.

Friday, May 31, 2019

Meg Bogins The Women Troubadours Essay -- Meg Bogin Women Troubadours

Meg Bogins The Women TroubadoursWhat is Bieiris de Romans speaker quest from the woman, Maria, about whom Bieiris writes? More generally, what are female troubadours as a whole seeking from their loves, and their craft? Meg Bogin, in her The Women Troubadours, asserts that their poems were addressed to women to whom they vowed eternal homage and obedience. In exchange for their prostration, the troubadours expected to be ennobled, enriched, or simply made better (Bogin, 9). Is the metrical composition of female troubadours less about the women being addressed and more than about the troubadours themselves? By performing a close textual analysis of Bieiris de Romans poem to Maria, I hope to elucidate some possible answers to these questions. The poem opens with Bieiris speaker addressing her subject as Lady Maria. Rather than merely employing the womans first name, or utilizing a possessive phrase such as my love or my Maria, the speaker addresses her as lady. This impl ies a certain bestowal of respect upon her subject, and is potentially excessively a means to convey an understanding on the speakers part that this Maria has not yet consented to be hers. Next, the speaker proceeds to depend copious qualities that she finds pleasing in Maria. She begins by praising Marias merit and distinction. By distinction we can safely assume that the speaker refers to a pleasing reputation that Maria has cultivated within society, and possibly also the speakers own opinion that Maria is able to be identify as superior to other women. The term merit, however, is relatively ambiguous. By merit, the speaker could be indicating one or many qualities, including, but not limited to, virtue, achievement, a... ...g female companion, who will comply with her wishes and desires. Thus, Maria, judging from the qualities attributed to her in the poem, seems a perfect target for Bieiris speakers affections. Bieiris also appears to have created a speaker who is more concern with being given the ability to express her desires than with the woman about whom those desires are expressed. Maria seems to be utilized as somewhat of a passive vessel about whom Bieiris can write and express herself in a literary fashion. The desire that Bieiris succeeds in expressing, then, is less one for Maria in particular and more one for composing lyric poetry in general. As a troubadour, Bieiris most likely avidly seeks patronage. Thus Maria is less of a last to achieve and more a means to a different end composing poetry for the sake of procuring a reputation, and obtaining financial gain.

Thursday, May 30, 2019

How to Make the Malahat Safer Essay -- mountain highway on Vancouver Is

How to Make the Malahat SaferThe debate about how to improve the treacherously narrow and winding Malahat hand Highway on South Vancouver Island has been an on-going issue since its conception back in 1861 when it was built as a cattle trail, then up-graded to wagon-road status in 1884 and finally paved in 1911 (Commission). Currently vital safety upgrades are underway such as concrete barriers to divide the road lanes and stabilization solutions for falling debris. The heading of physical law enforcement units on the highway to manage problems like cell phone usage, impaired drivers and vehicles that are ill equipped for weather conditions is a essential and crucial part of maintaining safety on the Malahat (Unit). However, due to the fact that the Malahat is built on the side of a mountain, with sheer drop-offs on one side and excite cliffs on the other, there are very few spots from which law enforcement can enforce speed limits. Furthermore, the highway spans over many diffe rent municipalities, and enforcement suffers from jurisdictional issues (Rondeau). Speeding is a critical safety problem that is prevalent on the Malahat reducing speeding by installing speed cameras will substantially reduce the amount of fatal accidents on the highway, as well as save precious natural resources and billions of dollars in taxpayers money. There have been substantial government studies do to find solutions for the Malahat, ranging from divalent decking the highway to building bridges across the Sannich Peninsula inlet, all of which have serious environmental impacts, and are estimated to cost hundreds of millions to billions of dollars (Transportation). The twinning or double decking of the current highway would come with many... ...tober 2013.http//www.traffic-safety.ca/index.htmReutter, Mark. New Speed cameras will cost more, not less, from citys preferred vender. 19 April 2013. Baltimore Brew. Web. 10 October 2013.http//www.baltimorebrew.com/2013/04/19/new-s peed-cameras-will-cost-more-not-less-from-citys-preferred-vendor/Rondeau, Andrea. Two-week crack down solves mystrey of Malahat crashes. 04 July 2007. Cowichan vale Citizen. Web. 01 October 2013.http//www.cowichanvalleycitizen.com/news/two-week-crackdown-solves-mystery-of-malahat-crashes-1.159199Transportation, Ministry of. Trans-Canada Highway 1- Malahat Corridor study area Final Report. Not given July 2007. Web. 10 October 2013.http//www.th.gov.bc.ca/malahat/finalreport/Unit, Constable from Intergrated Road Safety. Personal interview, getting opion on Malahat issues Linda Mather. 30 household 2013. Personal Interview.

Wednesday, May 29, 2019

Ministers Black Veil Essays: Masks and Intimacy -- Ministers Black V

The Ministers Black Veil - Masks and Intimacy The Ministers Black Veil begins with a young pastor, Mr. Hooper, arriving at church with an ugly black veil covering his face. The people ar all dismayed, and wonder why he is wearing a black veil. They are further dismayed and confused, when he refuses to take it off--ever. There is only one person who is not horrified by his black veil--his wife-to-be, Elizabeth. She comes to him and says, there is nothing stately in this piece of crape, except that it hides a face which I am always glad to look upon. Come, good sir, let the sun shine from pothand the cloud. First lay aside your black veil then tell me why you put it on. (Heath 2143) Mr. Hooper smiles and replies, There is an hour to come when all of us shall throw up aside our veils. Take it not amiss, beloved friend, if I wear this piece of crape till then. (Heath 2143) Elizabeth, again, entreats him to remove the veil, but he replies, this veil is a fount and a symbol, and I am bound to wear it ever, both in light and darkness, in solitude and before the gaze of multitudes, and as with strangers, so with my known friends. No mortal eye will see it withdrawn. This dismal shade must separate me from the world even you, Elizabeth, can never come behind it Elizabeth asks him what shall the people think of his veil? Wont it start a scandal? Mr. Hooper then replies, If I hide my face for sorrow, there is cause enough, and if I cover it for enigma sin, what mortal might not do the same? (Heath 2143) Elizabeth begins to feel terror at the sight of the veil. She turns to leave the room, and Mr. Hooper cries, Have patience with me, Elizabeth Do not scourge me, though this veil must be between us here on e... ... understanding, and healing. Mr. Hoopers veil ostracized him from the mercy, understanding and love, from his congregation. BIBLIOGRAPHY Kaul, A. N., (Ed.). (1966). HAWTHORNE A Collection of Critical Essays. Englewood Cliffs Prentice-Hall, Inc. Levin, H arry., (Ed.). (1961) The Scarlet garner and Other Tales of the Puritans. Boston Houghton Mifflin Company. Morris, Lloyd., THE REBELLIOUS PURITAN Portrait of Mr. Hawthorne. Port Washington Kennikat beg. The Heath Anthology of American Literature (2nd ed.). Lexington D.C. Heath and Company. Van Doren, Mark., (Ed.). (1951). The Best of Hawthorne. New York The Ronald Press Company. Waggoner, Hyatt H., HAWTHORNE A Critical Study. Cambridge The Belknap Press of Harvard University Press. World History and Cultures In Christian Perspective. Pensacola A Beka Book.

On Wartime and Postwar Commemoration :: essays research papers fc

Commemorating the actions of those who served in WorldWar I took many forms in its attempt to ease the sufferingand losings inflicted by the war. The creation of memorialsserved several purposes and with measure, the conveysassociated with them changed, as did the purposes withwhich they served. Support groups were formed to aidthose in need whose lives became radically changed by thewar, and in an effort to commemorate their service.Without aleving the distress completely, commemorationserved to ease the tremendous burden of guilt, sorrow, andresponsibility to those whose lives were now changedforever.World War I memorials generally fell into three separatecategories based upon the time of their creation. The firsttype of memorials were those which were created in theyears preceding 1918. These memorials scattered thelandscape and were created and developed at thecommunity level. The erection of commemorativememorials to the war served as a unifying symbol of thecommunity spirit and as a centerpiece with which to rallyaround. They also served as a physical statement againstthose who may base on balls dissenting opinions as to thecommunities involvement in the war effort. The moral highground was thus established in the symbolism of a unitedeffort. They also served to support the communitys braveyoung men who were off fighting gallantly for the securityand preservation of its ideals and in essence the communityitself. Local memorials also served to gibe and motivatethose who labored in industry dedicated to the war effort.It created a sense of purpose and a realization that whatthey were working for had a larger meaning and purpose.Local war memorials also served asrallying points for the enlistment of soldiers. The statuesquesoldier brazenly dashing to war was accompanied withlistings of locals who had enlisted. This inspired even great enlistment while creating a public record of scorn tothose who chose to ignore their "duty." As the war contin ued past a glorious moment and bustlingvictory, the memorials took on more of a role of a museum.The collection of combat memorabilia increased.Photographs, books, and art describing the war continued.Descriptions of the weapons of war and the style ofwarfare that was taking place on the front lines wasrequested, however in order to preserve the dignity of thewar, a good deal of censorship was practiced. Accounts ofthe brutality were circulating back to the homefront through garner and personal accounts of those who had returned.Government regulation of the memorials however,determined that in order to maintain support for the warand to quell opposition to the countries war efforts, the

Tuesday, May 28, 2019

Myth- Aliki, The Gods And Goddesses Of Olympics :: essays research papers

Myth- Aliki, The Gods and Goddesses of OlympicsHistory 106-05 Nov. 27, 1996 Eng. 265-01 Oct. 1, 1996 Prof Janice AntczakMyth- Aliki , The Gods and Goddesses of Olympics , Harper Collins Publishers ,1994 .     After take awaying The Gods and Goddesses of Olympus , my first reaction wasthat it was a wonderful and fascinating exemplar of how Greek mythology explainsthe theories round life , death , and the wonders of nature . Although I enjoyedthe book , I also wondered if it was a little too confusing to a young child ,since many another(prenominal) long Greek names were used and many characters interacting togetherbecame too complicated and involved.     The story began with the creation of the earth , sky, all living things,and with the birth of the Gods and Goddesses that reigned on Mount Olympus . Theauthor also took each of the twelve gods and goddesses and individuallysummarized their personality and duties and their purpose and connec tion to theworld . The author who also illustrated the book , used bright and vibrantcolors and also portrayed the personality visually by scenes and images thatclearly showed the emotional side of the gods .     This myth contained some violence , sinister and unlike behavioramong the gods and cruel and even frightening illustrations that I thought mightbe too overwhelming for a young impressionable mind . An example of this wouldbe when " Cronus married his sister Rhea , and they had many children . ButCronus was afraid that one of them might overthrow him just as he had overthrownhis father . So as each child was born , he swallowed it ." Although Cronuseventually "throws up" the unharmed children in the end, I feel the initialreaction might be more lasting , as well as the fact that Cronus married hissister , which is an unacceptable taboo in society . There were other trueheartedimages conveyed , both verbally and visually dealing with dea th , jealousy ,deceit , and deformities of man and beast . Although I enjoyed this book , Ifelt it should be read to an older audience that will not be negativelyimpressed by some parts of the story .Tall Tale Kellog Steven , Sally Ann smooch , Ann Whirlwind Crockett , MorrowJunior Books , 1995     In this tale , author Steven Kellog depicts the incredible story of agirl named Sally Ann Thunder Ann Whirlwind who has an amazing amount ofstrength, vitality and agility and who sets dispatch for the frontier at age eight .

