Tuesday, August 25, 2020

War and Its Effects essays

War and Its Effects articles Flipping through the channels on TV, we are well on the way to run over the updates on a war going some place on the world. Individuals are continually battling about an area, political thoughts, or basically out of confidence. It is this brutality that influence us as individuals; we have gotten so used to the picture of individuals being slaughtered, killed, and executed before our eyes that we see these occasions without the smallest regret. Our own youngsters are growing up with the way that the most ideal approach to determine an issue is to just do battle. War and savagery are making our general public disintegrated, before we know it we may even annihilate the world. After a legislative question, an adjustment in thoughts, or straightforward scorn towards countries, a war is locked in. It begins by sending guiltless lives out to war, the vast majority of them not realizing that they are going to forfeit themselves for the reason for their legislature. Hundreds if not a huge number of blameless individuals would bite the dust every day because of the war, however doesn't imply that it generally legitimizes the end? The appropriate response is no, gambling honest lives is certifiably not a far from being obviously true issue, its essentially isn't right. Pack battles, family debates, and schools getting assaulted by weapon men. Our youngsters are growing up with these pictures in consistently life. We have gotten so used to brutality and we are tolerating it. Model, a person enters a bank, burglarizes the agent at firearm point, and out of nowhere chooses to slaughter the assistant and takes all the cash with him. Its only a scene of a well known game played by a huge number of adolescents over the world. We let our children experience it direct, we instruct them to like it. Before we know it they are out on the avenues battling, causing demonstrations of savagery towards others. Which begins a pattern of ceaseless brutality. Wouldn't it be pleasant on the off chance that we lived in a universe of peacefulness? Indeed, yet we don't. We experience a daily reality such that youngsters are dominating. They are taking shots at school. Why? due to the absence of consideration that they are getting ... <!

Saturday, August 22, 2020

Exercise 8: Chemical and Physical Processes of Digestion

Lab Report 8 April fifteenth Exercise 8: Chemical and Physical Processes of Digestion Lab Report Questions Activity 1 What is the distinction between the IKI measure and Benedict’s examine? IKI measure recognizes the nearness of starch, and the Benedict examine tests for the nearness of lessening sugars just as IKI turns blue dark while Benedict is a brilliant blue that changes to green to orange to ruddy earthy colored with expanding levels of maltose What was the reason for tubes #1 and #2? For what reason are they important?Because they are the controls and the controls must be set up to give a known standard against which all correlations must be made. Positive controls the entirety of the necessary substances are incorporated and negative a negative outcome is normal approving the analysis. What impact did pH level have on the chemical? It somewhat permitted the chemical to carry out its responsibility on the grounds that there were sure indications of both starch and its diminishing sugars. What impact did bubbling and freezing have on the action of amylase?Boiling didn't permit the breakdown of starch in light of the fact that the diminished sugars were absent and the starch was the place the freezing indicated a ++ for the decreasing sugars and a negative outcome in the starch demonstrating that it diminished the starch. Action 2 What was the impact of the chemical peptidase? Why? The catalyst peptidase couldn't separate the starch by demonstrating that there is certain IKI test for starch and a negative Benedict test for its diminished sugars. What is cellulose? As per your outcomes, does salivary amylase digest cellulose?Cellulose is a polysaccharide found in plants to give unbending nature to their cell dividers and salivary amylase can't process it on the grounds that there were no positive indications of the Benedict test which should have been certain if a breakdown occurred. What befell the cellulose in tube #6? It was processed by the mic roscopic organisms giving an exceptionally positive indication for the Benedict test. Movement 3 What is the ideal pH level for pepsin? For what reason do you believe that is? The ideal pH for pepsin is around 2. 0 since it demonstrated a higher ideal thickness indicating that more BPNA has been hydrolyzed.Also the stomach is acidic adding to the thinking that pepsin will function admirably in acidic situations. How was optical thickness estimated? What is the criticalness of this estimation? A spectrometer sparkle light through the example and afterward quantifies how much light is ingested. The division of light retained is communicated as the example of optical thickness. The higher the optical thickness is more prominent than zero the more hydrolysis has happened. Movement 4 Why do lipids present unique issues for digestion?Because the insolubility of the triglycerides presents a test since they will in general cluster together leaving surface atoms presented to lipase catalysts . How do bile salts impact lipid processing? Bile salts are emitted into the small digestive tract during assimilation to truly emulsify lipids. They go about as a cleanser isolating the lipid bunches and increment the surface region available to the lipase catalysts. What components influence stomach related compounds? A few factors that influence stomach related chemicals are pH and the measure of lipase and bile salts in an answer.

Monday, August 10, 2020

Women With an Alcoholic Parent Have More Risk Factors

Women With an Alcoholic Parent Have More Risk Factors Addiction Alcohol Use Print Women With an Alcoholic Parent Have More Risk Factors By Buddy T facebook twitter Buddy T is an anonymous writer and founding member of the Online Al-Anon Outreach Committee with decades of experience writing about alcoholism. Learn about our editorial policy Buddy T Medically reviewed by Medically reviewed by Steven Gans, MD on December 06, 2015 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on May 27, 2019 Ray Kachatorian / Getty Images More in Addiction Alcohol Use Binge Drinking Withdrawal and Relapse Children of Alcoholics Drunk Driving Addictive Behaviors Drug Use Nicotine Use Coping and Recovery There are differences in how parental alcoholism affects daughters as opposed to how it affects sons, particularly when it comes to psychopathology, or mental health disorders, in each gender. Daughters of alcoholics are affected by a parents alcoholism in many of the same ways that sons are. Both are at higher risk of developing alcohol abuse disorders compared to children of non-alcoholic parents. But there are some differences in how women are influenced, scientists say. Certain Behavior Problems Appear to Be Shared by Men and Women Children of both genders who have parents with a substance use disorder are at a higher risk of externalizing symptoms, negative behavior thats focused outward, resulting in disorders such as conduct disorder, antisocial personality disorder, and substance use disorders. Children of parents with a substance use disorder are also at a higher risk of internalizing symptoms, negative behavior thats focused inward. If parents have a current substance use disorder, kids are more at risk of developing both externalizing and internalizing symptoms. In the case of parents who are in recovery from substance use disorder, kids are more at risk of developing externalizing problems, but not internalizing problems. What Externalizing Means in Psychiatry Gender-Related Differences A ?Yale study  analyzing responses from 23,006 men and 17,368 women showed that daughters of alcoholic parents have more increased risks for substance use disorders and mental health disorders than sons do. The study also showed that having been raised by both biological parents and having a college degree indicated a lower frequency of both alcoholic mothers and fathers by over 50 percent and 30 percent, respectively. The Yale study found that daughters of alcoholic fathers and/or mothers have nearly a one-third greater risk of becoming alcoholics themselves than do the sons. The chances of developing bipolar mania are greater for sons of fathers with alcohol use disorders and daughters of mothers with alcohol use disorders. Daughters of alcoholic mothers have a higher chance of developing schizoid personality disorder and nicotine dependence than sons too. Women At Higher Risk for Many of the Effects of Alcohol Increased Risks for Females Having an alcoholic father puts females at a higher risk for every mental disorder with the exception of dependent personality disorder. Females with alcoholic mothers are also at a higher risk for every mental disorder except for hypomania, panic disorder, and pathological gambling. Increased Risks for Males Males in the study were shown to not have as many risks for individual mental disorders. They showed no greater risks for pathological gambling or dependent personality disorder with an alcoholic father and no greater risks for  mania, hypomania, panic disorder with agoraphobia, social phobia, pathological gambling, nicotine dependence, dependent personality disorder, or schizoid personality disorder  with an alcoholic mother. Research has shown that having an alcoholic mother significantly increases a sons risk of developing panic disorder, an illness typically diagnosed in females. How the Effects of Alcoholism Differ in Men

Saturday, May 23, 2020

Attitudes Towards Mental Illness in the Play Cosi by Louis...

The play â€Å"Cosi† by Louis Nowra is the story of a university student who is set the task of producing a play in a mental institute. The play uses many dramatic techniques including, but not limited to; the setting of the play, humour, and tension as well as role, to help draw the audience into the world of the play, the world of these ‘mental patients.’ The play also helps to bring forward people’s feelings and attitudes towards the mentally ill and people’s attitudes towards love and cheating, to further draw the audience into the world of the play, and the world of the 1970’s, when people with any kind of mental illness where treated as ‘outcasts’ and were not accepted as socially acceptable. Lewis (the main character) is in relationship†¦show more content†¦The term â€Å"Let’s hope it doesn’t rain† is used to show how damaged the theatre is. This setting is very important as it provides the audience with an understanding of exactly how the theatre would have looked. The characters in Cosi highlight the way the theatre looks, so the audience can fully understand the setting, entirely allowing the audience to become engaged throughout the entire play. Stage directions are used during the play to reveal even more of the personality of each of the characters. The extremely-confident personality of Nick is made clear in the first scene, when Nick, Lucy and Lewis first enter the darkened theatre, and Nick starts to toy with Lucy in the dark, pretending to be a ghost. Stage directions can also be used to reveal the feelings of characters. When Lucy and Nick leave, and Lewis is left with Roy, you can tell just by watching the way Lewis holds his body, and moves about the stage, he feels betrayed by Lucy, and by Nick. Stage directions are also used to reveal the humour and action on the stage during the entire performance. At the end of act one, scene two, the audience is and the rest of the patients are told by Doug that there is a fire in the bathroom, where Doug himself, had just exited. Stage directions are used to capture the madness as the characters run off of the stage trying to stop the fire, and as Cherry attacks Doug, and starts to strangle him.Show MoreRelatedCosi Essay Dale Tilley1643 Words   |  7 PagesHow Successful Has Lois Nowra Been in Challenging the Significant Ideas of Love, Fidelity, Sanity and Insanity in Cosi? In the play Cosi Louis Nowra challenges the important themes of love, fidelity, sanity and insanity within a range of dramatic techniques. Cosi is set in Melbourne, during the early 1970’s. Numerous political and radical events were occurring. The Vietnam War protest was raging, the sexual revolution was rolling, and mental illness was still misunderstood and mistreated. DueRead MoreCosi876 Words   |  4 PagesNowra’s play is set in a ‘burnt out theatre’. Discuss the importance of setting and imagery in conveying Nowra’s idea on Cosi. The setting and imagery used in Louis Nowra’s play ‘Cosi’ explore the turbulent time that took part in Australia. The play is set in a mental institution in Melbourne, in the 1970’s. Using the ominous presence of the Vietnam War, Nowra explores the insanity of the war; and the need to condemn war and to protest against Australia’s involvement in Vietnam. The main presenceRead MoreCosi Madness5345 Words   |  22 PagesMadness, love transformation Everyone goes mad in their own particular way.  Nowra thinks madness is too generalised, and it is based on each individuals past and experiences etc. At the end of the play,  Lewis is no longer afraid of madness. Lewis is thoroughly transformed by the patients. Nowra uses a mixture of laughter and madness, which is a volatile mixture. We usually see madness as dark and scary, so we can keep it in a corner and ignore it. When he adds humour to it, then we begin to

