Wednesday, July 31, 2019
Computer Hardware Essay
I. LECTURE OVERVIEW Foundation Concepts: Computer Hardware, reviews trends and developments in microcomputer, midrange, and mainframe computer systems; basic computer system concepts; and the major types of technologies used in peripheral devices for computer input, output, and storage. Computer Systems ââ¬â Major types of computer systems are summarized in Figure 13.2. A computer is a system of information processing components that perform input, processing, output, storage, and control functions. Its hardware components include input and output devices, a central processing unit (CPU), and primary and secondary storage devices. The major functions and hardware in a computer system are summarized in Figure 13.9 Microcomputer Systems ââ¬â Microcomputers are used as personal computers, network computers, personal digital assistants, technical workstations, and information appliances. Like most computer systems today, microcomputers are interconnected in a variety of telecommunications networks. This typically includes local area networks, client/server networks, intranets and extranets, and the Internet. Other Computer Systems ââ¬â Midrange computers are increasingly used as powerful network servers, and for many multiuser business data processing and scientific applications. Mainframe computers are larger and more powerful than most midsize computers. They are usually faster, have more memory capacity, and can support more network users and peripheral devices. They are designed to handle the information processing needs of large organizations with high volumes of transaction processing, or with complex computational problems. Supercomputers are a special category of extremely powerfu l mainframe computer systems designed for massive computational assignments. II. LEARNING OBJECTIVES Learning Objective â⬠¢ Identify the major types, trends, and uses of microcomputer, midrange and mainframe computer systems. â⬠¢ Outline the major technologies and uses of computer peripherals for input, output, and storage. â⬠¢ Identify and give examples of the components and functions of a computer system. â⬠¢ Identify the computer systems and peripherals you would acquire or recommend for a business of your choice, and explain the reasons for your selections. III. LECTURE NOTES Section 1: Computer Systems: End User and Enterprise Computing INTRODUCTION All computers are systems of input, processing, output, storage, and control components. Technology is evolving at a rapid pace, and new forms of input, output, processing, and storage devices continue to enter the market. Analyzing City of Richmond and Tim Beaty Builders We can learn a lot about innovative business uses of PDAs from this case. Take a few minutes to read it, and we will discuss it (See City of Richmond and Tim Beaty Builders in Section IX). TYPES OF COMPUTER SYSTEMS -[Figure 13.2] There are several major categories of computer systems with a variety of characteristics and capabilities. Thus, computer systems are typically classified as: â⬠¢ Mainframe computers â⬠¢ Midrange computers â⬠¢ Microcomputers These categories are attempts to describe the relative computing power provided by different computing platforms or types of computers therefore, they are not precise classifications. Some experts predict the merging or disappearance of several computer categories. They feel that many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks of microcomputers and servers. Most recently, someà industry experts have predicted that the emergence of network computers and information appliances for applications on the Internet and corporate intranets will replace many personal computers, especially in large organisations and in the home computer market. MICROCOMPUTER SYSTEMS Microcomputers are the smallest but most important categories of computers systems for business people and consumers. They are also referred to as personal computers (or PCs). The computing power of current microcomputers exceeds that of the mainframe computers of previous generations at a fraction of their cost. They have become powerful-networked professional workstations for use by end users in business. Microcomputersà categorised by size 1. Handheld 2. Notebook 3. Laptop 4. Portable 5. Desktop 6. Floor-standing Microcomputersà categorised by use 1. Home 2. Personal 3. Professional 4. Workstation 5. Multi-user Systems Microcomputersà categorised by special purpose 1. Workstation Computers 2. Network Servers 3. Personal Digital Assistants Workstation Computers ââ¬â some microcomputers are powerful workstationà computers (technical work stations) that support applications with heavy mathematical computing and graphics display demands such as computeraided design (CAD) in engineering, or investment and portfolio analysis in the securities industry. Network Servers ââ¬â are usually more powerful microcomputers that co-ordinate telecommunications and resourceà sharing in small local area networks (LANs), and Internet and intranet websites. This is the fastest growing microcomputer application category. Network Computers: â⬠¢ Network Computers (NCs) are a major new microcomputer category designed primarily for use with the Internet and corporate intranets by clerical workers, operational employees, and knowledge workers with specialised or limited computing applications. In-between NCs and full-featured PCs are stripped-down PCs known as NetPCs or legacy-free PCs. NetPCs are designed for the Internet and a limited range of applications within a company. Examples are: Dellââ¬â¢s Webpc, Compaqââ¬â¢s IPaq, HPââ¬â¢s e-PC, and eMachineââ¬â¢s eOne. Network computers (also called thin clients) are low-cost, sealed, networked microcomputers with no or minimal disk storage. Users of network computers depend primarily on Internet and intranet servers for their operating system and web browser, Java-enabled application software, and data access and storage. Main attractions of network computers over full-featured PCs are their low cost to: â⬠¢ Purchase â⬠¢ Upgrade â⬠¢ Maintenance â⬠¢ Support Other benefits to businesses include: â⬠¢ Ease of software distribution and licensing â⬠¢ Computing platform standardisation â⬠¢ Reduced end user support requirements â⬠¢ Improved manageability through centralised management and enterprisewide control of computer network resources. Information Appliances The market is offering a number of gadgets and information appliances that offer users the capability to perform enable host of basic computational chores. Examples of some information appliances include: â⬠¢ Personal Digital Assistants ââ¬â (PDAs) are designed for convenient mobile communications and computing. PDAs use touch screens, pen-based handwriting recognition, or keyboards to help mobile workers send and receive E-mail, access the Web, and exchange information such as appointments, to-do lists, and sales contacts with their desktop PCs or web servers. â⬠¢ Set-top boxes and video-game consoles that connect to home TV sets. These devices enable you to surf the Web or send and receive E-mail and watch TV programs or play video games at the same time. â⬠¢ Wireless PDAs and cellular and PCS phones and wired telephone-based appliances that can send and receive E-mail and access the Web. Computer Terminals Computer terminals are undergoing a major conversion to networked computer devices. For example: â⬠¢ Dumb terminals are keyboard/video monitor devices with limited processing capabilities, to intelligent terminals, which are modified networked PCs, network computers or other microcomputer-powered network devices. Intelligent terminals can perform data entry and some information processing tasks independently. â⬠¢ Networked terminals which may be Windows terminals that are dependent on network servers for Windows software, processing power, and storage, or Internet terminals, which depend on Internet or intranet website servers for their operating systems and application software. â⬠¢ Transaction terminals are a form of intelligent terminal. Uses can be found in banks retail stores, factories, and other work sites. Examples are ATMââ¬â¢s, factory production recorders, and POS terminals. MIDRANGE COMPUTER SYSTEMS Midrange computers, including minicomputers and high-end network servers, areà multi-user systems that canà manage networks of PCs and terminals. Characteristics of midrange computers include: â⬠¢ Generally, midrange computers are general-purpose computers that are larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframes. â⬠¢ Cost less to buy, operate, and maintain than mainframe computers. â⬠¢ Have become popular as powerful network servers to help manage large Internet websites, corporate intranets and extranets, and client/server networks. â⬠¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. â⬠¢ Data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. â⬠¢ First became popular as minicomputers for scientific research, instrumentation systems, engineering analysis, and industrial process monitoring and control. Minicomputers could easily handle such uses because these applications are narrow in scope and do not demand the processing versatility of mainframe systems. â⬠¢ Serve as industrial process-control and manufacturing plant computers and they play a major role in computeraided manufacturing (CAM). â⬠¢ Take the form of powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications. â⬠¢ Are used as front-end computers to assist mainframe computers in telecommunications processing and network management. â⬠¢ Can function in ordinary operating environments (do not need air conditioning or electrical wiring). â⬠¢ Smaller models of minicomputers do not need a staff of specialists to operate them. MIDRANGE COMPUTER APPLICATIONS Serve as industrial process-control and manufacturing plant computers. Play a major role in computer-aided manufacturing (CAM). Serve as powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications Serve as front-end computers to assist mainframe computers in telecommunications processing and network management. Midrange Computer as Network Server: â⬠¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. â⬠¢ Other applications, like data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. â⬠¢ Serve as powerful network servers to help manage large Internet web sites, corporate Intranets and extranets, and client/server networks MAINFRAME COMPUTER SYSTEMS Mainframe computers are large, fast, and powerful computer systems. Characteristics of mainframe computers include: â⬠¢ They are physically larger and more powerful than micros and minis. â⬠¢ Can process hundreds of millions of instructions per second (MIPS). â⬠¢ Have large primary storage capacities. Main memory capacity can range from hundreds of megabytes to many gigabytes of primary storage. â⬠¢ Mainframes have slimmed down drastically in the last few years, dramatically reducing air-conditioning needs, electronic power consumption, and floor space requirements, and thus their acquisition and operating costs. â⬠¢ Sales of mainframes have increased due to cost reductions and the increaseà in applications such as data mining and warehousing, decision support, and electronic commerce. Mainframe Computer Applications: â⬠¢ Handle the information processing needs of major corporations and government agencies with many employees and customers. â⬠¢ Handle enormous and complex computational problems. â⬠¢ Used in organisations processing great volumes of transactions. â⬠¢ Handle great volumes of complex calculations involved in scientific and engineering analyses and simulations of complex design projects. â⬠¢ Serve as superservers for the large client/server networks and high-volume Internet web sites of large companies. â⬠¢ Are becoming a popular business-computing platform for data mining and warehousing, and electronic commerce applications. Supercomputer Systems: The term supercomputer describes a category of extremely powerful computer systems specifically designed for scientific, engineering, and business applications requiring extremely high-speeds for massive numeric computations. Supercomputer Applications: â⬠¢ Used by government research agencies, large