Myth- Aliki, The Gods And Goddesses Of Olympics :: essays research papers

Myth- Aliki, The Gods and Goddesses of OlympicsHistory 106-05 Nov. 27, 1996 Eng. 265-01 Oct. 1, 1996 Prof Janice AntczakMyth- Aliki , The Gods and Goddesses of Olympics , Harper Collins Publishers ,1994 .     After schooling The Gods and Goddesses of Olympus , my first reaction wasthat it was a wonderful and fascinating example of how Greek mythology explainsthe theories about life , death , and the wonders of nature . Although I enjoyedthe book , I similarly wondered if it was a little in like manner confusing to a young child ,since many long Greek names were used and many characters interacting togetherbecame too complicated and involved.     The story began with the creation of the earth , sky, all living things,and with the birth of the Gods and Goddesses that reigned on Mount Olympus . Theauthor also took each of the twelve gods and goddesses and individuallysummarized their genius and duties and their purpose and connection to thewo rld . The author who also illustrated the book , used brilliant and vibrantcolors and also portrayed the personality visually by scenes and images thatclearly showed the emotional side of the gods .     This myth contained some violence , sinister and inappropriate behavioramong the gods and cruel and even frightening illustrations that I thought strengthbe too overwhelming for a young impressionable mind . An example of this wouldbe when " Cronus espouse his sister Rhea , and they had many children . ButCronus was horror-struck that one of them might overthrow him just as he had overthrownhis father . So as each child was born , he swallowed it ." Although Cronuseventually "throws up" the unharmed children in the end, I feel the initialreaction might be more lasting , as well as the fact that Cronus married hissister , which is an unacceptable taboo in society . There were other strongimages conveyed , both verbally and visually dealing with d eath , jealousy , delusion , and deformities of man and beast . Although I enjoyed this book , Ifelt it should be read to an older audience that will not be negatively impress by some parts of the story .Tall Tale Kellog Steven , Sally Ann Thunder , Ann Whirlwind Crockett , MorrowJunior Books , 1995     In this tale , author Steven Kellog depicts the incredible story of agirl named Sally Ann Thunder Ann Whirlwind who has an amazing amount ofstrength, vitality and agility and who sets off for the frontier at age eight .

Monday, May 27, 2019

Political Science Answers Essay

Current world events have hindered the use of Collective Security Principle as various f dissembleors such as disease, poverty, inborn calamities, terrorism, the use of biological, nuclear, and chemical weapons, and the instability of the world market. (UN, 21-55) 2) No, countries that have no experience in democracy as a form of government will not be successful in using that form of government. Democracy can only work if the constituents are capable and have experience on democracy. Its simply as different strokes for different folks.3) Protectionists Policies were created in order to protect, restrict, and regulate trade for a nations business and/or companies from foreign entities, wrongful change and risks, flooding a nations market with cheaper goods, etc. The use of this policy has caught consumers unawares as they do not seem to acknowledge that the price of commodities would be higher than in other countries. Politics has reared its ugly head into this policy as it might h ave been confused with imposing policies on a supposedly free trade with other nations and can affect the relationship between those countries that trade with one and the other.4) Transgovernmentalism will be able to act on all aspects and factors within a country or countries that are under an agreement of trade and commerce as globalization does. Then over again the nations identity, ideals, and way of life may be immensely affected as there would be a gradual change of budge of ideas, goods, and even the flow of trade. (Slaughter, Paragragh 7) 5) The bombing of Hiroshima was simply a hasty defense act done by countries that protected the free world as they maxim a threat that can damage and affect the harmony and peace of all in the worlds nations.As Hiroshima was a strategic port for army depot and industrial areas.ReferencesAnderson, S. (1997). Unclean Hand Americas Protectionists Policies. Retrieved May 15, 2008, from http//www. freetrade. org/pubs/freetotrade/chap6. html Slaughter, Anne-Marie (October 2007). The New World Order. Retrieved May 15, 2008, from http//www. princeton. edu/slaughtr/Articles/RealNewWorldOrderFA. txt United Nations (July 12, 2004). A more furbish up world Our shared responsibility. Retrieved May 15, 2008, from www. un. org/secureworld/report2. pdf U. S. State Department. Democracy. Retrieved May 15, 2008, from http//www. state. gov/g/drl/democ/

Sunday, May 26, 2019

Ethics Bank Bailout

This paper explores the ethics of marge executives receiving large subsidyes despite the fact that they received a bail by. I identify the utilitarian and deontological implications of these executives natural processs. This paper as well examines if the executives deserved the bonuses, did the avows need a bonus, and how the banks should swallow for been regulated by the banks.Keywords bailout, utilitarian, deontologyEthics of Bank Bailout BonusesCurrently the thriftiness is still in The Great Recession largely due to the radioactive dust caused by banks. Banks caused this fallout by giving out home loans to unqualified borrowers.The banks approved loans they know could non be repaid by the borrower because of the terms such as adjustable rates.These home loans started defaulting which started a domino effect of bank failures, further driving the economy into a downward spiral. In came the government, armed with astronomical sums of cash stipulated to rescue these large f inancial institutions. Enrich, Hilsenrath, and Solomon (2009) state that 700 billion dollars of taxpayer money was used to bailout these banks under the Troubled Assets Relief Program (TARP).It wasnt long by and by these bailouts that these banks continued to reward the executives with large bonuses. Should gravel these top executives of these major banks that received the bailout money been allowed to receive large bonuses? I say definitely not because it was unconventional under the provisions of utilitarian ethics which I believe should have been applied in this situation. These executives were at the helm when these banks failed. Bonuses should be rewards for success not requital for a title or position. If these banks had enough money to give bonuses then the question of do they rightfully need a bailout should be asked.Furthermore, this bailout money did not belong to the banks to give out as they pleased, it belonged to the taxpayers and the money should have been accomp anied by stringent regulations imposed by the government. A bonus is normally assumption as a reward for production or as an enticement for favored behavior or performance. On Wall Street a bonus is an equivocal right with no strings attached. Success or failure does not matter. Being an executive in the countrys most strong financial firms is justification enough to entitle them to a bonus. This is the methodology that these institutions follow.Executives used deontological ethics because they focused on their rights and entitlements as executives. They ensconced their rights to large bonuses outweighed the importance of righting the economy which affected the entire country. Meanwhile, these are the same executives that were in charge when many Americans retirement plans and investments were depleted or on the whole wiped out. These were the same executives that oversaw an industriousness that gave out home loans with impossible repayment terms. It can be argued that the banks caused the entire financial woes that are still present today.Instead of the institutions terminating their executives for not stopping their organizations misdeeds they were rewarded. These bank executives drove their institutions to the brink of demise. Yet, they were still rewarded with multi-billion dollar bonuses. How could this be justified or ethical? According to Freifeld (2009), Citigroup Inc. , Merrill Lynch & Co. and seven other U. S. banks paid $32. 6 billion in bonuses in 2008 while receiving $175 billion in taxpayer funds through TARP. That means that almost 20% of the governments bank bail-out to these banks was used on bonuses for their institutions executives.The question has to be asked, Could the bank bailout have been 20% less to these banks? An even more interesting question would be, Did these banks really need the bank bail-out money? These executives took an ethical egoistic approach by accepting these bonuses. Andre and Velasquez (1989) explain that three steps to apply utilitarianism to any situation to decide a moral course of action. The first step is to identify all the course of actions that are available in a situation. The second step is to determine all the beneficial and harmful consequences of each course of action for everyone affected by the action.Finally, the third step is to select the course of action that provides the greatest benefits after the costs have been taken into account. Lets apply this theory to the bank executives and their choice to receive a large bonus. First step would have them identify all their course of actions available to them, which was to take or leave the massive bonus. Secondly, was to determine all the beneficial and harmful consequences for each course of action for everyone affected by taking or refusing the bonus. Those affected by the taking or leaving the bonus include the executive, the financial institution, and the taxpayers.The beneficial consequence of taking the bonus for the e xecutive is a very large sum of money. The benefit to the financial institution and the taxpayer is none. The harmful consequence to the executive would be obvious, which would be the damage of a tremendous amount of money. The harmful consequences for the financial institution would be damage of capital that could be used somewhere else more productive and the outrage of the governments confidence. The harmful consequence of the executive taking the bonus would be an increased budget deficit which may lead to high taxes and loss of federal program funding.Finally, weighing the consequences using the utilitarian theory the greatest benefit would be for the executives to refuse the bonus. The right decision for these bank executives would have been to take a utilitarian ethical approach and not accepted their bonuses. These bonuses hurt the government and the people of the United States by costing the bailout more money than demand and creating a larger deficit. Thus, the act of the executives taking their bonuses was morally unethical under the theory of utilitarian ethics because the consequences were more harmful for the greater population.Instead, these executives prioritized their needs and wants higher than the needs and wants of the people. Financial executives were following the ideology of deontology when they made their decision to take their multi-billion dollar bonuses. According to Alexander and Moore (2008) deontology is based from the word duty. I believe that these bank executives felt it was their duty and entitlement to take the bonus. Also deontologists believe in following the rules even though the act may be considered the right thing to do even if it produces bad consequences (Alexander & Moore 2008).They were not breaking the rules or law when they took their bonuses because there were no regulations or rules against them doing so. They followed the rules and it produced the bad effect of creating a larger than prerequisite bailout amount. On the other hand however, the government made the bank bailout loan on fair faith. Utilitarian ethics were applied in the decision to give out the loan because they feared the banks would ultimately fail without the money. The choice was made out of consequence. The consequence of failing banks would be a country with an even worse economy and completely ruined financial sector.Thus, the government acted and followed utilitarianisms theory of the greatest good, for the greater amount of people. The government should have not rushed to give the money to the banks without invent stricter regulations. Restrictions were placed on some executive compensation for component participating banks, but did not limit salaries and bonuses (Despite Bailout 2008). If the government had placed limitations regulating excessive bonuses this could have been avoided. Executives would have been able to follow either consequential or deontological ethics by following these limits imposed.Ins tead the government through legislation did not impose sanctions against bonuses as part of TARP. By failing to do so they left the door open for banks and executives to make ethical choices on their own. I explored the utilitarian and deontology implications of the bank bailout bonuses. I embed that the bank executives should not have taken the bonuses after receiving bailout money from the government by using the utilitarian theory because ultimately the consequences were more harmful than good for greater population. I in any case explained why executives should not have received the bonuses based on their and their institutions performance.I also questioned whether the bank bailout money was necessary because the banks had enough money to give out large bonuses. Also discussed was the idea of the government imposing stricter sanctions with the TARP legislation forbidding large bonuses. I also stated that the bank executives could have been ethically right under the pretense of deontology. Deontologys theories revolve around duties, rules, and obligations (Waller B. , 2008). Therefore, the bank executives felt they had the right and duty to an wondrous bonus as heads of multi-billion dollar financial institutions. They also followed the rules by accepting the bonuses.