Tuesday, May 12, 2020

Opening Doors to a Health Care Financial Management Career 2019

If you are currently working in the health care industry and feel that you need to expand your horizons, both personally and professionally, you might want to consider looking into the financial management side of health care. Market trends are forcing hospitals to look at the managed care payments and be more proactive in sophisticated ways. Most healthcare managers are well trained in a clinical situation, but often lack the education and/or experience in business and finance. This training is necessary for career advancement and personal growth. Most health care settings do not provide a financial management training program, and managers may feel ill at ease with the job of trying to understand complex financial data. By not being trained, a management level employee could miss an opportunity to take action that could make a significant difference to the organizations financial success. To become educated in financial management there are workshops available which cover topics like financial and accounting concepts specifically related to the healthcare industry; managing units costs; the impact of managed care on reimbursement levels; selecting financial performance indicators; and acquiring the necessary tools to demonstrate financial management capability. .u9e20bccf028d6af5b4e19fbed18f8c6a { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u9e20bccf028d6af5b4e19fbed18f8c6a:active, .u9e20bccf028d6af5b4e19fbed18f8c6a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u9e20bccf028d6af5b4e19fbed18f8c6a { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u9e20bccf028d6af5b4e19fbed18f8c6a .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u9e20bccf028d6af5b4e19fbed18f8c6a .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .u9e20bccf028d6af5b4e19fbed18f8c6a:hover .postTitle { text-decoration: underline!important; } READ Earning a Master's Degree in Computer ScienceThere are publications like Healthcare Financial Management which is written and edited for finance professionals in hospitals and other health service organizations. This publication covers topics specific to healthcare finance, such as the following: strategic planning accounting practices leadership development management issues information systems network development legislative and regulatory issues capital finance cost management patient financial services emerging financial trends The articles in this publication are directed toward individuals responsible for all facets of the financial management of healthcare organizations. There are also several options to obtain further education applicable to the healthcare financial management field. You can continue on in your present employment and get a degree online through Jones International University, where you can obtain an MBA in Healthcare Financial management. It can all be done in the comfort of your own home, on your own time. Capella University, University of Phoenix and Colorado Technical University offer online course in healthcare management, which will give you the theory, practical application and real world case studies to let you advance in the field. .u9fa36d0dc066aa7ec0aa77bf9dc37546 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u9fa36d0dc066aa7ec0aa77bf9dc37546:active, .u9fa36d0dc066aa7ec0aa77bf9dc37546:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u9fa36d0dc066aa7ec0aa77bf9dc37546 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u9fa36d0dc066aa7ec0aa77bf9dc37546 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u9fa36d0dc066aa7ec0aa77bf9dc37546 .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .u9fa36d0dc066aa7ec0aa77bf9dc37546:hover .postTitle { text-decoration: underline!important; } READ Criminal Justice Associate Degree Online Excellent Opportunities for Women in CorrectionsAs you can see, there are several avenues available to further yourself in this important part of the health care industry. It is important to be part of the group that improves the bottom line of a hospital or health care management company, a person who is seen as innovative and on the cutting edge. Dont wait. Be that person tomorrow! Related ArticlesEarning a Masters Degree in Health AdministrationHealth Administration Degree Join the Largest Industry in the U.S.Health Care Management College DegreesInformation Technology In Health CareHealth Care Employment OpportunitiesAccelerated BSN Option Take a Leadership Position in the Field of Nursing as a Case Manager

