huge incomes and it would not hurt if they will get a song or two from an album through the internet. A student said that the artist will still have an income because they are still buying T-shirts and watch their concerts. (Hafner, par. 13) Curiosities about MP3 file sharing, lead to Bockhorn’s downloading of Limewire, a successor to Napster.   He agrees that it is unquestionably, great technology, without paying a fee.   Drawbacks to MP3 are availability of music, modem connection speed, and the guilt of acquiring music without paying.   â€Å"If I want to download My Cherie Amour, Stevie Wonder should get a cut of whatever price a true market . . . determines the song is worth . . .† (Bockhorn 162). Currently, Bockhorn’s primary concern is that MP3 technology has definitely warped the minds of users copying illegal files to build their music collection.   But, why does the music lover continue to partake?   Number one because of choice and number two because it’s free (Bockhorn 163).   Most people will agree that it’s illegal but will continue to do it.   â€Å"Like countless millions, Miriam Philips felt no guilt in downloading music from a shared campus folder† (Healey and Leeds 175).   Philips offers no sympathy for the artist and the record company, â€Å"They’re rich, they can deal with it†, (Philips via Healey and Leeds 175). According to a 13-year old girl, if you wanted a song or two in a certain album, it is not a big deal.(Hafner, par. 3) However, when someone consistently downloaded an artist whole CD, it might be the right time to call them thieves. Almost all of the houses here in the US have Internet-connected computers in their homes. A student even asked that if downloading of music is really illegal, why do PCs were sold with CD burners? (Hafner, par. 18) Downloading of music through CD burning is very convenient especially to students who were mostly doing it.   Just a few clicks away, they will be able to have the songs they wanted. (Hafner, par. 9) Though some of these people knew that they are violating the law, but they can’t afford to give up convenience and less expensive or the free copies of the recordings of their own choice. On the other hand, there are some advantages to the downloading frenzy.   This technology has prompted some users to purchase CD's based on a new interest in a particular type of music.   It is able to give a taste of a certain type of music or unknown band before purchasing an entire CD.   Users will find that if they’re downloading more than 2-3 songs they will probably go out and buy the entire album. Internet users will also argue that it is difficult at times to locate a particular piece of music that they’re looking for.   Also, this activity is for personal use, not resale (Healey and Leeds 176).   There is also no evidence that MP3 file sharing has dramatically hurt CD sales.   In 2001, sales dropped 10% and in 2002 sales dropped 7% (Bockhorn 163). There are news and write ups on lawsuits for music-downloading like the Napsters and Metallica lawsuits but possible loss of revenue for recording industry were not perceived. Music-downloading is hurting the businesses of music retailers. While downloaders are getting music for free through downloading it from internet or MP3s, it is a loss of income for massive music retail outlets. (Bestul, par. 5) People resigned from buying or purchasing music and switch over to downloading it from the computer instead. What they haven’t thought about is the income that music retailers or outlets will lose every time they download the music for free from computer or MP3 instead of buying a CD from retail outlets. In attempting to defend this illegal behavior, consumers will argue that corrupt record companies refuse to embrace technology that will allow ‘ala carte’ purchases.   Consumers wish to purchase the one or two songs from an album that are worthy of purchase.   This choice could lead to the extinction of great albums such as the Beatles’ Sgt. Peppers album (Bockhorn 163).   Bockhorn believes that people want to do the right thing, and hopes that record companies will provide us options for subscription or ala carte, but thus far they have been very reluctant.   If record companies would join the new technology, all of us could rest easier know that the artist got his/her share (Bockhorn 164). It is believe to be impossible to stop the downloading of music because it is the fad as of this era. Aside from the fact that many people are music lovers, the technology that we have today is unstoppable. Advancement in technology might be the reason why people can come up in this kind of technique in getting what they want for free or at a lesser cost with much ease. Maybe in the future, we might have other ways or means of downloading music or files in a more convenient way based on how technology progress on every generation. Future growth of MP3 digital technology is yet to be determined, with many changes to come.   Millions of Internet users each day have access to use of this technology, either through free or paid Internet sites.   Consumers do have a choice, the questions remains to be, how many will lean toward their obligation of legal choice.   Future enforcement of the free technology won’t be effective unless the music industry offers a legal alternative to file sharing. References Bestul, Michael J. (11 December 2003). â€Å"Lost in the controversy.† Blogcritics.com Retrieved last October 19, 2006. Websites: http://blogcritics.org/archives/2003/12/11/082220.php Bockhorn, Lee.   â€Å"MP3 and Me: How I Stopped Worrying and Learned to Love Online Music File-Sharing (sort of).† The Weekly Standard 16 October 2002 Edwards, Catherine. â€Å"The Napster Challenge.† Insight on the News January 2001 Hafner, Katie (19 September 2003). â€Å"Is it wrong to share your music? (Discuss).† The New York Times Retrieved last October 19, 2006. Website: http://www.nytimes.com/learning/teachers/featured_articles/20030919friday.html Healey, John, and Jeff Leeds. â€Å"Tone Deaf to the Moral Dilemma?† The Los Angeles Times 2 September 2003 Madden, Mary and Rainie, Lee (25 March 2005). â€Å"Music and Video Downloading Moves Beyond P2P.† Pew Internet and American Life Project Retrieved last October 19, 2006. W Website: http://www.pewinternet.org/PPF/r/153/report_display.asp Wicknick, Darcie-Nicole. â€Å"The RIAA Muic Downloading Controversy: Both Sides of the Record.† MusicBizAdvice.com Retrieved last October 19, 2006. Websites: http://www.musicbizadvice.com/a_little_history_on_music_piracy%20.htm http://www.musicbizadvice.com/the_music_downloaders_point_of_view.htm http://www.musicbizadvice.com/RIAA_Music_Downloading_Controversy.htm ; ; ; ;