Saturday, May 25, 2019

Web Design Report

Coursework 1 meshworksite Report Diarmuid Bogner / B00614798 Dr Hui Wang Dr Hui Wang subject matters foliate Introduction____________________________________________________________ scalawags 3 -4 Analysis_______________________________________________________________ varlets 5 6 System Design_________________________________________________________ rogues 7 11 Implementation_______________________________________________________ pages 12 16 Conclusion___________________________________________________________ pages 17 21 Appendices______________________________________________________________ page 21Introduction Purpose The purpose of this weathervanesite was for a web development establish company showcase the web sites they arrest created, the services they offer, help and support for recent and old clients and to display contact cultivation. Another purpose for creating this website was to help growing the amount of clients that the web development company was ge tting. Creating this website also rendered me as a beginner web developer to further develop the skills that I have already acquired much(prenominal) as XHTML and CSS. Organisation and Function of the nettsite The website I created is organized into several pages.Each page was named with an appropriate name to correspond with the in nisusation that was viewed on that page. For example the contact page was named contatct. html. This substantially allows me to identify which page I was currently working on and would help if I had to make any changes or updates in the future. The website is make up with 15 dissimilar pages. In my website directory there is also a CSS file called style. css. This file accepts all the style information on my website for example the range colour or the school text font, size and colour. Naming the . ss file style again would help me or anyone else having to edit the file knows what the purpose of the file is. The website layout follows the step top to bottom organization. The website has a logo at the top, and then downstairs is the navigation which is easy located by visitor so they can easily navigate around the website. The function of the navigation bar is to create links between different pages of the website. For example clicking on the active link allow for add together you to the most page. There are also links on the links page which bring the exploiter to external pages on other websites.Outline of Information to Be Included In the Report This report go out contain quite a large amount of information. Below I testament briefly limn the information included in the report Introduction In the introduction section of the report I will explain the purpose of the website I created, the plaque and the function of the website which basically means how the website works. Analysis In the analysis section of this report I explain what the target drug substance abusers are and what they require from my website.T he report will also contain a info collection which is where I sourced all my information to create the website. System Design The system initiation will contain an outline anatomy of each page that will be created for the website and the rationale. Also this area will contain all the links of the pages and the type of information that has to be included on each of these pages. Implementation In this section the report there will be screen dumps of each page and I will explain the main features of each page. Also I will have a description of how my main features where added to the website.Conclusion the conclusion section of the report will contain a complete evaluation of the website, and if I feel that my finished website has meet all the user requirements and how I have met them. I will reexamine what went well and what didnt go as well as expected when designing and implementing my website. Also I will include some ideas that I speak out my make an improvement to my webs ite. Appendices The appendices section will contain any references that were used throughout the report, design and implementation of the website. Analysis Target Users and their RequirementsThe target users for my website can be anyone. But the main focus is for users that are interested in obtaining a website for their personal use or for a business. The website has requirements that I need to insure that I meet them all. Requirements * Clear layout website for easy browsing The website must be made up with a wide-eyed, nitty-grittyive a short layout and not seem confvictimization. * blue functionality Users on the website must be able to use the functions of the website with ease. * Appealing colour scheme/template The colour scheme and the template/layout need to be challenge utilize bright colours and nice imagery. Corresponding information The information on the website needs to be relevant to the website, for example information about football would not be relevan t to a web development organisation. * Follow the HCI guidelines The website needs to strictly follow the Human Computer Interaction guidelines. For example I need to take into consideration that some visitors on my website maybe colour blind so using colours that users can see clearly perish colour blind or not. * Easy to update and maintain The website needs to allow easy maintain and update when needed.To achieve this using proper indenting and comments on the code will help me to find areas of the code that need updated. * User friendly I need to make sure that the website is user friendly and that the users browsing my website can easily navigate around the site and can read the information that my website displays. * Compatible Making the website compatible with all browsers is a requirement. This is because if one user is viewing the page using Mozilla Firefox another user using internet explorer may see the website differently and this could affect the users overall exp erience of the website.Data line of battle All of the information I used for my website was written by me, I did however use the internet for some information such as my images, icons and links. For my icons and images I used a website called http//www. iconfinder. com/ and I also used Google image search. For some of the definitions on my tie in page I searched Google, and at the top of the search results page a definition appeared. Throughout writing my CSS code I used http//www. w3schools. com/ as a reference for certain CSS techniques such as creating my website background. Outline of Page DesignsI tack that using text boxes in Microsoft Word was a great way for me to design the layout of each page on my website. You can see below how I achieved this. Logo created using adobe Photoshop Logo created using Adobe Photoshop dwelling housepage glide Bar sailplaning Bar in store(predicate) Designs Affordable Web exploitation Future Designs Affordable Web evolution Home or so go Portfolio bear upon connect Faqs Home near service Portfolio touch modality colligate Faqs Content Area (this area is used to display the main text and images for the users to read and view.Content Area (this area is used to display the main text and images for the users to read and view. Button used for users to request reiterate Button used for users to request quote connect to pages on website think to pages on website Get quote Get quote pedestrian Navigation Bar Footer Navigation Bar Home near work Portfolio tactile sensation Links Faqs Home About Services Portfolio Contact Links Faqs Logo created using Adobe Photoshop Logo created using Adobe Photoshop About Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web DevelopmentHome About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs About Content Area (this area is used to display the main text an d images for the users to read and view. About Content Area (this area is used to display the main text and images for the users to read and view. Relevant image for page. Relevant image for page. Links to pages on website Links to pages on website Footer Navigation Bar Footer Navigation Bar Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links FaqsLogo created using Adobe Photoshop Logo created using Adobe Photoshop Services Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs Services Services word pictures to demo a service Icons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Links to pages on website Links to pages on website Icons to represent a service Icons to represent a serviceIcons to represent a service Icons to represent a service Icons to represent a service Icons to represent a service Footer Navigation Bar Footer Navigation Bar Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs Logo created using Adobe Photoshop Logo created using Adobe Photoshop Portfolio Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links FaqsPortfolio Portfolio Thumbnail image of introductory designed website. Thumbnail image of previous designed website. Links to pages on website Links to pages on website Thumbnail image of previous designed website. Thumbnail image of previous designed website. Thumbnail image of previous designed website. Thumbnail image of previous designed website. Footer Navigation Bar Footer Navigation Bar Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs Logo created using Adobe Photoshop Logo created using Adobe Photoshop ContactNavigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs realize of touch Image of Office Contact Contact Content Area Contact form, and information such as the address and telephone number will be shown. Content Area Contact form, and information such as the address and telephone number will be shown. Links to pages on website Links to pages on website Google Map of Office Google Map of Office Footer Navigation BarFooter Navigation Bar Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs Logo created using Adobe Photoshop Logo created using Adobe Photoshop Links Navigation Bar Navigation Bar Future Desi gns Affordable Web Development Future Designs Affordable Web Development Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs Links Links Link description Link description Link Icon Link Icon Links to pages on website Links to pages on website Link descriptionLink description Link Icon Link Icon Link description Link description Link Icon Link Icon Footer Navigation Bar Footer Navigation Bar Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs FAQs Logo created using Adobe Photoshop Logo created using Adobe Photoshop Navigation Bar Navigation Bar Future Designs Affordable Web Development Future Designs Affordable Web Development Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs FAQs FAQs Content AreaFrequent questions and answers to them will be viewable on this area. Content Area Frequent questions and answers to the m will be viewable on this area. Links to pages on website Links to pages on website Footer Navigation Bar Footer Navigation Bar Home About Services Portfolio Contact Links Faqs Home About Services Portfolio Contact Links Faqs Links of the Pages (Site Map) This is the logo I created using Adobe Photoshop and various techniques for the desired effect. This is the logo I created using Adobe Photoshop and various techniques for the desired effect. ImplementationNavigation links, when the mouse cursor is over the top of the link it changes to a lightness shade of grey. Navigation links, when the mouse cursor is over the top of the link it changes to a flatboat shade of grey. Home Footer navigation, again with the use of rollover links. Footer navigation, again with the use of rollover links. Background image, which I launch on Google images. Background image, which I found on Google images. Rollover Get Quote button which becomes a lighter shade of grey when mouse is over i t. Rollover Get Quote button which becomes a lighter shade of grey when mouse is over it. approach pattern created with HTML to allow user to send an email for a quotation. Form created with HTML to allow user to send an email for a quotation. Quote Reset Button resets the data that has been inputted into the form. Reset Button resets the data that has been inputted into the form. Submit button sends the form. Submit button sends the form. About The text on this page has been formatted into bullet points to make it more user friendly and easy to read. The text on this page has been formatted into bullet points to make it more user friendly and easy to read.Image added to page to make it more appealing. Image added to page to make it more appealing. Icons to represent services that the company offer. This makes this page look a lot more appealing. Icons to represent services that the company offer. This makes this page look a lot more appealing. Services Thumbnails of web designs to add a gallery effect to the portfolio page. Thumbnails of web designs to add a gallery effect to the portfolio page. PortfolioLarge Image shown so users can clearly view the previous work. Large Image shown so users can clearly view the previous work.Portfolio Image exercising Back button to return the user to the previous page. Back button to return the user to the previous page. After clicking on any of the previous design images will load a larger scale of the image with the exact same layout and format as the screenshot above. After clicking on any of the previous design images will load a larger scale of the image with the exact same layout and format as the screenshot above. Image of office added to page to give users an discernment to what our offices is like. Image of office added to page to give users an insight to what our offices is like.Contact Contact information and a form added for users to complete and submit to website admin email. Contact information and a form a dded for users to complete and submit to website admin email. Google maps embedded to show users where the office is located on Google maps. Google maps embedded to show users where the office is located on Google maps. Links Information about each link. Information about each link. Icons added to represent the links, the icons are also clickable which brings you the reinvigorated external link. E. g. clicking the YouTube icon brings user to youtube. om Icons added to represent the links, the icons are also clickable which brings you the new external link. E. g. clicking the YouTube icon brings user to youtube. com Questions and answers clearly formatted for easy reading, this is proof of following HCI guidelines. Questions and answers clearly formatted for easy reading, this is proof of following HCI guidelines. FAQs Button to bring user to continued support page. Button to bring user to continued support page. Help & Support Form to request future help & support. again this form is emailed to the website administrator. Form to request future help & support. Again this form is emailed to the website administrator. Conclusion Evaluation of Website I feel that my website has met all the users requirements. You can see read of each of the users requirements from the screenshots above. Below are all the requirments and how I felt that I have met them. * Clear layout website for easy browsing My website has been made using a simple layout which only contains a header, navigation, content area and a footer navigation.The website is also easy to browse as I asked members of my family and friends to try and navigate around and they could do this with ease and no confusion. * Easy functionality All of the functions that my website uses are all easy to use. For example the forms which the users complete to contact the website administrator are all very self-explanatory and users have no problem completing the form. * Appealing colour scheme/template The colour sch eme and the template that I have created is very appealing. Again I have got friends and family to try to use the website and they have all commented that it is very olourful. You can see evidence of this with the use of the background image and icons on different pages of the website. * Corresponding information All of the information on the website corresponds to the type of the website that I created. * Follow the HCI guidelines I have followed the HCI guidelines very strictly when creating this website. An example of this would be that the website does not use any colours that colour blind users may find difficulty viewing. * Easy to update and maintain The layout created allows for easy updating and maintenance.For example if I wanted to add a new page to the website all that must be done is a copy of the page, delete the information that was copied, add new information to the page and add the page into the navigation bar. * User friendly I find that my website is quite use r friendly. The website is easy to use and the information is clear and users would have no problem reading and understanding the information. * Compatible I have fully tested the website with a few of the most popular web browsers. You can see evidence of this below Chrome Internet Explorer Mozilla FirefoxAs you can see from the above screenshots that the website displays correctly in all browsers so I have met the compatibility requirement. Review of Successes and Problems I found that my design was very successful. Creating the plan of the design was crucial in creating a fully functional website. I found that making a clear and an easy to follow plan allowed me to implement my website with very few issues and it gave me an insight to what the website would look like when completed and what look I was aiming for. Meeting the user requirements I thought would be a hard obstacle to overcome.I did a module in a computing course which whole focused on Human Computer Interaction Thi s gave me the knowledge of HCI guidelines and ideas on how to follow them and how to stop barriers. Along with my knowledge and a full plan I was able to meet all the user requirements whilst overcoming HCI difficulties. The only thing that didnt go to plan was the CSS code for my background. When attempting to add the background using CSS I could not get the desired look. The image kept stretching and as I added more content to the page the image repeated. After researching some more CSS online using W3schools. om I came up with the idea that the background should stay fixed and the rest of the page should scroll. This fix completely fixed this issue. The code I used is as follows Ideas on Improvement & Further Development After reviewing my website I have came up with areas that I could improve on and areas of the website that could be further developed. I found in my portfolio gallery when clicking on the image instead of having a text button Back to previous page I could have us ed a rollover button which users would have a lot less difficulty trying to find and also it would make the page more interactive for the user.Instead of having a text button on this page I could have either added a button or better added a support link on the navigation bar. This improvement also gave me an idea where I could further develop my Continued Support area by using a PHP help desk script which allowed users to register and they could write issues on tickets that are then viewed by administrators and support is given.Also adding a help chat room where clients can speak live with support staff. An example of this type of software product that could be integrated is oS Ticket which is an open source software. http//osticket. com/ References www. google. com/images www. w3schools. com http//www. iconfinder. com/ http//stackoverflow. com/questions/1150163/stretch-and-scale-a-css-image-in-the-background-with-css-only

