Wednesday, November 27, 2019

Introduction to Tesco  Essay Example

Introduction to Tesco   Essay Tesco is Britains leading food retailer employing 160 000 people in the U K throughout its 702 stores. Over the past five years Tesco has expanded from a traditional U K based supermarket into new countries, products and services including a major non food business, personal finance and internet shopping. Tesco has progressed into a truly international retailer employing a further 140 000 people throughout 214 stores in nine markets worldwide. The increasing scale and internationalization of Tescos sales and purchasing operations contributes to a significant increase in efficiency and profitability. In this assignment I will be examining Tescos position in the economy, explaining the role of economies of scale within Tesco and drawing up a detailed swot analysis of the organisation. I will also be examining the role of production within the firm. Tescos position in the economy Tesco is a public limited company (plc). Public limited companies are businesses with share price on the stock exchange. To become a public limited company, a business must have an issued share capital of at least à ¯Ã‚ ¿Ã‚ ½50 000. The company must have reissued at least 25% of the nominal value of the shares. Tesco can raise significant sums of capital by selling shares to the general public. Shares are bought and sold on the stock market. We will write a custom essay sample on Introduction to Tesco   specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Introduction to Tesco   specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Introduction to Tesco   specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Management of Tesco is in the hands of the board of directors who are appointed by the major shareholders at the annual general meeting (AGM). Tesco has approximately 100 000 active shareholders within the company. Tescos share holders do not have any say in the day to day running of the company. There is a distinct division between ownership and control within Plc companies. This is unlike sole traders, partnerships and some private limited companies, where owners usually take on management duties. Being a plc Tesco benefits from limited liability this will limit financial risk. In the unlikely case of Tesco going bankrupt and falling into debt shareholders can only lose the value of their fully paid shares at worst. Their personal property is immune. This is not the case for sole traders and partnerships as unlimited liability is present. Therefore the owners will be fully liable for all of their debts. Plcs have become the dominant type of business organisation in the private sector. Tesco will experience fewer difficulties in raising capital than most other types of business. Not only can they raise capital, but their high public profile also makes it easy to arrange loans from financial institutions giving it the resources to trade throughout the world and compete in the toughest markets overseas. Tescos legal obligations: * Memorandum of Association This is a statement of the name of the company, the address of the companies registered office, a statement of the companies aims. * Articles of association This is a set of rules by which the company is governed. The articles are a contract between the company and its shareholders. The document must provide details of. : 1. The firms nominal capital. 2. When shareholders meetings are to be held and how they are to be conducted. 3. The voting rights of shareholders. 4. How profits and losses are to be distributed. 5. Names of directors. 6. How directors are appointed and the nature of their authority. Tescos business objectives Business objectives are medium to long-term goals or targets that provide a sense of direction to the business. These usually have a stated time scale. For instance, Tesco might have an objective to boost market share from 27% to 30% over the next four years. Tesco owes its success to fulfilling their major business objectives and meeting consumer needs. These are as follows: * Making a profit * Increasing sales and market share * Providing services to the community * Producing high quality products and offering high quality services * Developing a skilled workforce * Expanding into overseas markets * Fulfilling charitable or non-profit objectives Tescos Market share Market share is the term used to describe the proportion of total sales in a particular market for which one or more firms are responsible. This is usually expressed as a percentage. The supermarket sector has always been highly competitive. Tesco is the leading company in the sector with a huge 27% market share. Tesco is under much increased competition for market share and sales with the rise of Asda Walmart, sainsburys and the takeover of Safeway by Morrisons. Tescos dominant market share is put down to their policy of cheaper prices, offering better choice and convenience for their customers and its emphasis on meeting changing consumer needs through service and innovation, while maintaining its commitment to value and quality. In June 2003 the third largest supermarket was created. This came about by the takeover of Safeway by Morrisons. According to BBC news a deal worth à ¯Ã‚ ¿Ã‚ ½2.9bn was agreed by the two supermarket chains. The combined firm, with 598 stores, a turnover of à ¯Ã‚ ¿Ã‚ ½12.6bn and a market share of 16%, aims to compete with Tesco, Sainsburys and Asda- the giants of the U K supermarket sector. This was a massive boost for Morrisons which prior to the takeover was a fast growing but medium sized supermarket chain based in the north of England. The take over has opened up the South of England to Morrisons where Safeway was predominantly located. The well documented takeover of Safeway by Morrisons was proposed by all of the supermarket giants including Tesco. Tesco showed a great deal of interest in the takeover but their bid was blocked by the competition commission. The office of fair trading decided to block Tescos bid stating that it would give Tesco increased buying power over manufacturers and suppliers resulting in a push up of prices. The office of fair trading also had concern for small stores and its negative effect on local communities. Financial Information In April 2003 Tesco announced a 14.7% rise in annual profits. This rise in profits has been put down to increased emphasis on non-food products and its expanding overseas operations. Tesco announced pre-tax profits of 1.4bn for the year to February 22nd. These profits exceeded forecasts of 1.3bn. Tesco decided six years ago to focus on expansion into higher margin non-food products such as clothing, healthcare and retail services such as banking, as well as expanding overseas. Tescos International sales rose 31.2% to à ¯Ã‚ ¿Ã‚ ½5.2bn in the year to February 22nd. Meanwhile in the U K sales grew 7.9% to à ¯Ã‚ ¿Ã‚ ½23.4bn.