Isolation and Loneliness in Of Mice and Men Essay

In the novel Of Mice and Men the theme of loneliness and isolation can hardly be ignored as there are elements of them in key moments in the story. Isolation and loneliness plays a huge role in the story and some of the points that make this book a very gripping read, they also put things across that most of us would not have imagined in the first place. George and Lennie play the biggest part to the themes of loneliness and isolation. When they first arrive at the ranch everybody is very surprised to see two itinerant workers travelling around together. The night before George and Lennie come to the ranch they are sitting by the brush they say to each other ‘Guys like us, that work on ranches, are the loneliest guys in the world†¦ They don’t belong no place†¦But not us!†¦ Because I got you to look after me, and you got me to look after you.’ George and Lennie’s dream of themselves owning a ranch together and having a house with two separate bedrooms for each other, this in the day the book was written was very strange because people keep themselves to themselves and travel on their own they would do almost anything to share a room with somebody just for the company. But George and Lennie aren’t lonely and they want their own space away from other people. All of the other workers are not afraid to tell George and Lennie that they find it strange that two workers are travelling together and Lennie can only speak when George lets him. The ranch owner tells George that he will keep an eye on them because George may be trying to take something from George, for example his money. This is a perfect example of how people thought about workers travelling together. A good point about having friends on the ranch is if you get in a fight you have someone to stick up for you. An example of this is when Curley starts to hit Lennie he does nothing until George tells him that he can hit back and so he does and Curley gets what he probably deserves. The friendship that George and Lennie has is very important especially to Lennie because most other people would not be able to put up with him being a pest and causing them to loose their previous job in weed due to Lennie doing something stupid. If it was not for these two friends looking out for each other Lennie would probably been killed a lot earlier on in the story and not by George. Curley’s wife is also a great example of loneliness and isolation on the ranch. Steinbeck does not give her a name. That makes her feel unimportant and she is not wanted, even though she plays a big part in the novel about the themes of dreams and in a way stops Lennie and George from getting their own dream of their own ranch. She is the only woman on a ranch full of men. This means that there is an immediate sense of loneliness because if any of the workers are caught flirting with her there will be trouble because Curley’s dad is the ranch owner and he can get the workers sacked if his son tells him to, so Curley’s wife has to stay in her house all day and the only person she can really talk to is Curley. Towards the end of the novel when Curley’s wife is talking to Lennie in the barn it is the first time in the whole novel when she actually has a full conversation with anybody. She opens up to Lennie and tells him things that she has never told anyone else before, probably because she has nobody else to talk to. She really ‘lets her hair down’ and tells him all sorts of things like she tells him that she does not like to only have to talk to Candy because she does not like him and that he is not a nice person. The only reason why she married him was so that she can escape her ‘previous life’ at home. She also says ‘Think I don’t like to talk to somebody ever’ once in a while? Think I like to stick in that house alla time.’ On the ranch Candy is another perfect example of loneliness and isolation. Because he is old and disabled the other workers have a different attitude to him. His equivalent to a friend on the ranch was hi old dog. Because his dog was old and no longer useful so they kill it. Candy hopes they shoot him when he gets unable to do any work. At the very end of the novel when Lennie has killed Curley’s wife and Curley is hunting him down. George is the one to kill Lennie because they were friends and he wanted no body else to shoot him. This shows friendship even when Lennie has done something very bad up until his last moment George can still find it in his heart to be kind to Lennie.