universities, and major corporations. â⬠¢ Are used for applications such as global weather forecasting, military defence systems, computational cosmology and astronomy, microprocessor research and design, large scale data mining, large time-sharing networks, and so on. â⬠¢ Use parallel processing architectures of interconnected microprocessors (which can execute many instructions at the same time in parallel). â⬠¢ Can perform arithmetic calculations at speeds of billions of floating-point operations per second (gigaflops). Teraflop (1 trillion floating-point operations per second) supercomputers, which use advanced massively parallelà processing (MPP) designs of thousands of interconnected microprocessors, are becoming available. â⬠¢ Purchase price for large supercomputers are in the $5 million to $50 million range. Mini-supercomputers: The use of symmetric multiprocessing (SMP) and distributed shared memory (DSM) designs of smaller numbers of interconnected microprocessors has spawned a breed of mini-supercomputer with prices that start in the hundreds of thousands of dollars. TECHNICAL NOTE: THE COMPUTER SYSTEM CONCEPTS ââ¬â [Figure 13.9] As a business professional, you do not need a detailed technical knowledge of computers. However, you do need to understand some basic facts and concepts about computer systems. This should help you be an informed and productive user of computer system resources. A computer is a system, an interrelated combination of components that perform the basic system functions of input, processing, output, storage, and control, thus providing end users with a powerful information-processing tool. Understanding the computer as a computer system is vital to the effective use and management of computers. A computer is a system of hardware devices organised according to the following system functions: â⬠¢ Input. Examples of some input devices of a computer system include: 1. Keyboards 2. Touch Screens3. Light Pens 4. Electronic Mice 4. Optical Scanners 5. Voice Input They convert data into electronic machine-readable form for direct entry or through a telecommunications network into a computer system. Processing. The central processing unit (CPU) is the main processing component of a computer system. (In microcomputers, it is the main microprocessor). One of the CPUââ¬â¢s major components is the arithmetic-logic unit (ALU) that performs the arithmetic and logic functions required in computer processing. Components of the CPU include: 1. Control Unit 2. Arithmetic-Logic Unit 3. Primary Storage Unit Output. Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users. Examples of output devices include: 1. Video Display Units 2. Audio Response Units 3. Printers Storage. The storage function of a computer system is used to store data and program instructions needed for processing. Storage devices include: 1. Primary Storage Unit (main memory) 2. Secondary Storage Devices (magnetic disk and tape units, optical disks) Control. The control unit of a CPU interprets computer program instructions and transmits directions to the other components of the computer system. Computer Processing Speeds: Operating speeds of computers are measured in a number of ways. For example: â⬠¢ Milliseconds ââ¬â Thousands of a second. Microseconds ââ¬â Millionths of a second. Nanoseconds ââ¬â Billionth of a second Picosecond ââ¬â Trillionth of a second Other terminology used includes: Teraflop ââ¬â used by some supercomputers MIPS ââ¬â Million instructions per second Megahertz (MHz) ââ¬â Millions of cycles per second Gigahertz (GHz) ââ¬â Billions of cycles per second Clock Speed ââ¬â used to rate microprocessors by the speed of their timing circuits and internal clock. Section II: Computer Peripherals: Input, Output, and Storage Technologies INTRODUCTION A computer is just a high-powered ââ¬Å"processing boxâ⬠without peripherals. Your personal computing needs will dictate the components you choose for our particular computing needs. Analyzing United Technologies and Eastman Kodak We can learn a lot about the business value of consolidating computer operations and systems from this case. Take a few minutes to read it, and we will discuss it (See United Technologies and Eastman Kodak in Section IX). PERIPHERALS Peripherals are the generic name for all input, output, and secondary storage devices that are part of a computer system. Peripherals depend on direct connections or telecommunications links to the central processing unit of aà computer system. Thus, all peripherals are online devices, that is, separate from, but can be electronically connected to and controlled by, a CPU. This is the opposite of off-line devices, which are separate from and not under the control of the CPU. INPUT TECHNOLOGY There has been a major trend toward the increased use of input technologies that provide a more natural user interface for computer users. More and more data and commands are being entered directly and easily into computer systems through pointing devices like electronic mice and touch pads, and technologies like optical scanning, handwriting recognition, and voice recognition. POINTING DEVICES Keyboards are still the most widely used devices for entering data and text into computer systems. However, pointing devices are a better alternative for issuing commands, making choices, and responding to prompts displayed on your video screen. They work with your operating systemââ¬â¢s graphical user interface (GUI), which presents you with icons, menus, windows, buttons, bars, and so on, for your selection. Examples of pointing devices include: â⬠¢ Electronic Mouse ââ¬â A device used to move the cursor on the screen, as well as to issue commands and make icon and menu selections. â⬠¢ Trackball ââ¬â A device used to move the cursor on the display screen. Pointing Stick ââ¬â A small buttonlike device, sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Touchpad ââ¬â A small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Touch Screens ââ¬â A device that accepts data input by the placement of a finger on or close to the CRT screen. PEN-BASED COMPUTING Pen-based computing technologies are being used in many hand-held computers and personal digital assistants. These small PCs and PDAs contain fast processors and software that recognises and digitises handwriting, hand printing, and hand drawing. They have a pressure-sensitive layer like a graphics pad under their slatelike liquid crystal display (LCD) screen. A variety of penlike devices are available: Digitizer Pen ââ¬â A photoelectronic device that can be used as a pointing device, or used to draw or write on a pressure-sensitive surface of a graphics tablet. Graphics Tablet ââ¬â A device that allows an end user to draw or write on a pressure-sensitive tablet and has their handwriting or graphics digitised by the computer and accepted as input. SPEECH RECOGNITION SYSTEMS Speech recognition and voice response (in their infancy) promise to be the easiest method of data entry, word processing, and conversational computing, since speech is the easiest, most natural means of human communication. Speech recognition systems analyse and classify speech or vocal tract patterns and convert them into digital codes for entry into a computer system. Early voice recognition products used discrete speech recognition, where you had to pause between each spoken word. New continuous speech recognition (CSR) software recognises controlled, conversationally paced speech. Examples of continuous speech recognition software include: â⬠¢ NaturallySpeaking by Dragon Systems â⬠¢ ViaVoice by IBM â⬠¢ VoiceXpress by Lernout & Hauspie â⬠¢ FreeSpeech by Philips Areas where speech recognition systems are used include: â⬠¢ Manufacturers use it for inspection, inventory, and quality control â⬠¢ Airlines and parcel delivery companies use it for voice-directed sorting of baggage and parcels â⬠¢ Voice activated GPS systems are being used in advanced car design â⬠¢ Physicians use it to enter and printout prescriptions â⬠¢ Gemmologists use it to free up their hands when inspecting and grading precious stones â⬠¢ Handicapped individuals use voice-enabled software to operate their computers, e-mail, and surf the World Wide Web. Speaker-independent voice recognition systems allow a computer to understand a few words from a voice it has never heard before. They enable computers to respond to verbal and touch-tone input over the telephone. Examples include: â⬠¢ Computerized telephone call switching â⬠¢ Telemarketing surveys â⬠¢ Bank pay-by-phone bill-paying services â⬠¢ Stock quotations services â⬠¢ University registration systems â⬠¢ Customer credit and account balance inquiries OPTICAL SCANNING Optical scanning devices read text or graphics and convert them into digital input for a computer. Optical scanning enables the direct entry of data from source documents into a computer system. Popular uses of optical scanning include: â⬠¢ Scanning pages of text and graphics into your computer for desktop publishing and web publishing applications. â⬠¢ Scan documents into your system and organize them into folders as part of a document management library system for easy reference or retrieval.à There are many types of optical scanners, but they all employ photoelectric devices to scan the characters being read. Reflected light patterns of theà data are converted into electronic impulses that are then accepted as input into the computer system. Optical scanning technology known as optical character recognition (OCR) can read special-purpose characters and codes. OCR scanners are used to read characters and codes on: à Merchandise tags Product labels Credit card receipts Utility bills Insurance premiums Airline tickets Sort mail Score tests Process business and government forms Devices such as handheld optical scanning wands are used to read OCR coding on merchandise tags and other media. Many business applications involve reading bar code, a code that utilises bars to represent characters. One common example is the Universal Produce Code (UPC) bar coding that you see on packages of food items and many other products. OTHER INPUT TECHNOLOGIES Magnetic stripe technology is a familiar form of data entry that helps computers read credit cards. The dark magnetic stripe on the back of such cards is the same iron oxide coating as on magnetic tape. Smart cards that embed a microprocessor chip and several kilobytes of memory into debit, credit, and other cards are popular in Europe, and becoming available in the United States. Digital cameras and digital video cameras enable you to shoot, store, and download still photos or full motion video with audio into your PC. Magnetic ink character recognition (MICR) is machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. OUTPUT TECHNOLOGIES Computers provide information in a variety of forms. Video displays and printed documents have been, and still are, the most common forms of output from computer systems. But other natural and attractive output technologies such as voice response systems and multimedia output are increasingly found along with video displays in business applications. VIDEO OUTPUT Video displays are the most common type of computer output. Most desktop computers rely on video monitors that use cathode ray tube (CRT) technology. Usually, the clarity of the video display depends on the type of video monitor you use and the graphics circuit board installed in your computer. A high-resolution, flicker-free monitor is especially important if you spend a lot of time viewing multimedia on CDs or the Web, or complex graphical displays of many software packages. The biggest use of liquid crystal displays (LCDs) is to provide a visual display capability for portable microcomputers and PDAs. LCD displays need significantly less electric current and provide a thin, flat display. Advances in technology such as active matrix and dual scan capabilities have improved the color and clarity of LCD displays. PRINTED OUTPUT After video displays, printed output is the most common form of output displays. Most personal computer systems rely on inkjet or laser printers to produce permanent (hard copy) output in high-quality printed form. Printed output is still a common form of business communications, and is frequently required for legal documentation. â⬠¢ Inkjet printers ââ¬â Spray ink onto a page one line at a time. They are popular, low-cost printers for microcomputer systems. They are quiet, produce several pages per minute of high-quality output, and can print both black-and-white and high-quality colour graphics. Laser Printers ââ¬â Use an electrostatic process similar to a photocopying machine to produce many pages per minute of high-quality black-and-white output. More expensive colour laser printers and multifunction inkjet and laser models that print, fax, scan, and copy are other popular choices for business offices. STORAGE TRADE-OFFS Data and information need to be stored after input, during processing, and before output. Computer-based information systems rely primarily on the memory circuits and secondary storage devices of computer systems to accomplish the storage function. Major trends in primary and secondary storage methods: â⬠¢ Progress in very-large scale integration (VLSI), which packs millions of memory circuit elements on tiny semiconductor memory chips, are responsible for continuing increases in the main-memory capacity of computers. â⬠¢ Secondary storage capacities are also expected to escalate into the billions and trillions of characters, due primarily to the use of optical media.