Sunday, November 24, 2019

Neolithic pottery and art Culture

Neolithic pottery and art Culture Introduction The Neolithic period is one of the most fascinating periods in the Chinese history; a period believed to have started in 10,000 B.C. and came to an end eight thousand years later. This period was characterized by a population, which solely depended on crop and domestic animal farming as opposed to gathering and hunting as considered as common ancient economic activities.Advertising We will write a custom term paper sample on Neolithic pottery and art Culture specifically for you for only $16.05 $11/page Learn More Like in other parts of the world, Chinese Neolithic inhabitants preferred occupying regions along rivers and lakes for easy access of water, which was a major family need. Of great significance is the Chinese artistic tradition that has its core traces in the middle of the Neolithic group (The Metropolitan Museum of Art 1). There are groups of artifacts which prove the existence of the tradition. This paper analyses, pottery culture du ring the Neolithic culture with special emphasis on some of the social reasons which prompted the development of the culture. Additionally, several images have been compared with a thorough discussion of the social importance of certain artifacts within the historical environment. Categories of artifacts As mentioned above, Chinese artistic tradition was divided into two categories. The first group was the painted pottery which was common along the Yellow River Basin that stretched to the northwestern part of China from Gansu province. Yangshao emerged in the central region while Machang, Banshan and Majiayao were witnessed in the northwest region (The Metropolitan Museum of Art 1). Yangshao pottery was done using coils of clay, which were stuck together and smoothened into customized shapes and sizes. Pottery containers from graves were principally painted with red and black color to signify pain and mourning. It is believed that this practice depicts ancient use of brushes for sev eral linear compositions among others. The second category of Neolithic artifacts encompassed jade carvings and pottery originating from the eastern seaboard and the lower side of the Yangzi River towards the southern direction (Jiang and Liu 356). This representation included Hemedu, Liangzh, Dawenkou and Longshan. It is important to mention that Eastern China pottery was distinctively known for its unique shapes as compared to those from the central region, which mainly included the tripod that later remained significant during the Bronze Age. Even though some paintings from the eastern region were painted as part of decorations, those from the coast mainly utilized burnings and technical incising. Notably, the craftsmen of the Neolithic period in China have been recognized throughout history for their invention of the Wheel (The Metropolitan Museum of Art 1).Advertising Looking for term paper on art? Let's see if we can help you! Get your first paper with 15% OFF Learn More Another important aspect of Chinese culture during this period was the use of jade among potters. This made lifetime contributions into what was later known as Chinese civilization (Pryor 1). Stone was also commonly used in making designs among the Neolithic settlements. The best stones were always chosen depending on their strength and quality before being fashioned into desired items of value. Nephrite, also known as â€Å"true jade†, was considered tough and strong by most craftsmen and was therefore frequently used than other stones in the region at that time. This was a common phenomenon in Zhejiang and Jiangsu especially towards the end of the Neolithic period (Pryor 1). An important feature of jade was its hardness, and proved tough during carving as it required a strong knife and always turned out to be laborious. Incised decorations and glossy polished surfaces required high skills and extraordinary patience from craftsmen in order to realize outst anding good results. Archeological findings have always revealed the presence of jade in and commonly placed alongside privileged dead bodies before burial could take place. Axes Like other artifacts during the period, jade axes1 were symbolic and carried unique message for the public. Besides being used during burial, they also symbolized harsh punishment especially in cases where one was found guilty of a serious criminal offense. After carving of the axe, it was always fixed into a stick which served as the handle. It also denoted gaining of power by one person to lead others (Thorp and Vinograd 35). The significance of Jade axes tremendously evolved, making them to become symbols of social importance. Image 1 Regional pottery and art As mentioned above, the Neolithic period saw the emergence of artifacts and designs which later became the foundation of the Bronze Age. These carvings and other forms of art were unique depending on the geographical location since different people valued art uniquely.Advertising We will write a custom term paper sample on Neolithic pottery and art Culture specifically for you for only $16.05 $11/page Learn More As a result, provinces and even villages identified themselves with certain designs with a few similarities being noted. Additionally, artifacts carried meaning that was easily communicated within the area of origin as different groups of people had customized interpretation and understanding of art as described below. Image 2 Image 3 Yangshao Village Yangshao Village2 had a wide range of potteries during the Neolithic period with special focus on 4500 B.C. Most of its artifacts carried complicated designs even though one could easily consider them to be simple, with three distinctive categories being recognized. These included owl3, animal and lady figures (Thorp and Vinograd 47). Based on these groups, it suffices to mention that each artifact within a given class symbolized a certain asp ect of people’s life. Therefore, their presence always had unique interpretation by the people of that time. Although its meaning was not quite clear to many, owl images were common in the village and they took different shapes and designs as chosen by the artist. The design and most features of most owl images indicated the strength of the animal. Other people also believed that owl represented the messenger of some supernatural being that was beyond their knowledge and understanding.Advertising Looking for term paper on art? Let's see if we can help you! Get your first paper with 15% OFF Learn More On other occasions, they were used to imply the need for people to stay awake during the night for their own safety (Thorp and Vinograd 48). On the other hand, fish figures depicted the lifestyle of people at the moment as fishing was one of the economic activities of the time and a major source of food. The first owl image above denotes the strength of the animal from its strong wings and legs. Being a core aspect of any community, fertility was also represented through art. Frog images were commonly used to denote this as they were designed with a human shape and artistic decorations. Common features included legs and the use of three to four colors as part of the final touches to make the figure more attractive. They were generally made by hand although they always had asymmetric shape (Thorp and Vinograd 50). Image 4 Another village which valued artistic images and figures was Dahe in Henan Province. People from this village expressed their ideas through figures also witnessed in other regions during this period. Axe, bird and fish figures were quite common and signified their daily lives in terms of economical aspect of living. Farming was a common practice together with fishing. The figures emphasized how their daily lives were shaped. Similarly, Xia Dynasty4 and Shang Dynasty valued pottery and their cultures. There were three subjects that were common and significant in these dynasties (Thorp and Vinograd 256). These were sky, earth and people. People from these dynasties believed that the earth produced rulers of the earth and the universe. Their tombs were however characterized by several layers which implied the existence of numerous layers of the universe. Several figures were also recognized including the axe and Vassal among others, with each pottery denoting a specific meaning or aspect of their lives. Some of the images like gold seals were a symbol of wealth and material ability for the community and were common in tombs. Image 5 Conclusion From the above analysis of pottery and art culture during the Neolithic period, it is evident that most people of this age highly valued their culture pricelessly. Through expert skills and knowledge, they expressed their feelings, lifestyle and other aspects of life through artistic figures and decorations. Of significance is the image of animals among their potteries (Kuijt 297). Common animals included owls and fish whose symbolic meaning revolved around the nature of their daily life and the existence of a supernatural being respectively. Social status was also represented by several artistic images like tombs with solid gold which always symbolized a sense of wealth and high social status. Other elements of high standards of living included but not limited to golden horse, mirror, cosmetic containers and elegant dining ware. In general, Neolithic period significantly prepared people for the Bronze Age that was experienced later on. There were several artifacts which found way i n this age, implying the importance of Neolithic period in Chinese history and Cultural Revolution. Jiang, Leping, and Liu Li. â€Å"New evidence for the origins of sedentism and rice domestication in the Lower Yangzi River, China.† Sedentism and rice domestication in South China 80 (2006): 355-361. Kuijt, Ian. Life in Neolithic farming communities: social organization, identity, and differentiation. London: Springer, 2000. Print. Pryor, Francis. â€Å"Overview: From Neolithic to Bronze Age, 8000 800 BC.† BBC News 2011. bbc.co.uk/history/ancient/british_prehistory/overview_british_prehistory_01.shtml. The Metropolitan Museum of Art. Neolithic Period in China, 2011. Web. https://www.metmuseum.org/toah/hd/cneo/hd_cneo.htm. Thorp, Robert, and Vinograd Richard. Chinese art culture. New York: Abrams, 2001. Print. Footnotes 1 Tool used during burial and was associated with high punishment. 2 A village found on the western side of Henan near the Yellow River. 3 Owl figures were 36 cm in height and were designed to stand freely. 4 Regarded as the first dynasty in the history of China.

Thursday, November 21, 2019

Lean thinking (Layout Planning) Assignment Example | Topics and Well Written Essays - 1750 words - 1

Lean thinking (Layout Planning) - Assignment Example The most exemplary and logical way to accomplish this working criteria would be to designate any two working departments with large amount stock movement proximity so as to save on fuel costs, transportation costs and most importantly operational time. So as to categorize which particular centres frequently have a large amount of stock or inventory movement within the company centres, a work Travel Chart is created to indicate the weekly sum of the activities and travels among the different departmental centres. The table below shows the operation sequence of all the products manufactured by the company. It also shows the respective allocated company sub-sections used during the production of each of the products. Notably, this will aid in appropriate decision making during the layout designing processes. A travel chart is used outline the degree of essential departments’ relativity in the production process. This is carried out via examining the amount or volume of products between each and every different work centres to aid in concluding which department s ought to be developed and stationed close to one another. Here is representational table of the travel chart for these company’s operational activities. Based on the above travel chart as well as the systematic layout planning technique (SLP) the degree of the importance between any two work centres to be allocated close to each other has been determined. In this case scenario the various company processes are represented using numerals. In this case, the number represents the first production process, that is, the guillotine process. Therefore, one can inference from the travel chart that the process number 12 - Pack and 13 - Dispatch work centres both display a high and strongly relative bond in terms of the movement of product between the two centres. Consequently,

Wednesday, November 20, 2019

Scanning the Environment Essay Example | Topics and Well Written Essays - 500 words

Scanning the Environment - Essay Example ote focuses on demographics and socio-cultural trends, advertising, strategy and image for the previously mentioned retailers and the strategy that a competitor should adopt. Retailing of grocery items has been a competitive business for some time because a number of large retail chains, online stores and retail shops compete within the market. This means that it is important to try to position the retail brand right so that a maximum attraction for the grocery retail segments within the consumers is possible (Reynolds, 2004, Pp. 12 – 18). Brands tell a lot about price and this means that positioning brands to attract a certain type of customer to maximize profit is important in grocery retailing. Demographic trends for the US consumer suggests that the average consumer is more health and money conscious as a result of the prevailing economic uncertainty and they are only willing to pay a little extra for better fresh fruits and vegetables, food brands (Cook, 2008, Slides 1 – 25). However, quality and price are the most important considerations in selection of grocery items, but pesticide free items are only second in preference to fresh gr ocery items. Thus, organic products are second only to fresh quality products. In addition, the proportion of non – Hispanic Whites as a proportion of the total consumer is declining compared to an increase in the Hispanics and the Asians. Thus, retailers must consider the previously mentioned trends in efforts to position their retail brands. Aldi, the global grocery retailer has tried to benefit from the willingness of the consumer to pay a little more for quality in positioning its brand (Aldi, 2009, â€Å"Grocery Selections†). However, Amazon Grocery appears to have tried to lure the customer by offering established middle-of-the range brands with an emphasis on saving for quality and a concern for the Asian and Hispanic consumers. However, both of the previously mentioned chains emphasize value for money. Although

Sunday, November 17, 2019

Research Paper - Real Estate Example | Topics and Well Written Essays - 250 words

- Real Estate - Research Paper Example The type of information to be considered includes location, medium of transport, etc. Sources of risks include radon emissions, surface water, soil, and air. The perception of risk is affected by five critical cycles. The health risk cycle involves publication of the initial study which links specific environmental contaminants with a given health effect. The remediation cycle involves seeking information on how to remediate or reduce the risk. Thirdly, public relations cycle involves publishing the risk effects in popular press. The regulatory stage involves lawmakers and regulators responding to public concerns about the environmental risks. Lastly, the lending cycle ends with the lending community reacting to the environmental risk. Environmental assessment has also been enhanced since 1986. Lenders can gather information about environmental conditions that may affect mortgage loan security. Inclusion of property in federal superfund regulations impacts on the value of property. S ignificant market stigma may be caused by such regulations. Contamination such as contaminated aquifer may affect current use by limiting the best and highest use of the property. Contamination also affects the surrounding uses e.g. property close to a landfill may be affected by landfill risk. In the real world, environmental conservationists and governments use the information to locate potential environmental hazards such as landfills near properties of low value. The responsible regulators and government institutions also use the impacts to create an enabling environment where the best and highest current uses of land can be achieved by minimizing