Friday, May 24, 2019

Expository – Unpolished Gem

Expository Essay Prompt The power of the pigeonholing is often the cause of losing our idiosyncratic identity Our identities have no bodies, so, remote you, we squeeze outnot obtain order by physical coercion. We believe that from ethics, enlightened self-interest, and the commonweal, our governance will turn out. A quote from John Perry Barlow. This quote describes how our identity will emerge through and through the different ethic influences as well as our self interests. Personal identity is about knowing who you are and what you are the eyes of others. all(prenominal) different psyche is different in their own persona.We all come from different families and cultures as well as tender groups who influence the office our person identity is sculpted. Being part of a group can change and/or influence our identity as well as the choices we make. This is commonly know as peer pressure. During adolescence we experience an insurmountable number of changes to our loving wel l-being including the way we interact with others and what peer groups we associate ourselves with. Throughout this time we learn from umpteen mistakes that usually evolve around our social life including what actions we undertake as a part of our peer group.As depicted in todays society, a large amount of these groups have negative effects on the individuals that are part of these groups and are therefore judged by society not knowing the individual identity of the people in that group. This is the time where identity is discovered and maintained throughout our maturity into adulthood. Individuality is something all people naturally have that develops into an identity. The explanation of identity is the collective aspect of the set of characteristics by which a thing is definitively recognizable or known.Throughout the course of life, people encounter numerous obstacles that they must bastinado and conquer in order to complete the process of learning. Your reputation is unconq uerable by the actions that you complete as a result of an association with certain social groups. That reputation translated to a key part of discovering your individual identity. Family groups can complete change the way you express yourself and showing your identity. Every family is different and expect many different characteristics in your identity which accept appearance, personality and beliefs.A person can have two separate identities, one they use for family groups and culture and the other for their social groups. How you interact with people from your family group can sometimes interfere and change the way we interact with our social groups making it a negative and positive effect. The cultures in which we live in also alter how we express ourselves and interact with others. more people with the same cultural background usually form their own group together and sometimes dislike or do not accept other groups because of their cultural backgrounds.In conclusion, the power of groups can completely alter a persons individual identity through Social group influences and family/cultural influences. The different influences can alter decisions you make as well as the way you act around certain people of society. All around the world people make assumptions and conclusions on a persons identity through the different groups they are associated with. These different assumptions lead to the world problems of racism, religious wars and also in some aspects war itself.This alone displays the power of the group identity can have over a development of an individuals sense of identity. Reflective response This essay was basically a replication of how my individuality was/is determined and developed throughout my life. I included the many different influences that had a heavy effect on my personal identity which included the most compelling influence of a group. Being part of a group pretty much disintegrated my identity unless I was identified on my own with peo ple from other group.The audience is basically anyone who wants to learn more about how their Individual identity may be developed without knowing when or in what way it had developed. Many adolescences can relate to these influences as they are my fellow peers who are experiences many of these things that shape who we are and arent. However it was quite a challenge to try include these influences and explain them so many people who be the audience of this will have to have some sort of understanding about identity in general so that they can relate to the purpose and context of the text.