à Storage Trade-offs: Speed, capacity, and cost relationships. â⬠¢ Note the cost/speed/capacity trade-offs as one moves from semiconductor memories to magnetic media, such as magnetic disks and tapes, to optical disks. â⬠¢ High-speed storage media cost more per byte and provide lower capacities. â⬠¢ Large capacity storage media cost less per byte but are slower â⬠¢ Semiconductor memories are used mainly for primary storage, though they are sometimes used as high-speed secondary storage devices. â⬠¢ Magnetic disk and tape and optical disk devices are used as secondary storage devices to greatly enlarge the storage capacity of computer systems. â⬠¢ Most primary storage circuits use RAM (random access memory) chips, which lose their contents when electrical power is interrupted â⬠¢ Secondary storage devices provide a more permanent type of storage media for storage of data and programs. Computer Storage Fundamentals: [Figure 13.20] Data is processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the computerââ¬â¢s circuitry in the media it uses. This is called a ââ¬Å"two-stateâ⬠or binary representation of data, since the computer and media can exhibit only two possible states or conditions ââ¬â ON (1) or OFF (0). Computer storage elements: â⬠¢ Bit ââ¬â is the smallest element of data, (binary digit) which can have a value of zero or one. The capacity ofà memory chips is usually expressed in terms of bits. Byte ââ¬â is the basic grouping of bits that the computer operates as a single unit. It typically consists of 8 bits and is used to represent one character of data in most computer coding schemes (e.g. 8 bits = 1 byte). The capacity of a computerââ¬â¢s memory and secondary storage devices is usually expressed in terms of bytes. ASCII (American Standard Code for Information Interchange) EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced: EB SEE DICK Storage capacities are frequently measured in: Kilobyte = 1,000 bytes Megabyte = 1,000,000 bytes Gigabyte = 1,000,000,000 bytes Terabyte = 1,000,000,000,000 bytes Petabyte = 1,000,000,000,000,000 bytes Exabyte = 1,000,000,000,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes Yottabyte = 1,000,000,000,000,000,000,000,000 bytes Direct and Sequential Access â⬠¢ Direct Access ââ¬â Primary storage media such as semiconductor memory chips are called direct access or random access memories (RAM). Magnetic disk devices are frequently called direct access storage devices (DASDs). The terms direct access and random access describe the same concept. They mean that an element of data or instructions can be directly stored and retrieved by selecting and using any of the locations on the storage media. They also mean that each storage position (1) has a unique address and (2) can be individually accessed in approximately the same length of time without having to search through other storage positions. Sequential Access ââ¬â sequential access storage media such as magnetic tape do not have unique storage addresses that can be directly addressed. Instead, data must be stored and retrieved using a sequential or serial process. Data are recorded one after another in a predetermined sequence on a storage medium. Locating an individual item of data requires searching much of the recorded data on the tape until the desired item is located. SEMICONDUCTOR MEMORY The primary storage (main memory) on most modern computers consists of microelectronic semiconductor memory circuits. Plug-in memory circuit boards containing 32 megabytes or more of memory chips can be added to your PC to increase its memory capacity. Specialized memory can help improve your computerââ¬â¢s performance. Examples include: â⬠¢ External cache memory of 512 kilobytes to help your microprocessor work faster â⬠¢ Video graphics accelerator cards with 16 megabytes of RAM are used for faster and clearer video performance â⬠¢ Removable credit-card-size and smaller ââ¬Å"flash memoryâ⬠RAM cards provide several megabytes of erasable direct access storage for PDAs or hand-held PCs. Some of the major attractions of semiconductor memory are: â⬠¢ Small size â⬠¢ Fast speed â⬠¢ Shock and temperature resistance One major disadvantage of most semiconductor memory is: â⬠¢ Volatility ââ¬â Uninterrupted electric power must be supplied or the contents of memory will be lost (except withà read only memory, which is permanent). There are two basic types of semiconductor memory: â⬠¢ Random Access Memory (RAM) ââ¬â these memory chips are the most widely used primary storage medium. Each memory position can be both read and written, so it is also called read/write memory. This is a volatile memory. â⬠¢Ã Read Only Memory (ROM) ââ¬â Non-volatile random access memory chips are used for permanent storage. ROM can be read but not erased or overwritten. Instructions and programs in primary storage can be permanently ââ¬Å"burned inâ⬠à to the storage cells during manufacturing. This permanent software is also called firmware. Variations include PROM (programmable read only memory) and EPROM (erasable programmable read only memory), which can be permanently or temporarily programmed after manufacture. MAGNETIC DISK STORAGE These are the most common forms of secondary storage for modern computer systems. Thatââ¬â¢s because they provide fast access and high storage capacities at a reasonable cost. Characteristics of magnetic disks: â⬠¢ Disk drives contain metal disks that are coated on both sides with an iron oxide recording material. â⬠¢ Several disks are mounted together on a vertical shaft, which typically rotates the disks are speeds of 3,600 to 7,600 revolutions per minute (rpm) â⬠¢ Access arms between the slightly separated disks to read and write data on concentric, circular tracks position electromagnetic read/write heads. â⬠¢ Data are recorded on tracks in the form of tiny magnetized spots to form the binary digits of common computer codes. â⬠¢ Thousands of bytes can be recorded on each track, and there are several hundred data tracks on each disk surface, which provides you with billions of storage positions for software and data. Types of Magnetic Disks There are several types of magnetic disk arrangements, including disk cartridges as well as fixed disk units. Removable disk devices are popular because they are transportable and can be used to store backup copies of your data off-line for convenience and security. Floppy Disks, or magnetic disks, consist of polyester film disks covered with an iron oxide compound. A single disk is mounted and rotates freely inside a protective flexible or hard plastic jacket, which has access openings to accommodate the read/write head of a disk drive unit. The 3-1/2-inch floppy disk, with capacities of 1.44 megabytes, is the most widely used version, with a newer Superdisk technology offering 120 megabytes of storage. Hard Disk Drives combine magnetic disks, access arms, and read/write heads into a sealed module. This allows higher speeds, greater data-recording densities,à and closer tolerances within a sealed, more stable environment. Fixed or removable disk cartridge versions are available. Capacities of hard drives range from several hundred megabytes to many gigabytes of storage. RAID Storage Disk arrays of interconnected microcomputer hard disk drives have replaced large-capacity mainframe disk drives to provide many gigabytes of online storage. Known as RAID (redundant arrays of independent disks), they combine from 6 to more than 100 small hard disk drives and their control microprocessors into a single unit. Advantages of RAID disks include: â⬠¢ Provide large capacities with high access speeds since data is accessed in parallel over multiple paths from many disks. â⬠¢ Provide fault tolerant capability, since their redundant design offers multiple copies of data on several disks. If one disk fails, data can be recovered from backup copies automatically stored on other disks. â⬠¢ Storage area networks (SANs) are high-speed fibre channel local area networks that can interconnect many RAID units and share their combined capacity through network servers for many users. MAGNETIC TAPE STORAGE Magnetic Tape is still being used as a secondary storage medium in business applications. The read/write heads of magnetic tape drives record data in the form of magnetised spots on the iron oxide coating of the plastic tape. Magnetic tape devices include tape reels and cartridges in mainframes and midrange systems, and small cassettes or cartridges for PCs. These devices serve as slower, but lower cost, storage to supplement magnetic disks to meet massive data warehouse and other business storage requirements. Other major applications for magnetic tape include long-term archival storage and backup storage for PCs and other systems. OPTICAL DISK STORAGE Optical disk storage involves technology, which is based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. â⬠¢Ã CD-ROM ââ¬â A common type of optical disk used on microcomputers. They are used for read only storage. Storage is over 600 megabytes per disk. This is equivalent to over 400 1.44-megabyte floppy disks or 300,000 double-spaced pages of text. Data are recorded as microscopic pits in a spiral track, and are read using a laser device. Limitation: Recorded data cannot be erased â⬠¢Ã CD-R ââ¬â (Compact disk recordable) is another optical disk technology. It enables computers with CD-R disk drive units to record their own data once on a CD, and then be able to read the data indefinitely. Limitation: Recorded data cannot be erased â⬠¢Ã CD-RW ââ¬â (CD-rewritable) optical disk systems have now become available which record and erase data by using a laser to heat a microscopic point on the diskââ¬â¢s surface. In CD-RW versions using magneto-optical technology, a magnetic coil changes the spotââ¬â¢s reflective properties from one direction to another, thus recording a binary one to zero. A laser device can then read the binary codes on the disk by sensing the direction of reflected light. â⬠¢Ã DVD ââ¬â (Digital Video Disk or Digital Versatile Disk) can hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. The large capacities and high- quality images and sound of DVD technology are expected to eventually replace CD-ROM and CD-RW technologies for data storage, andà promise to accelerate the use of DVD drives for multimedia products that can be used in both computers and home entertainment systems. â⬠¢ DVD-ROM is beginning to replace magnetic tape videocassettes for movies and other multimedia products. â⬠¢ DVD ââ¬â RAM is being used for backup and archival storage data and multimedia files. Business Applications One of the major uses of optical disks in mainframe and midrange systems is in image processing, where longterm archival storage of historical files of document images must be maintained. Mainframe and midrange computer versions of optical disks use 12-inch plastic disks with capacities of several gigabytes, with up to 20 