Wednesday, May 6, 2020

Human Resource Development Free Essays

string(130) " recognized standards which offers effective and quality to customers and better guarantee of a job candidate’s competency\." Table of Content Assignment Brie Introduction2 1. 0Task 013 2. 1 Role of UK Government in training development3 2. We will write a custom essay sample on Human Resource Development or any similar topic only for you Order Now 2. 1 NVQs and competency movements in the UK4 2. 2. 2 NVQ Levels of UK5 2. 3 Contemporary trainings initiatives in Sri Lanka6 2. 3. 1 Vocational Institute of Sri Lanka6 2. 3. 2 Tertiary and Vocational Education Commission (TVEC)6 . 3. 3 National Apprentice and Industry Training Authority (NAITA)7 2. 3. 4 The Ceylon German Technical Training Institute (CGTTI)7 2. 3. 5 NVQs in UK and Sri Lanka8 3. 0. Task 039 3. 1 Training and Development9 3. 2 Identifying Employee Training Needs10 3. 3 Importance of Employee Training for the Bank10 3. 4 Factors for Training and Development11 3. 5 Importance of Evaluation11 3. 6 The Way of Evaluation Needs To Be On Going12 4. 0 Conclusion13 5. 0 Reference14 1. 0 Introduction Human Resource Development is a process and planned activities designed, such as use of training, organization, and career development efforts by an organization to improve individual, group and organizational effectiveness. The development process builds up major competencies that facilitate to execute current and future job demands and enable the organization to meet its strategic objectives. Human resource management (HRM) includes many roles and Human resource development (HRD) is just one of the functions within Human Resource Management. Functions of the HRD are Training and development, Career development and Organizational development. HRD manager’s role towards this is incorporate HRD with organizational goals and strategies while modify HRD to corporate needs and budget, Promotes HRD as a profit enhancer and employee performance enhancement. According to the theories of learning in HRD, is important to recognize how do people learn and thus there are six main theories comes under learning styles; such as behaviorism, cognitivism, social learning theory, social constructivism, multiple intelligences and brain based learning. NVQs and competency movements are established in the UK government in order to enhance occupational skills of employees. These are based on national occupational standards. Standards are statements of performance describe what capable people in a particular occupation are expected to be able to do. HRD include ways and methods of identifying training and development needs and how training contribute to achieve of business objectives and the role a training and development policy for a business organization. Evaluations on factors are significant which are important for planning a training and development. Human Resource Development is vital towards achieving company objectives and need to be aware of when training and development need to be. 1. 0 Task 01 2. 1 Role of UK Government in training development United Kingdom government is identify occupations for which skills and training required, recognizes the significance of training and provide incentives to attract and retain the employees. And discover the issues in manpower planning, development and determine that government can execute to promote training. The Department of Employment and Learning-UK This department provided wide range of training and development programmes to the people around the United Kingdom. Aim of the department is to promote learning and skills, to prepare people for work and to support the economy. Objectives are to support economic, social and personal development through high quality learning, help people into employment, research and skills training and offer good employment practices. Major activities of the department * Develop the demand and condition of learning skills, entrepreneurship, management, enterprise and leadership skills. * Maintain and increase the level of research and development, innovation and creativity in the Northern Ireland economy; * support individuals to find jobs, including self employment, and improving the relationship among employment programmes and skills development; * The development and maintenance of the framework of employment rights and responsibilities. Skills solution service offers a single point of contact for employees, departmental trained skills adviser is available to meet employee to discuss training needs and advice to accomplish his/her necessities, help progress an application, assist with applying for financial support where appropriate. 2. 2. 1 NVQs and competency movements in the UK National Vocational Qualifications (NVQs) are based on skills, knowledge and understanding of an individual possess which are related to specific area of work. Reason for the Introduction of NVQs was to address weaknesses in current systems of vocational qualifications in United Kingdom, 1986. According to the publication of the White Paper Working together, education and training, the National Council for Vocational Qualifications (NCVQ) was set up. Then NCVQ developed as a framework of NVQs which include five levels and 11 occupational areas. the government funded for NVQs are based Industry Training Organizations to develop the occupational standards , with awarding bodies developing the assessment and quality assurance arrangements to criteria set by NCVQ. In 1994 White Paper Competitiveness, a majority of employers were either using or expected to benefit from NVQs and 40,000 managers were responsible NVQs as proof of lifetime learning. And NVQs continue up to date and the content and structure of all NVQs reviewed by April 1996. These qualifications are based on national occupational standards (NOS). NOS standards are define the abilities, knowledge and understanding required for a given occupation, and identifies outcomes that can be assessed. NOS are cover almost every occupation, existing as units and form the basis of all National Vocational Qualifications. NVQs are diverse from traditional qualifications on what people can do and demonstrate at work place. Traditional qualifications are just part of the curriculum is learned and assessed. According to NVQ, everything that is specified in the qualification must be achieved and assessed, encourage and support the candidate to gain knowledge of how to do the remainder and evaluate what the candidate can do at the work place. NVQs offer benefits for individuals such as Recognition of job competencies regardless of how they were acquired Certification as having met national standards for an occupational role, improved employability and transferability a flexible route to becoming qualified. Employers can have advantages an effective way of developing staff that has internationally recognized standards which offers effective and quality to customers and better guarantee of a job candidate’s competency. You read "Human Resource Development" in category "Essay examples" For the national level, NVQs are assured workers’ skills on goods and services produced and making the country more competitive and enhances the attractiveness of the labor force to foreign investors by providing certification of occupational competence. 2. 2. 2 NVQ Levels of UK BTEC Higher National Diplomas (HND) provides greater strength and specialization, Edexcel is one of the main awarding and examining organization in the UK and right through the world. NVQs have developed for five levels of competencies, Level 01 – Entry level Foundation Skills – This level identifies capabilities of different work activities performed in a variety of perspectives. Activities are simple and especially significant supervision is needed throughout the initial steps and early months. Level 02 – skilled occupation – Identifies competence in various work activities and performed in different contexts, some of activities are complex and non – routine, some are responsibility and autonomy. Guidance is required throughout the work. Level 03 – Technician and supervisory occupations Recognizes capabilities in a broad range of complex, which are related to technical or Professional work activities execute in wide variety of contexts. The individual should be competent of self-directed application, exhibits problem solving, designing, planning and supervisory capabilities. Level 04 – technical specialist and middle management occupations This level recognizes competencies involving the application of fundamental principles and complex techniques on wide area of perspectives. Level 04 is Equivalent to diploma, First degree, Higher National Diploma and nursing or teaching qualification. Level 05 – chartered professional and senior management occupations Level identifies the ability to use of personal professional responsibility for development, designing, product growth, process, system or services. And this level recognizes technical and managerial competencies at the highest level and people who are occupied in the highest responsibility and made outstanding contribution to the promotion and practice of their occupation. This level is equivalent diploma, Master’s degree, PhD and PGC 2. 3 Contemporary trainings initiatives in Sri Lanka 2. 3. 1 Vocational Institute of Sri Lanka Under the provisions of the Vocational Training Authority of Sri Lanka Act No: 12 of 1995, Vocational Training Authority (VTA) was established in Sri Lanka which is operating under the Ministry of Youth Affairs and Skills Developments. This has 6 National Vocational Training Institutes with 22 District Vocational Training Centers and 232 Vocational training centers. VTA is implementing the skills development programs and offer skills training for rural youth according to various fields. The Exposure of training for rural youth to information technology and other areas develop their skills and entrepreneurship. Functions of the VTA as follows, * Conduct research development (RD), career * development workshops and counselling programmes, * Offer Vocational Training and coordinate with the other institutions * Arrange final assessments, trade tests, final assessments and issue NVQ certificates through the Tertiary Vocational Education(TVEC) * Organize trainer training programs in order to manage the vocational training programmes effectively and efficiently. Assist the youth who have undergone for trainings and reward supplementary trainings, place employments and for self employment. 2. 3. 2 Tertiary and Vocational Education Commission (TVEC) TVEC setup and it introduced national certification structure for the Technical and Vocational Education and Training (TVET) sector of Sri Lanka, which is called the National Vocational Qualifications (NVQ) frame work which effect from January 2005. TVEC of Sri Lanka is associated with the Skills Development Project (SDP) and funded by the Asian Deve lopment Bank. Purpose of NVQ for Sri Lankan is in order to make globally competitive workforce Industry specific, through a standardized Technical and Vocational Education system. 2. 3. 3 National Apprentice and Industry Training Authority (NAITA) Apprentice and Industrial Training Authority of Sri Lanka (NAITA) was established in 1971 by an Act of Parliament. The functions of the organization towards people provide distance education, Curriculum Development, Monitoring Progress Instruction offer distance Education, Trade Testing and Certification. NAITA focus on small, medium and large scale enterprises and conduct island wide training programmes . Assistant is gained from the United Nations Development Programme and International Labor Organization. 2. 3. 4 The Ceylon German Technical Training Institute (CGTTI) This is incorporated as a separate training body by an act of parliament, established in 1959 and integrated to Develop modern Technology Training Centre (MTTC) at the CGTTI to meet future industry requirements. CGTTI providing training on technology related to Automobile and other technical trades and to be properly prepared to perform at the highest level of acceptance in the field maintains the standard. . 3. 