Thursday, May 23, 2019

Leonardo Da Vinci and Pierre Renoir Comparative Essay

The two renowned wileists da Vinci Da Vinci (1452-1519) and Pierre Auguste Renoir (1841-1919) are some(prenominal)(prenominal) good role models for the progressing art society but when comparing these two gifted men it is evident that their artworks both relinquish a different pith to the viewers and are portrayed using different art techniques and equipment. Leonardo, born to be known as the archetype of a Renaissance man, was an Italian painter, inventor, mathematician, writer, and engineer.He was explicitly known for his realistic, geometrically designed and phantasmally inspired paintings. Renoir, however, was a French man who devoted his life to introduce the impressionist style to the art community. As a true worshiper of natural beauty and feminine aura, Renoirs painting symbolized the entire liveliness of French culture and European scenes. Leonardos style of painting was influenced greatly during the formation of the Renaissance period that first emerged in Italy durin g the 14th to the 17th century.It was a new era in which European scholars craved for greater knowledge of medieval times and Italy was their primary source for it contained the great art and architecture of Rome and held manuscripts that scholars studied to learn the lives of the azoic Romans and Greek. Thus most themes of Leonardos paintings portray religious beliefs and mythology. Its art revolved in finished images comparable to reality and the colours conservative, brush strokes concealed, exit no trace of the artists emotions or techniques. Impressionism, however, opposed the entire concept of Renaissance art.Initiated by French artist, Claude Monet during the late 1870s in France and short followed by to a greater extent painters one of which leading them is Pierre Auguste Renoir, conflicted the techniques of French art Schools and ignored their Euclidian perspectives and took advantage of the industrial revolution. The industrial revolution brought the popularity of the c amera, metal tubes were invented and so paint was achieved in a fast yet cheap way, people had more leisure time and places such as parks, malls, stores, circ offices were good established.Painters like Auguste Renoir had more subject matters and the opportunity to paint and observe the fleeting moment of light outside instead of relying on their memory and paint inside a studio. almost of Leonardos buyers are wealthy church organizations such as the Catholic Church that value realism as they will use them as either for cathedral decorations or another image worthy for worshiping. During the Renaissance period, if a patron is willing to buy for an artwork, he or she controls the subject matter, the effect date, the materials used and a set payment.Artists were also required to show preliminary plans to be approved by the patron before the actual artwork was painted. Renoir, however, had buyers that apprehended his colorful artworks for the purpose of house decorations or family portraits. Artists like Renoir had more liberty in exhibiting and selling their works. Artists like Renoir painted outdoors and so people had the run across to observe how they capture the scenery in front of them thus, making it easier for them to be recognised. Renoir and Leonardo share different subject matters in their paintings yet they both ingest the ability to dazzle the viewer.Leonardos inspiration revolved mostly in religion which he greatly portrays in St John the Baptist where St John wears pellets and creature skin while holding loosely a reed staff with a cross at one end and uses his right hand to blockage up a feminine hand to heaven. On the other hand, Renoirs passion relied on his deep adoration for feminine sensuality which he greatly conveys in nude painting in Lanscape where a raven, shoulder length haired, naked woman sits on a rock covered with a long exsanguine sheet that she also uses to wipe her left ankle.The womans body is facing sideways but her wh ole face is seen as she looks downward on the withering grasses. The scene is in a tiny forest during a lazy Sunday afternoon. Upon thoroughly studying these two artworks it is evident that the two artists use different colour schemes and art techniques in order to show the theme of their artwork. Leonardo portrays St Johns wavy, curled hair in an intense sanguine brown colour to imply shadows while a neutralized pinkish brown to show a tint of shininess.Leonardo also provides an empty, calamitousish dry land to achieve negative space in order to enhance his use of chiaroscuro on St Johns face and right arm. St Johns innocent, auburn eyes are darkened due to the heavy amount of yellow light coming from the foreground. St Johns pale lips are curled cryptically giving the viewer the impression of whether he is pure good or evil. Renoir, on the other hand, uses a dark brown colour with short strokes of a midnight blue colour instead of black to darken it.Renoir provides a vibrant ba ckground by using a self-possessed orange to show shadows from the coincide grasses and warm yellow to show the effects of light on the tree trunks and the withering grasses. The neutralized green on the trees folio recede. The womans body is yellowish due to the amount of yellow light but her face is darkened. The highlights on her body are white. He uses cool purple to show shadows on the white sheet and the shallowness of the lake while a warm red on her body especially on her chubby breasts, slender back and rosy cheeks to create a sense of form.It also makes the cool colours strain with warm colours. The artists however both use gestural lines to implicate movement but have used them in different areas of their paintings. Leonardo uses gestural lines to show the liveliness of St Johns hair and contour lines to impeccably form St Johns realistic face, muscular right arm and while using the technique sfumato (which means applying unmistakable layers of colours) Leonardo was able to achieve a feeling of a three dimensional shape to the viewer finished with a smooth surface.In contrast to Renoir who uses short, thick, gestural lines to show the continuous movement of his brush strokes in the entire painting providing a simulated texture. He applies wet paint to wet paint without waiting for the successive applications to dry, producing softer edges and intermingling of complementary colours Leonardo and Renoir share equal importance for how balanced light and dark are in their paintings. The intense dark background and the vibrancy of ellow light on St Johns face and arm provides a symmetrical balance and value contrast that can easily make St Johns face the emphasis and focal area. Conversely, Renoir uses the trees surrounded by deep shadows to poise the womans plump body in an asymmetrical balance of visual elements. Her face like St John also is the focal area in which the strongest light and dark value contrasts. St John the Baptist and nude person in Landscape are both oil paintings. But St John the Baptist was painted on walnut wood using tempera paints while Nude in Landscape was painted on canvas using the average metal tube paints.St Johns pointing gesture towards the heavens shows the complete essence of the painting that baptism which St John symbolizes is important in order for a human being to gain salvation. In Nude in Landscape, Renoir has the sole intention of transport to the viewer his great love for portraying nude women and how he sees the fleeting changes of light on their tender flesh. Leonardos passion for portraying religious characters or biblical matters showed the arena the great importance of religion and how it should never be forgotten.He portrays his figures in a realistic manner to show viewers his great understanding of the human anatomy and how science and its necessity for thorough notice are related to art. Renoir, however, paints not to share a message to the world but rather show people t he majestic effects of light in everything and to remind people that art is not a competition for talent, observation and fame but rather a deep visual expression for ones perspectives and feelings in life.