Friday, November 15, 2019

Primary methods of maintaining organizational culture

Primary methods of maintaining organizational culture An organizations culture is made up of comparatively stable characteristics. It grows over many years and is rooted in intensely held values to which employees are forcefully committed. In addition, there are number of forces are successfully operating to maintain a given culture. These include written allegations about the organization mission and philosophy, the design of physical spaces and buildings, the dominant leadership style, hiring criteria, past promotion practices, entrenched rituals, popular stories about key people and events, the organizations historic performance evaluation criteria, and the organizations formal structure. Significantly, the organizational culture includes values, assumptions, goals and Industry demands. So the culture has been maintained through Attraction-Selection-Attrition (ASA), Employee on-boarding (socialization), Leadership (Top management) , and organizational Reward systems. It determines what types of people are hired by an organization and what types of people are left out. Attraction-Selection-Attrition (ASA) : First, employees are attracted to organizations where they will suit in. According to Judge statement, the employees with distinctive personality traits find different cultures attractive.[1]For example, out of their individual traits, employees who illustrate neurotic personalities were less likely to be attracted to inventive cultures, whereas those who had openness to experience were more likely to be. By ASA process, While selection, candidates and corporations both are looking for people who will fit into their current corporate culture.[2] Considering southwest airlines and Google are the best example for that. Attrition refers to the instinctive process, where the candidates who do not fit in will go away from the company. Research indicates that person-organization incompatibility is one of the important reasons for employee turnover.[3] New Employee On-boarding : On-boarding pertains to the process through which new employees learn the attitudes, knowledge, skills, and behaviors required to function effectively within an organization.[4] When the organizational employees socializing the new people, inviting as a part of their family, they will feel accepted by their peers and confident regarding their ability to perform, and also they can share the assumptions, norms, and values that are the part of the organizations culture. This understanding and confidence is making the new employees to perform their ability and traits in a excellent way. As well as it gives higher job fulfillment, Effective organizational commitment, and long period of time experience within the company for them. Organizations can also engage in different activities to facilitate on-boarding, such as implementing orientation programs or matching new employees with mentors. These processes are expanded by the nature of the company.[5] (refer Exhibit 1-1) Leadership : Leaderships are significantly helpful in creating and modifying the organizations culture. There is a direct agreement between the leaders style and an organizations culture. For example, when leaders motivate and praise the employees in the firm by their knowledge , skills, initiatives, the corporate culture tends to be more supportive and people- oriented. Consequently, the leaders are providing rewards, contingent on performance, again it tends to be more performance-oriented and competitive also to them.[6] Likewise, the leaders will influence directly to the cultures of their organizations. Apart from the leaders influence, the role model is another tool (Charismatic). Research have suggested that leader behavior, attitudes, and decision-making, the consistency between union policy, leader actions and role modeling determine the degree to which the organizations culture emphasizes ethics [7]. The leaders own behaviors will influence each individuals to understand what is acceptable behavior and what is unacceptable. In an organization, in which high-level leaders make the effort to involve others in decision making and seek opinions of others, team diversity is more likely to evolve. By acting as role models (charismatic), leaders send signals to the organization about the norms and values that are expected to guide the actions of its members. Leaders also proves their success from reactions to the actions of others in the organizational culture. Through their day-to-day actions improvements, leaders shape and maintain the organizations culture Effectively. Reward Systems : The Organizational reward system offering pliability and motivation for maximum effectiveness from the employees rather than being hard and rude. Usually, the company culture is formed by the type of reward systems and based on the kinds of behaviors and outcomes it chooses to reward and punish. One relevant element of the reward system is whether the organizational rewards either behaviors or outcomes. In some companies, the employees rewards system highlights intangible elements of performance also its looking like easily accessible metrics. In these companies, supervisors and peers may evaluate the workers performance by seeing the persons behaviors as well as the results. In such companies, we may expect a culture that is comparatively both either people-oriented or team-oriented, so the employees can act as part of a family [8]. However, in companies in which goal attainment is the sole criterion for reward, there is a focus on measuring only the results without much regard to the process. In these companies, we might supervise result-oriented and competitive cultures. A company culture evolves to determine which behaviors are deserved, which ones are penalized, and which are ignored by them. A reward system is a major tool managers can exert when undertaking the controlling function. In order for a reward system to be effective, the rewards must hold some importance for the employees. Reward systems should focus on positive reinforcement. It is the most effective tool for encouraging desired behavior because it stimulates people to take actions because they want to, because they get something of value (internally or externally) for doing it. An effectively designed and managed reward program can drive an organizations change process by positively reinforcing desired behaviors. According to (Thomas,1994) author presents criteria for building effective reward systems that he calls the SMART criteria. These criteria should be used when designing and evaluating programs. The programs should be: Specific. A line of sight should be maintained between rewards and actions. Meaningful. The achievements rewarded should provide an important return on investment to both the performer and the organization. Achievable. The employees or groups goals should be within the reach of the performers. Reliable. The program should operate according to its principles and purpose. Timely. The recognition/rewards should be provided frequently enough to make performers feel valued for their efforts. CREATING AN ETHICAL CULTURE : Ethical managerial leaders and their people take the right and good path when they come to the ethical choice points. An organizational culture most likely to shape high ethical standards is one thats high in risk tolerance, low to moderate in aggressiveness, and focuses on means as well as outcomes. Although, the managers in the organization, innovate and take risk to avoid the unbridled competition, and will pay attention to How and What goals are achieved.[9] Considering the Johnson Johnson employees culture, have become to know how their strong organizational culture it is. If the culture is strong and supports high ethical standards, definitely it should have a very powerful and positive influence on employee behavior. Even though, sometimes a strong culture can make an unethical behavior because of aggressive culture between the employees. Research suggesting that, some of the practices that management can undertake, Being a visible role model, Communicating ethical expectations, providing ethical training, Visibly rewarding ethical acts and punishing unethical ones, and finally providing protective mechanism can help the employees to be more active into the organizational culture. According to Turknett research, process that can help to ensure that the organization has an ethical culture and that has the leaders who lead with character. Investing in a process that seeks to infuse an ethical culture is especially important in the case where there is an ethical infringement. And by his three Cs, merely developing a cultural character into the people. Code, Character and Conversation providing a good framework for thinking about infusing ethics into organization culture. By using his model called Growing Leadership Character can also use to cascade these concepts deep into the organizational ranks. Moreover, his theory expressing the three basic character into the human. thus, providing an ethical behavior. When someone has character, usually it also mean that they are the people who work hard, get results, and are the people always Responsible. They also, however, ground all action in a solid base of Integrity, and they treat people with respect and Equity.[10] Nevertheless, Dr. Charles D. Kerns illustrates in his various research, how the values are influencing ethical behavior into the human. It could say clearly that VABEs (Values, Assumptions, behaviors, Emotions) seems to be a subset of virtuous values that align with ethical behavior.[11] Values > Attitudes > Ethical Behavior In Martin Seligmans, Authentic Happiness, has reviewed these core virtuous values that influence ethical behavior and appear to have universal appeal. Wisdom and Knowledge, Self Control, Justice and Fair Guidance, Transcendence, Love and Kindness and Courage and Integrity are giving personal values accordingly.However, there are some USA Based Indian companies are providing an ethical training into the employees, Significantly could illustrate as an example, Sierra Atlantic (California-Based software company) Hyderabad, trains its Indian employees in various aspects of U.S culture. As a result, they won a bid with an American firm over an Indian competitor because the Sierra employees were viewed as a better cultural fit. Such successes make it likely that companies with foreign clients will either adopt or continue to use cultural training.[12] Mary-Jo Kranacher is recommending some more values, to build an ethical culture into the organization, effectively. Developing ethics policies, Implementing controls, Establishing penalties and rewards, Communicating policies and procedures to others from top management to bottom, Enforcing policies consistently are included in his major suggestions.[13] As a result, the purpose of an ethics policy is to support a culture of openness, trust, and integrity in a companys management and business practices.

Tuesday, November 12, 2019

Use of Doubt To Persuade Essay -- Successful Persuasion Essays

Persuasion goes on around us everyday, all the time, on television, on advertisements, even in conversations with friends. Perhaps because of this, much has been written on how to persuade more effectively. Most of this literature is built upon the notion that to persuade is to urge successfully and completely. Going along these lines, certainty and confidence are logical complements to effective persuasion, since we cannot hope to convince others when we are ourselves in doubt. Doubt, therefore, is felt to be at the other end of the spectrum and antithetical to persuasion. But the art of persuasion is a human art, and so it is a living art, which cannot be satisfactorily summed up between the covers of self-improvement guides. In reality, successful persuasion can somewhat deviate from the conventional criteria of certainty; in fact, even doubt can be used to persuade. This exciting possibility appears unlikely from the start, because there is an inherent paradox in the notion that doubt can persuade. This contradiction is even clearer when we consider persuasion in the form of a speech given to a large audience. To be able to hold his own in front of a crowd, the speaker, surely, must be certain of himself and what he wants to say. But there is a possible approach by which orators can round the corner of persuading with doubt, and even make doubt work to their advantage. Given that the doubt is a shared concern of both the speaker and his audience, a candid confession of uncertainty may open new emotional inroads into the audience. By serving as a common denominator and a common challenge to both parties, a shared doubt when brought into the open can direct the combined energies of the listeners towards finding a workable so... ...nd genuine than an outward show of sorrow. In this case, to contrive is to constrict. Doubt as an instinct embedded in persuasion transcends common rhetoric as it moves beyond the rational sphere of intellect into the domain of unbridled emotions. For this reason, and also because it was with an intention to explore persuasion beyond conventional notions that we set out to study the use of doubt in the first place, it is impossible and indeed unnecessary to encapsulate the skill of persuading with doubt within any sort of generalising guidelines. To subject this practice to prescriptive limits is to sever its lifeline-the vital element of spontaneity that moves with circumstances. As Lee lamented, "sometimes, history takes many devious turns"; it was exactly through one such quirk of history that his speech in 1965 achieved such astonishing payoffs ("Press" 9).