Saturday, September 14, 2019

Mtn Nigeria Roll Out Strategy

MTN NIGERIA COMMUNICATIONS LIMITED Prior to 1999, which heralded the return of democracy to the Federal Republic of Nigeria, 30 companies had the Digital Mobile License (DML). None of these companies were fully operational as the lacked the technical and financial capability to operate the DML. Aside from the digital mobile licensee, the only active player who was more or less a monopoly was Nitel.The advent of democracy resulted in the appointment of a new regulator for the telecommunications industry. One of the mandates given to the regulator was to deregulate the telecommunications sector and to drive it to become an enabler of the Nigerian economy. The regulator’s first move was to revoke all DML licenses, free up the spectrums associated with the licenses and then open up the licenses to all that is interested.After a due diligence, going thru technical and financial bids, six players were invited to bid for three of the four spectrums put up for sale (the fourth was res erved for Nitel, the government owned company). After a very competitive, free and fair bidding process, MTN Nigeria Limited emerged as one of the winning bids, paying $285m for the license. As part of the terms to retaining the license, each operator of the DML license was to use the GSM technology. They were all given roll out targets, and targets on subscriber base. ROLL OUT STRATEGYAt a strategy management meeting, MTN identified that aside from ensuring that the roll out and subscriber base targets are met, they also have to ensure what ever strategy that is implemented will ensure that investment in the cost of the license and building of the network is recoverable and sustainable. Two roll out strategies were identified: Width strategy and Depth strategy or a combination of both. Whichever strategy was chosen, the marketing team were to ensure that the necessary marketing strategy, slogan and drive support it

Friday, September 13, 2019

Compare and contrast two European countries Essay

Compare and contrast two European countries - Essay Example Social exclusion and marginalization have been intensified by the several factors, which includes the following. The increasing disparities in educational and skill levels have led to several people staying out of the labor market because judgment is based on qualification. Long-term unemployment poses the individuals to the risk of segregation in the society. They may be denied access to opportunities due to their economic status. Male joblessness is another rising issue. This is brought about by the emphasis placed on gender equality. In the effort to combat the past inequalities, much has been done on the women and girl child part hence putting the male species at stake. (Atherton, 2003, p.81) Since more and more women are getting educated and are given first priority in the job sector men are at the risk of losing jobs. Another factor is feminization of an increasingly casualised work force. The widening gaps in income levels are creating bigger possibilities of social exclusion. The increasing gaps in income levels are building on social gaps between the rich and the poor. The rich gets richer and the poor is getting poorer. This makes it difficult for the poor to cope with the fast moving life. People who cannot fit in the high-class life are locked out to belong to a rather low class. (Atherton, 2003, p.85) Deteriorating health and life expectancies for the poor society members is on the increase. The poor cannot access to health services most likely after the superiors deny them them. Poor health leads to short life expectancy. The poor standards of living contribute largely to the rising mortality rates among the poor. The rich has enough income to eat well, have a dignified life, a good health and their life expectancy is higher compared to the life expectancies of the poor members in the society. (Ferguson, 1990, p.24) Social exclusion is at the centre of public discourse in all countries across the European Union. Most researchers and scholars use past data to create comparable indicators of social exclusion. Most of the comparable dynamic information was on a wide range of demographic, social and economic indicators across Europe. Almost half the employed age population is disadvantaged on at least one point in time. Very few people are likely to be sidelined on a large number of social exclusio