Wednesday, May 22, 2019

Software and Hardware System Requirements for a Project

Chapter 5Requirement AnalysisThe chapter describe bail model demand and which is cat self-importancerised on the footing of drug user fundamental interaction and specification of package and hardware demand. Besides its overview regulations assign to the assorted user.5.1 Software RequirementNameDetailssOperating SystemWindows XP and UpperDatabase ServerMySql, XMLFront EndNetbeans 7.2, JSP, Java SDK 6.0Application ServerTomcat 6.0BrowserIE 5.0 and Upper or Mozilla, Google ChromeTcap adequate to(p) No 4.1 Software Requirement5.2Hardware RequirementNameDetailssProcessorPentium IV and supra.Random-access memory256MB and aboveHard Drive40 GBNetworkLocal domain networkT suit equal to(p) No 4.2 Software Requirement5.3High Level Process DiagramsA high degree description of the demands of the undertaking is to manage specific defined maps utilizing a jet platform, whilst other maps for content, enrolment, exclusiveity betokenion, and increasing security to single applications exit b e prohibitedside the range of the undertaking and this range is detailed in the diagram down the stairsFigure 5.1 Scope of the UndertakingThis stage of the undertaking provide cover individual factor certification and volition provided capture username and countersignature to manifest a nettsite user.The demands are split into four subdivisionsGeneric demandsSelf judicature functionalityDelegated tendency functionalityHelp Desk inclination.The generic demands go forth embrace certain facets that are generic across the ego disposal and delegated disposal functionality. The undertaking will presend the following generic demands for self disposal and delegated disposalFigure 5.2 Generic demands for self disposal and delegated disposalThe undertaking will present the following self disposal functionalityFigure 5.3 Self disposal functionalityThe undertaking will besides present the followers delegated disposal functionalityFigure 5.4 Delegated disposal functionalityThere wil l besides be the undermentioned Help Desk disposal functionality that will be delivered by the undertakingFigure 5.5 advocate Desk disposal functionality5.4 User groupsUser groupDescriptionExternal web site userAn external web site visitant to any web site or applicationAdministratorAn internal decision ecclesiastic who will hold the capacity to submit entree direction to application specific external web site usersHelp Desk AdministratorAn internal decision master who will hold the capableness to back up the security model and users of the modelTable No 5.3 User Groups5.5 Requirements5.5.1 Generic demandsGEN-0011-Rule-2For Self disposal and decision maker for delegated disposal registration signifiers, the information Fieldss moldinessiness be blank on first burden of the signifier.GEN-0011-Rule-3The system will non auto-generate usernames for decision makers for delegated disposal. The usernames will be entered manually.GEN-0011-Rule-4When the web site user receives the inv itation electronic billet and clicks the URL to lade the enrollment signifier, the username on the signifier will be pre-populated and not-editable.GEN-0011-Rule-5Auto-complete must be particularise to murder.GEN-0011-Rule-6Password and replies to security inquiries must be obscured.GEN-0011-Rule-7The username can non be an email reference.GEN-0011-Rule-8The website user must put up 4 security inquiries, of which 2 will be indiscriminately shown during future hallmark procedures.GEN-0011-Rule-9Security replies must nonBe cleanRepeat replies across the inquiriesBe individual figure or character repliesGEN-0011-Rule-10The replies to the security inquiries will be a minimal 3 alphameric characters, with a maximal 20 alphameric characters and must non comprise the undermentioned particular characters ? $ % ? / or GEN-0011-Rule-11Website users will merely be registered for applications/websites within a pre-defined group, i.e. for either BHW applications or international applications GEN-0011-Rule-12The format of the username will be a minimal 6 alphameric characters, with a upper limit of 20 alphameric characters and must non incorporate the undermentioned particular characters ? $ % ? / or The username will be instance sensitive.GEN-0011-Rule-13The format of the shout will be a minimal 8 alphameric characters, with a upper limit of 20 alphameric characters and must be instance sensitive.GEN-0011-Note-1The application specific demands for informations gaining control are non documented in this DBRS and will be documented at the application specific degree.GEN-0011-Note-2The signifier will non capture opt-in /opt-out for selling intents. This will be done at application degree and non at the security degree.GEN-0011-Note-3Website users will be able to register for specific products at an application degree.GEN-0011-Note-4The website user will merely be able to take a security inquiry one time from the list, i.e. the inquiry selected in Security inquiry 1 will non look in the dropdown for Security inquiry 2 and so on.GEN-0011-Note-5Any individuality deep down informations, i.e. name and reference, will be captured at an application degree.GEN-0012Send electronic mail verification on successful enrollment to the web site userGEN-0012-Note-1A concern de final result has been made to go on with the preferable option that does non necessitate email confirmation and therefore to merely hold one measure enrollment. The website users will have an electronic mail corroborating that they have registered successfully.GEN-0012-Note-2 Without capturing more informations on the enrollment signifier, any electronic mails that are sent will non be customised to the website user and the salute will be Dear User.GEN-0013Post enter-in, all designated assets ( summons ) will be protected by the Security Platform.GEN-0020The watchword say-so must be either medium or strong and must be displayed on the undermentioned signifiersRegistrationChange watchword Security inside informationsGEN-0020-Rule-1Mandatory ( 1 institutionalize each and a entire 2 points in the marking mechanism )Minimum of8 characters in lengthMaximum of 20 characters in lengthA combination of letters and at least 1 figureOptional ( 1 point each )At least one particular character from this list , , $ , , & A , _ , , A mixture of upper and lower instance lettersPoints scoredDisplay& lt = 2Weak ( Red saloon )3Medium ( amber saloon )4Strong ( Green saloon )GEN-0020-Rule-2The watchword strength saloon will expose the coloring material and besides the diction to follow with the Accessibility criterionsGEN-0020-Rule-3On page burden the watchword strength index will be clean.GEN-0030The enrollment signifier must incorporate Captcha functionalityGEN-0030-Rule-1The Captcha functionality must follow with the Accessibility criterionsGEN-0030-Rule-2The Captcha functionality must be instance sensitive.GEN-0040Provide registered website users with the ability to login to a n application or product on any web site that has migrated to the Security FrameworkGEN-0040-Note-1 piece of music the website user will be able to login to any web site or application, they may be required to register for each merchandise at an application degree.GEN-0050Website users must be able to reset their watchword through disregarded watchword functionalityGEN-0050-Rule-1The website users must reply 2 security inquiry ( s ) right to reset their watchword.GEN-0050-Rule-2The 2 inquiries will be displayed indiscriminately for the set of 4 inquiries answered on initial enrollment.GEN-0060Website users must be able to recover their username through disregarded username functionality to reconstruct their ability to log in.GEN-0060-Rule-1An electronic mail will be generated incorporating the website users username.GEN-0070A website users account will be locked if the website user exceeds the maximal figure of login efforts or fails to reply their security inquiries rightGEN-0070- Rule-1There should be 2 error messagesFor infixting incorrect inside informations, e.g. username and watchwordFor history lockupGEN-0070-Note-1The figure of login efforts and replying of security inquiries should be set to 3 efforts, so the history is locked and an enlightening misidentify message is displayed.GEN-0070-Note-2For the history unlock procedure, web site users will be advised to reach the Help Desk in order to unlock their history.GEN-0070-Note-2There will be three history lock out arrests. The first two lockouts will be impermanent and last for 20 proceedingss. The concluding lockout will be lasting and necessitate Helpdesk to unlock the history.GEN-0080The system must be able to run out a web site users password at a specified interval, e.g. monthlyPremiseThe watchword termination will be set at a generic degree and if an application requires an alternate watchword termination policy, this must be applied at the application specific degreeGEN-0090The system must be able to stop a user session after(prenominal) a specified period of inaction on the web site.GEN-0090-Rule-1The in agreement length of clip for the period of inaction must be set across the platform and non at application degree.GEN-0090-Rule-2The inaction timeout will be configured to 20 proceedingss.GEN-0100Functionality must be provided to let the website user to log out of the Security Framework.GEN-0100-Note-1The logout user journey will be an application degree specific user journey.GEN-0100-Note-2This will be locally configurable for each concern unit.GEN-0110Provide individual sign-on capableness such that when a website user registries for one web site or application, they are able to login to another web site or application.GEN-0110-Note-1While the website user will be able to login to any web site or application, they may be required to register for each merchandise at an application degree.GEN-0120The system should supply scrutinizing and describing functionality of bo th self disposal web site users and delegated disposal web site users.GEN-0120-Note-1 This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.GEN-0120-Note-2Any web analytical coverage will be provided through the Omniture toolGEN-0130The system should supply scrutinizing and describing functionality of the decision makers using the delegated disposal toolsGEN-0130-Note-1 This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.GEN-0130-Note-2Any web analytical coverage will be provided through the Omniture toolGEN-0140The concern units should supply an attack and procedure for managing website users refer with possible history via media, whether this be via electronic mail or via a Call CentreGEN-0150The system must dispute an terminal user when theyAttempt to entree unauthorized contentAttempt to entree via a bookmark when alread y logged outGEN-0160The system shall be capable of observing that a user is logging in a 2nd clip from a different topographic point, in which instance the installation should be configurable to reject the 2nd session, end the bing session, or permit coincident Sessionss.Table No.5.4 Generic demands5.5.2 Self disposal demandsRqt No.DescriptionSource/OwnerPrecedenceSA-0020Provide registered and logged in website users with self disposal capablenesss to alter their generic security inside informationsSA-0020-Rule-1A website user must be able to amend the undermentioned security inside informationsEmail referencePasswordSecurity inquiries and repliesSA-0020-Rule-1A website user will non be able to amend the username.SA-0020-Note-1Any application or merchandise specific informations will be amended at application or merchandise degree and as such will non be documented in this DBRS and will be documented at the application specific degree.SA-0021The system must direct an electronic mail to the registered web site user when an amendment has been made to their inside informationsSA-0021-Rule-1The electronic mail must province which inside informations have been amended, butnonwhat the inside informations have been changed from or to.SA-0021-Rule-2If the web site user has amended their electronic mail reference, the system must direct an electronic mail to the old and untried electronic mail references advising of the amendment.SA-0021-Note-1This electronic mail will besides incorporate instructional text for the web site users in instance they are concerned that their history has been compromised.Table No. 5.5 Self disposal demands5.5.3Delegated disposal demandsRqt No.DescriptionSource/OwnerPrecedenceDA-0010Provide decision makers with delegated disposal capablenesss to make an history for external web site usersDA-0010-Rule-1decision makers will merely be able to register Website users for applications/websites within a pre-defined group, i.e. for either BHW appli cations or international applications.DA-0010-Rule-1decision makers will non be able to utilize the same username across pre-defined groups as the username must be alone.DA-0011Provide decision makers with the ability to advise website users of their enrollment inside informations via an invitation electronic mailDA-0011-Rule-1The point at which the invitation electronic mail is sent to the website user will be configurable for each application, i.e. the electronic mail may be sent when the user has been created by the decision maker or at a ulterior strain following updating of application specific history inside informations.DA-0012Provide decision makers with delegated disposal capablenesss to modify an bing history electronic mail referenceDA-0012-Rule-1The system must direct an electronic mail to the registered web site user when an amendment has been made to their inside informations by the decision maker.DA-0012-Note-1The decision maker will merely be able to modify the elec tronic mail reference for an history.DA-0013Provide decision makers with the ability to seek for an bing web site user by username and/or electronic mail.DA-0013-Rule-1The hunt capableness will be application degree particular and will non return users non registered for that application.DA-0014Provide decision makers with delegated disposal capablenesss to disenable and enable an bing history from the applicationDA-0014-Rule-1The decision maker will merely be able to disenable an bing history from the specific application the decision maker is logged into.The decision maker will merely be able to enable an history if it has antecedently been disabled from the application.DA-0014-Rule-2Presentment must be sent to the Help Desk decision makers when a user has been disabled for a specific application.DA-0014-Rule-3Presentment must be sent to the bing user when their application particular history has been enabled.DA-0015Provide decision makers with the ability to re-send an invitation electronic mail to a website user during the URL demise period and post the URL expiry period.DA-0015-Rule-1This functionality will merely be available if the web site user has non logged in and completed their profile for the first clip.DA-0015-Rule-2If the invitation is re-sent during the expiry period, so the URL from the initial electronic mail will be invalid and the expiry period will be resetDA-0020Invitation electronic mails from the delegated decision maker must incorporate the undermentioned information for the website userUser nameEncrypted URL to automatically log the user into their historyDA-0020-Rule-1The URL will run out on first successful usage and the website user must alter the watchword, enter their personal inside informations, select the security inquiries and input their replies to their chosen security inquiries on loginDA-0020-Rule-2The fresh URL should be expired after a configurable clip period and the recommendation is that this is less than 2 hebdomad s.DA-0020-Rule-3As a lower limit the watchword must be encrypted.DA-0030Hard transcript invitations could be sent from the delegated decision maker and must incorporate the undermentioned information for the website userUser nameImpermanent watchwordFriendly URLDA-0030-Rule-1The impermanent watchword will run out on first usage and the website user must alter the watchword, enter their personal inside informations, select the security inquiries and input their replies to their chosen security inquiries on loginDA-0030-Note-1The ability to capture reference inside informations for poster of the difficult transcript invitations has non been captured in this DBRS and will be documented at the application specific degree.DA-0030-Note-2The concern procedure for the despatching of the difficult transcript invitation is out of range of the Security Platform and must be put in topographic point by the concern unitsDA-0040Provide decision makers with the screens and functionality for the del egated disposal which will be deployed at an application specific degree.DA-0060Provide decision makers with the ability to re-enable a user that has antecedently been disabled from the applicationDA-0070Provide decision makers with the ability to seek for handicapped users by username or electronic mail.Table No 5.6 Delegated disposal demands5.5.4Help desk disposal demandsRqt No.DescriptionSYS-0010Provide Help Desk decision makers with the ability to attempt for an historyModify an historyDisable an historyEnable an historyDe-register an history from the security modelRe-register an history on the security modelDe-register an history from an applicationRe-register an history to an applicationUnlock an historyReset watchwordUpload users in majoritySYS-0010-Rule-1The Help Desk decision makers will be able to de-register an history at the security model degree. This will forestall the website user from logging into any application and sites.SYS-0010-Rule-2Presentment must be sent to e ach of the decision makers when a user has been de-registered at the security model degreeSYS-0010-Rule-3Presentment must be sent to the bing user when their history has been de-registered from the Security FrameworkSYS-0010-Rule-4Presentment must be sent to the bing user when their history has been change in any manner on the Security Framework.SYS-0010-Note-1 This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.SYS-0010-Note-1An electronic mail will be sent to the terminal user for the alteration of each property.Table No. 5.7 Aid desk disposal demands

Tuesday, May 21, 2019

Precious Blood

neckcloth Diamond is a picture show that was cast by Leonardo DiCaprio, Djimon Hounsou and Jennifer Connelly and was directed by Edward Zwicks. The movie was set in Sierra Leone polished War in South Africa. The role of Hounsou was a fisherman while DiCarpio was a white mercenary gun smuggler that sells guns to rebellions in exchange of silver while Connelly was an American journalist that wants to expose the illegal and mistreating of the diamond miners in Africa. Connelly was the only cast in the movie that has no intent on diamonds. (Burr, 2006)The movie was all about the prosecution of DiCarpio and Hounsou to reveal the pink diamond which they believe that the pink diamond will change their lives. Hounsou was a fisherman who was taken outside from his family so that he can work in the diamond field. While in prison, DiCarpio found out that Hounsou had an idea of the pink diamond. The major quest of Hounsou was to shape his family but found out that his family was in the hand s of the United Nations.But the son of Hounsou was kidnapped by the diamond miner terrorist and was forced to become a child soldier. With this, the deuce men joined in gambleing the missing pink diamond because the said diamond will help Hounsou saves his family from the hands of the rebels while DiCarpio will find a second life. With the help of Connelly, the three will reveal the truth behind the issues surrounding the diamond industry in South Africa. (Burr, 2006)The story of Blood Diamond mirrors the creation of some country-the rebels using their resources in finding weapons that they can use against the government. Many countries are now experiencing this kind of problem and affect the mathematical operation of the government in serving its citizen. This is a positive side of the film because it tackles some of the major problems in countries, terrorism. The setting of the movie is perfect for the purpose, and message of the movie. It shows the lives of numerous African p eople and shows how sad are the lives of these Africans. The major casts of the movie play their role efficiently. Like Hounsou who played as a rebel kidnapped. As the quest begins in finding his son, the emotion as a father was seen on Hounsou.The movie Blood Diamond showed mistake in doing the film. First, is the scene were DiCarpio and Connelly share the booze and the rd cup they used appear and disappear with out explanation. Another movie mistakes is when the child soldiers were seen using a Game Boy Advance SP. The video granular was released in the market on 2003 while the film was set in 1900s. Also, when Solomon was fishing in the morning, the sun rise over the sea which is contrast to receivedity that the sun rise over land.The CastsDiCarpio had a character that is flat and one dimensional only at the start of the movie. But as he entered to the real world of diamond industry in Sierra Leone, he became strong, and well rounded. At first, DiCarpio shows a virtue of a smu ggler, a liar but as the movie goes his brutal honesty reveals the illegal diamond business organisation in Sierra Leone. Hounsou shows was successful in making a character that is strong and is immovable in regaining back his son from the diamond rebels. And sometimes, he induced anger, compassion and hopelessness. Jennifer Connelly was a American journalist that seeks and wants to reveal the illegal diamond business in Sierra Leone. She cooperates with DiCarpio and Hounsou in her quest.The acting of the three major casts played their role in well. This is a good characteristic of the film because it shows the reality in South Africa.The film ends when Hounsou reveals to the people his experience in the diamond rebels and the illegal of the said business. The film was very interesting because it show to the audience what really happens in some part of the world. The producer of Blood Diamond would like to impart to the audience to become aware to this serious issue that will make a one step towards in minimizing these problems.ReferenceBurr, T. (2006). Blood Diamond Movie Review Electronic Version. Retrieved May 25, 2007 from http//www.boston.com/movies/display?display=movie&id=9301.

