Thursday, December 26, 2019

Fallacy Summary and Application Essay - 838 Words

Abstract An argument is fallacious when it contains one or more logical fallacies. A logical fallacy is an argument that contains a mistake in reasoning (2002). When using critical thinking to make decisions, an individual or group needs to be aware of logical fallacies and how they relate to decision-making. Logical fallacies can be used to manipulate a situation and if a person or group does not recognize logical fallacies, the person or group can be manipulated during the decision-making process. This paper will discuss three common logical fallacies and how they can be used in the decision-making process between management and subordinates in a business setting. nbsp;nbsp;nbsp;nbsp;nbsp;†¦show more content†¦The Nizkor Project describes a hasty generalization as a fallacy that is committed when a person draws a conclusion about a population based on a sample that is not large enough (www.nizkor.org). The managers that were involved in the discussion group stated that the entire staff should have their Internet access removed because they were all misusing at time, or would at some point in the future. Because only a few individuals have actually misused the company resource, it was hasty generalization by the managers to state that all of the employees have or would misuse the company’s Internet access. nbsp;nbsp;nbsp;nbsp;nbsp; The subordinates responded to the managers’ use of the hasty generalization fallacy, with a fallacy of their own. The subordinates stated that if the company removed a tool such as Internet access that is used to complete company business, what would the managers remove next. The phones, office supplies, or possibly their computers? The subordinates stated that if their Internet access were removed, they would eventually be unable to do their jobs. The subordinates to form their argument for not removing Internet access from the staff used the slippery slope fallacy. The logical fallacy known as the slippery slope occurs when we claim, without sufficient evidence, that a seemingly harmless action, if taken, will lead to a disastrous outcome (2002). The managers having listenedShow MoreRelatedFallacy Summary and Application Essay1066 Words   |  5 PagesFallacy Summary and Application Abstract Throughout this paper, we will discuss the relative meanings of fallacies and the importance they have in regards to critical thinking and the decision-making processes. Within the process of critical thinking, fallacies tend to play a very large part of this process. By definition, a fallacy is a statement or an argument based on a false or invalid reference (American Heritage Dictionary of the English Language). As you will read on further into thisRead More Logical Fallacies Summary and Application Essay1297 Words   |  6 PagesLogical Fallacies Summary and Application What do you see when you look at Begging the Question, Hasty Generalization, and Appealing to Emotion? When you initially look at these three categories they may not seem to have too much in common. However, when you look deeper you will see that in fact, they are all different types of logical fallacies. Logical fallacies are errors of reasoning, errors that may be recognized and corrected by prudent thinkers (Downes, 1995). The following quote helpsRead More Teaching an Applied Critical Thinking Course: How Applied Can We Get?3266 Words   |  14 Pagesthis function. The software in question is an interactive, artificial intelligence program that checks beliefs for faulty thinking (fallacies), including inductive and deductive errors. The system scans student essays for possible fallacies; asks questions at relevant junctions; provides individualized feedback on fallacies committed; provides summaries of fallacies found; diagnoses thinking problems; issues recommendations; and pro vides other pertinent information. The current movement in appliedRead MoreUsing Mobile Technology For Farming And Economic Reasons1343 Words   |  6 Pagestechnology to solicit prospective crops sales around the various remote agricultural communities. The authors, Sampangi, Viswanath and Ashish Ray stated that the Indian government was really on to something â€Å"new† with the Indian culture. Does this application not â€Å"go beyond† what the theory claims? This writer contends that –â€Å"If You Build It They Will Come† (Kinsella, 1982). What are the issues involved in translating theory into practice In further substantiating the previous thought concerning theRead MoreWhat is wrong with adultery Essay1697 Words   |  7 Pagesessay, Steinbock argues that adultery is different from a criminal offense position such as murder where people use moral rules against them. Hence, adultery is not banned universally because adultery is a private matter. Here, Steinbock commits the fallacy of equivocation which means a word shifts from its meaning from one premise to another. The word adultery shifts its meaning from a criminal offense to a private matter in the same argument. Such a change of meaning always makes an argument invalidRead MoreA Scientific Discussion About Diet And Exercise For Health And Weight Loss881 Words   |  4 Pagestranscribed the presentation into the format that I hope to submit for publication through you and your agency. The general scope of the book focuses on a summary of what we know about obesity and how exercise and diet assists with improving health issues that people who are obese face while attempting to lose weight. Following the summary are a series of responses to questions generated by either those in attendance for the lecture I gave, or close colleagues that I have worked with in the pastRead MoreThe Roman Road And The Romans Road1590 Words   |  7 PagesThe Roman Road Summary of Method -The intellectual method of evangelism the Romans Road uses a systematic way to explain salvation through Bible verses from the book of Romans (What Is Romans Road). The Romans Road method of evangelism is used by many evangelists and missionaries to share the good news of salvation. The Romans Road approach makes it easy to map out the road to salvation. Although there are different versions of the Romans Road the message of salvation remains the same. The RomansRead MoreHow Testing Can Improve Quality Of The Software1395 Words   |  6 Pagescan see how many bugs are in which module. â€Å"This can give a good indication that when a defect is found in one area of the application, chances are there are more defects in that particular area, so it is worth investing more time to test that particular area of the application to find as many defects as possible. However, testers should not ignore to test the rest of application as well as there may be other defects sc attered around.† (Amir Ghahrai, 2008)The fifth principle is the pesticide paradoxRead MoreThe Age Of Enlightenment : An Elusive Dream Of Perfection1244 Words   |  5 Pagesparadise beyond compare. Many, through their works tried to give their readers, if even through an abstract glance, what the perfection would be. Many writers thoughout time have seemed to understand society and through their works have shown the fallacy of this vision. Through their words, they revealed that in order for perfection or a Utopian to be established on reason, as demonstrated in Voltaire’s Candide, we as humans would have to give up what it means to be human. To quote Jesus Christ,Read MoreSummary and Response Essay1905 Words   |  8 Pages Outstanding Student Paul Brown (MW or TR) Summary and Response due date This is a Sample Summary and Response In his article Making the Grade, Kurt Wiesenfeld presents a problem regarding the ethical value of grades in modern society. A physics professor, Wiesenfeld opens the article by making the rookie error of being in his office the day after final grades were posted. (paragraph 1) Several students then attempt to influence him to change their grades for the class. What concerns Wiesenfeld

Wednesday, December 18, 2019

Deterioration Of Brotherhood And The American Dream

Suzanne Hornak Professor Kizershot English 102 20 October 2015 Midterm Paper Deterioration of Brotherhood and The American Dream Henry and Lyman are two brothers that had it all; freedom, a car, happiness. What almost everyone in life wants, The American Dream. Until Henry goes off to war and the effects of this ruins his brother’s enthusiasm along with his own. In â€Å"The Red Convertible† by Louise Erdrich at first you envy the relationship the two Native American brothers have until it slowly crumbles and becomes bitter and they end up losing sight of the visions they once held. Throughout the story the red olds that they own together is what embodies these brother’s bond from the very beginning of good times all the way until the very end. The story first starts out by mentioning the two brothers and the car itself. The car clearly symbolizes the relationship of the brothers. Erdrich’s opening paragraph starts with: I was the first one to drive a convertible on my reservation. And of course it was red, a red Olds. I owned that car along with my brother Henry Junior. We owned it until his boots filled with water on a windy night and he bought out my share. Now Henry owns the whole car, and his younger brother Lyman (that’s myself), Lyman walks everywhere he goes. (1) The author wrote it this way so that the readers understand what the car means. The first line into the story it mentions the car is a convertible and â€Å"reservation† is bolded. The author wrote it thisShow MoreRelatedThe Autobiography Of Malcolm X Essay1152 Words   |  5 Pagesto mention that author uses a transformation narrative or a metamorphosis story. It is a classic statement: a story of someone who has collapsed, in a moral meaning, and who is looking for the light. This narrative starts from Malcolm s moral deterioration at his youth. The author tells that he went to a Black ghetto in Boston, where he conks his hair, because he feels the uneasiness living around white people?. In Boston, he succeeded within Black culture and could not bear to the Black people whoRead MoreEssay on Search for Identity in Ralph Ellisons Invisible Man2669 Words   |  11 Pageshere (Draper 704). Hibernation, he says, is a covert preparation for a more overt action (13; Prologue). T hrough the rest of the novel, the protagonist explains what has brought him to his newfound understanding of his identity and his role in American society. Misled by his peers, the narrator initially believes that acceptance into society, even by false means, leads to self-fulfillment–an assumption that provokes his loss of identity (Draper 674). Before he died, the narrator’s grandfatherRead MoreThe Importance Of The American Dream In Arthur Millers Death Of A Salesman2107 Words   |  9 PagesThus, in Miller’s Death of a Salesman, the different components of the American Dream can either work together, or destroy an individual in their pursuit of their ultimate goal are represented through Willy’s pursuit a tight-family unit and extreme wealth. The prospect of the American Dream destroying an individual rests upon the definition and action of that same individual. What one individual may see as a success in their pursuit of happiness may very well be seen as a failure in another’s. SomeRead MoreExperiences of World War One in All Quiet on the Western Front, by Erich Maria Remarque1995 Words   |  8 Pagessay that it was a tremendous suggestion in that this novel to me seems to be one of the finest pieces of anti-war literature ever penned. The way the novel is able to portray the mindset of a soldier was beautifully done and shows the complete deterioration that occurs over time. First to understand more about the novel and its author, Erich Maria Remarque, it would be helpful to learn about his life. Erich was born on June 22, 1898 (internet source 4) in the town of Osnabruck Germany. He was bornRead MoreThe Horrors of War: Erich Maria Remarques All Quiet On the Western Front2024 Words   |  9 Pages The novel provides one of the earliest looks in to these mental issues such as PTSD that would become more widely recognized in later years. Remarque’s All Quiet On the Western Front vividly portrays the mindset of a soldier and the complete deterioration that occurs when one is in combat for days on end. First to understand more about the novel and its author, Erich Maria Remarque, it would be helpful to learn about his life. Erich was born on June 22, 1898 (Erich Maria Remarque-Peace CenterRead More John Maynard Keynes Essay examples4182 Words   |  17 Pagesas many other diverse ones. His induction into one of his many groups known as the Apostles was a very significant event during his time at Cambridge. This was a secret society that was very elite, containing only twelve members. It was a secret brotherhood of carefully selected individuals who sought truth and self development through absolute candor with each other. Bertrand Russel was a member of this group as was G.E. Moore, who played the role of mentor for Maynard. Moores philosophy and bookRead MoreInternal Threats to Pakistan10157 Words   |  41 Pagesreligious tolerance. But today, the lack of social justice in Pakistan subject majority of the people of this country to hunger and starvation, deprive them of equitab le access to education and economical well being and prosperity remains a distant dream. 3. Presently, Pakistan is passing through a critical phase of its history. The internal fabric of the society is badly damaged and the nation seems to be divided on almost every issue. On one hand the economical disparities are inculcating a deepRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesand Paul Buhle, eds., The New Left Revisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform

Tuesday, December 10, 2019

Legitimacy Theory and Its Testing †Free Samples For Students

Question: Discuss about the Legitimacy Theory and Its Testing. Answer: Introduction Each and every company is required to maintain the good corporate governance and is required to follow the generally accepted accounting policies and the relevant accounting standards. In case the company does not follow then it will end up with the failure. In the literature review, the companys mandatory or the voluntary disclosures have been discussed with reference to the base theory which is known as the Legitimacy Theory. The presence of the legitimacy theory is very essential in every business whether it is trading or manufacturing. The main focus has been laid down on the theoretical and the practical applications that are being followed by the company. It is related to the climate change that the country in which the company operates is facing. Two variables have been considered one is voluntary management (dependent) and other one is legitimacy crisis (independent). At first the motivational factors has been detailed and after that the literature review has been conducted with the hypothesis testing. The main aim or issue of the literature review is that what are the guidelines issued by the Government regulations and what motivates the companies to follow them. They follow it mandatorily or voluntarily. With this aim the review has been divided into the different headings and the subheadings. The issue of maintaining the climate in its original condition is very important in current scenario. In the todays world every company is emitting the carbon and thus is becoming the reasons for the climate change. The motivation of considering the issue for discussion has come from the below two factors: The major source of the carbon emissions are the companies operating in different parts of the World. Every company shall work in such a manner that the carbon emissions shall be at the minimum and shall not affect in any manner to the society and the environment of the country. For doing this the company has started making voluntary disclosures as to how much they have emitted during the year and how the financial performance of the company has been affected by such emission. On practical note, till now the Government has not made it mandatory for the companies to disclose the carbon emissions. In order to survive in the market the companies are required to disclose it so as to gain the interest of the stakeholder of the company. Data has been obtained from the Carbon Disclosure Project. The theory that has been underlined over the study is the Legitimacy theory. The theory aims that the company shall follow all the guidelines and the policies of the government authorities and shall disclose all the financial and non financial information of the company in the Annual report and other reports annexed to the annual report. In the current scenario, the companies are more convenient with the disclosure of the information for the user of the financial statements. Earlier researches have been conducted which has been done in relation to social contracts and the accounting by following the auditor and auditee relationship. Literature Review Social Contracts - The term social contract implies the arrangement or the agreement that is entered into between the two parties. In the context of this literature review the social contract is the arrangement entered into between the government and other stakeholders of the company and the company. The basic premise of the social contract is that the company is required to protect the stakeholders of the company and the society from the negative effects of the working of the company in the country. For instance the social and environmental effects like carbon emissions, production of hazardous gases, etc. If light is thrown in the history of the World, the social contract was first entered into by the people of the country with the king so as to protect them from the acquirers outside the state. The basic objective is to save the life of the people staying and residing in that country (Baker, 2013 and Cruess, 2008). Legitimacy Theory - The word legitimacy is single but it has relevance in almost all the fields. The term shall be considered all the time and in performance of every task. It provides the belief that the work that has been done has been so performed within the pre defined rules and regulations and the underlying policies (Burlea, 2013). It is also said that if the work has not been performed as per the rules and regulations then the work so performed is tend not to be legitimate. The similar case applies to the different companies operating across the World. They have entered into the social contracts with the society and environment and the government and therefore, they have the responsibility to provide all the useful information to the stakeholders of the company. The legitimacy theory is based on the three theories namely Institutional, Management and the stakeholder theory (Donaldson Preston, 2005). According to the institutional theory, the company is required to follow the predefined rules and regulations for the performance of the work; the management theory entails that all the work shall be integrated and focused towards the accomplishment of the common goals and the stakeholder theory states that the company shall perform its activities in such a way that the wealth of the shareholder shall be increased and the other stakeholders interest shall, be considered as the top priority. In such sense, the theory of legitimacy covers all the aspects which are required by the Carbon Disclosure Project. Following the legitimacy theory, most of the companies have started disclosing all the relevant information in their annual report and the corporate social responsibility statement along with the sustainability report. In the current scenario, the companies know that it is very necessary to reduce the carbon emission and save the environment and the society. In order to survive in the market, the companies are required to disclose how much emission they have made during the year. By following the industry norms, some companies have targeted the percentage above which the carbon shall not be emitted from the operations of the company. The setting of target by the companies to reduce the carbon emission is the part of the technique known as the Carbon Management. The companies set the minimum target and disclose it publically by making it available on the website of the Government under the Climate Disclosure Project. Sometimes setting the target and disclosing the carbon emissions have been seen as wrongful. It is because of the attitude of the company then it has while performing the work. The setting of the target is itself an example of the commitment made by the company towards the compliance wi th the reduced carbon emissions as laid down in the Carbon Disclosure Project. There are two types of companies which disclose all the information. One is good company which discloses all the information in the view that the company will be able operate in the industry and will have good reputation and by disclosing the same the company will not be in any danger situation. The other company is the company which in actual emits carbon in excess of the industry norms and discloses the relevant information in the view that the disclosure of any kind of information will not give negative effects but non disclosure of the information may lead to the penalty and thus they discloses it. All disclosures are required to be made under the Carbon Disclosure Project. Although it has not been made mandatory but the companies have started following it voluntarily (Rahman, 2014). Through this theory, the companies will be motivated to present the true and the fair financial position to the stakeholders of the company and also the correct non financial information. Out of the largest G 500 companies, 288 companys data have been used for the analysis and thereafter the hypothesis has been developed. The first hypothesis for which the model has been developed is that there is the clear and the positive relationship between the carbon risk management and the disclosure by the companies. 297 companies have not been considered because of the reasons that they have not disclosed the information about the carbon emission. Carbon Disclosure Scores have been found using the two proxies (Najah, 2011). One is the Carbon Disclosure Leaders Index, 2009 and other one is the Carbon disclosure score which is based on the report of the company Sustainability report forming part of the annual report of the company. The first proxy has been developed by the Big Audit firms. Following the hypothesis testing, Carbon disclosure project performance methodology has been used wherein the final score obtained by the companies are calculated using the percentage formula which helps in assessing the performance of the company. After that the regression method has been adopted and on the basis of the regression method adopted on the hypothesis, the results have been obtained. The result of the first hypothesis is that the carbon risk management is directly linked with the carbon disclosure made by the management of the company. Thus, the legitimacy theory makes the company to disclose all the information. References Burlea S, (2013), Legitimacy Theory available on https://www.researchgate.net/publication/303928907_Legitimacy_Theory accessed on 30/08/2017. Baker E, (2013), Social Contract, Essays by Locke, Hume and Rousseau Read Books Ltd., p 34 -43 Cruess R L, (2008), Expectations and obligations: professionalism and medicines social Contract with society. Perspectives in Biology and Medicine, 51(4), 79-598. Donaldson T, Preston, L. E, (2005), The stakeholder theory of the corporation: Concepts, Evidence, and implications Academy of management Review 20(1), 65-91. Najah M, (2011), Are Climate Change Disclosures an indicator of superior climate change risk management, available at https://mams.rmit.edu.au/myfzrqb7lhvw1.pdf accessed on 30-08-2017 Rahman N, (2014), Exploring the Relationships between the Carbon Disclosure and the Performance, Journal of Social and Behavioral Sciences, 164, pp 118-125