Sunday, November 10, 2019

Math and Psychology

The Use of Statistics in Psychology Author: The Role of a Psychologist I believe the role of a psychologist is to help people understand the underlying cause of abnormal or detrimental behavior and give them the tools to modify or change the behavior or the underlying issues. Statistics is the study, collection, organization and interpretation of data. My first thought when I read that I needed to take a course in statistics to get my bachelors degree in psychology, was â€Å"Why do I have to take a course in statistics and what does that have to do with wanting to help people? I could not believe there was a reason to use a form of math outside of the math needed to run a normal business. I was planning to use an accountant for that sort of math, so why did I need to know anything beyond the basics? Where was the correlation between statistics, of all things, and psychology? My first psychology instructor, assured us that statistics was a necessary tool to a psychologist and that a s we went further in the course, we would learn more about how to use that tool. I decided to reserve myI believe there are two main uses for statistics in the field of psychology. ? I believe statistical data is used in psychological research. For instance it may be used to answer a hypothesis. It is used to determine if the hypothesis is proven to be true or false. In other words, statistics may be used as a scientific way of answering some questions. ? An example of this in psychology might be the hypothesis that an abused child may grow up to abuse their children unless they get some sort of counseling.Statistical data taken from 300 psychologist case files shows that of the 300 abused children, 190 of them had at least 1 parent who was abused as a child. Additionally, in 72 cases both parents had been abused as children. Of the 300 cases, only 32 children had parents who either had not been abused as children or who declined to answer the question. I feel this study shows signi ficant statistical data that the hypothesis that abused children may grow up to abuse their children without some sort of counseling is true. The second use of statistical data in the field of psychology is by the clinical psychologist. A clinical psychologist must review published research studies to keep abreast of the latest scientific information that may pertain to their cases. These studies provide statistical analysis of the data and in some cases how issues were resolved. If a treatment is successful in a statistically significant number of cases, it might be a treatment that is implemented in a similar case.To double a recipe of Ratatouille Let’s take a look at the ingredients for the original recipe: †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ 2 cups diced peeled eggplant 2 cups sliced zucchini 1/2 teaspoon salt 1 1/3 cups uncooked spiral pasta 1 cup sliced onion 1 tablespoon olive oil 1 (14. 5 ounce) can d iced tomatoes, undrained 2 tablespoons tomato paste 1 teaspoon dried oregano 1/2 teaspoon garlic powder 1/2 teaspoon dried basil Dash pepper 1 cup shredded part-skim mozzarella cheeseTo double the quantities of items with a whole number amount is easy, but what about those fractions? Let’s focus on the 1 1/3 cups uncooked spiral pasta. To double that, we multiply by 2. 1 1/3 x 2 Change each fractional amount to an improper fraction. = 4/3 x 2/1 Multiply numerator times numerator and denominator times denominator to get: = 8/3 Now simplify. = 2 2/3 cups of pasta References Ratatouille Pasta. (2009). Allrecipes. Retrieved April 10, 2009, from http://allrecipes. com/Recipe/RatatouillePasta/Detail. aspx