disks held in jukebox drive units. WORM ââ¬â (Write Once, Read Many) versions of optical disks are used to store data on the disk. Although data can only be stored once, it can be read an infinite number of times. One of the major business uses of CD-ROM disks for personal computers is to provide a publishing medium for fast access to reference materials in a convenient, compact form. These include: â⬠¢ Catalogs â⬠¢ Directories â⬠¢ Manuals â⬠¢Ã Periodical abstracts â⬠¢Ã Part listings â⬠¢Ã Statistical databases of business activity and economic activity Interactive multimedia applications in business, education, and entertainment using CD-ROM and DVD disks. Optical disks have become a popular storage medium for image processing and multimedia business applications and they appear to be a promising alternative to magnetic disks and tape for very large mass storage capabilities for enterprise computing systems. However, rewritable optical technologies are still being perfected. Also, most optical disk devices are significantly slower and more expensive (per byte of storage) than magnetic disk devices. So optical disk systems are not expected to displace magnetic disk technology in the near future for most business applications. IV. KEY TERMS AND CONCEPTS ââ¬â DEFINED Binary Representation: Pertaining to the presence or absence of electronic or magnetic ââ¬Å"signalsâ⬠in the computerââ¬â¢s circuitry or in the media it uses. There are only two possible states or conditions ââ¬â presence or absence. Central Processing Unit (CPU): The unit of a computer system that includes the circuits that controls the interpretation and execution of instructions. In many computer systems, the CPU includes the arithmetic-logic unit, the control unit, and primary storage unit. Computer System: Computer hardware as a system of input, processing, output, storage, and control components. Thus a computer system consists of input and output devices, primary and secondary storage devices, the central processing unit, the control unit within the CPU, and other peripheral devices. Computer Terminal: Any input/output device connected by telecommunications links to a computer. Digital Cameras: Digital still cameras and digital video cameras enable you to shoot, store, and download still photos or full-motion video with audio in your PC. Direct Access: A method of storage where each storage position has a unique address and can be individually accessed in approximately the same period of time without having to search through other storage positions. Information Appliance: Devices for consumers to access the Internet. Laptop Computer: A small portable PC. Liquid Crystal Displays (LCD): Electronic visual displays that form characters by applying an electrical charge to selected silicon crystals. Magnetic Disk Storage: Data storage technology that uses magnetised spots on metal or plastic disks. Magnetic Disk Storage ââ¬â Floppy Disk: Small phonograph record enclosed in a protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability for microcomputer systems. Magnetic Disk Storage ââ¬â Hard Disk Secondary storage medium; generally nonremovable disks made out of metal and covered with a magneticà recording surface. It holds data in the form of magnetised spots. Magnetic Disk Storage ââ¬â RAID Redundant array of independent disks. Magnetic disk units that house many interconnected microcomputer hard disk drives, thus providing large, fault tolerant storage capacities. Magnetic Ink Character Recognition (MICR): The machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. Magnetic Stripe: A magnetic stripe card is a plastic wallet-size card with a strip of magnetic tape on one surface; widely used for credit/debit cards. Magnetic Tape: A plastic tape with a magnetic surface on which data can be stored by selective magnetisation of portions of the surface. Mainframe Computer: A larger-size computer system, typically with a separate central processing unit, as distinguished from microcomputer and minicomputer systems. Microcomputer: A very small computer, ranging in size from a ââ¬Å"Computer on a chipâ⬠to a small typewriter-size unit. Microprocessor: A semiconductor chip with circuitry for processing data. Midrange Computer: Larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframe computer systems. Minicomputer: A small electronic general-purpose computer. Network Computer: A new category of microcomputer designed mainly for use with the Internet and Intranets on tasks requiring limited or specialised applications and no or minimal disk storage. Network Server: A type of midrange computer used to co-ordinate telecommunications and resource sharing and manages large web sites, Intranets, extranets, and client/server networks. Network Terminal: A terminal that depends on network servers for its software and processing power. Off-line: Pertaining to equipment or devices not under control of the central processing unit. Online: Pertaining to equipment or devices under control of the central processing unit. Optical Character Recognition (OCR): The machine identification of printed characters through the use of light-sensitive devices. Optical Disk Storage: Technology based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. Optical Disk Storage ââ¬â CD-ROM: An optical disk technology for microcomputers featuring compact disks with a storage capacity of over 500 megabytes. Optical Disk Storage ââ¬â CD-R: Compact disk recordable (CD-R) enables computers with CD-R disk drive units to record their own data once on a CD, than be able to read the data indefinitely. Optical Disk Storage ââ¬â CD-RW: Compact disk rewritable (CD-RW) enables computers with CD-RW disk drive units to record and erase data by using a laser to heat a microscopic point on the diskââ¬â¢s surface. Optical Disk Storage ââ¬â DVD: Digital video disk or digital versatile disk (DVD) enables computers with DVD disk drive units to hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. Optical Disk Storage ââ¬â WORM Disk: Optical disk that allows users to write once, read many times. Optical Scanning: Using a device (scanner) that scans characters or images and generates their digital representations. Pen-Based Computing: Tablet-style microcomputers that recognise hand-writing and hand-drawing done by a pen-shaped device on their pressure sensitive display screens. Peripheral Devices: In a computer system, any unit of equipment, distinct from the central processing unit, that provides the system with input, output, or storage capabilities. Personal Digital Assistant: Handheld microcomputer devices, which are designed for convenient mobile communications and computing. Pointing Devices: Devices, which allow end users to issue commands or make choices by moving a cursor on the display, screen. Pointing Device ââ¬â Electronic Mouse: A small device that is electronically connected to a computer and is moved by hand on a flat surface in order to move the cursor on a video screen in the same direction. Buttons on the mouse allow users to issue commands and makeà responses or selections. Pointing Device ââ¬â Pointing Stick: A small buttonlike device sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Pointing Device ââ¬â Touchpad: Is a small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Pointing Device ââ¬â Trackball: A roller device set in a case used to move the cursor on a computerââ¬â¢s display screen. Primary Storage: The main (or internal) memory of a computer. Usually in the form of semiconductor storage. Printers: Devices that produce hard copy output such as paper documents or reports. Secondary Storage: External or auxiliary storage device that supplements the primary storage of a computer. Semiconductor Memory: Microelectronic storage circuitry etched on tiny chips of silicon or other semiconducting material. Semiconductor Memory ââ¬â RAM: Also known as main memory or primary storage; type of memory that temporarily holds data and instructions needed shortly by the CPU. RAM is a volatile type of storage. Semiconductor Memory ââ¬â ROM: Also known as firmware; a memory chip that permanently stores instructions and data that are programmed during the chipââ¬â¢s manufacture. Three variations on the ROM chip are PROM, EPROM, and EEPROM. ROM is a nonvolatile form of storage. Sequential Access: A sequential method of storing and retrieving data from a file. Smart Cards: Cards such as debit and credit cards, which have an embedded microprocessor chip and several kilobytes of memory. Speech Recognition: Direct conversion of spoken data into electronic form suitable for entry into a computer system. Promises to be the easiest, most natural way to communicate with computers. Storage Capacity Elements: Units used for storage capacity and data: bits, bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB). Storage Capacity Elements ââ¬â Bit: A contraction of ââ¬Å"binary digitâ⬠. It can have the value of either 0 or 1. Storage Capacity Elements ââ¬â Byte: A sequence of adjacent binary digits operated on as a unit and usually shorter than a computer word. In many computer systems, a byte is a grouping of eight bits that can represent one alphabetic or special character or can be ââ¬Å"packedâ⬠with two decimal digits. Storage Capacity Elements ââ¬â Kilobyte (K or KB): When referring to computer storage capacity it is equivalent to 2 to the 10th power, or 1,014 in decimal notation. Storage Capacity Elements ââ¬â Megabyte (MB): One million bytes. More accurately, 2 to the 20th power, 1,048,576 in decimal notation. Storage Capacity Elements ââ¬â Gigabyte (GB): One billion bytes. More accurately, 2 to the 30th power, or 1,073,741,824 in decimal notation. Storage Capacity Elements ââ¬â Terabyte (TB): One trillion bytes. More accurately, 2 to the 40th power, or 1,009,511,627,776 in decimal notation. Storage Media Trade-offs: The trade-offs in cost, speed, and capacity of various storage media. Supercomputer: A special category of large computer systems that are the most powerful available. They are designed to solve massive computational problems. Time Elements: Units used for measuring processing speeds: milliseconds, microseconds, nanoseconds, and picoseconds. Time Elements ââ¬â Millisecond: A thousandth of a second. Time Elements ââ¬â Microsecond: A millionth of a second. Time Elements ââ¬â Nanosecond: One billionth of a second. Time Elements ââ¬â Picosecond: One trillionth of a second. Touch-Sensitive Screen: An input device that accepts data input by the placement of a finger on or close to the CRT screen. Transaction Terminals: Terminals used in banks, retail stores, factories, and other work sites that are used to capture transaction data at their point of origin. Examples are point-of-sale (POS) terminals and automated teller machines (ATMs). Video Output: Video displays are the most common type of computer output. Volatility: Memory (such as electronic semiconductor memory) that loses its contents when electrical power is interrupted. Wand: A handheld optical character recognition device used for data entry by many transaction terminals. Workstation: A computer terminal or micro- or minicomputer system designed to support the work of one person. Also, a highpowered computer to support the work of professionals in engineering, science, and other areas that require extensive computing power and graphics capabilities. V. DISCUSSION QUESTIONS Do you agree with the statement: ââ¬Å"The network is the computerâ⬠? à What trends are occurring in the development and use of the major types of computer systems? Do you think that network computers (NCs) will replace personal computers (PCs) in business applications? Are networks of PCs and servers making mainframe computers obsolete? à Whatà trends are occurring in the development and use of peripheral devices? Why are those trends occurring? When would you recommend the use of each of the following: à Network computers NetPCs Network terminals Information appliances in business applications What processor, memory, magnetic disk storage, and video display capabilities would you require for a personal computer that you would use for business purposes? à What other peripheral devices and capabilities would you want to have for your business PC?