Monday, December 2, 2019

Water Supply and Project Team free essay sample

Modern Technology is one of the main reasons why most of business transactions today are easier. Thru the use of computer system, we can make exact and consistent reports, billing, monitoring, and many more. One of the best examples is a billing and payment system for a billing and payment transaction. It will help a lot to focus on customer bills, monitoring on customer info, paying of bills and producing an adequate weekly or monthly billing and payment report. Using a computerized billing and payment system will really help a lot on a business transaction. It will change the old manual transaction by transforming it to a useful computer system. The computer system will help the employees doing their jobs fast and consistent. It can even manage every department to give a balance interaction between the system and the business. OVERVIEW OF THE CURRENT STATE OF TECHNOLOGY The TRWSA is currently using manual transaction. We will write a custom essay sample on Water Supply and Project Team or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Every transaction that they accommodate every month is done through the use of a typewriter. The record keeping of their documents are not well organized because the filling cabinet are not able to maintain the proper arrangement of their files. They are not able to produce a specific report that they need because they are on a manual system. Through the use of computer system all of the current problem faced by TRWSA can be solve easily. Every transaction is processed through the use of computer. The working efficiency can be upgraded and it fastens the processing of every transaction. The storage of all files are now stored on an organized database therefore the searching and sorting of files can be easily done. The proposed system can produce annual reports easily. Preparing of bills is more easy, fast and accurate. STATEMENT OF THE PROBLEM This is the statement where the problems of project study states. It includes both the general and specific problems of the study. General Problem How could the current transaction of the Tibagan Rural Waterworks and Sanitation Association (TRWSA) be upgraded using functional computers or computerized transactions and to produce accurate billing receipts? Specific Problem How to improve the current data storage of TRWSA which is by record book or ledger? How to minimize time and process consumption on preparing, computing and issue of the bills? PROJECT OBJECTIVES This study is designed to identify and determine the usefulness of manipulating the system in Tibagan Rural Waterworks and Sanitation Association. GENERAL OBJECTIVE The project team adjusts in the needs of the company. The team designs a computerized billing and payment system to help them on upgrading their old manual system into a more easy and functional computerized billing and payment system. SPECIFIC OBJECTIVES These are the following objectives that the project team would like to achieve. The project team uses an organized electronic database that is included on the proposed computerized billing and payment system. The proposed systems really shorten the time consumption on preparing the monthly bills and the system are accurate on producing monthly bills. SIGNIFICANCE OF THE PROJECT This segment gives a brief explanation on various significance of the research. The study contributes so much to the following: I. T Professional This study helps the need for information technology experts to continue to grow. I. T students will assist to learn how to plan, analyze, design, build, maintain and manage projects. Professors and projects will expose students to software development, systems integration, and data management and computer networks. Project team The planned study serves the project team as their reference or guide in making their program. It also assists the project team taking computer related courses to identify the best programming language to use. Proponents learned how to boost their self – esteem and confidence. It also helped the team to have unity to make this system successful. Company The billing and payment system that the team proposes really helps on upgrading their current manual system into more easy to use, reliable and trusty computerized billing and payment system. The project team makes sure that every menus, options, and tools that are included in the system really helps on every transaction to be more accurate and to produce exactly the fair amount for the concern of the valuable customers. It also speed’s up the time in creating billing invoice. It also helps the user to avoid redundancy and other human errors. The system answer’s some problems of the TRWSA regarding on their system improvements. Customer Through the improvement of their current system the customer can easily pay their monthly bills. REVIEW OF RELATED LITERATURE The review of related literature serves as a basis for the project team to engage this study. This part offers the gathered information on the study. Water supply and sanitation in the Philippines is characterized by achievements and challenges. Among the achievements are a high access to an improved water source of 92% in 2010; the creation of financially sustainable water service providers (Water Districts) in small and medium towns with the continuous long-term support of a national agency (the Local Water Utilities Administration LWUA); and the improvement of access, service quality and efficiency in Manila through two high-profile water concessions awarded in 1997. The challenges include limited access to sanitation and in particular to sewers; high pollution of water resources; often poor drinking water quality and poor service quality; a fragmentation of executive functions at the national level among numerous agencies; and a fragmentation of service provision at the local level into many small service providers. Mr. Antonio Flores, 2010 In 1990 the Water and Wastewater Department and the Water Rates Advisory Committee of the City of Taguig, developed a new water rate structure simpler than the one previously in use. This new water rate structure encourages water conservation. Preliminary calculations done by city staff confirmed the advantages of the new billing system (City of Taguig, 1990). However, a specific water forecast model is required for a more precise estimation of the influence of the new rate structure on water consumption and on revenue collection. Such a model will allow testing of different rate structures and different conditions affecting water use and therefore revenue (water price, conservation programs, and weather conditions). Mr. Robert Marquez, 1998 Just like with any business, having the right tools is critical to a company’s failure or success. One of the most critical tools for a successful utility company is having an efficient, yet effective water billing system. Having the right billing in system is place is important for a number of reasons. New water billing software helps utility companies to be more efficient in their overall billing processes, while helping them to boost productivity. New water billing technologies help utilities automate internal billing processes into a simple, effective, and easy to use system. If you’re looking to boost efficiency and productivity, while decreasing customer response times and increasing customer satisfaction, there is no one more trusted in the utility billing services industry than CUSI Utility Billing Solutions. CUSI Solutions, 2011 Water supply scheme is the only urban water supply scheme in Marikina which has been getting the facility of computerized water billing system continuously since 1991. The operating of the system has been outsourced. The software development has not been in a year or two, but it has been in process years together and proudly contributed by generously from meter readers, counter clerks, fitters, plumbers, clerical staff in the office, and auditors and accountants, to the higher officers, engineers at all levels, and most of consumers of the scheme. It has become most intelligent software in the city and now it is not only utility software but it is management software. It is in use in Valenzuela and has to share the experience of managing more than 8000 consumers in the manila, the Capital city of the Philippines. Julius Bautista, 2002 REQUIREMENTS ANALYSIS AND DOCUMENTATION These are the important things to be taken in considering the system efficiency. Minimum machine requirements should be met which are stated below: The machine should run Windows operating system most preferably Windows XP. The processor should be Pentium or Athlon with a capacity of 1. 86 GHz. 1GB RAM for better performance of the system at least 100MB space in the hard drive for the system to be installed, 512MB video card or higher for better graphics. SCOPE OF THE PROJECT The focus of this study is on billing and payment transaction of TRWSA. This system can save, manage and organize the customer’ record. The proposed Water Billing and Payment System keep track of the monthly bills of preferred customers. The customers can be notified about their monthly bill and shows the transparency of their bill because this system is designed to produce accurate bill invoice. It generates Billing and Payment report of customers. The proposed system is password-secured for the security of the important records to prevent tampering and to loss of important documents. The personnel who have the authority to access all record of the system is the manager of the TRWSA. The proposed system only covers the billing and payment of TRWSA. It can also notify the user if the customer is already in need to be sent a disconnection notice. Records of monthly meter consumed by the customer can be shown easily, can search faster, and all records are stored in a database. OVERVIEW OF THE REQUIREMENTS DOCUMENTATION The researchers develop a Water Billing and Payment System equipped with Barcode Scanner for TRWSA. By using the system, producing of monthly bills is more accurate and efficient and the TRWSA will have no problem acquiring it. 1. The Billing and Payment System is more efficient and perform the billing and payment transaction faster and less time consuming. 2. The Billing and Payment System will automatically record the customer transaction and the time/date that they pay with a device using Barcode Reader. 3. Although having some difficulties, the project team still pursued developing computerized Billing and Payment System to be more fast and efficient in their transactions. GENERAL DESCRIPTION The project team aim is to propose a Water billing and payment system for TRWSA because nowadays manual transactions are no longer implemented on some water districts because it consumes more time on preparing bills and handling customers record. A lot of disadvantages are going to eliminate if manual transaction will be change into computerized transaction. This proposed system is using a barcode scanner to make it faster on handling payment transaction when the customer is going to pay his bills. Every bill notice or disconnection notice is including barcode data for the use of barcode scanners. After the completion of the project, it will be tested to check and monitor the water billing and payment transaction of TRWSA. The manager and secretary will be the user of the project. The manager has the authority to manipulate the system. Both the manager and the secretary have their own password to be protected and secured. The proposed Water Billing and Payment System aims to promote accurate billing, an easy way of payment and to make every transaction fast and reliable. PRODUCT PERSPECTIVE The project team has chosen to create and develop this kind of system because as of now, manual transaction are no longer been used on some water districts. Manual transaction is less efficient than the proposed system. This will serve as their computerized transaction on their monthly billing. The project team builds and conceptualizes this kind of system to maintain the good quality service that the TRWSA is given to its valuable customers. Brainstorming, suggestions and perseverance are present to come up with this successful proposal. It can be beneficial to the TRWSA to enhance their current flow of transaction from manual to computerized it is simply upgrade their monthly billing transaction into more efficient and reliable transaction. PRODUCT FUNCTIONS Monthly billing is the important part of the transaction, because here it all starts the computation of meter consumed and tracking of customers that who did not pay their bills. As the problem of keeping up some important records of TRWSA the product seems to provide an organized database for the user can be easily sort or search what he needed for the specific transaction. The product also comes up with barcode scanner to make every transaction fast and avoid typing errors within the payment process. The manager can easily check and supervise the day to day records of the customers with the use of this system. The main function of this system is its Barcode Scanning procedure. The system simply generate the bill notice or disconnection notice including barcode data and when the customer is going to pay his desired bills the user simply trigger the barcode scanner into the bill notice or disconnection notice and the system shows how much the bill is going to pay by the customer. Water Billing and Payment System recording procedure includes (1) adding new member record (2) updating records, for editing customer’s information. Monthly Billing procedure includes (1) monthly meter reading collected by the meter-reader. Payment of Bill procedure includes (1) using of barcode scanner on identifying the customer’s bill. Monthly billing and payment report procedure includes (1) simply the user click the print button to print out the report. Time In/Out procedure includes (1) recording of the time that the user logged-in and logged-out the system, (2) generating of reports of the attendance. USER CHARACTERISTICS The manager will be the end user of this system. He has the capability to manipulate and view all the records on the database. The manager and the secretary must be computer literate and knowledgeable about the system – particularly the flow, so he can perform his task accurately and efficiently. They do not need to learn about the programming language used in this system because he does not need to do to programming. GENERAL CONSTRAINTS The system’s performance can be tested and shown on Windows Operating Systems – much better if it is Windows XP. Some features might be present on Windows XP which might not be present at some operating systems nowadays. The existing system of TRWSA is a manual transaction that is more time consuming on preparation of bills. That’s why the project team decided to choose TRWSA to be the subject of this study. ASSUMPTIONS AND DEPENDENCIES Water Billing and Payment System with Barcode Scanner recognizes the barcode data of the bill notice or disconnection notice stored on its computerized database storage. It saves the records and updates the database immediately. It also requires a manager to handle and operate the system without the need of many users. The proposed system is password-protected so it can be guaranteed accurate and shows a genuine report. The user of the system does not need a lot of skills when it comes to programming. He only needs to acquaint himself and be aware of the processes made by the system to eliminate error. Concentration and effort must be present for him to get used in using the system. Preferably, the system would run on Windows Operating System – much better if it is Windows XP. SPECIFIC REQUIREMENTS This section provides the systems detailed features and its functions together with the considerations of what must the system and the user meet. USER REQUIREMENTS The proposed system really complies on the needs of the user. The user can easily understand the flow of the system. The system was able to produce accurate billing and publish the billing and payment reports. It lessens the time consumption on preparing the monthly bills and the computation of every customer’s bill. The system uses an electronic database therefore the user can easily search and sort customer files and records. The system is also password secured so that only the authorized person can only use the system. The user must be knowledgeable on the flow of the system and has the skill to use computer. SYSTEM REQUIREMENTS 1. Logging In Out and Registration 1. 