5 NVQs in UK and Sri Lanka Sri Lankan Main objectives for setting NVQ are to recognize locally and internationally, create an internationally competitive workforce in Sri Lanka, match and provide Vocational training/ skills with market demand and recognize the certificates those possessed through the NVQ system. NVQ Sri Lanka is aligned with More proactive training, National goals, aware of responsiveness to Ind ustry training needs, enhance of linkage with Industry and other stakeholders and Collaboration and rationalization among the training agencies. The Sri Lankan NVQ framework comprised of 7 levels of upward mobility UK government is providing Education Maintenance Allowances, Undergraduate, Postgraduate courses and supporting the career and development aspirations of learners. ABC PLC can use of Edexcel NVQs. In the UK Edexcel NVQs determine for a huge variety of careers and Commitment to excellent customer service, Edexcel NVQ external verifiers also provides support, advice and guidance to Edexcel-approved centres. NVQs programs are provide an opportunity to ABC Plc enhance and overcome the problems occurred in performance. Conduct research development, Offer Vocational Training and coordinate with the other institutions, Assist the youth who have undergone for trainings and reward supplementary trainings , And this facilitate to ABC Plc forecast that will achieve business benefits. According to the NVQs ABC Plc reduce waste and improve its productivity therefore company can be expected their rate through business improvement techniques in NVQs. UK based NVQ programmes provides significant benefits for employer as well as employee. 3. 0. Task 03 Commercial Bank of Sri Lanka is known as benchmark private sector bank in Sri Lanka. Over decades the bank has created its own identity with the clear vision, set standards and unique trend in banking sector. 3. 1 Training and Development Commercial Bank is providing training and development programmes to its employees and objectives for training are in order to better performance, economical reduce wastage and improve quality of the service, motivation and lesser staff turnover. Bank is using ADDIE model as systematic approach to training and development. Functions of TD in the bank are, designing and developing programmes after identifying training necessities and developing a comprehensive training programme. Train the trainer programme, Outbound training activity, Credit Programme, Junior Executive Officer Programme, Behavior Modification. And also managing and conducting training in technical and soft skills, facilitating the management of overseas training and Publication of official newsletter ‘Compulse’. The bank has identified Advantages of training development as follows, better performance of employees usually shows a greater increase in and a higher quality of work out put than the untrained group. And when the employees are given proper training, supervision responsibility is lesser as well as increases the self-esteem and confidence is increased. Trained personnel will be able to make better and economical use of materials and equipment and service will be quality. Staff is motivated and feels sense of recognition when they sent on training. TD have a favorable impact on staff turnover lesser staff turnover due to better training. TD has drawback as well such as Information and learning areas might change day by day, therefore need to do the training all over again and this may waste the time and money. Diverse learning and training styles for those being trained can cause to be bored due to too basic or it may cause some to be frustrated because complicated. Some employees may leave the company after the training and this would be waiting of time and money of the organization. Time allocation might be not sufficient for covering all the training areas therefore some important tasks may neglected. Sometime losing control of the training content and the wrong person might do the training without knowing the mmanagement. 3. Identifying Employee Training Needs Identifying the people who need the training and requirements is vital for each and every organization to reduce wasting money and time. Commercial Bank HRD division is usually conducting a job task analysis of the employee in order to recognize the people who require trainings. It’s important to know exactly what the prospects are for the job to provide effective training. Identify the discrepancies and areas need to impr ove by comparing employee performance to the job expectations and by performance appraisals. HRD Managers recognize the reason for the discrepancy those are may be due to personnel issues, work process issues, such as not knowing how to complete a specific task, or ignorance of the specific task. Work process issues can be identify by employee training, while personnel issues can be addressed by an employee review process. Schedule departmental meetings with all employees and discuss and ask them to raise and make list of suggestions that which areas they consider to be more training is needed. Evaluate legal requirements such as health and safety training. Bank is get feedback from customers of the bank, such using interviews or surveys in areas such as customer satisfaction. And also use tests such as computer base, trials and observations. 3. 3 Importance of Employee Training for the Bank Employee training contributes to the achievement of business Objectives of the bank. Employee training increases the stability and flexibility of the bank and best available methods of performing the work can be standardized and made available to all employees. They are decrease wastages of resources and work both efficiently and effectively towards bank’s targets. Trained employees will be able to better use of materials and equipments whilst improving the quality of the service. Such as providing IT training to the prospective employees may cause to achieve more targets and make Bank profitable and can work adapt to the changing technology. Better training enables the organization to face competition from the other banks. Trained people decreased workplace stress and increased employee effectiveness which leads to satisfaction for the customer of the bank and keep up Bank’s image around the world. 3. 4 Factors for Training and Development According to the Commercial Bank training and development planning, one key aspect is to consider is each employee’s abilities which means should match the abilities of the employee suitable to corresponding training programme otherwise there will be a problem. For an instance bank is sending an employee to an accounting course , be competent of doing the accounting and HRD manager should ensure he/she good at accounting and numbers. Cost incurred for T D process is very much considerable factor; management should be aware of minimize wastages and conduct the process. Time is another aspect which is specially significant for the Bank, saving time and money will gain profits. Techniques are another factor for planning the training and development process. Bank is exercise diverse methods to address the employees. Most of the time HRD department is using presentations, role plays, speeches, and using internal and expertise. Bank is also considered about number of trainees going to be train, culture of the bank and attitude among the employees. 3. 5 Importance of Evaluation TD process is comes under specific objectives of the bank and spent ore money and time on analyzing, designing, development and implementation process, therefore it’s important to ensure training is successful or not. The response of the trainees can be acquired through questionnaires, smile sheets. To assess the amount of learning, Bank considers using of pre tests and the post tests. Tests determine how far people have developed skills, knowledge and attitudes. There eval uating the effectiveness of the provided training. Such as observations, interviews, self diaries. Evaluation can be carried out at the end of the training and can be compared with the objectives of the training and outcomes. Finally evaluation determines week points of training programme and in future such things can be taken care of and at the last it helps to discover whether organizational benefits has yielded. 3. 6 The Way of Evaluation Needs To Be On Going Evaluation process includes according to the ADDIE model, Analysis, Design, Development, Implementation and Evaluation. According to the analysis process identifying training needs, assess the learner’s existing capabilities, identify the audience and their characteristics are crucial to make training programmes. Recognize the training materials will develop and make budgets and time frame for the programme. Training requirements and needs for the staff can be identified as the difference between estimated level of performance and definite level of performance. Training areas can be recognized through the performance appraisals and tests. Next step is design, according to this, design materials and plan the strategy to be used for the training programme. This may also include design of a class or demonstration, depending on how the programme will be delivered. The development phase involves development of training programme. And gather the training programme, all associated materials necessary for a successful training programme, in this phase is testing and clear up procedures. During the process of implementation a procedure for training the facilitator and the learner is developed and delivered, conduct the trainer training programmes, installation of training modules, activating modules and establishing logins. At the end of the training it should be evaluated; questionnaires can be use in the training programme in every week or month and tests , observations, evaluation forms can be use for one day training ctivities. And it’s important to assess the training effectiveness, enhance initiatives and programmes. 4. 0 Conclusion Human Resource Development module reviewed and analyzed the framework influencing the role of government in training and development and the growing emphasis on continuous development and lifelong and constant development. Evaluated on NVQs, MCI and competency movement in the selected organization. Module is examined modern-day training initiatives introduced by the Sri Lankan Government and compared with the Government of UK. According to Task two, explore the differentiated theories of learning and explained their contribution to the process of planning and designing of organizational learning events. Tasks three critically evaluated and explained current approaches of the training and development of the organization and discussed about drawbacks. Explained how training contributes to attain company objectives and the role of a training and development policy, importance of evaluating factors of planning, training and development. Discussed the importance of evaluation and how it helps to market the contribution of training and development to the organization. The knowledge and experience enhanced throughout the Human Resource Development module and learnt how it’s important in the organization for achieve business objectives. 5. 0 Reference * Wikipedia (2012) ‘human resource development’ human resource development. [accessed 22 May 2012], available at http://en. wikipedia. org/wiki/Human_resource_development. * Hotel mule (2012) ‘the key role of training and development in tourism and hospitality’ Understanding the context: national level responses to training. [accessed 25 May 2012], available at http://hotelmule. com/showthread. php? 49-the-key-role-of-training-and-development-in-tourism-and-hospitality. * Pearson Education Ltd (2012) ‘NVQ and competence-based qualifications (QCF)’ qualification [accessed 28 May 2012], available at http://www. edexcel. com/quals/NVQ-competence-based-qcf/Pages/What-are-NVQs. aspx. * Department for Employment and Learning (2010) ‘About the Departmentâ₠¬â„¢home. [accessed 28 May 2012], available at http://www. delni. gov. uk/index/about-the-dept. htm. * TVE Council (2003 – 2009) ‘how NVQs differ from other certifications’ home. [accessed 29 May 2012] available at http://www. tvetcouncil. com. bb/compare. tml. * Vocational Training Authority Sri Lanka (2011) ‘about us’ Overview [accessed 29 May 2012] available at http://www. vta. lk/index. php? option=com_contentview=articleid=55:overviewcatid=36:about-usItemid=28. * Commercial Bank of Ceylon PLC (2012) ‘Our Training Programme’ Careers. [accessed 29 May 2012], available at http://www. combank. lk/newweb/info/105? oid=57. * e how money(2012) ‘Instructions Identify Employee Training Needs ‘how to identify employee training needs. [accessed 29 May 2012], available at http://www. ehow. com/how_2076444_identify-employee-training-needs. html. How to cite Human Resource Development, Essay examples