Tuesday, July 30, 2019
Concepts of Health Promotion Essay
Health is defined as a state in which human needs are met in an autonomic way, and is not limited to the absence of disease or disablement (V. Henderson). Optimal health is a lively, self-motivated equilibrium of physical, intellectual, spiritual, emotional, and social well-being. The concept of health promotion delineates the method of empowering people to increase control over, and to advance their own overall health. The main purpose of health promotion is to heighten peopleââ¬â¢s motivation to strive for optimal health, while assisting them in making lifestyle modifications that will help them advance their wellbeing to an ideal state. Modifications of the unfavorable way of living can be enabled through a combination of strategies and learning experiences that enhance awareness and rise motivation; most importantly, the change is made possible through the creation of opportunities that permit access to situations that make positive health practices an easy choice. Individuals and communities require a great deal of health education in order to achieve optimal health levels. The development of health promotion has allowed the nurse to reinforce the professionââ¬â¢s role on health promotion and disease prevention, propagate information that promotes an educated public, and assist individuals and communities to change established negative health behaviors. The nursing roles in health promotion vary greatly depending on the individual or groupââ¬â¢s needs, and their level of readiness to take action toward lifestyle change and behavior modification. In order to be an efficient educator, the nurse has to perform a self-awareness assessment of own health beliefs and practices. In health promotion, it is of great importance that the educators live what they teach, hence becoming models of healthy lifestyle behaviors and attitudes. A nurse who will teach the importance of smoking cessation must not be a smoker; the reason is clear and obvious. Should the client learn that she smokes, he will lose confidence in her role of health advocate, and undervalue the importance of smoking cessation. The trust of the nurse-client relationship might be compromised, and the likelihood that the client will stop smoking will decrease significantly. An extensive approach of health promotion can be achieved through the nursing process includingà assessment, diagnosis identification, planning, implementing, and evaluating outcomes. Even though the process is alike, the nurse gives emphasis to teaching the client accountability for self-care. After the client and the educator agree to the goals together, the health-promotion plans are established; thereafter, the client takes accountability for the success of the plans. A comprehensive assessment of the individual health status is fundamental to health promotion. The nurse has to take in consideration multiple factors, and collect significant data from the clientââ¬â¢s milieu before beginning to design a plan of health promotion education. Some elements of assessment should include the health history and physical examination, physical fitness assessment, lifestyle assessment, spiritual assessment, social support systems review, health risk assessment, health beliefs review, and life-stressors review. Planning has to be done according to the needs, desires and priorities of the client. The client decides on health promotion goals, and the actions and interventions to achieve those goals. During the planning process the nurse acts as a resource person rather than as a counselor. The nurse provides information, highlighting the importance of gradual change, and appraises the clientââ¬â¢s goals to ensure that they are realistic, quantifiable, and satisfactory to the client. Implementation is the ââ¬Å"actingâ⬠towards behavior change. The nurse gives emphasis to self-responsibility for implementing the plan. Depending on the clientââ¬â¢s needs, nursing interventions may consist of supporting, counseling, teaching, consulting, modeling, and enhancing the behavior change. The nurse has to offer ongoing and non-judgmental support that focuses on the desired behavior change. Moreover, the nurse will help the client identify his social support system, which is vital in the goal attainment process. Evaluation of the outcomes should not be sporadic, but rather done on a continual basis in shared collaboration of nurse and client. Evaluation is the time of celebrating successes, or a time when the client may choose to rearrange priorities, or adjust strategies. Health promotion aims a wide range of targets at different levels in the community. The huge benefits resulted from health promotion and disease prevention efforts make many realize that this domain of health care isà worth to be invested in. The focus is shifted evermore from the medical to the preventative approach, from treating the disease to avoiding the onset of it. Nurses have a fundamental role in health promotion by their position and interaction with the community. In acute care settings, they see the people at their toughest times of their lives. It is there nurses can assist patients make important informed decisions in regards to their health. The nurse has the role of assisting the patient in moving in the right direction on the health-illness continuum. Someone might argue that there is no more room for prevention once the illness occurred, but the truth is that there is always something to be prevented. For example, the patient who was admitted with diabetic ketoacidosis (without even knowing that he had diabetes) will need a lot of information and support on how to manage the disease and prevent complications. The nurse in the acute setting will begin the health promotion process for this patient, and furthermore refer him to diabetes specialists. Once the patient follows-up with them, the odds are that another nurse at the doctorââ¬â¢s office will continue the process of teaching the patient about the disease management. Disease prevention is included under health promotion umbrella, and consists of three levels of prevention: primary, secondary, and tertiary. The difference between them is determined by the specific point in time in the course of the disease progression when the health promotion is initiated. The primary prevention targets health promotion and protection before disease or dysfunction arise. It includes but it is not limited to immunizations, routine health check-ups, and risk assessments for specific diseases, family planning services and marriage counseling, health education on various threats to well-being. The main goal of primary prevention is to reduce the risk of exposure of the individual and the community to potentially harmful sources. In comparison, secondary prevention concentrates attention on a timely recognition of health issues and a rapid intervention to lessen health problems. Its main goals are to identify individuals in an initial stage of disease and to limit forthcoming disability. For example, a patient who experiences an acute heart attack can benefit from emergent cardiac stent placement. After this initial step of treatment, the patient will not onlyà need a continual adherence to the recommended regimen, but also making appropriate lifestyle changes in order to prevent further health problems linked to the initial cause of injury. Health promotion at the secondary level is very important because the patient who experienced a life-altering event may be able to return to prior level of quality of life, in conjunction with the appropriate lifestyle modifications. Some examples of secondary prevention are: teaching self-examination for breast and testicular cancer, yearly screening colonoscopy after 50 years of age, or yearly mammograms after the age of 40. At last, tertiary prevention places emphasis on restoration and rehabilitation with the goal of helping the individual to reinstate an optimal level of functioning. Chronic disease management is an example where tertiary prevention comes in to assist the client regaining control and quality of life to a certain extent, as permitted by the disease process. Education and support about managing chronic illness at home to prevent complications is part of the tertiary prevention. The levels of prevention can overlap in practice because same interventions can serve different causes. For example, if a person decides to follow the Weight Watchers nutrition plans to lose weight for the reason of increasing overall health and state of well-being, this will be primary level health promotion. On the other hand, if the same person decides to lose weight with the motivation to decrease the risk for cardiovascular disease, then it is considered a behavior of secondary level of prevention. In conclusion, health promotion is a vital component in society because it helps its citizens reach to a qualitative life. Without health promotion and disease prevention programs, mortality and morbidity would always be our next door neighbor. By health promotion we can see more people laughing, dreaming, and enjoying the excitement of life. References Bennett, C., Perry, J., & Lawrence, Z. (2009). Promoting health in primary care. Nursing Standard, 23(47), 48-56. Blacksher, E. (2009). Health reform: whatââ¬â¢s prevention got to do with it?. The Hastings Center Report, 39(6), inside. Marcus, S. (2012). Poison prevention: engineering in primary prevention. Clinical Toxicology (Philadelphia, Pa.), 50(3), 163-165. doi:10.3109/15563650.2012.658474 Kozier, B. (2007). Fundamentals of nursing: Concepts, process, and practice. Upper Saddle River, N.J: Prentice Hall Health.
Monday, July 29, 2019
Organization Theory and Design Assignment Example | Topics and Well Written Essays - 1000 words - 1
Organization Theory and Design - Assignment Example Symbols used in every organization reflect the culture of people in that organization, the assumptions, emotions, and values of the employees. Some symbols communicate uncomfortable issues in the organization thus linking the emotions of the members with the actions in the organizations. Cultural artifacts and management are also viewed as cultural symbols (Sun, 2005). An organization that has its own culture identifies itself with the members of the organization; they are committed and stable. It is unattainable for an outsider to perfectly discern the cultural values of an organization using some observable aspects such as dress and ceremonies. According to Sun (2008), the outsiders will not identify factors such as absenteeism, high turnover rates, and the memberââ¬â¢s level of commitment. Insiders, who have many working experience, are at 60% advantage than outsiders, who are at 40 % advantage. The insiders are in a better position than outsiders are since the insiders of an o rganization realize when the company has low profits, the members are being scarce, any unethical behavior, illegal political contribution, wiretapping, and promotion gifts. An organization that has not achieved the desired results and has failed to be included in the list of the best performers, longs to change their working environment and make it more comfortable to live in. Pressure for change has accumulated from talented employees who are not given a chance to contribute their views (Daft, 2013). Many employees in most working places are demanding to be included as officials and promoted accordingly, which is not the case in most companies. This has left most employees with a great interest to change their working environment. It is after an organization has the right leaders, who are the originators of every organization, have guided the members in the right
Sunday, July 28, 2019
Biology and Organic Chemistry Essay Example | Topics and Well Written Essays - 1000 words
Biology and Organic Chemistry - Essay Example Also, allow q^2 to equal homozygous recessive individuals, which means that q = the square root of the number that equals q^2. Finally, we can gather the answer for 2pq, given all of the above information. When observing population consisting of 1,000 squirrels, there are 2 expressions of coat colors, red and black. We have observed that 292 squirrels were homozygous dominant, 440 squirrels were heterozygous and 268 were homozygous recessive. We will say that "R" will represent the allele for dominant, red fur. Let's then say that "r" will stand for the recessive allele which when expressed in a homozygous pair, shows up as black fur coats on the squirrels. If we know we have 292 squirrels that are homozygous dominant, this tells us that 29.2% of the squirrels were RR (homozygous dominant) and red coated. If we have 440 squirrels which are heterozygous, that means that 44% of the total number of squirrels were Rr and had red coats. If there were268 squirrels which were homozygous recessive then 26.8% of the total number of squirrels were rr and had black coats. These figures were gathered by dividing the number of squirrels that possessed the same genotype (rr, RR or Rr) by the number of the total squirrel population. This number reflects the actual number of squirrels possessing the same genotype into a percentage of the population of squirrels as a whole. To figure out the allelic frequency, we need to loo... We can safely assume from the data above that p^2 = .292 and stands for the percent of homozygous dominant squirrels. When we take the square root of .292, we get.50. So, 50 is the frequency of dominant alleles. Also, we need to find out the frequency of recessive alleles. Essentially, we will want to know that q^2 = the percentage of recessive squirrels. The square root of that number is equal to the frequency of recessive alleles. So, q^2 = .268. When we take the square root of that we get.52. So then, the frequency of recessive alleles is equal to .52. 2. Was the population from question #1 in Hardy Weinberg's equilibrium Explain using the chi square test. The chi square model is a test that can be used on each category; recessive and dominant. We are able then to examine what we expect to see and compare that to what is expressed. We can decide if the population is a Hardy Weinberg equilibrium or not. The way in which we can do this is by using the following formula: (the sum of) (O-E)^2/E. Let us say that O equal the numbers that we have observed while E stands for the numbers we expect to see in each group. We believe based on standard frequencies that we will see 750 red coated squirrels and 250 black coated squirrels. We have actually observed 732 red coated squirrels and 268 black ones. When we use these figures in the formula of the chi square model, we end up with 1.73 with one degree of freedom. There are only 2 possible phenotypic categories here, red or black. 3. Ten years ago, we could see similar results on the same population of squirrels, but only phenotypes were recorded. 3a. Assuming Hardy-Weinberg equilibrium, calculate the allelic