1 The system must provide a registration form for creating accounts 1. 2 The user must be able to register in the system. 1. 3 The user must be able to log in and out. 1. 4 The system must be able to detect or distinguish a valid user account. 1. 5 The system must able to recognize the level of access of the user. 2. Billing and Payment 2. 1 The user must be able encode the meter consumed by the customer on the Compute Bill menu. 2. 2 The user must encode the full account number of the customer on the search textbox to be able to search the correct customer. 2. 3 The system must be accurate on computing the bills all the time. 2. 4 The system should be able to detect the customer who reached the penalty limit. 2. 5 The system must produce accurate billing and disconnection notice. 2. 6 The system should save the billing and payment history of the customer. 3. Report and Receipt 3. 1 The system must produce billing and payment reports. 3. 2 The system should produce accurate billing and payment receipts. 4. Maintenance and Security 4. 1 The system must assure the full security of the system. 4. 2 The manager should be able to edit and delete any non-active account on the system. 4. 3 The user must be able create a back-up copy of the database. INTERFACE REQUIREMENTS Log-In form – In this form the user needs to enter the correct username, user-type and password to be able to access the system. Main menu – all of the functions of the system are in here. The user must log-in with his account to be able to view the menu and sub-menu of the system. Compute Bill Menu – Here the user simply encode the customer’s consumed meter on the present meter textbox. To make the computation just click the compute button. To print the Bill notice, click the print bill notice button. Payment Menu – In this form the user can perform the payment transaction. The user needs to use the barcode scanner to able to search quickly on the database. The user needs to click the payment button to complete the transaction. To print the payment receipt the user simply clicks the print receipt button. Billing and Payment History Menu – This is where the user can view and generate the customer’s billing and payment reports. DESIGN OF SOFTWARE, SYSTEM, PRODUCT AND/OR PROCESSES The proposed computerized water billing and payment system was programmed using the visual basic 6 language. The system’s hierarchy was designed based on the flow of the monthly transaction of TRWSA. The system is using Microsoft Access Database as storage of files, data and all of the important information of the system. As the development of the system, the system is now included barcode scanner to fasten the payment transaction of the system. The system is a LAN based activated so the two computers can communicate to each other. To present the flow of the system we used a Data Flow Diagram and Context Diagram to analyze every flow of the data from one another. Here is the Context Diagram of the Existing Water Billing and Payment System. Here is the Context Diagram of the Proposed Billing and Payment System. Here is the Data Flow Diagram of the Existing Billing and Payment System Decomposing Process 1. 0 Billing System Issued Bill Invoice Distributed Bill Invoice Decomposing Process 2. 0 Payment System Here is the Data Flow Diagram of the Proposed Billing and Payment System Decomposing Process 1. 0 Billing System Issued Bill Invoice Distributed Bill Invoice Decomposing Process 2. 0 Payment System The Context and Data Flow Diagram shows the data flow of the transaction on the existing and proposed system. Based on the System requirements of the product it must be run on Windows Operating System and it works great on Windows XP because of the compatibility issue of the programming language that being used to developed the system. DEVELOPMENT METHOD The development of a system is not that easy. To prove that the system is running it consumes a lot of time on designing, planning, testing and etc. On the development of the system we considered some guidelines to help us through accomplish every part of the system. In this case we use the waterfall model as a pattern on developing our system. The Waterfall model is a sequential development process where development flows steadily downwards through the various phases of analysis, design, implementation, testing, integration and maintenance. The project team found that emphasizing planning, time schedules, target dates, budgets and implementation at one time allows us to consider, think and plan through the entire life of a project. The benefits of Waterfall model is it has several provisions for correcting any errors in early steps and allows for change control. Here is the sample of the Waterfall model that the project team has been used to develop the system. WATERFALL MODEL DESCRIPTION OF THE PROTOTYPE In this section shows the system prototype and some explanations on the functions of the system. Figure 1. 1 Login Form For Login:Here is the login form of the system. The user must be able to input correct username, privilege type and password to be able to access the system. The privilege type is the identifier of the user level of the system. For Registration: To be able to register new account the user simply clicks the register button to go to the registration form. Figure 1. 2 – Master Code Form For the Master Code: To be able to access the registration form the user must enter the correct master code of the system. This validation is serves as security to block unauthorized user to create new account. The manager is the one who knows the master code. For Changing the Master code: The manager can change the master code all the time he wants to. Figure 1. 3 – Set Master Code Form Here is the form where the manager can change the master code depend on what the manager wants. Frequent updating of master code can really help on the security of the system. The manager needs to enter first the current master code before entering the new master code. Figure 1. 4 – Add new User Form After gaining the access code, the user can now add new user account depends on the user level that the user wants. The username and password must be 6-10 characters long and the password must be a combination of alphanumeric characters. Figure 1. 5 – Main menu form This is the main menu of the system. The entire main and sub menu of the system are here. The toolbar at the top of the form includes the following menus: Customer Center menu – It includes the add/edit of customer accounts on the system Billing and Payment Transaction menu – On this menu the user can prepare the bill notice, compute meter readings, payment transactions and viewing/printing of billing and payment reports. Create Back-up Database menu – The manager can create backup copy of the systems database to be able to retrieve any important files in case there is database corruption happen. View User Account options menu – The manager can view all the user information here. It serves as the monitoring of the user on the system. Log-Book menu – The manager can view the log time in and out of the user. Figure 2. 0 – Add new customer Form For adding new customer: Here the user can add new customer account on the system. To be able to add the customer the user must complete all the information fields. The customer needs to pay the installation fee of the connection. For updating Installation Fee: The user can update the installation fee by clicking the update button. Figure 2. 1 – Edit Customer Information Form Here the user can update some of the customer’s information. The user can search the customer’s database by simply encoding the account number on the search textbox. Figure 3. 0 – Bill History Form The user can perform the preparation of the monthly bills here. The user can search the customer on the search textbox and enter the customer’s meter consumed on the present meter textbox. To compute the meter consumed the user needs to click the compute button to perform the transaction. To print the bill notice the user needs to click the print bill notice button. Figure 3. 1 – Bill History Form On this form the user can view the billing records of the customer. The user can sort and search the billing records on the database. To search on the database the user simply enters the account number of the customer on the search textbox. The system allows the user to print the billing record that the user has been selected. Figure 3. 2 – Payment Form In this form the user can perform the payment transaction of the monthly bills. Through the use of barcode scanner the searching of files on the database will be faster than typing the complete account number to find a customer. The user can view the complete bill information of the customer. To print the payment receipt the user needs to click the print payment receipt button. Figure 3. 3 – Payment History Form On this Form the user can search and view the payment records of the customer. The user can print the selected payment record of the customer. Figure 4. 0 – Create Backup Form The manager can create backup copy of the systems database to be able to retrieve any important files in case there is database corruption happen. The manager must choose the destination where the copy of the database will be saved. Figure 5. 0 – User log Form This is the user log form. Here the manager can view/print the user log records. To search on the user log database the user must set the start date and end date of the user log records. TESTING Table 1. 1 Type Scale Rating Equivalent 5 Excellent 4 Very Good 3 Good 2 Fair 1 Poor This table represents rating and equivalent used to evaluate the software material of the system. The highest score is 5 and lowest is 1. Table 1. 2 Reference table to obtain Mean Value Scores Weighted Score Interpretation 5. 0 – 4. 50 Excellent 4. 49 – 3. 50 Very Good 3. 49 – 2. 50 Good 2. 49 – 1. 50 Fair 1. 49 – 1. 0 Poor This table represented the weighted scores and the user understanding with the system in order to identify the results of the evaluation. Table 1. 3 Initial mean rating according to Functionality A. Functionality Rating Description 1. Correctness. Ability to produce correct. 4 Very Good 2. Reliability. Ability of a system to perform and maintain its function. 4 Very Good 3. Usability. Ease which of systems functions is learnability. 5 Excellent 4. Integrity. Data is stored and retrieval is correct. 4 Very Good Total 4. 25 Very Good Table 1. 4 Initial mean rating according to Engineering B. Engineering Rating Description 1. Efficiency. Amount of quantity expense. 4 Very Good 2. Testability. Hypothesis are logically possible 4 Very Good 3. Documentation. The process of providing evidence in research paper. 5 Excellent 4. Structure. Permanence of patterns and relationships of entities. 4 Very Good Total 4. 25 Very Good Table 1. 5 Initial mean rating according to Adaptability C. Adaptability Rating Description 1. Flexibility. Capability to adapt to new, different, or changing requirements. 4 Very Good 2. Reusability. Segment of source code that can be used again to add new functionalities. 4 Very Good 3. Maintainability. Something can be maintained. 4 Very Good Total 4 Very Good IMPLEMENTATION PLAN / INFRASTRUCTURE / DEPLOYMENT Care planning of the implementation and deployment of the system and the preparations of the researchers do for the deployment of the finished system. It has necessary steps in placing the new system into productions. The researchers need to take some considerations such as the user knowledge, the timing of implementation, type of deployment and its acceptability. On the counterpart in order to put Water Billing and Payment System into actions, the researchers need to be knowledgeable and skilled to be aware of all the needed things, materials, and proper actions for the implementation. The first step is to coordinate with the owner involved and interacted with the system then conducts an assessment of the system. However, once error occurs it affects the whole transaction but it is beneficial once the system runs properly. And if ever bugs appeared, the IT personnel and other computer literate personnel conduct can have a plan to deliver the problem and conduct maintenance once a solution came up. For the successful of the system, detailed and thorough planning is needed to extent the systems productivity. The developers need to test and validate again the functionality of the system to be assured that it’s free from errors and bugs. It’s also part of the developers to train the users involved with the system to operate the system to its full extent of functionality. CONCLUSION AND RECOMMENDATIONS Conclusion-The proposed water billing system will make accurate, functional and more efficient the existing system. As the project team has studied the system of the company, it has been concluded that there is really in need of a system that will greatly facilitate faster and easier transactions especially in the computing of bills, recording customer information and creating reports. Recommendation- Knowing the problem of the Tibagan Rural Waterworks and Sanitation Association it helped the project team to come up in recommending a computerized water billing system that will make accurate billing amount and billing transaction. Having this proposed system the company’s daily transaction will consume less time and effort expected in performing the work. It also gives more advantage not only to the employee but also to the management. This proposed system is designed to address the efficiency and accomplishments level desired by the entire company.