Friday, November 8, 2019

Systems Analysis Essays

Systems Analysis Essays Systems Analysis Essay Systems Analysis Essay Systems analysis can be defined as a disciplined process, which begins with the establishment of user requirements for a given application and concludes with the implementation of fully operational system The main stages of systems analysis are often referred to as the system life cycle. The following sections give a brief overview of their functions within the systems analysis process. Feasibility study The aim of this stage is to establish whether or not a proposal for the computerisation of a particular application is worthwhile or feasible. In simple terms, the feasibility study has to answer questions such as: Will computerisation achieve the users objectives?; What type of system will be most suitable?; Will it be financially worthwhile? System investigation and design Assuming that the feasibility study produces a recommendation to proceed with computerisation of an application, then before any system specification is produced, an analysis has to be made of the processes and procedures involved in the application under consideration. For example, an analysis of Sales Order Processing should identify how orders are received, the order forms used and the procedures necessary to fulfil orders. Analysis is not simply the recording of an application as it currently operates through a variety of information gathering methods such as interviewing and observation, the requirements of a new system should be identified. Although the needs of the organisation are of obvious importance, employees are more likely to be concerned with matters of job satisfaction and working conditions. Successful implementation of a computerised system requires a great deal of work, involvement and willingness to co-operate by everyone concerned. If staff feel that their views have been considered such co-operation is more likely. Although users views are Important an outside observer can often identify problems with current practice which have never been questioned. A systems analyst from outside the firm needs therefore, to possess qualities of tact and diplomacy if his or her views are to be considered. The process of design should produce a complete picture of * the input, * processing, * storage and * output requirements of the new system. The picture will include * narrative descriptions, * flowcharts illustrating clerical procedures, * data flows and * the role of the computer in broad outline. The design of a computerised system should include as many improvements suggested in the investigation stage as is practicable and it will almost certainly be necessary to question tiers further when, for example, problems arise in the implementation of particular system requirements. Compromises will have to be made between what is desirable and what is practicable. Management and users may have specified requirements during the investigation stage, which prove either too expensive or extremely difficult to satisfy. System implementation System implementation or going live involves a range of preparatory. The main activities are as follow: * Development and/or testing of software. If an off the shelf system is chosen, then no development time is necessary, but testing is still vital. * File conversion. This is probably the most time-consuming activity in that all data relating to the application, which is currently held in manual files, has to be encoded onto the chosen magnetic storage medium. accuracy is vital and both software and clerical checking procedures should be employed. * Staff training and education. This may take a variety of forms but may be part of the proposals put forward by the chosen supplier. It is an extremely important activity if the systems effectiveness is to be maximised and if staff are to feel happy and confident in its operation. * Introduction of new clerical procedures. If the whole system is to function correctly, the computer processing aspect has to be supported by the clerical procedures designed to work with it. Part of staff training, therefore, has to be dedicated to purely clerical tasks such as the preparation of input data or source documents. * Choice of a changeover or going live plan. A number of alternatives are available and each has costs and benefits associated with it. Parallel running, requires that the old and new systems be operated alongside one another until the new system is fully tested. This minimises the risks consequent upon system failure, it is an expensive option in that it involves a great deal of staff time. Direct changeover is less expensive if the new system works but failure could mean catastrophe for the business. The plan used will depend on a number of factors, for example, the importance of the system to the success of the business. System maintenance After its initial introduction a system should be flexible to the changing needs of the business. An allowance for the businesss expansion should be made in the original system specification and the supplier should be able to satisfy those expansion needs as and when necessary. Equally, advances in hardware technology and the sophistication of software mean that a system soon becomes outdated. Even if a business chooses not to take advantage of improved software, hardware is likely to become less reliable and will need replacement after about five years of business use. Agreements on software and hardware maintenance should be established with the supplier and formalised in the contract signed by purchaser and supplier. The Feasibility Study The purpose of a feasibility study is to determine whether or not the purchase of a computer system can be justified. The study has to answer two fundamental questions: 1. Can the envisaged applications be carried out by a computer system more efficiently than with existing facilities?; 2. Will a computer system be economically viable?. Since the early 1 970s, prices of all types of computer system have fallen dramatically and their power has increased to such a degree that, for example, microcomputers challenge the minicomputer in their range of applications. This may be part of the reason why many organisations find it difficult to justify undertaking a detailed feasibility study and argue that no matter how limited their needs there is a computer system to satisfy them at a cost-effective price; it is only necessary to decide on its best application(s). Although this is an understandable view, it should be remembered that any item of equipment should be justified in terms of its costs and benefits to the business and that a computer system should be no exception. Although there are few businesses, which cannot benefit from computerisation at all, the process of carrying out a feasibility study disciplines the purchaser to think carefully about how it is to be used. In modifying the purpose of a feasibility study, the previous questions can be replaced by the following: 1. Which applications can be computerised to give most benefit to the organisation?; 2. What type of computer will be required?; 3. What are the likely acquisition and running costs?; 4. What are the likely implications, especially those concerning personnel and organisational procedures?. Pressures for computerisation There are many and various pressures which can trigger the thought of using a computer, either for the first time or, where a computer is already installed, for other applications still operated manually. Some examples are as follow: i. A business is expanding and to cope with the increased workload it appears that the only the alternative to computerisation is increased staffing. ii. A business is growing at such a rate that more information is needed to manage it properly. To obtain the information manually is too time-consuming and by the time it has been gathered is probably out-of-date. iii. Staff are being asked to work regular and increasing amounts of overtime and backlogs of work are building up. iv. Customers are complaining about the speed and quality of the service provided. v. Where stock is involved, it is difficult to keep track of stock levels and while some customer orders cannot be filled because of stock shortages, other stock is gathering dust on the shelves. vi. A great deal of advertising literature is constantly reminding business management that they are out-of-date and at a disadvantage with their competitors. vii. Other businesses providing a similar service use a computer. Examples (i), (ii) and (iii) suggest that the business is operating successfully and needs to take on extra staff or streamline its systems. Examples (iv) and (v) may be symptomatic of generally poor business management and in such cases, computerisation alone may not solve the problems. Examples (vi) and (vii) may tempt the management to computerise simply to keep up with the Joness. Although a computerisation programme resulting directly from one or more such pressures may be completely successful and worthwhile, the pressure itself should not be the reason for computerisation. Instead, management should establish the organisational objectives they wish to achieve through computerisation. Establishing objectives for computerisation It is important for management to establish what they are trying to achieve in terms of the overall objectives of the business and in the light of this, the objectives of the systems, which contribute to their achievement. For example, two major business objectives may be to improve the delivery of customers orders and to minimise the stock levels, which tie up valuable cash resources. The achievement of these objectives may involve contributions from several different information processing systems and the list may include the following. * Stock Control records stock movements and controls stock levels. * Purchasing responsible for the ordering of new supplies from suppliers. * Sales Order Processing receives customers orders and initiates the process of order fulfilment. * Purchase Ledger the accounting record of amounts owed and paid to suppliers of stock. * Invoicing the production of invoices requesting payment from customers for goods supplied. * Sales Ledger the accounting record of amounts owing by and received from customers for goods supplied. These and other applications within a business are interconnected by the information, which flows between them. Such connections can be illustrated with the use of data flow diagrams (DFD), which are described in Chapter 25. Establishing priorities for computerisation The applications which are going to bring greatest benefit to the business should be computerised first. Establishing individual system objectives The objectives of the relevant application must first be clearly understood. The following is a typical list for stock control serves to illustrate the definition of such objectives. * To maintain levels of stock which will be sufficient to meet customer orders promptly. * To provide a mechanism which removes the need for excessive safety margins of stock to cover customer orders. This is usually effected by setting minimum stock levels, which the computer can use to report variations below these levels. * To provide automatic re-ordering of stock items which fall below minimum levels. * To provide management with up-to-date information on stock levels and values of stocks held. Contents of the Feasibility Report The Feasibility Report should contain the following sections: Terms of reference These should set out the original purpose of the study, as agreed by management and detail the business objectives to be achieved, for example: (i) the improvement of customer service, such that orders are delivered within 24 hours of order receipt; (ii) the provision of more up-to-date management information on current stock levels and projected customer demand; (iii) a tighter control of the businesss cash resources, primarily through better stock management. Applications considered for computerisation The applications which may assist the achievement of the business objectives set out in the Terms of Reference are listed, for example: stock control; purchasing; sales order processing; invoicing; accounts. System investigations For each application under consideration there should be: * a description of the existing system; * an assessment of its good and bad points. For example, the sales order processing system may be slow to process customer orders and this results in poor delivery times, which in turn causes customers to take away their business; * an estimate of the costs of the existing system. For example, apart from the cost of staffing, an estimate has to be made of the cost of lost business, which could be avoided with an improved system. Envisaged system requirements This section should detail, in general terms, those aspects of each application which need to be improved and a broad outline of how each system may operate following computerisation. Costs of development and implementation These will include both capital costs and revenue or running costs. Capital costs are likely to be incurred for the following: (i) computer hardware; (ii) systems software and software packages (either off-the-shelf or tailor-made); (iii) installation charges for hardware and software; (iv) staff training. Revenue costs include those for the maintenance and insurance of the system. In addition, unless there are existing computer specialists in the organisation, additional suitable staff may need to be recruited Timescale for implementation This will depend on the scale of the operation, the type of application and whether or not packaged software is to be used. Expected benefits These are more difficult to quantify than the costs but may include, for example: * estimated savings in capital expenditure on typewriters and photocopiers; * more efficient stock management allows customer service to be maintained whilst keeping stock levels lower. This releases valuable cash resources and reduces possible interest charges on borrowed capital; * expansion in business turnover, without the need for extra staff and reduced overtime requirements. Other considerations The staff have to support any development for it to be properly successful and this usually means consultation at an early stage in the feasibility study and the provision of a proper staff-training programme. Customers must also be considered. For example, when a customer receives a computer produced invoice it should be at least as easy to understand as the type it replaced. Assuming that the feasibility study concludes that the proposed computerisation is worthwhile, according to the criteria set out in the report, then more detailed investigation and design can follow. System Investigation and Design Introduction If the feasibility report gives the go-ahead to the computerisation project, then a more detailed investigation of each candidate system begins. The facts gathered about each system will be analysed in terms of their bearing on the design and implementation of a computerised version. The objectives of the analysis are to gain a thorough knowledge of the operational characteristics of the current system and to settle, in a fair amount of detail, the way in which a computerised system will operate. It is extremely important that the new system does not simply computerise existing procedures. The design should, as far as possible, ignore existing departmental structures, which may inhibit the introduction of different and improved procedures. The aim of the investigation and design process is to produce a specification of users requirements in documented form. This is referred to as the Statement of User Requirements and will be used to tender for supply of hardware and software. Fact-finding methods There are several methods, which can be used to gather facts about a system: (i) interviewing; (ii) questionnaires; (iii) examination of records and procedure manuals; (iv) examination of documents; viii. observation. Each method has advantages and disadvantages and the method or methods chosen will depend on the specific circumstances surrounding the investigation, for example, the size of the business, the number of staff employed and their location and distribution. Interviewing This method has much to recommend it, in that the facts can be gathered directly from the person or persons who have experience of the system under investigation. On the other hand, a business with a number of geographically distributed branches makes the process of extensive interviewing expensive and