Saturday, May 2, 2020

Dramatic section Essay Example For Students

Dramatic section Essay Perhaps one of the most dramatic sections in the play is the last one, where all the tension that has built up throughout the play is finally released in a terrible climax.  So far in the story, Rodolpho (an illegal immigrant from Sicily, staying in Eddies house) has taken Eddies daughter, Catherine, from him (Eddies view), and is going to marry her. Eddie is against this, as he thinks that Rodolpho isnt right, and just wants to marry her to become an American citizen (and also the feeling we have throughout the play that Eddie loves Catherine in more ways than just fatherly love). He has vented out his anger on Rodolpho physically, and, seeing that it didnt work, went against the rules of the neighbourhood, and phoned the immigration bureau to take him away. This has had two effects; firstly, to make Eddie totally alienated from the rest of the community, alone with no one to turn to (which, in a man like Eddie, could have disastrous effects), and secondly, make Marco (Rodolphos immigrant brother, whos family is relying on his income to survive, and who is also being deported) want to kill him.  The end section starts off in the reception room of a prison. In the scene are: Marco, Rodolpho, Catherine and Alfieri. Marco has been imprisoned, and has no chance of being freed. Rodolpho though is going to marry Catherine, and become an American. The only way Marco can go and see the wedding is if Alfieri bails him out, which he will only do if Marco agrees not to go and attack Eddie. The section begins with something that puts a doubt on Rodolphos sincerity, Well-we did something The fact that Marco looks at him is very significant, as a lot of information can be conveyed with a look. Then the way in which they clasp hands reminds us of the sealing of a pact. This is only speculation, but they could have come to America with the intention of tricking a girl to marry Rodolpho so he could become an American citizen. This is entirely possible, as throughout the play we have heard evidence from Eddie suggesting this, and for a lot of it, he persuaded us. It is only towards the end that we start to trust Rodolpho, and there is still some doubt. This gesture makes us question his motives again. It also makes us question Marco, who throughout the play, we have considered to be honest. If it turns out he isnt, then its even more likely hell go against Eddie. We also see that if the American law wont help him, hes ready to take the law into his own hands, when he queried, There is no law for that?(He is referring to snitching on Marco, and, because of it, depriving his children of food). He is obviously shocked that there is no law, and is still thinking in the Sicilian way, where law and justice were almost the same thing. In his mind, Eddie should be punished, but the American judicial system says otherwise. This brings us back to something he said before, In my country he would be dead by now. If he cant get justice from the law, then he will have to make his own. This starts the build-up of tension, as we believe we can uses what will happen next. Then, just in case we were in any doubt, he tries to get out of promising not to harm Eddie, What do you say to me? : All right. : You wont touch him. This is your promise. Maybe he wants to apologize to me. . When asked for the first time, Marco lowers his eyes. He is avoiding eye contact; something you do when youre not being entirely honest, as your eyes can easily give you away. .ud98766a05a040458dfa26fd3a557ad31 , .ud98766a05a040458dfa26fd3a557ad31 .postImageUrl , .ud98766a05a040458dfa26fd3a557ad31 .centered-text-area { min-height: 80px; position: relative; } .ud98766a05a040458dfa26fd3a557ad31 , .ud98766a05a040458dfa26fd3a557ad31:hover , .ud98766a05a040458dfa26fd3a557ad31:visited , .ud98766a05a040458dfa26fd3a557ad31:active { border:0!important; } .ud98766a05a040458dfa26fd3a557ad31 .clearfix:after { content: ""; display: table; clear: both; } .ud98766a05a040458dfa26fd3a557ad31 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ud98766a05a040458dfa26fd3a557ad31:active , .ud98766a05a040458dfa26fd3a557ad31:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ud98766a05a040458dfa26fd3a557ad31 .centered-text-area { width: 100%; position: relative ; } .ud98766a05a040458dfa26fd3a557ad31 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ud98766a05a040458dfa26fd3a557ad31 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ud98766a05a040458dfa26fd3a557ad31 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ud98766a05a040458dfa26fd3a557ad31:hover .ctaButton { background-color: #34495E!important; } .ud98766a05a040458dfa26fd3a557ad31 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ud98766a05a040458dfa26fd3a557ad31 .ud98766a05a040458dfa26fd3a557ad31-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ud98766a05a040458dfa26fd3a557ad31:after { content: ""; display: block; clear: both; } READ: Shakespeare's presentation of Shylock in the Merchant of Venice EssayIt also seems as though for him, not taking revenge would be morally wrong (It almost seems hes ashamed). When hes asked for a second time, he doesnt even answer the question (notice the slight pause; A possible sign of him trying to think about how to get out of the situation). When he finally agrees, he stares away, as though what he just did was something extremely shameful. His body language gives him away, he doesnt persuade Alfieri, and he certainly doesnt persuade the audience. To add even more to the anticipation of whats to come, Alfieri himself seems unsure of what Marco will do, Only God Marco First of all, there is his final, parting comment. He is reminding Marco that only God makes justice, and the fact that he has to repeat himself shows that he is not confident that Marco will stick to his promise. Then theres the way in which he leaves the stage. The words processional tread remind us of a funeral; an omen of whats to come. Then the scene changes. We are with Eddie, who has obviously upset and distracted, verging on mad, As seen earlier on in the play, Eddie rocks when he is in a particularly unstable mental state, and last time, he hit Rodolpho just afterwards. This already tells the audience that something bads going to happen, but thats not all; theres also the way in which he rocks. The word surges suggests that every so often, he pushes quite hard, venting his anger. It shows how furious he is inside, but he doesnt know how to let it out without resorting to violence, which also helps build tension with the audience. Beatrice knows how mad he is, . The word fear tells us that we should watch out, as she probably isnt afraid for nothing. She knows him really well, and if shes afraid, it means hes going to do something.