Wednesday, November 27, 2019

Grameen Phone Essay Example

Grameen Phone Essay Example Grameen Phone Essay Grameen Phone Essay Skilled and qualified work force can ensure better standard of products, services and organizational performance. And the quality of this workforce Is solely dependent on the recruitment process. Only a comprehensive and fair recruitment process can ensure the inclusion of the best options to the organization Gramophone ,being the leading telecommunication brand in Bangladesh, carries an extensive and multi dimensional recruitment process to ensure premium standard of human resource. With an attempt to finding the best individuals, Gramophone conducts a multi- leveled recruitment procedure. At different levels of this process different aspects and dimensions of the individuals behavior and knowledge is assessed. The whole assessment system comprises of steps like: Initial screening , written test, interview etc. And all these steps are intended to Analyze the candidates on the basis of Experience, Exposure and Education ,generally known as the sees. Thus the recruitment process of GAP Is designed to evaluate a candidate basing not only on his academic credentials but also on his behavioral and psychological aspects. And The highly experienced selection panel and extremely transparent assessment process enables Gramophone rightly to do so and provide GAP with the best work force available Thus the fastidious and inclusive nature of Gasp recruitment has helped it become unique and probably The best in this sector. And subsequently enabled GAP to sustain the standard of work force to the highest degree . Introduction to gramophone: Gramophone started its journey in Bangladesh as a joint venture of telethon and Grahame telecoms corporation on 26th march, 1997. : Since Its inception it created a rand value In the mind of the customers through premium product quality, extensive network faceless and customer oriented services and thus It was able to establish Itself as the leading telecommunication company In Bangladesh. Besides conventional services its wide range of exclusive and innovative customer services like Byplay, Cellarer, Mobility helped it to gain a competitive advantage over its competitors. In its tenure of 16 years it has created over 16 million customers to become the largest telecommunication brand in Bangladesh. And it has succeeded to establish it as a glowing Image of sensibility. Reliability and trust. Why are we choosing gap: Among several other organizations/brands, it has succeeded to differentiate itself from the others through professionalism, sincerity, reliability, transparency etc in its recruitment process. Through its comprehensive recruitment procedure, it has succeeded to filtrate the most talented and skilled brains of the country over the years. Thus with the help of latest technologies, extensive consumer analysis, Impeccable product and service quality and most of all a wide range of the most qualified professionals, technicians. Employees and service providers, has enabled setting the recruitment process of GAP will certainly unravel the recipe of flawless recruitment Scope of study: Recruitment process of GAP: Over the years gramophone has succeeded to maintain its impeccable standard of human resource. And the thing that has helped gramophone to maintain such standard i n the field of human resource is its flawless and comprehensive recruitment process. Through its multi dimensional recruiting process GAP has succeeded to filtrate the most talented and skilled individuals of the country. GAP has a standard recruiting process consisting of multiple steps and levels. Which helps to analyze each candidates aptitude,effectiveness and skills. Then Human resource department evaluates each candidate basing on the results and documents of their performance on each level. And thus by analyzing all the aspects they select the best candidates. The pros and corns of the Recruitment process of GAP is described below: Classification of recruitment: Generally GAP goes for two kinds of recruitment basing on their demands and requirements. Hey are 1 . Lanterns recruitment. 2. External recruitment. Internal recruitment: When a company fills up vacancies with its own manpower hen it is referred as internal recruitment. In case of internal recruiting internal recruiting existing employees are informed about vacancies through the official medias and links. And afterwards qualified and able candidates are either promoted or replaced to the vacant place on the basis of their qualifications and existing performance. External recruitment: External recruitment is the recruitment process where an organization fills up its vacancies by recruiting people from external sources. External recruitment is more complex in nature and requires more effort and budget. Steps of recruitment: Once a vacancy is created GAP goes through a standardized and structured recruitment process. Len these steps different dimensions of the candidates physical and mental faculty of the candidate is Judged as per the Job requirement. He steps of the recruitment are: Identifying the need to recruit Advertisement Initial screening The written test The interview Candidate Assessment The medical test Appointment and orientation model) Identifying the need to recruit: Recruitment budget (same baa Identifying vacancy is the first step of recruitment process. A vacancy is created mainly due to two reasons. Hey are:l . Resignation and 2. Business growth. Irrespective of the reason, the information of vacancy is intimidated to the Hum an resource department by the concerned department. Then human HER defines the requirements basing on the Job nature and functions. Len case of new role they define up a detailed list of tasks that the person will have to do. This helps in determining the qualities and qualification genuinely required the Job. 2. Bib description:Next they produce an outline of the broad responsibilities(rather than detailed task) involved in the Job. 3. Person specification:then the decide what kills,experience,qualification and attributes someone will need to do the Job as defined in the task analysis and Job description. Hush in the first step of the recruitment process of GAP, they find out the vacancy,the position of the Job,required qualifications of the Job,Job description,and the personality traits desired determining the recruitment budget: upon request from the concerned department,the HER department makes an estimated budget. Finance and account department also takes part in this process. Thus a budget plan is determined and sanctioned upon the approval of higher authority. Advertisement: In this step GAP(HER department) advertises the vacancies to inform eligible candidates. Len this respect GAP is slightly non traditional in the perspective of Bangladesh. GAP uses internet as its only major medium of advertisement. Len these advertisements ,the Job qualifications are properly mentioned with some other necessary information to limit the number of applicants as well as to find the best candidates for the Job. Besides,the ads give a brief description of the Job along with the programs etc. Thus the advertisements provide the candidates with clear conception about the Job and its particulars. Initial screening: Upon receiving the C.v.,the initial screening takes place. GAP(HER Department) shortlists the number of candidates based upon the information provided in the applications. N this step HER conducts the screening basing on two set of criteria. They are:written criteria and unwritten criteria. Written criteria encircles the requirements that are mentioned in the advertisements. Elf HER fails to fails to minimize the number of candidates basing on the written criteria, then they go for unwritten institutions,work experience etc. Writte n examination: the candidates passing through the initial screening possess are hen called for a written examination(not always). This test is to evaluate Job knowledge,communication skills,analytical aptitude and mental promptness of the candidates. The interview :A panel of managers takes the interview of the candidates who have passed the written test. The panel generally have managers from HER and the concerned department. These well structured interviews focus on required competencies for the particular post. These interviews are designed to solicit information from a persons response to oral inquiries. Apart from Judging the educational and theoretical knowledge of the candidates,these interviews are features like leadership,honesty,presence of mind are verified through skillful questioning.