time-consuming. Further, interviewing skills need to be acquired if the process is to be effective. The interviewer needs to know how to gain the confidence of the interviewee and ensure that the information, which is given, will be of value in the design of the new system. Questions need to be phrased unambiguously in order that the interviewee supplies the information actually required and a checklist of points will help to ensure that all relevant questions are asked. Of course, the interview may need to stray from the points in the checklist, if it becomes apparent that the interviewee is able to provide relevant information not previously considered. For example, clerical procedur es may be designed quite satisfactorily but may be made less effective because of personality conflicts between staff. Such tensions may only be revealed through personal interview. The interviewer also needs to detect any unsatisfactory responses to questions and possibly use alternative methods to glean the required information. Unsatisfactory responses include: * Refusal to answer. Such refusal may indicate, for example, that set procedures are not being followed and that the member of staff does not wish to be incriminated. * Answer with irrelevant information. It may be that the question is ambiguous and has to be re-phrased in order to elicit the required information. * Answer with insufficient information. If a system is to be designed which covers all foreseeable user requirements and operational circumstances, it is important that the analyst has all relevant information. * Inaccurate answer. The interviewer may or may not be aware that an inaccurate answer has been given but it is important that other sources of information are used to cross-check answers Questionnaires Questionnaires are useful when only a small amount of information is required from a large number of people, but to provide accurate responses, questions need to be unambiguous and precise. The questionnaire has a number of advantages over the interview: * each respondent is asked exactly the same questions, so responses can be analysed according to the pre-defined categories of information; * the lack of personal contact allows the respondent to feel completely at ease when providing information, particularly if responses are to be anonymous; * questionnaires are particularly suited to the gathering of factual information, for example, the number of customer orders received in one week; * it is cheap, particularly if users are scattered over a wide geographical area. A number of disadvantages attach to the use of questionnaires: * questions have to be simple and their meaning completely unambiguous to the respondents; * if the responses indicate that the wrong questions were asked, or that they were phrased badly, it may be difficult to clarify the information, particularly if the respondents were anonymous; * without direct observation it is difficult to obtain a realistic view of a systems operation. The questionnaire often provides only statistical information on, for example, volumes of sales transactions or customer enquiries. Examination of records and procedure manuals If existing procedures are already well documented, then the procedure manuals can provide a ready-made source of information on the way procedures should be carried out. it is important to realise that procedures detailed in manuals may not accord entirely with what actually happens. The examination of current records and the tracing of particular transactions can be a useful method of discovering what procedures are carried out. Special purpose records, which may involve the ticking of a box when an activity has been completed, can be used to analyse procedures, which are causing delays or are not functioning efficiently. The use of special purpose records imposes extra burdens on staff who have to record procedures as they happen and the technique should only be used when strictly necessary. Examination of documents It is important that the analyst examines all documents used in a system, to ensure that each: * fulfils some purpose, that is, it records or transmits information which is actually used at some stage. Systems are subject to some inertia, for example, there may have been a one-off requirement to record and analyse the geographical distribution of customers over a single month and yet the summary document is still completed because no-one told the staff it was no longer necessary; * is clear and satisfies its purpose, for example, a form may not indicate clearly the type of data to be entered under each heading. In any case, it may well require re-designing for any new system which is introduced. The documents, which should include, for example, source documents, report summaries, customer invoices and delivery notes, help to build a picture of the information flows which take place from input to output. Observation It is most important to observe a procedure in action, so that irregularities and exceptional procedures are noticed. Observation should always be carried out with tact and staff under observation should be made fully aware of its purpose, to avoid suspicions of snooping. The following list details some of the features of office procedures and conditions, which may usefully be observed during the investigation: * office layout this may determine whether the positioning of desks, filing cabinets and other office equipment is convenient for staff and conducive to efficient working; * work load this should indicate whether the volume of documents awaiting processing is fairly constant or if there are peak periods of activity; * delays these could show that there are some procedures which are constantly behind schedule; * methods of working a trained observer can, through experience, recognise a slow, reasonable or quick pace of working and decide whether or not the method of * working is efficient. It is important that such observations should be followed up by an interview to obtain the co-operation of the person under observation; * office conditions these should be examined, as poor ventilation, inadequate or excessive temperatures, or poor lighting can adversely affect staff efficiency. Often the observation will be carried out in an informal way but it may be useful on occasion to, for example, work at a users desk, so as to observe directly the way that customer orders are dealt with. It is important to realise that a user may put on a performance whilst under observation and that this reduces the value of the information gathered. Documenting the results of analysis A number of standard approaches, apart from narrative description, can be used to document the result of the system analysis, including: data flow diagrams (DFDs); organisation charts system flowcharts. Their applications are illustrated in the following section, which examines the categories of information, which need to be gathered and recorded during a system investigation. Categories of system information The major categories of information which need to be gathered involve: * functional relationships and data flows; * personnel and jobs; * inputs; * processes; * outputs; * storage. Functional relationships and data flows A business has a number of functional areas, such as Sales, Accounts, Stock Control and Purchasing, each having its own information system. However, the computerisation of a system in one functional area cannot be carried out without considering its effects on the rest of the business. Information systems within a business interact with and affect one another. The business, as an entity, also interacts with and is influenced by individuals and organisations in the surrounding environment and the businesss individual information systems should be co-ordinated to allow the achievement of overall business objectives. The data flows between individual functional areas can be illustrated with the use of a data flow diagram. Personnel and jobs It is possible to design a computerised system without involving staff, but it is likely to be less successful, partly because users can provide valuable insights into the practical aspects of system operation and partly because they will feel less motivated if they have had little or no influence on the final design. A formal organisation chart can be used to gain an overall picture of staff relationships and responsibilities but it should be borne in mind that designated and actual job responsibilities can differ radically. For example, it may turn out that a junior sales clerk is carrying out the checking of orders, which should be the responsibility of the sales supervisor. Thus, it may be necessary for the analyst to draw an alternative informal organisation chart to show the actual working relationships of staff. An example is given Apart from identifying working relationships between staff, it is useful to draw up brief job descriptions so that consultation on individual system procedures can take place with the appropriate staff. For example, a job description for a sales clerk may include the following activities: completion of standard order forms; checking stock availability; notification of orders to accounts. Therefore, although the sales departmental manager may have knowledge of such procedures, the sales clerk will have practical experience of their operation and should be consulted. System inputs A number of details concerning the data inputs to a system need to be established: * source. It may, for example, originate from a customer, a supplier, or another department in the business; * form. The data may arrive, for example, by telephone, letter, or a standard form such as an order form or suppliers invoice; * volume and frequency. For example, the number of orders received daily or weekly; * contents. For example. the individual items of data which appear on a suppliers invoice. Such information will allow the analyst to make recommendations on the most appropriate methods of computer input. The design of appropriate input methods also has to take account of several tasks involved with the collection and entry of data to a system: * recording. For example, the completion of a customer order form following receipt of a customer order by telephone; * transmission. For example, the order details may need to be transferred to another department or branch of the business for encoding and computer processing or they may be keyed in directly at the point of collection; * visual checking. It may be, for example, that a customer order has no quantities entered; * encoding. Verification procedures need to be designed to prevent transcription errors when data is encoded onto a computer storage medium for processing; * validation. Data is checked by a data vet program against set limits of validity, for example, account numbers may have to fall between a particular range of values. Thus, decisions need to be made concerning: (i) data collection procedures; (ii) methods for the transmission of data to the place of processing; (iii) data entry, data verification and data validation procedures. Data collection The designer needs to be aware of the available input technologies. These can be divided into two categories, keyboard entry and data capture technologies such as bar code reading, optical character reading (OCR) and optical mark reading (OMR), which allow direct input to the computer from specially designed input forms. Keyboard entry This is the most common method of input and requires the transcription of data from source documents. These can be designed to minimise the possibility of transcription errors at the data collection stage. Direct input Bar codes are pre-encoded and are thus immune from errors of transcription (assuming that the bar code is correct in the first place). Optical mark reading requires that pencil marks be used to indicate particular values from a limited set on a pre-designed form. Although no keyboard entry is required, mistakes may be made by the originator of the document and good design is therefore important. Data transmission It may be that no data transmission is necessary because the data is processed at the point of collection. For example, customer orders may be recorded on order forms at the sales desk and then taken into the next room for keying into the computer. Alternatively, the data may have to be transmitted some distance, perhaps to another floor of the building or to another building some miles away. A fundamental decision has to be made, whether to localise processing at the points of collection, or to use a central facility with data communications links from each location. Data entry The data entry method chosen will depend on the data collection methods used and may involve keyboard transcription from source documents or data may be captured directly from bar codes, OCR or OMR type documents. Where keyboard transcription is used, verification and validation procedures are likely to be interactive, in that the data entry operator has to respond to prompts on screen and make corrections as and when the system indicates Most small business computer systems will be used for on-line processing, where transactions are processed immediately with master files at the data entry stage. Consequently, validation and verification have to be carried out immediately prior to the processing of each transaction. On-screen verification At the end of each transaction entry, the operator is given the opportunity to scan the data on the screen and to re-enter any incorrect entries detected. This usually takes the form of a message at the bottom of the screen, which is phrased in a way such as Verify (yes or no). On-screen validation Character, data item and record checks, such as range and mode checks, can be made each time the RETURN key is pressed during data entry. For example, the screen may prompt for the en-try of an account number, which must be 6 digits long and be within the range 000001 to 500000. Any entry which does not conform with these parameters is erased and the prompt re-displayed for another attempt. Appropriate screen dialogue to allow the data entry operator to enter into a conversation with the computer is a crucial part of the input design process and is dealt with as a separate topic in Chapter 21. Batch data entry The type of keyboard transcription used will be affected by the type of input data. Where, for example, files only need to be updated weekly, transaction data may be batched and entered onto magnetic disk for processing at a later stage in one update program run. System processes All the clerical and machine-assisted processes, which are necessary to achieve the desired output from the given inputs, need to be identified. This will allow the systems analyst to determine the role of the computer in the new system, the programs necessary to take over the processing stages and the changes needed to clerical procedures, before and after computer processing. There are many instances when the processing requires not only the input data but also data retrieved from files. For example, to generate a customer invoice requires: i. input data concerning commodity codes and quantities ordered; ii. data from the stock master file concerning prices of items ordered by reference to the input commodity codes; iii. customer details from the customer master file. The above processes can be completely computerised but other processes may require human intervention. For example, before a customer order is processed, the customers credit status may need to be checked and referred to a supervisor before authorisation. Non-standard procedures Most processes will follow standards suitable for their particular circumstancesIt is important, however, that the investigation identifies and notes any non-standard procedures. For example, what procedure is followed when there is an insufficient quantity of an ordered item to completely fulfil a customer order? It may be that some customers will take part-orders, whilst others require the full quantity of an item or none at all. If non-standard procedures are needed, it is important to know their complexity, how often they are used and what extra information is required. Ideally, a system should be designed to cope with all possible circumstances, but cost sometimes forces a compromise. Document flow System flowcharts can be used to model the movement and interaction of documents and the data they record, as well as the processes involved. In order that the involvement of each section, department or personnel grouping in the processes can be identified, the system flowchart is