Saturday, July 27, 2019
Cloud Computing Essay Example | Topics and Well Written Essays - 250 words - 4
Cloud Computing - Essay Example Balance in most cases remains the weight that is distributed in the design through placement of the industryââ¬â¢s elements. Alignment; - In most distribution industries, alignment as a design principle allows the creation of order and organization. It also allows the creation of visual connection within the organization (Morris, 2012). Contrast; - This design principle generally allows organizations to focus on its design elements and by doing this, it helps in improving processes within the organization. Lastly, the space allows free movement in organization especially during the organization processes (Morris, 2012). Adhering to the fundamental design principles is therefore important especially during the development of secure applications. Effective adherence of the design principles in most cases provides balance and a continuation during the development of secure applications. Adherence of the fundamental designs also provides improvement during the development of secure
Ergonomics, Work Methods, Satandards and Work Design Case Study
Ergonomics, Work Methods, Satandards and Work Design - Case Study Example The collected data were tabulated and graphically represented in order to conduct the proposed program more smoothly. The gathered information clearly indicated that back injuries and cumulative trauma disorders (CTD) were very common among the employees. However; among the recordable cases, 30% were back related whereas CTDs constituted only less than 10%. From a detailed analysis, the investigators identified that ââ¬Ëselectorsââ¬â¢ were the group most vulnerable to back injuries while forklift operators maintained the second place. A department-wise study revealed that the grocery department had majorily affected by injuries followed by freezer department and meat and diary departments in second place and third place respectively. Contusions and sprains were outnumbered and hence that could not be brought under the range of this study. In addition to the collection of statistical data, the project members also gathered ten minutes videos of each departmentââ¬â¢s work perf ormance in order to examine the nature of physical strain caused by each job. The adopted biomechanical techniques for this study included ââ¬Å"a three dimensional analysis of static strength requirements and an analysis of repetitive lifting using the revised National Institute for Occupational Safety and Health (NIOSH) Lifting Equationâ⬠(Laurie, Andres & Wood, n.d.). As a part of the research, frequency data in January, 1994 were gathered for each job. Vertical and horizontal distances between each job location were estimated using measurement tapes and handled loads are weighed. The investigators also consulted personnel familiar with these operations with intent to acquire information regarding overtime work. The collected information processed using the two selected methods. The study outcomes illustrate that lifting cases above 50 lb. and horizontal movement cases beyond 20â⬠cause high stress on the body and it would probably affect the low back or shoulder area. Section 2 Every organization largely depends on its employees to achieve a comprehensive economic growth. The above stated grocery warehouse distribution company also offers certain benefits to its employees. As discussed earlier, the firm implements an incentive pay system by which the employees get the opportunity to earn unlimited income. Under this option, the fastest worker achieves more so that an employee may tend to perform his works rapidly. An employeeââ¬â¢s outstanding physical performance on a regular basis would certainly result in injuries and sprains on his body. This situation turns out to be the main cause of increased back injuries and CTDs in the organization. It has been identified that the grocery selectors are the most affected category of back injuries. The gathered data show that grocery selectors lift a weight of 30 pounds at a frequency of four per minute and this activity continues for eight hours. The asymmetry angle or back twisting angle for this wo rk is 30 degrees. At the same time, meat selectors lift 70 pounds two times in a minute and their job duration is also 8 hours. All other elements remain the same for each
Friday, July 26, 2019
Summary Essay Example | Topics and Well Written Essays - 250 words - 60
Summary - Essay Example Marriott shares IBMââ¬â¢s desire to be a global company instead of being a multi-national company. This, he adds, has become inevitable since the very nature of work is rapidly changing. The company must adapt to the on-going changes in the world by hiring new customers. It falls upon Human Resources to employ a new breed of workers that must compose a diverse team to accommodate the companyââ¬â¢s vision. The world Gross Domestic Product (GDP) is currently at about $60 trillion where the United States accounts for 25%. Competition is no longer simply local but it is fundamentally global. Jim Clifftonââ¬â¢s ââ¬Å"The Coming Jobs Warâ⬠was also pointed out by Marriott. This book reveals that 5 billion people out of the worldââ¬â¢s total population of around 7 billion are good enough to work. The problem of joblessness has a direct impact on the economy and how the businesses thrive. Among the prevailing difficulty is that a number of these workers are unable to fit the qualifications for the job since they are new graduates. The Four Growth Initiatives which consist of a smarter planet, business analytics, cloud and growth markets must be taken into account to foster continued future
Thursday, July 25, 2019
Sleep Disorders Essay Example | Topics and Well Written Essays - 250 words
Sleep Disorders - Essay Example Rhythmic brain activity occurs in this stage known as ââ¬Å"sleep spindlesâ⬠, as mentioned by (Cherry, 2011). It is mentioned in (www.sleepdex.org, n.d.) that deep and significantly slow brain activity characterizes stage 3 of human sleep. Slow brain waves called delta waves are observed mixed with faster waves in this stage, while delta waves are exclusively produced in stage 4. Rapid eye movement and fast breathing occurs in REM, where the rate of brain activity equals the rate observed when a person is awake. Parasomnia is a sleep disorder in which one has severe trouble in comfortably falling asleep. In this disorder, the patients experience nightmares or sleep walking. Parasomnia can occur if one is aroused from non-REM sleep. (MedicineNet, 2011). Sleep walking most commonly occurs during stage 3 and 4, where there is slow brain activity and the patient has absolutely no idea of his/her body movement. There occur 4-5 sleep cycles throughout the night and sleep walking prim arily occurs during the first or second sleep cycle. Since there is short sleeping time involved in nap, sleep walking does not occur during the day time. Therefore, sleep walking characteristically occurs at night time during stage 3 and 4. References: Cherry, K. (2011). Stages of Sleep.
Wednesday, July 24, 2019
McDonald's Strategic Choices Essay Example | Topics and Well Written Essays - 1250 words
McDonald's Strategic Choices - Essay Example This will make their comparisons and differences, clearly distinguished. McDonalds's is specialized in; beef, chicken, bread, potatoes, and milk. These are the main products in their ingredients. The firm has rapidly grown and a study on their strategies and policies places it in even a better position of further development. In fact the number of restraunts has drastically increased since its establishment. As a result, the company has built a strong goodwill and public image. Wal-Mart on the other hand has its effect felt globally. The firm has also followed suite by setting up numerous shops in different parts the world and partnering with other major companies. While McDonald's expansion is doing wonderful, Wal-Mart has had its share of disappointments in trying to sell overseas, their business in Britain and Germany was tragic and led to loses. But this in turn, has not changed the position that Wal-Mart is still the World's biggest employer. Wal-Mart expansion is also seen in local hubs unlike other corporates who target mainly the major towns and cities. (Fadtastic It should also be noted that both companies have had their hard times due to small mistakes in their different restaurants, shops and branches spread all over America, Europe and Asia. Claims launched against them being low pays, exploitation, services among others. They in turn practiced the right measures to clear the messes settling the rows. To cite examples that almost ruin their business, there was a time when the Hindu community allegedly claimed that McDonald's French fries had beef flavoring and as a result called on its community to sabotage their products. If it were not for their hardworking strategy team's speed they would have lost it. The team in turn sincerely apologized and later on paid to settle Hindus, anything to win their trust and loyalty back. Wal-Mart though has not yet managed to professionally convince its consumers completely. In fact, communities recently demonstrated over their going, 'greed policy' terming it as green/brain washing over their employee' s package offer that is, low pays and limited health care benefits. Critics say that they are rational in their business activities, workers. It demands that we look at the organization's structures as the first strategy. McDonald's management runs the business under departments with each one handling a different responsibility from the other. The Operations dealing with the equipments, Development taking care of property and structural aspects, Finance in supplies and monetary control, Marketing carrying out sales, promotions while Human Resources caters for customer care, personnel, hygiene and safety. This arrangement has enabled services and products to follow chain easily and as a result, improved on efficiency and customer confidence with are key to boosting loyalty, hence maximizing on their profits.If the consequent choice of strategy is followed, McDonald's can take their desired direction. The firm's vision for growth is in shape though competitors are always trying best to topple them. Basic secrets and traditions that still place them at the top continue to be followed with improvements coming in handy too. He alth is given the number one priority with extreme measures put to ensure that workers and the business premise are
Tuesday, July 23, 2019
Differentiates Developmental Theory and Rudimentary Theory Essay
Differentiates Developmental Theory and Rudimentary Theory - Essay Example When action research findings are shared; they increase the interrelation between theoretic research and practice. The rapport between the two differentiates developmental theory and rudimentary theory thus publishing action research transforms information into application knowledge. More so, publishing an action research encourages other people to undertake similar researchers in the same or other areas, thus widening the knowledge application base. Publishing also widens the understanding of local readers of facts that they may consider palpable yet they affect their lives in a colossal way. Findings from an action research can be shared through data enclaves. This involves putting related findings in small groups called enclaves and allowing access for the people who consume such data. Data enclaves help in sharing findings and keeping them confidential before publishing. In case the findings of a research are confidential, they may be shared through remote execution systems. The findings are put in highly protected areas so that any request for secondary research in the area are submitted on the system. Findings of an action research may also be shared conventionally while limiting the level of access to such data. Top-coding is a technique of limiting the maximum number of people allowed access to certain findings, for example, 1-35000. Conversely, while sharing this information, discretion should be prioritized. Confidentiality can be maintained through de-identification and ensuring the people providing information remain anonymous. In the field of medicine, findings from field and laboratory researchers are shared through peer-reviewed journals. A peer-reviewed journal is basically a report with details of the features that the scientists observe in the experiments and their conclusions basing on such observations and medical/ scientific theory.