Saturday, November 23, 2019

The Piano Lesson Themes - Sutters Ghost

The Piano Lesson Themes - Sutters Ghost Supernatural themes lurk throughout August Wilsons drama, The Piano Lesson. But to fully understand the function of the ghost character in The Piano Lesson, readers may want to become familiar with the plot and characters of The Piano Lesson. Sutters Ghost During the play, several characters see the ghost of Mr. Sutter, the man who probably murdered the father of Berniece and Boy Willie. Sutter was also the legal owner of the piano. There are different ways of interpreting the ghost: The ghost is a product of the characters imagination.The ghost symbolizes oppression.Or it is an actual ghost! Assuming the ghost is real and not symbolism, the next question is: What does the ghost want? Revenge? (Berniece believes that her brother pushed Sutter down a well). Forgiveness? (This doesnt seem likely since Sutters ghost is antagonistic rather than repentant). It may simply be that Sutters ghost wants the piano. In Toni Morrisons beautiful foreword to the 2007 publication of The Piano Lesson, she states: Even a threatening ghost hovering in any room it chooses pales before the gripping fear of what is outside - the steady, casual intimacy with imprisonment and violent death. She also observes that Against years of menace and routine violence, wrestling with a ghost is mere play. Morrisons analysis is spot on. During the plays climax, Boy Willie enthusiastically battles the ghosts, running up the stairs, tumbling down again, only to go charging back up. Grappling with the specter is sport in comparison to the hazards of the oppressive 1940s society. Spirits of the Family Bernieces suitor, Avery, is a religious man. In order to disconnect the ghosts ties to the piano, Avery agrees to bless Bernieces house. When Avery, an up-and-coming reverend, passionately recites passages from the Bible, the ghost does not budge. In fact, the ghost becomes even more aggressive, and this is when Boy Willie finally witnesses the ghost and their battle begins. In the middle of The Piano Lessons chaotic final scene, Berniece has an epiphany. She realizes that she must call on the spirits of her mother, father, and grandparents. She sits down at the piano and, for the first time in a year, she plays. She sings for the spirits of her family to help her. As her music becomes more powerful, more insistent, the ghost goes away, the battle upstairs ceases, and even her stubborn brother has a change of heart. Throughout the play, Boy Willie demanded that he sell the piano. But once he hears his sister play the piano and sing to her deceased relatives, he understands that the musical heirloom is meant to stay with his Berniece and her daughter. By embracing music once again, Berniece and Boy Willie now appreciate the pianos purpose, one that is both familiar and divine.

Thursday, November 21, 2019

Social Networking Sites Are Good Society Essay Example | Topics and Well Written Essays - 750 words

Social Networking Sites Are Good Society - Essay Example Steve Chazin, a former managing director at Apple is quite categorical in his statement that social networking has changed the lives of people for the better as all humans do have a need to feel connected to each other (Are Social†¦). Danah Boyd, researcher at the Microsoft and experts in media, has more discreet view on the subject that those who do not understand social media look at only negativities and see social media as evil (Are Social†¦). Aric Sigman, a fellow of the Royal Society of Medicine and recipient of the Chartered Scientist award from the Science Council is of the view that online contacting displacing face-to-face contacting will bring about some sort of physiological changes such as illness or higher premature mortality. (Are Social†¦) In one of the study done at University of Maryland on 200 students (Conger, 2010) giving up all social networking sites for a day had some amazing findings. On asking students how they felt during this pause, students came out with a reply of having anxious mood and frantic cravings that typically felt by a person who goes through withdrawal from any addictive stuff. In such context, it has been said that social networking sites would destroy our brain and bodies as has been voiced by Susan Greenfield, a neuroscientist from U.K; however, so far, no any published scientific studies have validated such claims (Conger, 2010). On the contrary, it has been found that the more people are engaged with any social site, the better they feel. This is what argued by Moira Burke, a researcher from the Human-Computer Institute at Carnegie Mellon University (Conger, 2010). The reason for favorable feelings stems... This essay discusses that the more people are engaged with any social site, the better they feel. This is what argued by Moira Burke, a researcher at the Human-Computer Institute at Carnegie Mellon University (Conger, 2010). The reason for favorable feelings stems from the emotional support that friends, acquaintances or family provide. The feeling of having more social capital triggers a sense of well-being in them. In another study done at Cornell indicates that social capital garnered online also propels better physical health. Though it has been warned in some quarters that social networking would drive people into isolation; it has helped reap benefits from online contacts. Fowler and Christakis from Harvard University have completed many studies on the aspects of attitudes, health behaviors, and on happiness among social networking site participants and they have reached the conclusion that as people influence each other in their normal interactions, similar is the behavior pat tern found at social networking sites. This paper makes a conclusion that a social networking has gone a long way since its modest start about 15 years back. Facebook, Twitter, Orkut and many other sites have now millions of users who share their daily experiences and understandings on a myriad of issues. In the era of globalization, these sites are being extensively used for the various causes and will continue to grow as one of the formidable social tools for masses.

Wednesday, November 20, 2019

See des Essay Example | Topics and Well Written Essays - 1000 words

See des - Essay Example re concerned, much of the motivation that get people to patronize matches has to do with personal thoughts of people about the sporting discipline in question, players involved in the game, competing teams, and other social factors. Though the need for marketing strategies is generally necessary, a lot of the respondents pointed to the fact that they attended the game because of the performance of the two teams of the day. Greater part of the respondents also indicated that they are selective of the kind of games to watch based on the performance of the teams involved and whether or not they have personal favorites among the players taking part in the game. Some others also pointed out that their presence had no linkage with marketing done by the teams but that they were there as part of their social curricula activities. The researcher can therefore conclude that for people to get more students to games, they ought to create very good personality marketing for their teams and player s. This is because if the teams and their players have very good image in the eyes of the students, they students will go and watch their games as part of their social relaxation activities. Interview someone who works for a retail store about how they choose which products the store sells. You will have to interview an owner or manager who is involved in the product decisions. A clerk at a store will not know how the products are picked. You can interview them about a particular product line (like snow boards or stuffed animals or soft drinks) or new products. This question should include some detail-not just â€Å"what people buy is what we keep†. The popularity of a product is determined by the public promotion and popularity of the product. This is because the interviewee indicated that there are shoppers who come to the shop and ask for specific products because they have heard advertisements on the products. This confirms the saying that buyers take decisions based on what

Sunday, November 17, 2019

Sample Analysis of a Poem Essay Example for Free

Sample Analysis of a Poem Essay Listen, children: Your father is dead. From his old coats Ill make you little jackets; Ill make you little trousers From his old pants. Therell be in his pockets Things he used to put there, Keys and pennies Covered with tobacco; Dan shall have the pennies To save in his bank; Anne shall have the keys To make a pretty noise with. Life must go on, And the dead be forgotten; Life must go on, Though good men die; Anne, eat your breakfast; Dan, take your medicine; Life must go on; I forget just why. Source: â€Å"Second April by Edna St. Vincent Millay.† Poet’s Corner. 2003. 25 Apr. 2007 http://www.theotherpages.org/poems/millay01.html In Edna St. Vincent Millay’s poem â€Å"Lament,† the speaker, a mother whose husband has just passed away, must face both her grief and the continued daily needs of her children: clothing, medicine, food. The children learn of their father’s death in no euphemistic terms as their mother tells them, â€Å"Listen, children: Your father is dead.† Rather than immediately becoming emotional, she focuses on the practical needs of her children, telling them that she’ll make them pants and jackets from his old clothing. She says, â€Å"Life must go on,† and â€Å"the dead must be forgotten,† stoically facing a bleak future. The poem’s only overt emotional reference comes when the speaker repeats, â€Å"Life must go on,† and adds, â€Å"I forget just why.† This last line is a clear indication of the hopelessness and emptiness that the speaker feels now that her loved one is gone, a common expression of frustration with the absurdity of death. Although all individuals grieve differently, this poem represents a universal expression: that life must go on even when we feel like it cannot. Poetic Devices: 1. Apostrophe: the poem is a direct address from mother to children, as evidenced by the first line â€Å"Listen, children:† 2. Repetition: the speaker’s frequent statement that â€Å"Life must go on† emphasizes the cruelty of death for the living; daily life continues despite the absence of those we love.

Friday, November 15, 2019

Essay --

The term forensic is used often among television crime dramas but what is it? Forensic, as defined by Oxford Dictionary of English, is â€Å"relating to or denoting the application of scientific methods and techniques to the investigation of crime (Stevenson). This science has led to the capture of many criminals. DNA testing has been a large part of this forensic science, however forensics played a large role prior to DNA testing being developed. Fingerprinting, blood typing, and trace evidence were three of the forensic tests in use before DNA testing that helped identify a suspect. Fingerprinting is a technique that has been in use for a long time. In 1880, a Scottish doctor, Henry Faulds, first suggested to the British that fingerprints could be used in criminal investigations. This suggestion had merit because every person has a unique set of fingerprints. The concept was then incorporated into the law system. Fingerprints are, in fact, most often used in prosecutions. They are to help the prosecutors identify a suspect and to place them at the scene of a crime (â€Å"Fingerprints† 410-411). Fingerprints can be left on almost any surface, including smooth ones. The combination of the friction ridges, or the raised grooves on the fingertips, and sweat that gathers there is what causes the fingerprint to leave a trace (Bergman and Berman-Barrett). Fingerprinting is widely used today and I believe it still plays a large and crucial role in criminal investigations. Blood Typing, or Serology, is another method of identification used in forensics. This type of science is focused on the study of Antigens in the blood and how specific antibodies places blood into separate groups. The blood groups most commonly used in this scie... ...croscopically match fibers from carpet to a specific car is fascinating and intriguing. Trace evidence also seems to be easily left behind, where as fingerprints can be concealed with rubber gloves and blood is not always left at crime scenes. Forensic science consists of many different components that have helped solve many crimes. Fingerprinting can be used to place criminals at scenes and to identify suspects. Serology is a science that has become outdated but helped prosecutors narrow down suspects. It ultimately led to the development of DNA testing, the culprit for its demise. Edmund Locard was the innovator behind the concept of trace evidence and how particles can be compared microscopically to help in crime solving. All of these aspects of forensics potentially led to the development of DNA testing and laid the groundwork for future expansion.