divided into columns representing these divisions of responsibility. A system flowchart may use a range of standard symbols, which are illustrated in Figures below. A number of standards exist for the drawing of system flowcharts and the range of symbols used depends on which stage of the investigation and design process has been reached. For example, in the early stages of investigation of an existing manual system, there will be no representation of computer methods of input, processing, output or storage. At a later stage, when computer methods are being considered, it will be necessary to use suitable symbols in the flowchart Flow Chart Symbols Figure illustrates example of a manually operated order processing and invoicing system. The Figure illustrates example of a batch processing stock file update of a stock master file. Notice the sorting and validation stages, which are essential to batch processing systems Most business systems require alternative actions to be taken dependent upon some variable condition or circumstance. For example, 15 per cent customer discount may be allowed if the invoiced amount is paid within, say, 14 days of the invoice date, after which time all discount is lost Batch Processing Stock File Update Of A Stock Master File. In order that computerised and non-computerised processes can be properly designed, the investigation must identify all: * decisions made during system operation; * conditions and circumstances which lead to alternative decisions; * actions to be taken following a decision. Figure represents the computerised aspects of a similar system, but does not show detail procedures needed to prepare, for example, the data for input or the distribution of output. A computerised system must have the necessary clerical procedures to support it. Some decisions and consequent actions will need to be documented for clerical procedure guidelines, whilst others which involve computer processing will form part of program specifications used in program writing or as bases for choice of packaged software. System outputs * output design first requires identification of the following: * data items required as output. Some may be revealed in the existing system, whilst others may be requested by users as being desirable in any new system; * form of the output, for example, whether or not printed copy is required; * volume of data with each output and the frequency of the output. This information assists decisions on the type and number of output devices required. On-line orderprocessing Based on the above information, the following tasks can be carried out: i. selection of an appropriate output device to display or communicate the outputs. ii. designing output screen and document layouts. System storage (files) The storage of historic and current information is a vital part of any business system. For example, to produce a payslip not only requires transient input data concerning hours worked and sickness days but also data on rate of pay, tax code, deductions of tax and superannuating to date etc., which are held in the payroll master file stored on magnetic disk. Information on the contents of files will be gathered from existing manual files, together with responses from users regarding the output requirements of any new system. If packaged software is to be used then the contents of files will be dictated by the package, in which case some data item types may be surplus to requirements, whilst others which are required may not be available. File contents Each file consists of a number of logical records, each of which has a number of associated data items. For example, each stock record in a stock master file may include: Stock Code; Description; Unit Price; Minimum Stock Level; Re-order Quantity; Quantity in Stock. File organisation and access This concerns the logical ordering of records within a file. Database management systems (DBMS) An increasingly popular alternative to traditional file processing systems is to construct databases controlled by a DBMS. The design process requires that data is analysed according to subject area, for example, raw materials or staffing, rather than by department or functional area. Choice of storage device Choice is concerned with storage capacity, mode and speed of access. Data Flow Diagrams Data Flow Diagrams are a widely used technique for representing the information flows of a system. They are a particular feature of SSADM methodology (Structured Systems Analysis and Design Method). They arc used in the early stages of a systems analysis to provide an understanding of the present system. As the project proceeds they are used to represent the required and also as a basis for program specification. DFDs can be drawn at various levels of detail. At the high Level the DFD is known as a Context Diagram which shows the system as one box with flows going to and coming from external entities. This can then be decomposed into more detailed DFDs. A DFD can show the physical processing of the present system detailing the departments and individuals concerned in the work, or it can be a logical DFD which shows what happens to the data rather than how the processing is carried out. A logical DFD is useful as it frees the analyst from being over influenced by the present system. Purpose of A Data flow diagram It is a diagrammatic representation of information flows within a system showing: * how information enters and leaves the system. * what changes the information. * where information is stored. A DFD is also useful to: * show the boundaries and scope of the system. * check the completeness of the analyses * ensure that all information flows and activities have been considered. * show the major functional areas of the system and therefore identify particular program requirements. DFDs can he used by both technical and non-technical staff and is used in discussions between the analyst and the user. One of the greatest strengths of DFDs is that they can be used to describe a system at several levels. Components of DFDs External Entity The source of information provided to the system. Or the recipient of information provided by the system. An oval shape represents it. If understanding of the DFD can be enhanced then an external entity may be drawn more than once. Process A process transforms or manipulates data within the system. It is represented by a box and will include a numeric identifier, the location of the process, and the process identifier. When naming processes begin with a verb and follow it by an object. e.g. Make Delivery, Receive payment. The object should always be singular. Data Store Data stores may be manual or computer files, and represent the place where a process places data so that it can be retrieved later. Each data store is labelled with the letter M for manual or D for computer and is given a number. Data Flow Represented by an arrow which should be labelled with the data that is being carried (never use a verb on a data flow). Boundary A boundary is sometimes drawn around a DFD to show the limits of what is being investigated. Levels of DFD Level 0 DFD (Context Diagram) Shows the entire system a single black box communicating with the external entities. Level 1 DFD An outline DFD using typically up to 12 process boxes. It shows: * system boundaries, * external entities * main system flows, * main system functions. * data stores. Level 2 and 3 DFD Successively more detailed DFDs showing up to 8 process boxes per DFD. Data Flow Diagrams How do you start? Case study Example Draw a Data flow diagram of the following scenario Data flow diagrams A manufacturing company has a strict health and safety policy. They have a small health and safety department, which maintains safety levels in the organisation. They require that employees report any problems to them if they discover faults within the organisation of a hazardous or potentially hazardous nature. Reports from employees are received in the Health and Safety department either by telephone, e-rnail or internal memo. This information is received by the health and safety administrator who logs the calls on his fault logging computer database. The computer database issues a unique problem number, which is given to the head of department of the employee highlighting the fault. The head of department is also provided with details of the nature of the problem. There are two health and safety inspectors employed by the organisation who investigate the problems when they occur. They are based in the health and safety department and are given the details of the problem and the fault number from the computer database by the administrator who logs the assignment of the task on the fault logging database. When the problem is investigated and therefore the task is completed the inspectors contact the administrator to advise them of the situation. The administrator advises the particular head of department that the necessary work has been carded out and the task is closed in the fault logging database. 1. Pick out relevant information and place in tabular form External entity Processes Data stores Data. flows employee report problem fault logging fault details head of dept collect problem ID No health and safety inspectors close problem Fault No assignment details Completed details Fault closed details Health and Safety Department Fault Reporting System 2. Context Diagram (no data stores) 3. Produce the Data Flow diagram Example 1 A purchasing department receives a purchase requisition from the stores. The requisition is checked, and an invalid requisition is returned to the stores for correction. An order is made out using a file of approved suppliers, and sent to the appropriate supplier. A copy order is filed. The requisition is filed. When the goods arc received the invoice is compared with the filed copy order and an invalid invoice is returned to the supplier. Valid invoices are passed to the accounts department for payment, and fulfilled orders are filed. Draw a Level 0 and level 1 DFD for the purchase requisition system. Example 2 When an invoice is received from a supplier, it is checked against a file of authorised purchases. If the invoice does not much an authorised purchase it is returned to the supplier with, a querying letter. If the invoice matches an authorised purchase, but is for an incorrect amount then it is returned to the supplier with a standard form. If the invoice reconciles, a payment authorisation is made out. A cheque is then sent to the supplier, and the invoice and the authorisation are filed. Draw a level 0 and Level 1 DFD for the system. Example 3 This case study is based on the video issue recording system of the Gentlepeoples Video Library Club (GVLC). GVLC specialises in obscure videos that are not readily available from other sources. GVLC lends only to members of the Video Society part of the exclusive and very desirable Gentlepeoples Club. Details of finance are outside the scope of the investigation. Any member of the club is automatically a member of the library. Club membership is for one year; a few new members are admitted on 1 January each year; new members are not admitted during the year. The library is set up along conventional lines, though members are not restricted as to the number of videos they may borrow at any one time. Videos are requested for return only if required by another member. Most active users of the library regularly change their videos. Two or three copies of popular titles are available. In order to borrow a video a member selects it takes it to the issue desk and gives the video and his club membership card to the librarian. The librarian takes the video ID card from the video sleeve and adds the membership number to the card. The librarian places the card in the loans file and the member leaves with the video. When a member returns a video. He or she presents the video to the librarian. The librarian finds the video card in the loans file and places the card in the video sleeve before returning the video to the library shelves. To reserve a video, which is on, can. A member asks the librarian and leaves their membership number. The Librarian finds a relevant video in the loans file and adds the members number on the reservation column on the video card. The librarian also makes a note of the member who has the video on loan and completes a return request card addressed to that member. The address is taken from the library copy of the club membership book. When the reserved video is returned the librarian puts the video under the counter and completes a Reservation Ready card addressed to the member who requested the reservation again taking the address from the membership book. Tine member requiring he video can then pick the video up from the librarian and have it issued in the usual manner. Members make many enquiries of the librarians: typical questions include is the video entitled Dziadek on loan? Which video did actress Anna Kucharski appear in? have we a video entitled Son of Arturo? Have we any videos on the subject Right Action? The librarians are able to answer these queries by inspecting the loans file the actor index the subject index and the title index. In addition to the above duties the librarians receive new videos from the social committee of the club. The selection ordering and payment for the videos is outside the scope of this investigation. On receipt of the new video the librarian has to make out a video card for insertion in the video sleeve and the relevant entries for the indexes. The librarians are also responsible for amending the library copy of the membership book with changes of address and at the end of the year far collecting the new membership bock from the Club Secretary. Answers Example 3 GLVC Video Library Context Diagram Level 1 DFD Activity 1 College Library 1. Zero Normal Form 0NF List Attributes Stud# Name Address TG Tutor Book# Title ISBN ReturnDate Identify Primary key and repeating attributes. Write out in 0NF using standard notation:- When an entity has has a Repeating Attribute (e.g book has several authors) The repeating attribute is shown with a line over it STUDENT(Stud#, Name, Address, TG, Tutor, Book#, Title, ISBN, ReturnDate) 2. First Normal Form -1NF Rule- An entity in First Normal Form must not contain any repeating attributes. Remove repeated attributes to form a new entity LOAN_BOOK. There are now 2 entities in 1NF:- STUDENT(Stud#, Name, Address, TG, Tutor,) LOAN_BOOK(Book#,Stud#, Title, ISBN, ReturnDate) (A composite key is required to uniquely identify each loan of a particular book) 3. Second Normal Form 2NF Rule An entity is in 2NF if it is 1NF and all non key attributes are fully functionally dependent on the whole of the primary key. ( 2NF applies to entities with composite keys, that is a primary key composed of two or more attibutes. An entity which is already in 1NF, with a single attribute primary key is automatically in at least 2NF) The STUDENT entity has a single attribute primary key and is therefore already in 2NF. The LOAN_BOOK entity has a composite primary key so we need to examine all the non-key attributes to ensure they are fully functionally dependent on the whole of the primary key. Non-key attribute Dependent on:- Title Book# ISBN Book# ReturnDate Book#, Stud# Therefore Title and ISBN need to be removed to form a new entity BOOK. Book# is included to provide a link. The tables in 2NF are now:- STUDENT(Stud#, Name, Address, TG, Tutor,) LOAN_BOOK(Book#,Stud#, ReturnDate) BOOK(Book#, Title, ISBN) 4. Third Normal Form 3NF Rule To be in 3NF an entity must be in 2 NF (and therefore in 1NF) and contain no non-key dependencies. Fields which are not part of the primary key must always depend on the primary key and not on anything else, such as another non key field. Consider the entity STUDENT, Name Address depend on the primary key but Tutor depends on the Tutor Group code TG and not on Stud#. They should therefore be removed to form a new entity, TUTOR. A copy of the code TG is left in the student table to form a link. STUDENT(Stud#, Name, Address, TG) TUTOR(TG, Tutor) Consider the entity LOAN_BOOK, return date is dependent on the primary key and therefore already in 3NF. Consider the entity BOOK, title is dependent on the ISBN and not on the Book#, this should be removed to create a new entity ISBN. A copy of ISBN is left in the BOOK entity to provide a link. BOOK(Book#, ISBN) ISBN(ISBN, Title) The final tables are:- STUDENT(Stud#, Name, Address, TG) TUTOR(TG, Tutor) LOAN_BOOK(Book#,Stud#, ReturnDate) BOOK(Book#, ISBN) ISBN(ISBN, Title) H. T. Harvey 6-Feb-03 1 of 18 Chapter 18