Monday, July 22, 2019
Van Is a Good Essay Essay Example for Free
Van Is a Good Essay Essay Pie Chart Showing the Occupational Expectation of the Trainees: Government Institutions Pie Chart Showing the Occupational Expectation of the Trainees: Private Training Schools Pie Chart Showing the Total Occupational Expectation of the Trainees: Total 2 2 3 4 5 6 C HAPTER I INTRODUCTION This paper reports the results of a small tracer study and discusses how tracer studies can be used as a planning tool to assist education and manpower planning. To make education institutions more efficient, we need to know what happen to graduates. One way is to conduct tracer studies. Such studies are useful for assessing the labour market performance of graduates and school leavers. Uses of Tracer Studies Tracer studies can be used to achieve the following: â⬠¢ To collect information on how well the graduates are doing in the labour market â⬠¢ To get feedback from the graduates to modify and upgrade the education institutions â⬠¢ To meet the needs of the employers â⬠¢ To make tracer studies as part of labour market information system â⬠¢ To make use of the labour market information to assist policy planners. C HAPTERll METIlODOLOGY AND SURVEY DESIGN. The tracer study questionnaires used include items such as employment status, income, basic demography, waiting time for employment, job changes, attitude to jobs and qualitative feedback on courses and programmes of training institutions. Samples of fresh graduates from Yangon Institute of Technology (YIT), Civil, Government Technical Institute (GTI), Mandalay, Machine Tools, Agriculture High School, Myittha, during the three academic years 1984/85, 1985/86, 1986/87, were first chosen at random and then efforts were made to establish contact with those graduates included in the sample. Next, a few individuals who received training in specific skills like Computer Operations, Tailoring and Auto-repairs run by private establishments were also chosen at random and interviewed. Table 1 Training Institutions Run by the Government No. Training Institutions 1984/85 3 1986/87 Yangon Institute of Technology (Civil Eng. ) Government Technical Institutes (Machine Tools) Agriculture High School (Myittha) 203(10) 244(10) 274(10) 30 17(5) 48(5) 44(5) 15 66(5) 50(5) 24(5) 15 Total 2 Academic Year 1985/86 Sample Size 286(20) 342(2) 315(20) 60 Note: Sample sizes are given within parenthesis. Table 2à Skill Training Course Run By Private Establishments No. Training Institutions 1988 1 2 3 Computing and Typing Tailoring Auto-Workshop Total 5 3 2 Intended Interview 1989 1990 5 3 2 5 3 2 Total 15 9 6 30 Interviewers were sent all over the country to contact the graduates selected for interviewing through local administrative bodies. More than one visit was needed in tracing some 3 respondents for shifts in their places of residents. It is important to note that the sample sizes for private skill-training courses were fixed in advance for the sake of convenience. Table 3 Response Rate by Type of Graduates/Skills Sample Response. Response Rate % B. E (Civil) GTI (Machine Tools) (Mandalay) AHS (Myittha) Computing and Typing Tailoring Auto-workshop 30 15 27 15 90. 0 100. 0 15 15 9 15 15 9 6 6 100. 0 100. 0 100. 0 100. 0 Total 90 87 97. 0 No. Graduates/ Type of Skills 1. 2. 3. 4. 5. 6. C HAPfERill PLACEMENT OF GRADUATES Relationship Between Type of Diplomas/Degrees and Type of Work In our study of graduates from some training institutions, both in the formal and non-formal sectors, we see that some are employed in jobs which are related to their educational training, but a great majority found their jobs do not match with their training or acquired skills. For example, a graduate of Yangon Institute of Technology is found to take up the profession of a primary assistant teacher and another as a self-employed shop-keeper. Also a graduate of an Agricultural High School (AHS), took up the post of a Primary Assistant Teacher (PAT). A tracer study on the graduates of computer centres reveal that most of them take up the course because of the challenge of a new subject and also because the universities are closed for the time being. A currently employed PAT attending the course of computer said that her training and her work does not relate. She has a bachelor degree with physics major and has the feeling that she should be employed in a field in which her training might prove to be useful. Our study reveals that training systems such as computer schools, secretarial, typing schools are currently very popular and heavily attended in the sense that trainees perceived that the new market oriented economic policy would create job opportunities for them. Currently it is seen that such level of employment has not been reached yet. To those who took up computer training a few are fortunate enough to find employment in the same institution. Most of the trainees of typing school usually take it as a pre-course for computer training. Some attended such courses to while away before the university opens. Such reasons clearly bring out the fact that ultimately employers are the ones who decide on employment. Since employers have great influence over labour market the most obvious solution is to place training under the control of a board in which employers receive higher representation. Table 4 Match Between Training and Employment No. Institute (or) Training 1. Institute of Technology Government Technical Institutes Agricultural High School. Computer Training Tailoring Short Hand and Typing Auto-workshop 2. 3. 4. 5. 6. 7. Related 16 Not Related 4 8 11 1 1 2 5 1 1 1 5 Employment and Unemployment Situation of the Graduates The tracer study brought into view that among the 87 respondent, 38 per cent are not employed. Graduates of higher education face unemployment more often than lower education level graduates after completing their studies. A research was conducted in 1977 to find out the prospect that graduates have in securing jobs, the types of occupation where graduates are placed and how graduates have to wait to find jobs. Ten per cent of the graduates from Yangon Arts and Science University, Yangon Institute of Technology, the Institute of Economics, the Institute of Education, the Institute of Animal Husbandry and Veterinary Science. the Institute of Agriculture, under the Department of Higher Education and the Institute of Medicine and the Institute of Dental Science under the Ministry of Health were surveyed. The total response was 41 per cent within two months. Based on a survey regarding the number of applications submitted for jobs, the highest was found among the B. E (Engineering) degree holders and the lowest among the B. Sc degree holders. Six per cent of the graduates who were offered the jobs they had applied for, did not accept the job. The main reasons for this was that either the place of the job was too far out, or there were problems related with the family or the salary was low. Out of the 259 respondents 70 per cent were employed and 30 per cent were not yet employed. B. E. graduates and B. Sc graduates were found to be the largest in number among those not yet employed. In the recent survey in 1990, it was found that more than 59 per cent of the YIT and 53 per cent of the GTI graduates had found employment. For the AHS graduates the extent of employment was about 80 per cent. Among graduates of Computing Typing only 40 per cent and among Tailoring 22 per cent were able to find employment. Auto-workshop trainees are employed cent per cent. This is so because the nature of the job is arduous and young people are not willing take on this type of training highly. Table 5 Type of Training and Extent Employment (Per cent) No. Type of Institution 1. 2. 3. 4. 5. YIT GTI AHS Computing Typing Tailoring Employed Unemployed 59. 0 53. 0 80. 0 40. 0 100. 0 41. 0 47. 0 20. 0 60. 0 0. 0 Occupational Expectation of the GraduatGs The external efficiency of an education system involves relationships between general and vocational education and between schools and work opportunities, what schools and teachers can be expected to do in preparing for future occupations and what may be expected from a combination of learning in and out of school. The relationships are intricate and diverse and can be summarized as follows. 6. First to promote economic growth, it is essential to have a trained labour force equipped to handle technical and managerial problems. This presents a more severe problem for developing countries, where skilled manpower is scarce and enterprises that could provide opportunities both for training and employment is lacking. Secondly the problem of unemployment in the modern sector among graduates and others leaving school. In other words, labour supply versus labour demand. Thirdly policy makers, employers as well as individual tend to consider formal education as passport to jobs in the modern sector. To increase their chances for employment with higher wage, students tend to remain in school as long as possible, sometimes for more years than required by the available jobs. Table 6 Occupational Expectation of the Trainees No. Training Schools 1. 2. AHS No. /1) Industrial Training Centre Government Private JVC 2 3 10 I. /1 +2) 3. 4. 5. Tailoring Computing and Typing Auto-workshop 11. /3+4+5) 9 30% 108à ° 19 69% 22]0 4 7% 25à ° Ill. Total /1 +2+3+4+5) 22 49% 176à ° 19 42% 151 à ° 4 9% 33à ° 2 14% 50à ° 13 86% 310à ° 3 6 7 7 2 5 Co-op 7 Figure 1 Pie Chart Showing the Occupational Expectation of the Trainees. Government Institutions J. V. C (15. 7%) Private (0. 0%) Private Training Schools 8 Total Government (49. 0%) Private (42. 0%) In our study on trainees from various institutions, we find that 49 per cent of the trainees wanted to join government departments, 42 per cent the private sector and 9 per cent tlie JVCs. It was found that no one wanted to join the cooperative sector. Among the trainees interviewed, two large groups were identified: those attending government training schools and those attending private and non-formal training schools. It was found that among those attending government training schools 86 per cent wanted to join government departments and 14 per cent preferred the JVCs. Most of the trainees taking private or non-formal training desired to join the private sector and to get government jobs as well. A tracer study of 1976177 graduates also point out that 67 per cent of the ograduates wanted to work with state enterprises or departments; less than 1 per cent the cooperative sector and the private sector and the remaining wanted to take up any type of work or set up their own businesses. This is understandable, for the state had been the major employer prior to the adoption of the market oriented economic policy, but after the adoption of the new economic policy, trainees actually look forward to join the private sector for work. This fact reflected the need for studying the labour market conditions placing more emphasis on employment effectiveness of the private sector. Income is also one of the main factors in the occupational expectation of the graduates. Our study is concerned with the income generation of graduates. Most begin their work with very low pay. For the YIT graduates, the majority had to start work with a monthly income ranging from K 400 K 750. For technical schools it is much lower, between K 200 K 450. Most of them start to work on a flat-payor daily wages basis. Graduates from the non-formal education sector such as auto-workshop workers, typists were found to earn more than university graduates. This is a natural flow of blue collar job workers earning more than white collar job workers in the initial period. The nature of the work is different although there is less wage differential. C HAYfER IV ISSUES AND RECOMMENDATIONS Methodology. Tracer studies are usually ad-hoc exercises covering only a few institutions or types of graduates. To use tracer studies as an aid to education/manpower policy making, graduates from all the institutions or programmes run by the Ministry of Education and other ministries should be analyzed. To encompass all the institutions and programmes, a sample will need to be selected. To be precise, the question should