Thursday, September 12, 2019

International Relations High School Essay Example | Topics and Well Written Essays - 500 words

International Relations High School - Essay Example That the WASP should dominate, be regarded as the superior race, is a direct outcome of the fact that, to a large degree, they shaped the land, created the nation and framed its culture. Irrespective of the fact, or myth, that America is a melting pot, it is ultimately a nation created in the image of the WASP culture, religion and world view. Indeed, the capitalist system which is so distinctly American is the product of the Protestant work ethic. Democracy, which is as American as is capitalism, was born of the historic encounter between these early immigrants and the British. Added to that, the country's founding fathers, its first president and most of those which played such a seminal role in the formation of the United States of America, are WASP. The perception of superiority, therefore, is rooted in the making of America. Similarly, the American Indian's occupation of the bottom tier and the persistent perception of them as an inferior race emanates from the historical circumstances surrounding the encounter of the races. As noted in Chapter 6, not only did the American Indian emerge as defeated but was decimated, virtually purged off the land.

Wednesday, September 11, 2019

Expatriates in Bahrain Essay Example | Topics and Well Written Essays - 2250 words

Expatriates in Bahrain - Essay Example The politicians in power use it more for personal gain and indulge in vote-bank politics. The visual media should persuade in inviting such people for having face to face interviews and group discussions, with the happenings telecast live on air for the public. Although it is common in some of the countries, it still has a role to play in questioning the integrity of politicians who need to perform consistently over a long period of time. For example, the Network 18 channel group organizes interviews called 'Devil's Advocate' in India with popular figures being questioned. Many countries should follow suit by interviewing politicians in their locale. Of late, many environmentalists are spreading awareness about the Greenhouse effect. The media should help them in reaching out to the public, informing them the statistics regarding pollution, power consumption, etc. There is a team called 'Action network' formed by BBC news corporation where people can get guidance on starting campaigns, and discuss with others who have the same interest. It is for this reason that in 2005, Action Network was awarded top position in the World Forum on eDemocracy's list, highlighting the 'Top Ten Who Are Changing the World of Internet and Politics'. Many News channels all over the world should be encouraged like this to initiate such activities of public welfare. The mass media should also help the Government in getting the views of the public. It should also help the law makers by bringing out facts of how criminals get unscathed through the holes in the law. This could happen only if media takes the responsibility in analyzing the case and bringing the results to the public. Media should also bring out valiant attempts like using Hidden cams in places of suspicion, in uncovering bribery, scandals, forgery and record the incidents that they are confronted with. This would help the Police realize, where they stand in terms of protecting the law and would also gain in convicting the law breakers by the evidences received through media. While media brings updated information from all parts of the world, it is imperative for it to make people realize their global position in the field of Science and Technology. News reports of electronic gadgets, industrial equipments and scientific tools and methodologies should help people to upgrade themselves with the changing world. Computerization was a big factor in the world's development and most of which was possible only through the influence of Media. Media does and should help people to know about the satellites, defense equipments, infrastructure and functioning of other countries so that collective efforts can be taken to make their own Government to have such means. Of course, the challenge is big for the media to achieve such a big task because of pressure from politicians, police and some other people. All said, the media should continue to strive in its efforts to ensure public welfare. The public in turn should help the media in achieving the common objective of changing the 'Face of the Nation'. Expatriates in Bahrain - An Asset or a Burden All that is good does not come cheap. This can be compared with the situation in Bahrain. I have read from the news reports that Bahrain, an isolated kingdom in the heart of Middle East has a rapidly growing