Wednesday, November 6, 2019

Free Essays on Duke Elington

The name is monumental in the world of jazz, who else but Duke Ellington would come to mind when thinking of the music that formed the 1920’s and shaped later music to what it is today. Undoubtedly one of the most accomplished musicians of all time and the forefront leader of the jazz world. Duke didn't always have music on his mind though. Duke, Born Edward Kennedy Ellington was born April 29th ,1899 the son of James William Ellington and Daisy Kennedy Ellington. They lived In Washington, moving out of the deep south just prior to Dukes birth to escape failing agriculture and the implementation of the Jim Crow laws. They lived comfortably in the middle class. Duke was given his nickname by his friends and family, and it stuck with him throughout his life. As a child Duke’s family listened to music that had black roots such as ragtime. The family considered jazz something to radical, new and vulgar though for there sophistication so it did not have a strong presence in his early childhood. When Duke was about seven his parents had arranged for him to take piano lessons. This at the time was seemingly not for him as it did not stick long. He would rather spend his free time outside playing sports such as baseball. His first job actually came as a peanut concession sales men for the Washington Senators, this served as a valuable experiance as good practice for the boy entertaining people. Duke’s interest in becoming involved in music developed around the age of thirteen when he realized that music could be used to gain popularity in a growing age of girls and parties. He set off in search of music lessons on his own rather than asking his parents for an instructor who would teach him unimportant things and have him practice them for hours on end, he decided to do things his own way. He began to hang around Frank Holliday’s hang out the Pool Room which was next to the famous Howard Theater. As well as being home to some of the... Free Essays on Duke Elington Free Essays on Duke Elington The name is monumental in the world of jazz, who else but Duke Ellington would come to mind when thinking of the music that formed the 1920’s and shaped later music to what it is today. Undoubtedly one of the most accomplished musicians of all time and the forefront leader of the jazz world. Duke didn't always have music on his mind though. Duke, Born Edward Kennedy Ellington was born April 29th ,1899 the son of James William Ellington and Daisy Kennedy Ellington. They lived In Washington, moving out of the deep south just prior to Dukes birth to escape failing agriculture and the implementation of the Jim Crow laws. They lived comfortably in the middle class. Duke was given his nickname by his friends and family, and it stuck with him throughout his life. As a child Duke’s family listened to music that had black roots such as ragtime. The family considered jazz something to radical, new and vulgar though for there sophistication so it did not have a strong presence in his early childhood. When Duke was about seven his parents had arranged for him to take piano lessons. This at the time was seemingly not for him as it did not stick long. He would rather spend his free time outside playing sports such as baseball. His first job actually came as a peanut concession sales men for the Washington Senators, this served as a valuable experiance as good practice for the boy entertaining people. Duke’s interest in becoming involved in music developed around the age of thirteen when he realized that music could be used to gain popularity in a growing age of girls and parties. He set off in search of music lessons on his own rather than asking his parents for an instructor who would teach him unimportant things and have him practice them for hours on end, he decided to do things his own way. He began to hang around Frank Holliday’s hang out the Pool Room which was next to the famous Howard Theater. As well as being home to some of the...

Sunday, November 3, 2019

Personal statement Essay Example | Topics and Well Written Essays - 750 words - 8

Personal statement - Essay Example er’s degree in the United States and was considered to be a very good specialist, therefore, the senior faculties were asking me if I was good in statistics as well as in SPSS. It was not very pleasant for me to see that they really got disappointed when I said that unfortunately, I was not. When I asked them about the reason behind asking me they explained that they were looking for help in statistics course. This was a great surprise for me and I really couldn’t understand why they asked me as they have a person who taught that course and I assumed that she should have been a specialist in the field. I didn’t bother myself to find out this since I was busy teaching other courses. At the same time it was upsetting that I could not provide any help when I was asked for it. As I’m working as a lecturer I have an opportunity and great desire to receive PhD. Therefore, I did apply for several universities and I was lucky enough to be accepted in George Mason University (GMU) but I faced a problem connected with statistics again as I did not have a statistics course in my master, but it was necessary to enter GMU. Consequently, GMU required me to take a pre-request course of statistics. The good thing was that course was online so I did not have to travel to the USA for a summer course and the bad thing was that my background in statistics is not good enough to start with online course. I understood that I should improve my statistics as soon as possible as I had statistics in my undergraduate and I started to struggle. To tell the truth, at first I hesitated whether to take the course or not. I called my friend who is studying at GMU to get her advice. She told me if I don’t take it this summer I will not definitely be enrolled in a PhD program. In other word, I’ll have to wait a year. After her advice, I decided to take the online pre-request course of statistics. I enrolled in the course and the drama started. At the beg inning I needed some help with

Friday, November 1, 2019

The book Marriage Morals by Bertrand Russell Essay

The book Marriage Morals by Bertrand Russell - Essay Example It contests and lobbies against LGBT rights, divorce, abortion, embryonic stem-cell study and pornography. Marriage and Morals is an old book written by philosopher Bertrand Russell, and that questions the Victorian perceptions of morality concerning marriage and sex (Russell 2). Contrast issues The Liberation of Women: chapter seven of the book advocates for women liberty; however, the approaches contrasts the morals the title claim. The chapter claims that the sex education provided by many books is insufficient to curb immorality. The only fixation that will suffice is to eliminate from young women all chances of being by themselves with men: girls must be prohibited to make their living by work outside the residence; they should never be permitted an outing unless in a company of their mother or an aunt; the unfortunate practice of going to boogies without a chaperon ought to be sternly stamped out. The book suggest that to avoid immorality of unmarried women there should be a mo nthly medical checkup carried out by police doctors and these doctors preferably castrated, and non-virgins to be sent to penitentiary(Russell 82). The chapter continue to suggest that the use of contraceptives and talking to unmarried women to be prohibited. The author asserts that if this is carried out for several years then the tide of immorality will be curbed. The concept is comparable with FRC effort to make women free from oppression; however, the approach differs. FRC has processes to encourage women freedom in a more humane manner as contrasted to suggestion that the book provides. It supports a federal ethics clause, permitting medical employees to refuse to give certain treatments to their clients, such as procurement of abortion, blood transfusion or birth control. It also supports for abstinence- and encourages sex education, intelligent design and entreaty in public schools, and the control of pornography and other "obscene, profane, indecent, or program on broadcast and cable television (Stange 510). In both cases, there is advocacy for restriction; however, the approaches differ. The book suggestions are not liberty related they are a different form of oppression of women in pretext of curbing immorality. The book gives a presumption that immorality can be controlled through restriction of women activities. Sex Morality: Chapter 8 of the book discuses the taboo on sex knowledge, it claims that frank pornography would do less damage if it were open and unashamed than it does when it is rendered interesting by secrecy and stealth(Russell 89). This is contrary to FRC stand on pornography since it is against it and advocates for the control of pornography and other indecent, obscene, profane, or program on broadcast and cable television. The book argues that the taboo against nudity is an obstruction to a decent approach on the topic of sex. It proposes that it is in order for children to observe each other and their parents nude when it so happen s naturally. There will be a short time, most likely at about three years of age, when the youngster is fascinated in the dissimilarity between the mother and the father, and compares them with the variances between themselves and other siblings, but this stage is soon ended, and subsequent to this they take no more interest in nakedness than in clothes. This is a contrasting fact with FRC stands that condemns any form of obscenity (Stange 510). The book considered homosexuality to be immoral when it