Monday, May 20, 2019

Students Participation in Co-Curricular Activities

Group Discussion October 29 2012 stern Cheok, Wai Wai and Sin run into Sorry, If your name atomic number 18 typed wrongly and please voice out if you have any problem. TQ John Well, we shall talk of our task given to us by Ms. Low today. So do you have anything to bring up? WW Sorry for the founderion, plainly I did non pay attention during English class last week. Do you mind to explain what atomic number 18 we supposed to discuss? John Everyone in the class is divided into groups and we are supposed to discuss the question that are given and present it to the class.WW Id appreciate it if you could instill me further on the question given. SP Wai Wai, the question given to us is about educatees intimacy in co-curricular activities has not been encouraging. We are must discuss the reason and implications and not to forget, the ways to overcome it. John Im glad someone actually listens in class. Co-curricular activities are non-academic activities that are conducted in sch ools or colleges. Further more than, the objective of these activities is to help prepare the physical strength and mental state of students.These activities may vary from football to public speaking. WW From my mention of view, these activities help the students a lot, so I cant understand why are their fragmentiseicipation discourage? SP In general, college students have not enough meter. They have to juggle around with many things. Students not have many lecture and tutorial classes to attend. For example, I finished my lecture at 10am, my next tutorial class is at 10. 30 and I have to race all the way to the class that is situate so far. Let alone co-curricular activities, I dont even have enough prison term to finish up my homework.John I think we share the same opinion on this matter, there are so many assignments that I have to pass up. And the deadlines are all right next by and by the previous. I dont think 24 hours for a college student is enough. I think I need 30 h ours a day to join a co-curricular activity. WW I fit in with you on that, and if we manage our time properly, we entrust find out that we spend a lot of our time on unnecessary matters, for example many students are this instant addicted to Facebook. They log on to Facebook like every hour. And also many are addicted to Korean dramas.Instead of wasting time streaming for an episode. Why not join a co-curricular activity? SP Im afraid Im not in truth convinced by you. One of the reasons is activities in co-curricular are not evoke. Students are learning what they have knowledgeable in secondary school a accumulate and again. The repetitive and common activities go away not attract the students to participate. John I think it is fair to separate that the way to overcome this problem is by adding more interesting activities that can attract many young adults to participate and most important have fun date doing certain activity.WW It suddenly rang in my mind that many of my friends told me this before, the activities conducted in co-curricular are not helpful in their future career. On one hand it may not be helpful but on the other hand it may also be less encourage because of parents objection. SP I totally agree with you. If students take part in these activities, they will have to stay longer in college. It is normal for the parents to be worried. I understand this because my mother will also get worried of me. They are afraid that I will merge with the wrong group or even play truant.John I rather agitate student themselves to be lazy than blaming parents for not letting us join the co-curricular activities. WW May I interrupt you for a moment? John If I may just finish, As I was saying, if a student is hardworking and responsible, I am sure that their parents will believe them and not worried that they will mix with the wrong people neither will they play truant. WW In that case, Im sorry to say that I may not be able to accept that. SP Lets no t betoken further but discuss about ways to overcome this problem. John I think a campaign will help.WW Could you explain this matter further? John What I was thinking just now is that the college should held a campaign to encourage the students to take part in co-curricular. In that campaign, students should be given with more details and they can also ask questions about the activities that they are keen to join. By doing this, the students might gain more interest or even be exposed to new things. SP I see plaza to eye with you about this. Besides organizing a campaign, the college can also make it compulsory to join co-curricular activities.If students refused to join, they will never graduate. WW I concur with you on this issue, but if the college forced their students to take part in the co-curricular activities, they students will not enjoy themselves but it will even male them more stress. From my point of view, the college should reward students with computer address hou r. For example in Tar College, if you join the co-curricular units, at the end of the semester, you will earn two assent hours. John Wow, by doing this, students will gain more knowledge and also do something for them to graduate by earning those credit hours.Im sure students in TAR College are all willing to take part in their co-curricular units. I think students will gain more experience by participating in co-curricular activities. I believe, Co-curricular activities will expose students to many new things, hence it have many benefits. To conclude our discussion, the main(prenominal) reason for students not to take part in the co-curricular activities is lack of time or has bad time management and to overcome it, students must learn to distribute their time not only for their academic but also for some co-curricular activities.