be asked of what size of sample is necessary to reflect the market demand for specific types of educated manpower. Another issue in methodology is formulating questions. At the centre of a tracer study is the questionnaire. In designing questions it should be borne in mind that much of the resulting analysis will be statistical and therefore the answers will need to be in a form where by they can be aggregated. Another important consideration in designing questions is to ensure that their meaning is clear and unambiguous. There are some factors to take into account in the wording of questions. All wording should be simple, direct and familiar. Each question should have a single issue. Operation The result of tracer studies can be useful to and fed into the work of several ministries, particularly Education, Labour and Planning. There should be a permanent tracer study unit in one of the above ministries. The advantage of setting up a permanent tracer study unit is that it can integrate information from tracer studies to national planning purposes. The setting of a permanent tracer study could develop a series of tracer studies right across to education/training system. To improve policy decision on education and manpower, tracer studies need to be organized as part and parcel of the activities of the institution and the information they generate should regularly be fed into the policy-making process. Recommendations. To get up-to date information on the labour market performance of graduates, Tracer Studies should be made regularly. To train more-people who will be in charge of the tracer studies. The person in charge should have, as a minimum, practical experiences of survey work including coding and analyzing cross tabulation. C HAPrER V CONCLUSION As this paper reports the results of a small tracer study and discusses tracer studies as a method of obtaining regular feed-back on the labour market performance of graduates, it can be used as a tool to assist education and manpower planning. Tracer studies provide information on the demand for educated workers. Besides this it has other advantages. First, the surveys are simple to conduct. Secondly, the typical questionnaire used is short and uncomplicated, and can easily be completed by respondents. The third is that almost all of them can be conducted by mail. They are therefore inexpensive to carry out. The survey can be conducted when graduates return for their graduation ceremony. Fourthly the data collected by tracer studies can be easily analyzed and understood by non-economists. Like all techniques to aid policy-making, tracer studies have shortcomings. Some of those shortcomings concern data reliability while others stem from the assumptions that underline tracer studies. I L IST OF WORKING PAPER SERIES 1. Education Data Review and Analysis 1 . 1 1 . 2 Performance Indicators in Higher Education by U Thein Htay (DHE). 1. 3 Performance Indicators in Technical, Agricultural and Vocational Education by U Myat Naing (MERB) and U Nyunt Maung (DTAVE). 1 . 4 Quantitative Review of Education Staff by U Tun Hla and U Myint Thein (DBE). 1. 5 2. Performance Indicators in Basic Educationà by U Saw Win (Institute of Economics). Population Projections (1983-2013) by U Nyan Myint (Institute of Economics). The Quality of Education 2. 1 2. 2 Pedagogy by Oaw Nu Nu Win (Institute of Education). 2. 3 Curriculum by U Myint Han (MERB). 2. 4 Student Evaluation by Dr. Khin Saw Naing (Institute of Medicine 2). 2. 5 3. Teacher Quality by Daw 00 Khin Hla (Institute of Education). Student Characteristics by U Maung Maung Myint (DBE). Education and Employment 3. 1 Manpower Demand and Employment Patterns in a Changing Economy by Dr. Thet Lwin (Institute of Economics). 3. 2. A Tracer Study of Recent Graduates: Implications for Education and Manpower Planning by U Kyaw Kyaw (Department of Labour). 3. 3 Linkages between Training Institutions and Employers by U Tun Aye (Ministry of NO. 1 Industry), Daw Myint Myint Yi (Institute of Economics) and U Van Naing (DBE). 3. 4 Education and Work Performance (A Survey of Employers Perceptions) by Daw Hla Myint (Institute of Economics). 3. 5 Non-Formal Education in Myanmar by Daw Win Win Myint (Institute of Economics) and Daw Lai lai Yu (MERB). 3. 6 Labour Market Institutions in Myanmar by U Kyaw Kyaw (Department of Labour). 4. Costs and Financing of Education 4. 1 4. 2 Government Expenditure on Education by Oaw Soe Soe Aung (Institute of Economics) . 4. 3 5. Management and Administration of the Education Budget by Or. Khin Ohn Thant (Ministry of Planning and Finance). Non-Government Expenditure on Education by U Saw Gibson (Yangon University). Education Infrastructure 5. 1 5. 2 A Comprehensive Survey of Education Facilities by U Sein Myint (OBE), U Nyi Hla Nge (Yangon Institute of Technology), Oaw Win Win Myint (Institute of Economics), Oaw Naw Joy Loo (Institute of Medicine 1), U Saw Wynn (OBE) and Oaw Win Win Maw (In.stitute of Medicine 1). 5. 3 The Provision of Infrastructure by U Nyi Hla Nge (Yangon Institute of Technology), U Nyunt Hlaing (Ministry of No. 1 Industry), U Tet Tun (Ministry of Construction) and U Sein Myint (OBE). 5. 4 6. The Construction Sector by U Tet Tun (Ministry of Construction), U Nyi Hla Nge (Yangon Institute of Technology), Oaw Naw Joy Loo (Institute of Medicine 1) and Oaw Win Win Maw (Institute of Medicine 1). Norms and Standards for Education Facilities by U Nyi Hla Nge (Yangon Institute of Technology), Oaw Win Win Maw (Institute of Medicine 1), and U Tet Tun (Ministry of Construction). Organization and Management of the Education System 6. 1 6. 2 The Cluster System for Primary Schools by U Myint Han (MERB). 6. 3 7. Organization and Management of Basic Education by Oaw Hla Kyu (OBE) and U Myint Thein (OBE). Organization and Management of Universities and Colleges by U Saw Gibson (Yangon University) and U Thein Htay (OHE). Special Studies 7. 1 Economics and Business Education by Oaw Cho Cho Thein (OBE). 7. 2 The Teaching of Science and Technology by U Khin Maung Kyi (OBE). 7. 3 The Teaching of English by Or. Myo Myint (Yangon University). 7. 4 Higher Education by U Myo Nyunt (Institute of Education).
Plot and character outlines Essay Example for Free
Plot and character outlines Essay He also wants different colored rabbits that he can feed with the alfalfa that he will collect. Lennies dream doesnt come true as his child like nature means that he tries to stroke Curlys wifes hair and not wanting her to scream he breaks her neck. He then flees to the brush where George told him to hide if anything went wrong. George wanting to protect Lennie from the pain of being hung decides instead to shoot him in the back of the head similar to the way Candys dog was so mercilessly killed. Another character who has a dream is Candy. Candy is a decrepit old man who is described as a swamper who lost his hand at the end of his useful life on the ranch. He wishes to join George and lennie to escape the ranch. His dream is to join George and lennie and seeks security in his old age. He is desperate and determined to make it happen as he is afraid he will end up like his dog as he will be sacked as soon as he becomes too old to do any work. Candy is considered useless as he only has one hand I got hurt four years ago theyll can me pretty soon. Candys only friend on the ranch was his dog who was shot and so he seeks company and doesnt want to be lonely any more, wants company in his old age I wont have no place to go, an I cant get no more jobs Candys dream doesnt come true as he has to abandon his plans as lennie is killed and George has to leave town as many of the men at the ranch believe that he might have been conspiring with lennie. At this Candy,s American dream is crushed. The next character who dreams is Crooks. He is a black stable hand, lives by himself in the harness room, a shed attached to the barn. Injured when a horse kicked him, Crooks has a body that is bent to the left because of his crooked spine. The stable hand has many horse care items in his room, as well as personal belongings he keeps because he is a more permanent tenant. He is a proud man but he feels segregated from the other guys and so spends most of his time in his room reading. He used to own his own hand but he lost it He dreams of one day being accepted and being able to sit in the bunk house and play cards he wants to be able to fit in and find his own place in society, have somebody that he can talk to A guy needs somebody to be near him. A guy goes nuts if he aint got nobody. He wanted to join George and Lennie but he pulls out after George finds out that Lennie and candy have been talking to crooks about the land and Crooks wanting to avoid disappointment decides that it is best he pulls out as George is not happy. Curlys wife also has a dream. Curlys wife is a seductive, pretty woman who not happy with her marriage to curly seeks excitement and a new life A show came through, an I met one of the actors. He says I could go with that show. But my ol lady wouldnt let me If Id went, I wouldnt be livin like this, you bet. she doesnt like Curlys and says he is a mean guy she is also happy when Lennie breaks Curlys hand as she says its good you busted curly up. Her dream is to become a big movie star as she makes reference to Nother time I met a guy, an he was in pitchers he says he was gonna put me in the movies. Says I was a natural. Soons he get back to Hollywood he was gonna write to me about it I never got that letter I always thought my ol lady stole it. Her dream was to go on stage and entertain as she also tried to run away with the circus A show came through, an I met one of the actors. He says I could go with that show. But my ol lady wouldnt let me If Id went, I wouldnt be livin like this, you bet. this makes reference to the fact that she is lonely as the only woman on the ranch and resents her life. Curlys wife trys to leave the ranch when she comes across lennie and they get talking, she lets Lennie touch her hair but he gets carried away and ends up killing her. Her dreams of fame and belonging are dashed as she dies before she gets the chance to leave the ranch. The last character who has a dream is Curly. He is the boss son, a young, pugnacious character, once a semi-professional boxer. He is described by others, with some irony, as handy. He is very jealous and protective of his wife and immediately develops a dislike toward Lennie. He is married but his marriage is a shame as his wife feels lonely and spends half her time supposedly looking for curly. His wife could be described as a promiscuous as she seems to take a interest in the other men on the ranch. Curly is a small guy and doesnt like big guys, like all small guys, he dont like big guys His dream was to become a professional boxer but he had to stay on the ranch, he feels insecure and possessive of his wife, as she has a promiscuous personality. Seems like Curly is cockier than ever since he got married. His dreams were dashed as he had to stay on the ranch and was not allowed to follow his dream, this may be why he is so bitter and angry . He also cannot even keep his wife as she seems to wander off a lot. His dreams are further crushed as his hand is badly damaged in a fight with Lennie. As his hand is broken he will never be able to fight again, as well as the shame of being beaten by someone who is considered to be mentally handicapped really damaged his reputation. To sum up, most the characters in the book have a dream of some sort. All of the characters dreams in the book of mice and men do not come true . Lennie and Georges dream is slashed by Lennie killing Curlys wife and her dreams are slashed as she is killed but Curlys wife dose finally decide to leave Curly which was part of her dream. Candys dream dies with Lennie as George is not interested in the farm anymore. Crooks had his dream when he used to own his own bit of land but it was taken away from him and so his dream was crushed. They chased their dreams but none of them came true which has reference to the American dream which many people chased but most never achieve. By marc di-trolio Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE John Steinbeck section.
Subscribe to:
Posts (Atom)