Tuesday, November 12, 2019

Apology Paper

Apology Paper In the Apology by Plato, the scene is set up on the jury; Socrates is standing in front of his accusers, Meletus, Lycon and Anytus. He is defending for himself against the four charges brought by the accusers. Socrates is charged with inquiring the heaven and searching things beneath the earth, a Sophist, not believing the god of Athens, and corrupting the youth. Therefore, surrounding him was a group of wealthy young audiences. In the Apology, Socrates is defending for himself as well as prophesies to those who condemned him.Although Socrates died, but he never convicted of his charges; even at the last moment, he warns the condemners and accusers will soon be punished by his son. In my opinion, if I were on the jury, I would also find Socrates as not guilty. Socrates violates none of the four charges, and by his eloquence, he embarrassed his accuser in front of the public, especially the wealthy young group of people and leading the defense on the jury and trap the ac cuser. According to the four charges on Socrates, the first one is Physicist, which is inquiring in the heaven and searching for things beneath the earth.Socrates uses two points for his defense, the falsehood that Socrates is a Physicist and Aristophanes. In the Dialogue, â€Å"and took possession of your minds with their falsehoods† Socrates thinks that the jury is judging unjustly for his charge, for those people who are being told that he is a Physicist since child. By default, those people are tended to think of the Physicist side. The word â€Å"default† means the natural tendency of thinking him as a Physicist in the first place.Later in the dialogue, Socrates furthers his defense by using Aristophanes’ comedy as an example. Aristophanes, also known as the father of comedy, he has been said to recreate the life of ancient Athens more convincingly than anybody else. With such a great name being mentioned in front of the public, it is far more convincing th at Socrates is not in the charge of Physicist, since Socrates treats the charge as watching a comedy which tells nonsense theory. Therefore, Socrates on the jury claimed that Meletus could not charge him for that. O Athenians that I have nothing to do with these studies. † The above statement shows the denial of Socrates of being a Physicist, he did not inquiring the heavens and below the earth. In my opinions, Socrates is obviously not guilty for the charges. He never was a Physicist, and even if he is, he would have search for explanation of the God, and knowing the cause of some Myths and use scientific approach to find the answer. The most important fact about Physicist is that they don’t believe in God, they believe in evidences and proofs instead. But Socrates does believe in God.Besides, I found no sign of Socrates in doing anything scientific. Instead, he is trying to call out the people who he met are present here to witness the truth. The second charge against Socrates is he making the worse argument into the better argument, this charge identified Socrates with the Sophists, a Sophists is a tutor who charged for tutoring the youths for a career in politics by teaching them how to make a convincing arguments and travelled from city to city to teach the youth. If I were on the jury, I would give a vote for him for not guilty.First of all, Socrates in the dialogue seems to separate him from the Sophists group, he jokes about if he able to teach, he would honor his student to pay him. Later he quotes other great philosopher as his argument, he is honoring those great people have the knowledge to persuade the youth to leave their own citizens, with such privilege that is certainly worth some money. Also he told the story of Hipponicus’s son and the way he interprets is convinced that Socrates lacks any knowledge in teaching other people. â€Å"My poverty is a sufficient witness. Furthermore, Socrates is using his poverty level as a p roof and a strong argument against Sophist, yet if he is charging fee for exhortation, it would if brought him out of poverty and living in luxury. But throughout the dialogue, there are plenty of places where Socrates stated that he have no money, â€Å"But you see that I have none, and can only ask you to proportion the fine to my means. † If he have the money, he would if volunteer to make an offer for the proposal for the sentence, instead of keep saying he have no money.As a conclusion, Socrates never travelled nor charged people money and living the life of poverty. It is very hard for me to think of Socrates doing the same as the Sophist, therefore I would brought in a verdict of not guilty for Socrates. The third charge for Socrates is corrupting the youth, â€Å"what evil does he practic or teach? They do not know, and cannot tell. † Socrates introduced his defense but saying group of wealthy young men came across him and getting angry with him for finding out that they really know nothing and call him the misleader of youth.But they can’t even point out what particular thing that Socrates had corrupted them, his argument was how he corrupted the youth when nobody can tell what Socrates teach. Furthermore, Socrates uses his eloquent brilliantly to embarrass his accuser Meletus. Socrates brought out Meletus and constantly ask him question and set him up to step on the trap. The tricks that Socrates is trying to do is to make Meletus contradicts himself. From the point of the jury, I would say he is not guilty for corrupting the youth.On the jury, Socrates pretends that he is the corrupter and asks for the people who he have given them advice to be his accusers, then he followed by a long list of names that he come across with. Besides, Socrates uses the word â€Å"produce† to emphasize his argument that Meletus should have â€Å"produce† some of witness that Socrates had gave them bad advice and Socrates even voluntee r to make way them. Judging from this point, I certainly know that Socrates is telling the truth and he is confident that he is not corrupting the youth.Besides, I also think that the charge of corrupting the youth is linked with other charges, like the Sophist charge, the Sophist were very distrusted by Athenians, if Socrates is found guilty for Sophist, he is certainly corrupting the youth too, vice versa. Besides, the analogy of the training of the horse is a convincing point, yet the young men also require training by a skilled teacher, and most people cannot do it, unless those youth are same as the horses. Therefore, he is found not guilty for corrupting the youth.The last charge against Socrates is not believed in the god of Athens, this charge is probably a follow-up of the first charge, Physicist. If you do not believe in the god of Athens, than you must be worshipping other god, therefore, Socrates’ accusers think he is inquiring the heaven and searching for thing b eneath the earth. In order to defense against he, Socrates further asks Meletus question by interrogating him to what extent is mean by not the same gods which Athens recognizes. Later Socrates regards the sun as stone and doubt about if Meletus is accusing Anaxagoras instead. â€Å"You really think that I do not believe in any god? This quote clearly shows Socrates’ argument, as Socrates are being accused on the jury, he defend himself by questioning Meletus of not knowing his belief. Socrates’ horsemanship and flute-playing is definitely dubious for Meletus, as he did not answer the question but get up an interruption. For the judgment here, I would say Socrates is not guilty for not believing the god of Athens as he does believe in gods of Athens. In his defense, Socrates admitted that he do believe in divine beings, it must be spirits or demigod and he claims and make Meletus to say that Socrates is an atheist who believes in spiritual agencies and demigods.Socrat es here successfully lead his accuser to admit that he have made a false accuse and have made up one just for charging Socrates. Without a valid accuse, how can Socrates be found guilty of not believing in the god of Athens? And yet Socrates is believes in the god of Athens. To conclude, if I were on the jury, I would found Socrates not guilty for the four charges. Nevertheless, the jury never wanted Socrates to die; it is Socrates would fain lose his life. Truth is always the truth, if you endeavor to defense, someday you will success.