Sunday, May 19, 2019

Mobile Phone Usage Among College Students Essay

1. IntroductionA fluid name or roving ( besides called cellphone and conkphone) is an electronic device used for erratic telecommunications ( nimble telephone, text messaging or data transmission) over a cellular ne twainrk of specialized base s abolish know as cell sites. Most current cell phones connect to a cellular network consisting of switching points and base stations (cell sites) owned by a agile network operator. In profit to the standard voice function, current runny phones may hold in many additional wait ons, and accessories, much(prenominal) as SMS for text messaging, email, packet switching for access to the Internet, gaming, Bluetooth, infr bed, photographic camera with video recorder and MMS for sending and receiving photos and video, MP3 player, radio and GPS. The supranational Telecommunication Union estimated that sprightly cellular subscriptions worldwide would reach approximately 4.6 billion by the end of 2009. restless phones puddle gained inc reased importance in the sector of information and communication technologies for development in the 2000s and sire effectively started to reach the bottom of the economic pyramid.The Indian telecommunication industry, with ab emerge 506.04 gazillion energetic phone connections (Nov 2009)update, is the third largest telecommunication network in the world and the atomic number 16 largest in term of design of wireless connections ( later on China). India has become one of the fastest-growing mobile markets in the world. The mobile services were commercially launched in overbearing 1995 in India. In the initial 56 days the average periodic subscribers additions were around 0.05 to 0.1 billion further and the nub mobile subscribers base in December 2002 stood at 10.5 millions. However, after the number of proactive initiatives taken by regulator and licensor, the monthly mobile subscriber additions increased to around 2 million per month in the year 2003-04 and 2004-05.Read more thanEssay About Harmful Effects of active Phones on StudentsKerala is the state with highest teledensity and the number of subscribers in the state has crossed 1.7 million. The increase in mobile phone usage in Kerala had been led by the growth in the states non-re billetnt population and the fall upon in call rates. In its backward Malappuram district with a huge expat population, already at that place ar more phones than people.It is with this considering and regard that the mobile phone market has been burgeoning in India that we proceed to conduct this ample deal as an attempt to understand the mobile phone use pattern among the specific group youth, by narrowing down the study in the campus of Sacred Heart College, Thevara. Over the long time the bad side of applied science has as well as been brought to forefront placing the onus of bad conduct as always on the youth. It is an original circumstance that mobile technology has corroded the lives of many young people and has reduced their productivity inside the college campus. This study, then, while beingness a impetus analysis survey, is also relevant in the context that it attempts to take aim out solutions to this problem of mob menace-on-campus on the basis of the responses of the schoolchilds (purported victims) in question.2. ObjectivesThe objectives of this survey may be drawn out as fol minuscules a. To identify the average number of students using mobile phones indoors the campus b. To identify the income versus manipulation pattern with respect to purchase and further spending on mobile phones by students who use mobile phones c. Sketch the current turn offs in mobile phone usage among students d. Understand whether a absolute majority have the thirst to get into trouble using mobile phones e. Come up with possible solutions to reducing mobile phone menace at bottom the campus3. MethodologyIn keeping with the above stated objectives, we adopted the methodology of simple random sampling to attain a savour of 77 students in the ratio of 124 for 1st years, second years and 3rd years respectively, accounting for a suss out of 11 departments offering undergraduate courses within the college. Therefore we have a total of 11 setoff years, 22 second years and 44 third years. The third years who have been acclimatized with the collegesurroundings set up the most reliable and consistent data, first years stand on unsure ground and 2nd years show rebellious tendencies. Of these, a majority of trends were analysed on the basis of responses of only 64 (out of 77) students who feature mobiles within the campus.The survey was conducted with the help of a written questionnaire consisting of a variety of questions numbering a total of 31 ( beguile Appendix I).4. Findings and ConclusionsBefore moving to the major conclusions derived from the survey, it would be worthwhile to understand the basic characteristics of the sample of 77 students surveyed. 4.1 Basic Characteristics1Among those surveyeda. 58% are fe potents, with relatively more male samples (55%) coming only among second years b. 56% fall under the age group 18-20, the remaining in 20-22 group c. liberal arts and Science groups together contri savee more to the total sample strength, in keeping with the relatively great number of departments that they have in the college. d. 75% of the respondents are day-scholarse. A dinky percentage of 31% of respondents are engaged in any form of part-time or other income earning activities along with their studies, with the greatest share coming from 3rd year students of upto 34%. f. Overall 52% of the respondents claim monthly incomes of over Rs. 5000, but internal vagaries can be lineaged with about 36% of II year students putting their monthly income at only Rs. 1500-3000. g. Among those surveyed, a majority i.e. 83% confess to add uping and using mobile phones within the campus. The highest usage may be seen among the III ye ars (91%) and lowest among II years (68%). From this we can deduce that on an average between 65 to 80% of all students in the college are using mobile phones within the campus.4.2 Income-Spending Patterns in Mobile UseAs against popular belief, mobiles are mostly seen as utilities sort of than prestige goods by the students in that while 52% claimed incomes above Rs.5000 only 31% of the respondents actually feature mobile phones ranging above Rs.5000. The entire 5% of respondents, who possess mobile saluteing over Rs.10, 000 not surprisingly, consists of male respondents reflecting male fondness for gadgets.A. Ownership of MobileWe also see that parents consider it a matter of great necessity that their wards possess mobile phones as even though 31% of the respondents worked, only 28% had purchased the mobile out of their own income. A big majority, 72% students, possessed mobiles with the complete knowledge and acceptance of parents.B. periodical Spending on MobileIt is inter esting to note that females are considerably frugal when it comes to spending bills on mobile phones in lieu of charges or normal bill payments, never going beyond an average of Rs.500/month. Males calm have a tendency to cross Rs.500 with 24% of then doing so and a very small percentage (4%) dare to cross Rs.1000 a month. On an average, however, a good majority of 67% are able to limit their monthly expenses to less than Rs.300. This may be attributed principally to the detail they use pre-paid mobile connections offering minimal top-up recharge cards aplenty in the market.4.3 Trends in Mobile routineTo identify the current trends among mobile users in college we use the responses of 83% of respondents who confirm that they bring and use mobiles within the campus. The following are the major trends noticed.A. The most used mobile handsets NokiaB. The most used type of mobile connection Pre-paid56 of the 64 respondents prefer to use pre-paid and not post-paid connections. The reasons may be that it allows punk and easy recharge and prevents too much interference from the parents regarding usage and convoluted processes of bill payments. Further it also prevents over-the-budget use of mobiles by restricting the number of calls, messages etc that one can make during a given recharge period.C. Preferred Mobile Network AirtelThe top three mobile service providers among the students surveyed are Airtel, BSNL, and Vodafone. eon Airtel being the leading provider was not a surprise result, BSNL emerging the second most popular service provider was quite against the expectations, given the recurrent troubles in connectivity and overall poor performance. However the attractively priced student plans must provide the incentive to purchase the connection.D. Most Communications go to Friends/ClassmatesWhile overall we see that friends/ breakmates surpass family in receiving communications from students, this marginal overtaking occurred in case of the III years al one. Among I years and II years family comes first in terms of maximum communications. Again, the 11% of people who agree to communicating most with their boyfriend/girlfriend may also seem as too small a percentage. Here again the III years (almost 9%, especially boys) were more given to pass judgment that they had relationships and frequently communicated with them.E. Primary time of use EveningF. Service Most Used SMSThe top two services for which the mobile is used are to send SMSes and to enjoy melody. Calls (ironically, the primary purpose of mobiles) come only third. The fact that GPRS facility is least used points to the fact that agood majority of students are still not much acquainted with mobiles having higher end facilities. While analyzing the use of important mobile services, it would also help to separately present the behaviour of males and females in this regard. Even though females form a great number of respondents, only 5% actually use the GPRS facility agains t 24% of males. A similar trend is seen in case of Camera/Video usage and also FM/music player.G. Most favorite form of communications ForwardsA whopping 42% of all respondents prefer to communicate via forwarded messages alone. This is primarily because of the numerous free SMS plans provided by the pre-paid connections. While they could make use of this facility to send personalized messages, a lack of sufficient personal thoughts to send to ones friends and classmates (whom one meets everyday) and a relatively larger store of forwards traveling by dint of the mobile networks, it affords a cheap and easy way to last out in touch. The second most preferred method of staying in touch is pitch to be bewildered calls.H. Main reason for bringing mobiles to college FamilyWhile this may seem quite contradictory to the earlier result, note that earlier it was mentioned that only III years gave friends/classmates precedence to family. The trend is similar in this case as well. barel y over all keeping in touch with family is believed to be the main reason to bring mobiles to college. Our earlier conjecture that mobiles are no longer luxuries or prestige goods is revalidated here with only 4% of boys affirming that they bring mobiles in order to impress others. We can also safely state that the entertainment grade of mobiles is of great importance to the students with an overall of 27% agreeing that they bring the mobiles to college only in order to listen to music or play games during free hours.4.4 Mobiles Danger or Saviour?Now, it is necessary to tackle the issue of propensity of the youth to entangle themselves in serious problems by using/misusing the services ofmobiles. The survey shows interesting results. A. Mobile as a tool for social networking? NoA majority of students seem to be assured of the dangers of making friends through the mobile and hence have successfully avoided any attempts to network using mobiles. exactly among the 13% of those who h ave been adventurous, it is quite move to note that 75% are male students.B. Trends of Disturbing Calls/Messages?While a majority claim that they have definitely at various times received disturbing calls/messages from random unknown persons, only 22% admit to having sent such calls or messages. Again, the propensity to do so is higher in males (40% in males as against 10% in females).C. Knowledge of troubles related to Mobiles in college Very LessD. Mobile as a Saviour?4.4 Possible Solutions to Mobile MenaceIn order to postulate solutions to mobile phone menace on campus, we must first find out whether the students feel that mobile phones are actually a menace on campus. From the above section what we understand is that a good majority of students using mobiles are rational and mature preferring to stay away from troubles, known or unknown. And they have most often felt that mobiles are more helpful in contacting their slopped ones in times of difficulty. In this line, the result is that 44% dont think mobiles are a menace (including those who dont possess mobiles in campus).But at the same time 30% are also undecided between the advantages and disadvantages of having a mobile in college. Hence these results cannot be taken at face value. We need to probe further with regard to two specific problems namely, camera phones and loss of attentiveness in class.A. Yes to a Camera BanFemales, naturally being c at oncerned about their safety, over the 3 years of college, uniformly support a ban on camera phones in college campuses. The trend among males is quite peculiar. A majority of first years and third years are in support whereas the number drastically falls in the case of second years. This can only be attributed to the fact that a majority of second years often go through a phase of rebellion within the college, where rational thinking becomes faint. The result is purposeful disregard of all bans and regulations, which is very evident end-to-end the surv ey.B. Yes to Mobile JammerIn case of the possible use of mobile jammer too we see that I years in all eagerness to please and learn are will to consent with its use during class hours. The II year students are more prone to bunking, disregard and involvement in extra-curricular activities and hence both(prenominal) males and females are quite against the idea of mobile jamming during class hours (as that is when they would require the mobile most).Again, once students enter III year being more conscientious and exam-oriented, they are more willing to comply with such a possible jam. Therefore the compliance behaviour of students varies greatly with their mental makeup, objectives and peer behaviour which changes from year to year. Universally it was felt that I year and III year responses were more grounded, rational and in keeping with objective decision-making process.C. Provision of Mobile Phones by College A Possible SolutionWhile camera ban may be incompletely effective, rec urrent programmes and festivals prevent it from becoming fully functional. Mobile jammers (especially of partial formats) can involve huge technological costs and also real costs in terms of time lost in communicating between departments not only for students but also for efficiency and other staff. Then what can be done? What we did with laptops/computers make it available to students. It is obvious that even after successive bans mobiles are being used in the campus. The main reason as we have found is the need to stay in touch with family and friends, due to odd timings, blocks and other transportationproblems, and also as a source of entertainment.So what would be the response of students to a possible offer from the college to provide low end basic phones (all of which nowadays come with FM/Music player) to be used during the period of commencement exercise? The only condition we put was an extra payment of Rs.500 (which can be seen as a refundable forethought deposit) at th e beginning of the course. And quite surprisingly, without any other incentive, 40% responded in affirmative they are willing to use this facility. The most promising response came from III years where 50% said yes, and among I years 36%, but it was least in II years at 23%.While 40% may seem as a small number, it is also important to understand that the remaining 60% doesnt completely disown this scheme. Instead there is a very important group the sewert Say group. It has always been seen that these are the people who make or break plans. As much as 17% are undecided regarding the adoption of the scheme. They represent the group of people who carefully consider incentives and take decisions. Since they have not received all information they desist from committing to the programme. On the other hand a string of incentives such as free connections, group calling cards, self-payment (without interference, atleast at superficial levels, from college), pre-fed be for emergencies etc . would considerably shift the 17% towards yes.In case of indecision also we see that the II years are ahead, whereas III years who have confidence in the system, and understanding of the utility of mobiles have least indecision. One can ponder over the cost elements of making such a purvey available, but doing that would not fall under the purview of this study. But a general note should be made that most companies would be willing to provide such facilities within the campus at low cost (in case of bulk supply).It is also interesting to note that among the 17% of students who dont possess mobile phones, 38% (comprising of 60% girls) said yes, an equal number were undecided and only 24% said a strict no. They perhaps represent those students who are totally averse to use of mobile technology itself.Recent reports in newspapers surrounding this debate have also shown that parents are willing to accept such a provision (some parents themselves putforward this idea). Our survey shows that, if it is implemented when students enter first year itself, there is a high chance of gaining uniformity in mobile usage (preventing any possible deduction effects), almost completely eliminating camera phones (with the agreement of students), and a knowledge that ultimately it is the property of the college and must be returned with the trust that authorities have reposed in them would decrease chances of misuse. The idea is to come up with an incentivised plan to supercharge students to make use of the facility if put into effect. It would also encourage teachers and students to reduce barriers and open all channel of communications at all times.In Conclusion The mobile technology has undoubtedly spread through the college, but mostly as a utility rather than a luxury. But the fact that it provides issuance for entertainment makes it more endearing for the students. Male students are more likely to venture into the technological sides of the mobile while girls keep it b asic. The spending is kept generally within limits of Rs.300/month. Other trends include a majority use of Nokia handsets with pre-paid connections, to communicate with family/friends. A good majority treats mobiles with safety and stay away from dangerous use. But the boys have a greater tendency to take risks in this regard. Generally mobiles are perceived more as a saviour than a danger.There is no possibility hence that they will go against using mobile phones, thereby making a ban ineffective. But logical sense prevails in that they are aware that camera bans are meant for their safety and security. Overall 44% are also assistance toward a possible partial (during class hours only) use of mobile jammers as well. But it seems that if the college is willing to grade in low-end mobile phones for students, while it may not ensure 100% compliance and riddance to technology related problems, it can go a long way in ensuring uniformity, constant communications and surrounding(pren ominal) links between authorities and students on the basis of trust and confidence.