Tuesday, March 24, 2020

Human Resource Perspectivescase Study Report Essay Example

Human Resource Perspectivescase Study Report Essay Under the situational factors with laws and societal values, Terry’s work habits have to be looked from different areas of law (Kramar et al. 2011, 8-9). It depends on whether the company when employing Terry had a workplace agreement or a contract between the two parties. In this case if there were no workplace agreement the countries statuary law comes into place. Annett’s concerns over Terry are justified because it was within Annett’s knowledge that Terry was working long hours. Whether Terry’s work habits were a disaster waiting to happen is not something which can conclusively be argued. This depends on other relevant factors like his partner’s views in relation to marriage and his psychical stamina. At forty years of age, he should be capable of still doing such work. The dangers of what might happen to Terry could risk the company’s liability. The dangers are that since Terry’s extra work was acknowledged by the company. Warnings should have being given to him written or otherwise. According to HRM policy choices, work systems (Kramar et al. 2011, 8-9) 0. 2Annett’s concerns We will write a custom essay sample on Human Resource Perspectivescase Study Report specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Human Resource Perspectivescase Study Report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Human Resource Perspectivescase Study Report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Annett’s concerns are related to his health and wellbeing. However the fact that most people felt obliged to work with Terry’s example seems to be a danger to the company as there are laws in place. The fact that he never insisted people work long hours shows that Terry knew his limits. That fact Annette has met Terry only a few times seems to be disturbing. This is because when such a situation has risen, Annette should concern herself more with Terry’s work style and addressed the situation by discussing with Terry about his workaholic lifestyle. Leading towards Long term consequences, individual wellbeing (Kramar et al. 011, 8-9) 0. 3Disaster waiting to happen As much as we are not aware of Terry’s health and his relationship in marriage with his partner. These matters have to be addressed by Annett. Into this question we have to take into consideration other factors whether Terry had the ability in his job to take work home. If this ranger in computer work which could be taken home, this would surely affect his marriage as less attention would be paid to his partner. 0. 4Tangible benefits According to the Harvard model this comes under HRM policy choices that include employee influences and reward systems (Kramar et al. 011, 8-9). The company which Terry works for obviously got tangible benefits. This is to be seen by the promotion he got and also a reward for the extra duties he did. Furthermore he was an example to others. This was acknowledged by Annett. The fact that Annett did not see him often and only saw him on few occasions shows that he was capable of doing his duties without supervision. Therefore this in itself is a great asset to the company. This leads to an employee relations issue, as this is a big advantage for the company. Therefore they could argue that the directors are responsible for not putting more safety measures in place to protect the employees over committing themselves to their duties, as a result the company could suffer the consequences. Long term consequences, organizational effectiveness and social wellbeing. (Kramar et al. 2011, 8-9) For the company’s benefits such issues could be prevented. 0. 4. 1Ways of communicating OHS There are different ways to communicate OHS to staff in the establishment/company Some of these are: * Through staff meetings on a regular basis. Through coaching sessions and demonstrations. * Through posters/memos that are placed on bulletins. * Through inductions/orientation of new staff. * Through briefing before work commence. * Written policies, procedures and documents used by staff while carrying out their work. Occupational health and safety communications Purpose: To establish guidelines for effective safety communications at the establishment Object ive: To create workplace environment where the free flow of safety information is promoted and utilized Standards: The establishment shall have regular safety meetings formatted to the needs of management and staff Safety communication meetings may take the form of: * Formalized safety committees * Department, crew/shift meetings * Toolbox safety meetings * And other appropriate site effective methods All safety communication meetings shall be recorded and a formalized process of feedback on corrective outstanding items shall be established. (Marie 2012) Safety information shall be strategically located throughout the establishment as a point of focus for safety communication. Feedback obtained Obtaining feedback from staff is very important. It will help in improving the purpose of our OHS guide for everyone’s benefit. We can obtain feedback from staff through: * Feedback Survey; * OHS questionnaires; * Staff opinions and concerns 0. 5Risks When taking risks into account, there could be specific laws in relation to the workplace. A guideline could have been made with reference to commonsense with regard to Terry’s marriage and health issues. It could have been focused not only for Terry but also for those workers in the company who were working under him. Taking him as an example they should not be made to feel that they should be performing to such an extent as to abuse their family life and as well as their health be risked. Directions or seminars should have been made to make sure that the employees understood to what extent their duties were. 0. 6Exploitation If the company did not make direction or seminars as explained before, then they would have being guilty of exploitation of Terry and the workers working under him. This could have left the company open to litigation and would have cost this company a lot of money. One of the company’s differences could have been that the type of work undertaken by Terry in this particular area was not confined for an eight hour job. He could have worked overtime at home on the computer and also worked with the contractors in the area of advertising. However the company would have noticed that they got vast amounts of benefits by Terry working for sixty hours a week. According to the fair work commission Australia, The ordinary hours of work are to be an average of 38 per week, an employee will not be required to work more than 10 ordinary hours per day and the ordinary hours of an employee must not exceed 152 hours in 28 consecutive days. (Australia. Fair Work Commission 2010) Written direction should have been made or they should have had placards placed in the workplace. Of cause different companies have different methods of approaching this and making these directions to its workers. Some companies do this by making workers sign a book which contains the directions and some company’s display posters showing health and safety requires depicting the dangers. But it is for the company to make sure that the worker should adhere to the country’s law and health and safety procedures. Rogier 2011) 0. 7Adverse Events Adverse events of such behavior by Terry could be legal or moral. Legal matters could only be concluded in the court of law. There would be arguments by both sides which could result in an expense which could be detrimental to the company’s profits. The moral obligation is responsibility for another human beings life extends more in the field of duty of care more than a legal requirement. The company should have made special effort to protect Terry’s health and marriage as he is an asset to the establishment. His continuation as a selfless worker should have been appreciated more by the company and Annette should have met him more than a few times by Annett as mentioned to bring about a more safe work environment for Terry. It is immoral for a company to make substantially profit with this regard with the workers development and risks attached to it. This could come from the situational factors under business strategy and conditions and also from laws and societal values (Kramar et al. 2011, 8-9) 0. 8Annett’s Requirements Annette of coarse had been recently appointed as the HR manager for the publishing company. As such we have to look into her job description whether she was aware that her negligence is not notifying Terry of his continuous and overtime work could have led to a disaster in his life. It would have been her role to establish healthy work hours for Terry. Annette should have initiated more meetings with Terry and analyzed why Terry’s workaholism was taking place. Annette should have found out the psychological reasons why he was behaving in such a way. Whether it was due to any reasons of Terry’s pasts or whether it was his insecurity or whether it was his need for more money and made Terry was available to do so, Annette should have directed Terry to a counseling session to stop such behavioral patterns. In this case the counseling sessions would have brought the answers which Annette needed. Annette should have made a report to the CEO of the company giving the advantaged of having Terry working such hours and the dangers it could bring to the company. (Killinger 2012) Then it would have being the duty of HR or it would have been their responsibility to make the decisions and Terry’s orking hours could not have limited to an eight hour job. Terry would have had communicating time and worked from home from his computer in the area of modern advertising. Therefore Annette could not be aware of how many hours for example he could have spend some time out of the work place making calls, socializing, publishing websites, travelling outside office hours. As such there was no possibility for Annette physically to stop Terry from working outside office. In such a case Annette could ask terry to keep a log book to keep records of hours he worked outside work. That way from time to time Terry could have made written requests for Terry to warn him if he exceeds his working hours. This would come under Stakeholders interests through management and shareholders (Kramar et al. 2011, 8-9) Annette’s concerns for rewarding such work habits that were dangerous to Terry is correct. Although the CEO thought of rewarding Terry should have also considered any dangers associated with that type of work. Annette should have being clear to appreciate hard work but at the same time not going to an extreme of not warning him of the dangers as the CEO seems to think. . 9References Chicago style referencing Kramar, R. , Bartram, T. , De Cieri, H. , Noe, R. A. , Hollenbeck, J. R. , Gerhart, B. amp; Wright, P. M. 2011. Human Resource Management: Strategy, People, Performance. 4ed. McGraw-Hill Australia Wood J, Zeffane R, Fromholtz M, Wiesner R, Creed A, Schermerhorn J, Hunt J, and Osborn R. 2010. Organisational Behaviour: Core Concepts and Applications. Second Australasian Edition. Milton, Queensland: John Wiley and Sons, Australia Ltd. Marie-Claire Ross  , 2012. 10 Ways to Improve your Workplace Safety Communication http://www. digicast. com. au/blog/? Tag=communicating%20OHS%20messages Harvard Business Review. 1993. The Articulate Executive: Orchestrating Effective Communication. Harvard Business School Press. FairWorkCommission2010http://www. fwc. gov. au/documents/modern_awards/award/ma000041/default. htm Barbara Killinger, The Workaholics2012Understanding the Dynamics of Workaholism—Obsession http://www. psychologytoday. com/blog/the-workaholics/201202/understanding-the-dynamics-workaholism-obsession Kumar, R. ,and B. Murck. 1992. On Common Ground: Managing Human Planet relationships. Toronto: John Wiley amp; Sons. Ramirez, R. 999. Stakeholder Analysis and Conflict Management. In Buckles, D. Ed. Cultivating Peace: Conflict and Collaboration in Natural Resource Management. Canada, International Development Research Centre and World Bank. Ottawa, Ontario, Canada. Rhodes, Kent. 2004. The importance of understanding organizational culture in mergers and acquisitions. http://gbr. pepperdine. edu/2010/08/merger-and-acquisition -strategies/ Rogier, M. 2011. How to Improve Organizational Communication. http://www. ehow. com/how_5679049_improve-organizational-communication. html. Teh, E. C. , and A. Girardi. 2010. Human resources and Organisation Development: Practice manual, readings and cases. 3rd ed. Cengage Learning. Victoria. Waddel, Dianne M, Thomas G Cummings, Christopher G Worley. 2007. Organisational Development and Change. Asia Pacific 3rd edition. Australia:Cengage Learning Australia. Waltman, J. L. 2011. Communication. http://www. referenceforbusiness. com/management/Bun-Comp/Communication. html Wood J, Zeffane R, Fromholtz M, Wiesner R, Schermerhorn J, Hunt J and Osborn R. 2010. Organisational Behaviour: Core Concepts and Applications. 2nd ed. Milton, Queensland: John Wiley and Sons.

Friday, March 6, 2020

Multidimensional Framework Essays

Multidimensional Framework Essays Multidimensional Framework Paper Multidimensional Framework Paper The multidimensional frame work is used to focus on the bio-psycho-social context of human development, and introduces social workers perspective on human behavior and the influences from the social environment. The application and utilization of the multidimensional framework is to direct the procedure of assessment, intervention and evaluation for the generalist social work process. This framework also shows the relationships between life-span concern and the understanding of person-environment transactions and use of the generalist social work method with individuals, families, groups, organizations, communities, culture and society are all areas of study. Throughout this paper, I will be demonstrating my assessment skill using the multidimensional framework and the micro theory related to human growth, development and change during my childhood. In gaining understanding about my biophysical structure, I have realized that the biophysical helps to describe my structure and how it affects my human behavior. It is to my knowledge that my physical structure is within a healthy, functional and in great shape due to my healthy eating habits and regular exercise. These principles have been handed to me during my childhood by my mother and most of my extended family. I was raised in a Christian home and beliefs of healthy eating and natural remedies for the body. I am aware of my families’ medical history with arthritis and how it may affect me in the future. I am also aware of the ways that I can avoid this health condition from happening to me.

Tuesday, February 18, 2020

Corporate social responsibility Case Study Example | Topics and Well Written Essays - 1250 words

Corporate social responsibility - Case Study Example Socially responsible behavior is directly related to financial performance and this is evident in many recent cases. Being socially responsible places certain demands on a company but this generally 'pays off' for a company as well as for the stakeholders and the society. At the same time, concern about CSR issues could also be a PR fashion in the market. Businesses face certain challenges when they are under pressure to adopt CSR. Through certain examples this paper would compare and contrast demands placed on a business that seeks to adopt practices reflecting Corporate Social Responsibility (CSR) with those placed on a business that does not adopt this standard. There is no legislation that imposes that CSR issues have to be addressed and if a company does not live up to the social standards, there is no law that prevents others from doing business with that company. Economist Milton Friedman states that, "The business of business is to maximise profits, to earn a good return on capital invested and to be a good corporate citizen obeying the law - no more and no less". Such neo-classical economic thinking leaves no place for CSR expenditures which in any case decreases profits, contends Robins (2008). The collective good lies in maximizing profits and leaving it at that. Managers too find the demands of CSR enthusiasts vague and difficult to accomplish. Public CSR claims do not reflect in the activities and functioning of the corporations like in the case of Wal-Mart and Coca-Cola. Wal-Mart ranks fourth in terms of social responsibility in terms of its dealings with its stakeholders but there were 4851 claims filed against it in the court (Papasolomou-Doukakis, Krambia-Kapardis & Katsioloudes, 2005). Wal-Mart claims to hold down inflation in the US (Fishman, 2003), create jobs, and has customer-centered strategy as their prices are unbeatable, but they ultimately squeeze the vendors and under-pay the staff (Heyer, 2005) with the ultimate goal of maximizing shareholder wealth. They even have an efficient supply chain and source their products from developing countries and claim to be a part of their growth. Nevertheless, employee wages at Wal-Mart are as much as 31% lower than competitors (Nester, 2006). It pays practically no benefits and very often employees have to work overtime without any additional compensation. Coca-Cola too makes tall claims that by being more efficient and more profitable, it makes businesses better for the community (Ash, 2004) but findings reveal otherwise. The lists of accusations against Coke are lengthy. They have committed as many as 179 major Human Rights violations (Cairns, 2005). Since stakeholder perception is critical to the survival of the firm, some firms try to just enhance their image by attempting to be minimizing the impact on environment. This is known as greenwashing and Coca-Cola undertook this venture only as a PR venture. To discern between the actual performance and greenwashing ratings firms like Kinder, Lydenberg, Domini Research & Analytics (KLD) grade the firms on various categories of CSR (Chatterji, Levine & Toffel, 2007). Such ratings have gained importance because investors make their decision based on such ratings. The damage to Coca-Cola's brand and image was to such an extent that KLD dropped the company from its Broad Market Social Index in July 2006. Because of this,