Sunday, November 10, 2019

Dangers of the Internet

Many people view the internet as an ultimate resource for anything they desire. The people who say that the internet is a brilliant invention for the best have reasons backing up their idea. For example, Sherry Turkle writes about such ideas explaining how the internet is an excellent tool for the better in her essay, â€Å"Can You Hear Me Now? † Turkle believes strongly that the invention of the internet is an innovation for the better and emphasizes to her readers how important it is in everyone’s lives nowadays. On the other hand, some believe exactly the opposite of Turkle’s invalid inquisition that the internet is a tool that is most definitely not for the greater good. The internet is a major promoter of violence and bad habits, it allows abusers to reach people that do not want to be reached and it opens many of us up to identity theft and malware viruses. The internet is an extremely risky device that many of the common users take for granted due to the lack of knowledge of its dangers. With the great power that the internet provides comes great responsibility that its users must also provide. Just like many other things, there are people who lack such responsibility and use the internet with bad intentions. Influencing Violence The first point of discussion pertaining to the harmfulness of the World Wide Web is that it is a great promoter of violence and bad habits. Users are free to roam to any type of website they please, whether it is a game site, social networking site, forum site and etcetera. The internet has no restrictions as to what people put on websites and web pages. Much like violence in video games, the internet can influence violence towards its users as well. Michele L. Ybarra speaks about the amount that children are influenced by the violent website on the internet today in her essay â€Å"Linkages Between Internet and Other Media Violence With Seriously Violent Behavior by Youth,† which was published in the â€Å"Official Journal Of The American Academy Of Pediatrics. † The internet is a host to many violent games and violent based websites alike. About 97% of the youth ages 12-18 are using online communications and have online access (Ybarra 929). With this many kids on the internet they can browse and view hate pages which discriminate against people or they can come across violent related web pages as well (Ybarra 930). With this increased exposure to these websites, causes an increase in violent behavior among our youth. Ybarra and her team conducted a study of 10-15 year old children and the effects of the different sources of violent media on their real habits. The results showed substantial results of increased violent behavior among the group that was associated with the violent media (Ybarra 933). Results reported that the violent behaviors included shooting or stabbing, aggravated assault, robbery and sexual assault (Ybarra 933). Among the many types of media that was studied such as: music, video games, television and the internet, the type of media that was the most influential was the internet (Ybarra 933). Ybarra goes to show her readers that most of all websites used included killing, fighting and shooting which in correlation contributed to the stimulus of the children’s anger level, having delinquent friends, and substance use such as drugs and alcohol (933). The monitoring of what our children view on the internet is crucial towards their health and well being, without monitoring our children are prone to be influenced by immoral and violence behaviors. Reaching Those Who do Not Want to be Reached Another harmful risk that the internet so willfully provides is the dangers of domestic violence and child predators. The internet allows predators and violent domestic partners to access people and children on a wide scale with the click of a mouse. The various social networking sites that the internet provides is practically like a database for people to access whoever they want. Although children and the victims of domestic violence do not want to be reached by predators and violent spouses, it is easy for these terrible people to reach them without their own consent. As I myself say, the internet is â€Å"Stalking made easy. † In her article, â€Å"Friend Request or Foe,† Laurie L. Baughman persuades her audience of the dangers and risks pertaining to internet stalking, mainly pertaining to domestic violence. Baughman is a senior attorney at the Pennsylvania Coalition Against Domestic Violence, thus giving her the right to speak about the topic. Facebook itself has over 400 million active viewers, and it considered the most popular online social networking sight for adults and children alike (Baughman 933). Baughman also points out that Facebook users in total upload approximately three billion photos every month and the average user spends about 55 minutes a day on the site (934-935). With such astronomical numbers like these, this introduces a whole new type of stalking based violence that was once again introduced by the internet. To start, pertaining to the issue of domestic violence, which is the major topic that Baughman discusses in her essay. She feels that it is an extremely dangerous asset that the internet has brought upon society. Baughman asserts in her essay â€Å"†¦Internet users who are victims of domestic violence may be vulnerable to further abuse or may experience harassment or stalking through these social networking mediums† (935). This quote offers a brief summary of the topic that Baughman is most concerned about in her essay, which will be addressed below. Domestic violence is defined as abusive behavior in a relationship to gain or maintain power, all of which can be done by actions or threats (Baughman 936). To show how much of a problem domestic violence has become; Baughman uses the quote â€Å"An estimated 1. million women are victims of physical assault each year† (936). With the amount of people attached to the internet today, many domestic assaults root from internet stalking. These social networking website were people post pictures and information about themselves has become a source of vulnerability of victims of domestic violence (Baughman 940). For example, many of us post pictures and personal information on Facebook, but what many do not know is that there can be bad people that we do not want seeing this information looking at it as well. Many of you may be familiar with the quote from Spiderman â€Å"With great power comes great responsibility,† this is much like the quote from Baughman’s essay when she states â€Å"Using technology is like a super power: you can use it for bad and you can use it for good† (940). This quote from Baughman’s piece stresses her concern of how much power comes from the internet and how people can use this power by means of harming other people. With this power that the internet has given to anybody who uses it, comes people who use it by means of stalking. The term cyber-stalking came directly from the invention of the internet and it is defined as behavior that constitutes â€Å"computer† based harassment (Baughman 940-941). Such stalkers do things such as: monitoring other people’s email, sending email threats or insults, disrupting email communication, using others email identity and using the internet to get personal information (Baughman 941). Although many may see all of these as an invasion of privacy, with the power the internet has given us, most of them are very simple to do and done quite often. In her essay Baughman shows her readers how cyber-stalking often leads to physical staking (941). With the small amount of difficulty that cyber-stalking is, often an abusive partner uses it to maintain power and control over their victim (Baughman 941). All of the above ways discussed, pertaining cyber-stalking can allow an abuser to access their victim through the internet, even if the victim has set up an internet protection, which will be discussed in the next topic (Baughman 941). Baughman uses an example of such harassment through emails in her essay; she tells us a story of how an abusive husband sent 1,500 pages of threatening emails to his ex-wife even when she had a restraining order placed on him (944). To sum up Baughman’s essay, due to social networking sights allowing individuals to freely post photos, comments, and other personal information, the internet acts as a personal information super-highway that is easily reached by abusers (965). A simple search of a persons name can bring up very personal information that abusers can easily access (Baughman 965). In sum, social networking sights and the internet are tools for communication, blogging, picture sharing and now vengeance by abusers. Roam at your own risk (Baughman 953). Nobody, including domestic partner are safe when on the internet. The next point of discussion relating to how abusers can access people who do not want to be reached is the issue of child predators on the internet. The author L. Alvin Malesky, Jr. , PhD in the Department of Psychology writes his essay â€Å"Predatory Online Behavior: Modus Operandi of Convicted Sex Offender in Identifying Potential Victims and Contacting Minors Over the Internet,† in correlation to this topic. Most sex offenders know their victims before even meeting it them, they become acquainted through the internet (Malesky 24). As discussed previously in Baughman’s essay, this task of becoming acquainted with anyone you want is relatively easy with the amount of social networking websites today. Predators tend to disguise themselves as another teenager and lie about their identity, the internet provides them with ideal cover that can fool even the smartest of children (Malesky 24). In his essay Malesky affirms â€Å"Chat rooms were the most frequently used component of the Internet to identify and contact potential victims† (26). When a child that talks about sex in anyway on the internet, it is found appealing by pedophiles and is often the reason why pedophiles go after a specific child (Malesky 27). This warning given by Malesky shows her readers how every little thing you say, post or do on the internet can be viewed by these disturbing people and can possibly make you their next target. These sex offenders patrol the virtual world in hopes to find a victim and eventually meet with them in person. People are free to surf the web, the type of people that lean towards an attraction to children are also free to do as they please. The internet give minors vulnerability to people who wish to do them harms (Malesky 30). In conclusion to his topic Malesky tells warns his readers that children should not post anything sexual on the internet or talk to people you do not know, you never know who may be looking or listening (Malesky 30)! Children are put in harms way while online, thus in sum urging how unsafe the internet really is. Cyber-Crime Lastly, the internet itself has brought forth a new type of crime everywhere in the world. The term cyber-crime refers to crime that takes place from a computer through the internet. These cyber-criminals can steal your identity, take your personal information and even give your computer a virus without ever leaving their computer desk. The root cause of this new crime is directly due to the invention of the internet. As was previously stated, the internet is a tool that requires responsibility. Criminals take no such responsibility when performing illegal cyber-crime related acts. Nobody is safe when they are on the internet with the growing amount of yber-criminals today. Kit Burden discusses the issue of the increasing problem of cyber-criminals in her essay, â€Å"Internet crime; Cyber Crime – A new breed of criminal? † which was published in â€Å"Science Direct† (College Edition). Burden starts out her essay by showing her readers that 43% of Americans recognize cyber-crime as a problem (2). These types of crime have been introduced to the world thanks to the invention of the World Wide Web. The first example of a cyber criminal I would like to point out is the increasingly more and more common hacker. Hackers use technology to gain unauthorized access to private computer systems, which is mostly for the purpose of retrieving confidential information such as credit card number and internet passwords (Burden 3). If the hacker has used a computer for functions with intent of retrieving other peoples information and date, this is considered illegal based off the Computer Misuse Act in 1990 (Burden 4). A hacker can obtain the most confidential of information on your computer, for example they can take your credit card information and use it as their own. Hackers may also go onto company website and alter what their information reads for terms such as of political leads and malicious intent such as cyber terrorism (Burden 4). Secondly, with the increasing threat of hackers, there is also an increasing threat of credit card fraud. These two go hand in hand with each other because hackers much of the time aim to receive others credit card information illegally by hacking. Burden points out that there is an estimated four billion dollars lost to credit card fraud each year and fifty percent of that money lost comes from online credit card fraud/hacking (9). Burden also points out how vastly internet related commerce is growing, therefore so will the amount of money lost to credit card fraud due to the increasing dangers posed by hackers (9). Along with credit card information, we must not forget that hackers can steal information such as accounts that you have set up online, which can hold your payment information and use them as well, the same goes for your email account. Lastly, on top of all that hackers can install malicious software onto your personal computer without you knowing. Viruses are embedded within files which you may think to be real; however they can be completely the opposite and trick you into downloading a virus. Most of the time, if one clicks on the virus itself it will download without you even noticing. Viruses can do whatever the maker of the virus wants them too. Viruses such as a key logger are planted on a computer and it will show the hacker who made the viruses every key you input into the computer. For example, if you type in your credit card information, the hacker will now be able to view it. The famous ‘Love Bug’ virus was released two years ago and single handedly completely shut down and paralyzed over 100 million computers (Burden 5). Because viruses can be spread to many users at a very fast pace and often can not be erased, they are looked down upon by the government and are taken extreme legal action against (Burden 6). Conclusion In conclusion, one has learned a great amount about the internet and the harm that it can bring. The internet puts a great amount of power into the hands of anyone who decides to use it, a power that should not be tampered with and often is by its abusers. Many reasons validate the inquisition that the internet is not a resource for the greater good but it is a tool that can and frequently is used for promoting violence and bad habits, allowing abusers to reach people that do not want to be reached and lastly, it opens many of us up to identity theft and malware viruses. We must all think twice about using the internet and if we do hopefully now we will take extra precautions especially when giving the power to roam the web to our children. The internet is an extremely dangerous place and we must not forget, nobody is safe when they are on the internet!