Tuesday, February 4, 2020

Gentrifying San Francisco Research Paper Example | Topics and Well Written Essays - 750 words

Gentrifying San Francisco - Research Paper Example This involves poor residents being displaced by wealthy and resourceful people (Corbyn 1). Communities that experience gentrification are characterized by an increase in average income and a decrease in the average size of a family. Gentrification has the potential to affect the gay community in San Francisco through the displacement of people, economic shifts and social changes. One of the main challenges that the gay community in San Francisco, California is facing is gentrification. Gay leaders in influential gay neighborhoods such as Castro fear that these regions are quickly losing their identities. According to Associated Press (2007), these regions are being populated by heterosexual couples. An influx of heterosexual couples in these regions can be attributed to the forces of gentrification (Associated Press 1). Gay neighborhoods are increasingly becoming attractive to investors and developers. The gentrification debate is based on discussions around the uprooting of minority and poor individuals and families. These people are uprooted from their communities by government policies or developers. Different approaches or theories have been used to explain the cause of gentrification in San Francisco. There are five crucial factors that have been attributed to this trend. These are social-cultural, demographic-ecological, social movements, political-economic and community networks. In the case of demographic-ecological, gentrification has been attributed to demographic factors such as environment, social organization, population and technology. This approach explains the explosive increase in population of people aged between 25 and 35 years in the 1970s (Associated Press 1). As a result of this increase in population, demand for housing and amenities also increased. The second approach that is used to explain gentrification is the social-cultural approach. This approach expl ains gentrification based on sentiments, values, beliefs, ideas and

Sunday, January 26, 2020

Development of Preschool Children

Development of Preschool Children 3 and 4-year-old children are often referred to as preschoolers. Preschool children want to become more independent and do things for themselves. They are enthusiastic about learning and acquire their knowledge through experiences and playing. Their motor, social, emotional, cognitive, and language skills all developing, as they try to gain inner control. Preschoolers want to establish themselves as individuals and can more easily express their needs since they have a greater grasp of language. The preschoolers body is continuing to lose baby fat and gain muscle. Their arms and legs are becoming more slender and their upper body more narrow and tapered. Some children grow taller so much more quickly than they gain weight and muscle, that they may begin to look somewhat skinny and fragile. This doesnt mean that they are unhealthy or that anything is wrong; some children just fill out gradually as their muscles develop. Most preschoolers grow about 2 to 3 inches in height and gain about 5 pounds each year. Also boys tend to be slightly larger than girls (Berk, 2008). A childs face also will mature during this time. The length of their skull will increase a little, and the lower jaw becomes more pronounced. At the same time, the upper jaw will widen to make room for their permanent teeth. Because of this growth, their face actually will become larger and their features appear more distinct. Children are playful by nature. Their earliest experiences of exploring with their senses lead them to play, by themselves at first and then eventually with others. Usually between 4 and 5 years old, preschoolers discover that they share similar interests and seek out kids who are like themselves. They discuss, negotiate and come up with ways to create elaborate play scenes; take turns; and work together toward mutual goals. Childrens play can be divided into 4 categories, some of which overlap. Dramatic play is fantasy-directed play like dressing up in costumes, pretending to be different characters, using toys to represent characters in stories, and creating imaginary settings. Some examples of manipulative play are using small toys like blocks or Legos to build objects, putting together puzzles, and making bead necklaces. Physical play uses the whole body in activities with bikes, balls, jump ropes, hoops, and play structures. In creative play children use art materials such as paint, clay, markers, pencils, glue, etc. Preschoolers improve their mobility skills through a variety of motor activities involving the entire body. Gross-motor development includes locomotor dexterity, which requires balance and movement, and upper-body and arm skills. Examples of locomotor skills are jumping, hopping, running, and climbing. Toddlers can climb up one step at a time, but preschoolers can use alternating feet to climb stairs. Most preschoolers progress from riding a tricycle to a bicycle, and some older preschoolers are able to roller-skate. Two basic upper-body and arm skills developed during the preschool years are throwing and catching a ball. Preschool children gain more precision in fine-motor development between 3 and 5 years old. They attain more control of finger movement, which lets them become capable of using small materials that require grasping and control. According to the National network for child care some milestones in gross and motor skills in preschoolers include hopping on one foot, galloping, beginning to skip, pumping themselves on a swing, zipping, snapping and unbuttoning, cutting, lacing and making representational pictures like house, people or flowers (Malley, 1991). During the preschool years children are in the preoperational stage. Throughout this stage children think in terms of concrete materials, believe that everyone thinks as they think, are perceptually bound and make judgments based primarily on how things look (Morrison, 2009). In the preoperational stage, children are very heavily influenced by their perceptions and do not fully grasp the concept of conversation. Children who have trouble with conservation have trouble understanding that the quantity of something can stay the same regardless of physical transformations. One example of this is if a child is shown 2 identical cups filled with the same amount of beans, and then you pour the beans into 2 different size cups, a child will think that one cup has more beans, not understanding that the same number of beans is in each cup. Another characteristic of the preoperational stage is egocentrism, which is the failure to distinguish the symbolic viewpoints of others from ones own (Berk, 2008 pg325). Children also have trouble with logic and abstract thinking during this stage, because so much of their knowledge is based on their perception. Being in the preoperational stage comes with some key changes in thinking and cognitive development. In addition to acquiring language, children also start to discover fantasy and imagination. With developing language skills comes the awareness of that something can be represented even though it is not seen. For example, the word balloon describes a balloon, just like the image of a balloon does, even if the balloon itself isnt actually visible. Children also start to use their imagination by pretending that objects are other things, transforming sticks into swords, big boxes into houses, and dirt into a racetrack. Preschoolers sometimes have imaginary friends. They have a tendency to brag and can be bossy towards their peers. They have a desire to feel important and worthwhile. At times they can be aggressive but enjoy being with other children and want to make friends. They like to pretend to be important adults such as a teacher, parent, doctor, shop owner or police officer. They want and seek out praise for their achievements. Social experience, along with cognitive development, contributes to gains in emotional understanding (Berk, 2008 pg 370).Emotional understanding is a childs ability to express his or her emotions appropriately, to correctly understand other peoples emotions, and to understand the outcomes of certain emotions. Children with high levels of emotional understanding can cope with their own or other peoples emotions in a way that creates positive social interactions. Preschoolers usually start to develop self-conscious emotions as they start evaluating themselves, instead of simply reacting to peers or adults evaluations. For example, a toddler may be perfectly happy coloring all over themselves from head to toe with markers, but wont experience guilt or shame until someone expresses their displeasure at the situation. A preschooler may still enjoy drawing on themselves, but as soon as they see a parent coming, shame and guilt may surface as a result of considering their appearance. A chil d may also now experience a sense of pride when Mom or Dad says, You did a great job cleaning up your mess. Preschool is a time when children start to develop friendships with their peers and this is essential for positive social and emotional development. Preschoolers think of a friend as someone they have fun with and are willing to share their belongings with. Preschoolers give twice as much reinforcement-greeting praise and compliance-to children they identify as friendsà ¢Ã¢â€š ¬Ã‚ ¦they are more cooperative and emotionally expressive-talking, laughing, and looking at each other more than nonfriends do(Berk, 2008 pg 376).While preschoolers understand the uniqueness of friendship their concept of it is still immature. They can be best friends with a peer one day and not like them at all the next. Parents can influence their childs early peer relationships both directly and indirectly, by giving their child more frequent social experiences, discouraging teasing, being emotionally positive and demonstrating cooperative play. Social experiences are critical in the development of a preschoolers moral understanding. Disagreements with siblings or peers over toys, taking turns or ideas give children their first concepts of fairness and justice. Children also learn by observing how their parents react when then have broken a rule and the way they talk about moral issues. Children who are advanced in moral understanding usually have parents who can adapt the way they communicate with their child about honesty, arguments and sharing in a way the child can easily understand. During preschool children have a massive increase in language development. This escalation in language skills represents the development of cognitive abilities. Children become more complex thinkers and these changes are exhibited in their language. Preschoolers are curious about language and rely progressively more on language to make their wants and needs known to adults and peers. Preschoolers can learn an average of 5 new words a day increasing their vocabulary from 200 words at age 2 to 10,000 words by age 6 (Berk, 2008 pg 356). To build their vocabulary so quickly, children use the fast mapping process where they connect a new word with a primary concept shortly after being introduced to the new word. There are different theories on how children acquire their vocabulary. Some theorists believe that children are naturally predisposed to distinguish word meaning using mutual exclusivity, which is a childs assumption that words refer to entirely separate categories (Berk, 2008). These theorists also believe that syntactic bootstrapping, which is the discovery of word meanings by observation of how words are use in the structure of a sentence, plays a major part in language development (Berk, 2008). Another theory is that word learning is controlled by the same cognitive strategies that children apply to nonlinguistic information. These strategies become more e ffective as childrens information processing, communication skills, vocabulary size, knowledge of categories and mastery of syntax improve (Berk, 2008 pg 357). Generally preschoolers can use simple sentences that follow a subject-verb-object order. Once they have mastered three word sentences they start to make small additions and changes in words that allows them to express word meanings in different ways and more efficiently. As with vocabulary development there are different theories on grammatical development; from the use of semantic bootstrapping (using word meanings to figure out grammatical rules), to the belief that children master grammar through direct observation, and including the idea that they have a special language making capacity for assessing the language they hear and develops the discovery of grammatical regularities. Preschool children have typically well developed conversation skills. They use gestures and objects to assist them in conveying their meaning. By 4 years old a child can adapt their conversation to fit the age, sex, and social status of the person theyre talking to. Their conversations tend to be less mature in highly demanding situations (like while on the telephone) where they cannot see the other person or use conversational aids (Berk, 2008). There are several ways in which parents and teachers can enhance all the developmental skills of a preschooler. Some activities that enhance physical and motor skills are dancing, swinging, sandbox play, throwing, playing with play dough and finger puppets, putting puzzles together, drawing, and stringing and lacing activities. Through directed and undirected play, children are naturally able to practice and learn both gross and fine motor skills and coordination (Snuggs, 2008). Enhancing cognitive development is about strengthening and exercising a childs thinking skills, not just giving them information. Activities like hide and seek (using variations of counting), Simon Says, I Spy and board games like Memory, Connect Four and Tic Tac Toe are all beneficial ways to enhance a preschoolers cognitive development. Planning activities in which the children have to work and plan together, helps build their social skills. Providing an opportunity for different personalities to interact, plan and work together, preschool children will learn the skills of compromise and sharing, while developing their social and emotional skills. A class play is an ideal group activity for the children to participate in. The most important thing we can do to ensure healthy social and emotional development is to be a positive role model. By being trustworthy, caring, and patient role models, we can help children develop a positive attitude. By showing respect to our children we help them learn to show respect for others. In order to enhance positive language development in preschoolers it is important to be patient while they are talking and give them time to express themselves. A few activities that can help further their development are having them draw a picture and make up a story about it, singing songs and using word play and letters to build the childrens phonological awareness, alphabet knowledge and vocabulary. I believe that each preschooler is a unique individual who needs a secure, caring, and stimulating environment where they can grow and develop emotionally, intellectually, physically, and socially. Parents and teachers should adapt to the needs of each child so that they can feel capable and successful.

Saturday, January 18, 2020

Computer Studies

1 GCSE Computing Revision Booklet This booklet has been created to provide an overview of each of the topics that you need to revise. Each section is broken down and guidance given on what you need to know. Use it in conjunction with your own revision techniques, e. g. mindmaps, to prepare for the exam. Name: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 Fundamentals of Computer SystemsYou need to be able to: (a) define a computer system (b) describe the importance of computer systems in the modern world (c) explain the need for reliability in computer systems (d) explain the need for adherence to suitable professional standards in the development, use and maintenance of computer systems (e) explain the importance of ethical, environmental and legal considerations when creating computer systems. What is a computer sys tem? At its very basic, a computer system nothing more than an input, a processor and an output. InputProcessor Output A computer system will usually have some storage capability and more often now – a way of communicating with other devices. Computers are all around us and I’m not just talking about your desktop or laptop computer. Your â€Å"smartphone†, your games console, your ipad, even your Sky+ or freeview recorder is a computer system of sorts. 3 Computer systems are integral parts of our lives. Think about all the computer systems you or your parents use on a daily or weekly basis: Running washing programmes and sensing when clothes are dry.On-board computers to control everything from engine efficiency to voiceactivated MP3/Bluetooth hands-free system. Cashless catering system in school to add and subtract money from your account. Self-service checkouts in supermarkets that scan, weigh, take payment and give change. Contactless card payment systems whe re a small RFID (radio frequency ID) tag is embedded into the card and read when the card is near. RFID technology – often used in library books and shops to detect theft, also has future applications in â€Å"smart† clothes and food products.Imagine the RFID tag in your clothes tells the washing machine how to wash them. Or a smart fridge that knows when the milk is past it’s sell-by date and adds it to your online shopping list. Since we rely so much on technology there are huge problems when it goes wrong! If a supermarket checkout system goes down this could result in lost sales of thousands of pounds. However, if an automated system, like those onboard aircraft fails then it could end in disaster! 4 Why do we need to use the same professional standards when developing and maintaining computer systems?Without standards to adhere to we risk developing systems that are not compatible with each other. Would you be happy if your Nokia mobile could only call othe r Nokia mobiles? Standards also improve the quality of the computer system and its maintenance by ensuring that best practice is followed and people don’t cut corners. Considerations when creating computer systems: The Data Protection Act 1998 provides protection for all information stored on a computer system. It requires the person who owns the system to store the information securely and only use it for the purpose it was originally gathered for, e. . the school holds data on you for the purpose of your education; it cannot sell this data to companies who may wish to sell you things. The speed of progress means that many gadgets become old and obsolete quite quickly. This means there are potentially stockpiles of old technology which could end up in landfill. Many companies now recycle these by selling reconditioned devices to other countries or cannibalising the parts to be used again. Websites like Google use huge server-farms around the world. These buildings are full o f computers running 24/7.There is an impact on the environment from the huge amount of electricity needed to run these server-farms. Technology enables us to do many things. But are they always right? Google’s Street View caused controversy when it was launched after people said that taking photos of their houses was an invasion of privacy. Social networking sites, like Facebook, have made it easier to share information but have made it difficult to set privacy settings. You can now be tracked using GPS technology and Facebook places! Is this the â€Å"Big Brother† state? 5 Computer SoftwareYou need to be able to: (a) explain the need for the following functions of an operating system: user interface, memory management, peripheral management, multi-tasking and security (b) describe the purpose and use of common utility programs for computer security (antivirus, spyware protection and firewalls), disk organisation (formatting, file transfer, and defragmentation), and sy stem maintenance (system information and diagnosis, system cleanup tools, automatic updating) (c) discuss the relative merits of custom written, off the shelf, open source and proprietary software.Operating System functions Memory management User interface The OS manages the transfer of data between the CPU, RAM and main storage (e. g. hard drive) The OS provides the user with a way of controlling the functions of the computer without resorting to machine code. It can be graphical (GUI), e. g. Windows or text-based [no mouse] (CLI – Command Line Interface), e. g. MSDOS. The OS manages the input and output devices connected to the computer, including things like keyboard, mice and printer. The OS allows more than one program to be run at once so users can switch back and forth between applications easily.The OS provides security features to restrict access to the system or particular files. Peripheral management Multi-tasking Security When trying to remember the functions of a n Operating System – think MUMPS! Memory mgt, User interface, Multi-tasking, Peripheral mgt and Security. 6 Utility programs Type Security Purpose Detects and protects the computer against virus threats. Quarantines infected files. Spyware Detects and removes spyware (small protection programs that quietly monitor what you are doing) Firewall Restrict communication in and out of the computer from the applications that are running.Formatting Sets up a hard drive, memory stick or card into a format that the computer can use to store/retrieve data. The process of formatting erases any data that was previously on the storage medium. File Transfer Allows movement of files from one location to another, either locally or via memory stick/FTP to another computer. Defragmentation Re-organises the data on the hard drive to improve read/write access times. System info & Provides information about the diagnosis system in order to help with diagnosis of problems. System cleanup Removes te mporary files and tools compresses/archives unused files to increase free storage space.Automatic Uses the Internet to check the OS updating is up-to-date and applies software patches/fixes as necessary. Program Antivirus Security Security Disk Operations Disk Operations Disk Operations System Maintenance System Maintenance System Maintenance 7 Software development Custom written Developed specifically for a particular organisation. (a. k. a. bespoke/inAdv: custom made to meet exact purpose house) Disadv: very expensive and need technical expertise to develop. Off-the-shelf Developed by a software company to be sold to the general public. Adv: cheaper than developing it yourself and tech support available.Disadv: inflexible – might not do everything you want it to do. Open source Written by general public for everyone else to use. Source code provided so software can be tweaked. Adv: allows anyone to use/adapt the software to meet their needs, collaborative approach to develo pment which can lead to better quality software. Disadv: by making source code available to all, provide opportunity for people to â€Å"take advantage† of software installed on users’ computers compromise security. Proprietary Written by developer and allowed to be used by others but with certain restrictions, e. . can’t adapt software. Source code is hidden. Adv: can allow for different versions of same software, e. g. educational version with limited functionality or fullfunctionality version costing more. Disadv: source code cannot be inspected so may contain spyware or other malicious features within the software. 8 Computer Hardware Definition: Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners.The internal hardware parts of a computer are often referred to as components, wh ile external hardware devices are usually called peripherals. Source: www. techterms. com Inputs and Outputs (Peripherals) You need to be able to: understand the need for input and output devices (a) (b) describe suitable input devices for a wide range of computer controlled situations (c) describe suitable output devices for a wide range of computer controlled situations discuss input and output devices for users with specific needs. (d) Inputs and outputs are the computers way of communicating with us – the user.Without inputs or outputs our system would be quite limited. Imagine a calculator which didn’t allow you to type in numbers or display the answer on the screen! Here are some of the common input devices used: Keyboard The keyboard, along with the mouse, is one of the most used input devices. Once you get the hang of where the keys are, it allows people to enter textbased data quickly into the computer. A numerical keypad (found on most keyboards on the right) provides a fast way for accountants and people who work in finance to enter numbers. 9 There are some interesting variations on the keyboard:Roll-up keyboard (portable – can be rolled up and stuffed in laptop bag) Wireless keyboard (no need for messy wires, frees up user needing to be near computer) Laser Projection (projects a keyboard layout on to any surface; sensors detect which â€Å"keys† have been pressed) Mouse The computer mouse is another common input device. It allows the user to interact with the software on screen. The mouse is quite versatile, with at least two buttons and the ability to move in any direction. However, it can be difficult to be precise – e. g. drawing using the mouse is quite hard! Mice have also undergone a few changes over the years as well:Laptop touchpad (touch-sensitive pads that allow the mouse to be controlled by just a finger) Trackball (the user moves the pointer on-screen by moving rolling the ball; the unit doesnâ€℠¢t move around like the mouse) Optical Mouse (old mice used balls which used to get clogged with dirt and grease – new mice use small cameras to detect movement instead). 10 Other Input Devices Scanner Scanners convert physical documents and photos into digital format. They can be used in conjunction with special software to automatically read handwriting and convert it into computer text. This is called Optical Character Recognition.Some tickbox forms are scanned in, like the Census form or your multiple choice Science exams; this is called Optical Mark Recognition. Touchscreen Touchscreens have been around for years in one form or another. The latest versions, like the Apple ipad interface use multi-touch technology to allow greater control. Microphone Microphones convert analogue sounds into a digital format that the computer can understand and playback. Sounds are usually recorded as . wav or . mp3 files (the latter uses compression to make the file size smaller and is mo re likely to be used to store music tracks).Digital Camera Digital cameras convert live images into digital format. Photos are usually stored as JPEG files. The quality and size of the picture is determined by the number of megapixels the camera is capable of detecting, e. g. photos taken with an 8 megapixel camera are made up of 8 million pixels. 11 Webcam Webcams capture live video feeds and using appropriate software can then transmit those across a network. Sensors Sensors measure the physical world and translate that into a digital format that a computer can understand. There are various sensors that detect ll manner of things: movement, light, heat, moisture, gases (e. g. carbon monoxide levels), location (GPS), etc. For example, the iPhone has an accelerometer so it knows which way round it is to ensure the screen is rotated the correct way. Output Devices Printer Printers produce physical documents and photos from digital files. Most photo printing is done by inkjet printers which can be expensive to run. Laser printers use toner cartridges which are more expensive initially but can print more pages before being replaced. 12 Monitor/screen Monitors/screens provide the visual output from the computer system.Most computer monitors and mobile phones use colour LCD (liquid crystal display). Speakers Working the opposite way to the microphone input, the speaker converts digital sound into analogue waves. 3D Printer A 3D printer uses lasers and a special kind of plastic to build physical 3D shapes from drawings made using CAD software (computer aided design). The object is built up layer by layer. The whole process can take many hours before the final product is finished. They are often used for creating prototypes in manufacturing, e. g. Dyson uses them to create prototype parts for their products.They are still very expensive but the price is coming down. Motor A motor can be driven with precision by a computer system. Often used in manufacturing, e. g. bu ilding cars, motors are used to control robotic arms. 13 Input and output devices for specific needs Keyboards have been adapted for users with limited movement in their arms/hands. A keyboard designed to minimise the movement of your hands. Trackballs have also been used where users only have limited motor ability. They can be used by hands or feet, like the one below: A foot-operated mouse, ideal for people with limited/no mobility in their arms.For quadriplegic users, there are two alternatives to using the mouse or keyboard. The first is voice-recognition; this involves the user reading a passage of text from the screen so the computer â€Å"learns† their voice pattern. They can then use special software to control the computer using voice commands. The technology is getting better but can still make mistakes. The second is eye-tracking which uses small cameras mounted on the monitor to detect eye movement and move the cursor to the point where the user is gazing. A mouse click is made by blinking slowly.Stephen Hawking uses a special device to allow him to communicate. An infra-red sensor detects twitches in the cheek muscle below his eyes in order to enter words and then his device generates a computer synthesised voice to read them out loud. 14 Internal Hardware Devices (Components) Central Processing Unit (CPU) You need to be able to: (a) state the purpose of the CPU (b) describe the function of the CPU as fetching and executing instructions stored in memory (c) explain how common characteristics of CPUs such as clock speed, cache size and number of cores affect their performance.The purpose of the CPU is to Fetch and Execute instructions stored in memory. It acts as the brain of the computer and controls the rest of the system. INPUTS and OUTPUTS CPU RAM 15 Fetch Execute Cycle (using Little Man Computer) Download the software: http://www. cs. ru. nl/~erikpoll/III/lmc. Allows you to quit out of the current program and go back to the Start This d isplays which phase of the fetch/execute cycle we are currently in. The program that is currently being carried out. The current instruction is the one in line with the phase display. Provides the name of the current instruction, along with it's op code and operand.This explains what the little man is doing at each stage as he follows the program. Fetch phase Before the little man can carry out an instruction, he needs to find out which instruction he has to carry out. He does this by first getting the value from the program counter (The thing that looks like a green mushroom in a block of wood), and then fetching the value from the corresponding address in memory. The Program Counter The little man uses the value in the program counter to decide which address in memory he should get the next instruction from.After getting the value, but before going and getting that instruction, he increments the program counter, so that it has the correct value in it when he visits it next time. M emory Memory can be used to store programs, and data. In the fetch phase of the fetch execute cycle we are only interested in the fact that we can get instructions from the memory. 16 Execute phase Once the little man knows which instruction he is going to perform, he has to set about actually doing it. This is the ‘Execute' phase of the fetch execute cycle. For each instruction the little man will perform a series of tasks.For instance, for an input instruction, the little man will go to the input tray, take the value he finds there, and go and put it into the calculator. For an add instruction, he will take a value from memory, and add it to the value presently in the calculator. Once the execute phase is complete, the little man will start the cycle again, and head to the program counter to get the value of the next instruction he has to fetch. The Input and Output trays These are what we (the user) use to communicate with the little man. We provide him with data via the in put tray, and when he's ready, he provides us with data via the output tray.Calculator (Arithmetic Logic Unit – ALU) On a ‘real' computer, this would be the Arithmetic Logic Unit (ALU). It’s basically a calculator that will carry out arithmetic operations. Memory Memory is accessed during the execute phase when we need to store or access data. It is possible to overwrite your programs when putting data into memory though, so be careful where you put it. Following a program (Decoding instructions) The program is a series of instructions made up of an op code and operand (either data or the address where data is stored).For example: Op code Operand 1 2 3 4 5 6 7 800 801 802 9 Load Store Add Subtract Input Output Halt Skip If Negative Skip If Zero Skip If Positive Jump 2 means â€Å"Store† 2 99 99 refers to the memory address where little man should store the data. These can be stored as binary bit patterns, e. g. 10 could refer to the op code (2) above and 1 1000011 could refer to the memory address (99). Remember 2 in binary is 10 and 99 is 11000011. This would give the bit pattern for the above instruction as 1011000011 Q. How does little man (CPU) know the difference between data or an instruction?It all depends on which phase of the cycle the CPU is in, e. g. in the Fetch phase the CPU knows it is an instruction. In the Execute phase the CPU knows it is data. Op codes understood by LMC 17 Characteristics which affect performance Clock Speed This is the number of cycles that the CPU can complete in one second (measured in Hertz or Hz) A faster clock speed means the CPU can process more instructions per second. For example a 1MHz processor can process 1 million instructions a second; whereas a 1GHz processor can do 1000 million instructions in the same time.This is the A larger cache size means holding area for more data can be held and data from the it’s less likely that any cycles are wasted. A RAM. It ensures the CPU smaller cache size and is always busy fast clock speed may with data. result in a bottleneck between the RAM and CPU. A dual-core processor or This is the quad-core processor is 2 number of processing cores to 4 times faster than a conventional chip as they the CPU has. A can process simultaneous dual-core has instructions. two and is able to process two instructions simultaneously in the same cycle. Cache sizeNumber of Cores It is important to balance all of the above to avoid â€Å"over-speccing† one area and creating bottlenecks elsewhere. 18 Memory You need to be able to: (a) describe the difference between RAM and ROM (b) explain the need for ROM in a computer system (c) describe the purpose of RAM in a computer system (d) explain how the amount of RAM in a personal computer affects the performance of the computer (e) explain the need for virtual memory (f) describe cache memory (g) describe flash memory (h) discuss how changes in memory technologies are leading to innovative c omputer designs.RAM and ROM Both are needed in a computer system but for different reasons. In a computer computer, ROM (Read Only Memory) is used to store all the instructions (the BIOS – Basic Input/Output System) to get the computer up and running. It seeks out the amount of memory, input and outputs available to it and then loads up the operating system. In some computer systems, like your washing machine, the ROM stores the software to control the hardware, as well as data such as cooking/washing times etc.RAM (Random Access Memory) is used as temporary storage for instructions and data between the inputs, outputs, secondary storage (e. g. hard drive) and CPU. The larger the RAM, the more instructions/data can be held in quick access memory without needing to use Virtual memory; this can improve performance. Random Access Memory Read Only Memory Volatile (forgets everything when power switched off) Non-volatile (remembers content even if power switched off) Can be writte n to and read from Can only be read from (not written to) Usually measured in Gigabytes (Gb) For the BIOS, usually measured in Kilobytes (Kb) 9 Virtual Memory Depending on the size of the RAM, it is not always possible to store all the running programs in the RAM at once and the computer will start running low on memory and slow down. This is where virtual memory comes in. It stores the data that the RAM isn’t actively using on the hard drive to free up the RAM. Then, when the CPU needs the data it pulls it back from the virtual memory on the hard drive. As far as the CPU is concerned, all the programs are running from the RAM. The operating system sets up a page file on the hard drive to be used for virtual memory.This is usually set at twice the size of the amount of RAM, e. g. 1GB of RAM should have a 2GB page file. Cache Memory This has been explained in the CPU section on page 17. Flash Memory Flash Memory is often referred to as solid-state storage, which means that the re are no moving parts. It’s similar to RAM but is non-volatile which means when the power is cut off, it still remembers the content). Flash memory is used in USB memory sticks and memory cards for digital cameras and some games consoles, e. g. Sony PSP.Future developments in Memory technologies Physical Size & Capacity Costs Speed Power Memory chips have become more compact (storing more bits per chip) which has lead to smaller computing devices and larger capacities. The cost of memory has fallen which means it is now affordable to have large amounts of RAM available. Read/write times are improving which mean faster access and better performance. Memory chips are more power-efficient meaning portable devices work for longer between charges and batteries can be smaller and lighter. 20 Secondary StorageYou need to be able to: (a) explain the need for secondary storage (b) describe common storage technologies such as optical, magnetic and solid state (c) select suitable stora ge devices and storage media for a given application and justify their choice using characteristics such as capacity, speed, portability, durability and reliability. Secondary storage is needed for when we want to store files permanently or semi-permanently. We might want to transfer files between computers by using portable secondary storage media. Storage TechnologiesCodes data using microscopic dips on the surface of the disc. Units Optical Codes data using small changes in magnetic fields. Magnetic Uses non-volatile memory chips to store bits of data Solid State Candidates should be able to: (a) define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte Bit 1 Nibble 4 bits Byte 8 bits Kilobyte (Kb) 1,024 bytes Megabyte (Mb) 1,024 kilobytes Gigabyte (Gb) 1,024 megabytes Terabyte (Tb) 1,024 gigabytes 21 Storage Media Comparison Storage Medium CD Method Optical Capacity Medium 650-700Mb Small 1. 4Mb Large 1Gb to 2+ Tb Speed Fast access Portability Lightweight and fl at Lightweight and flat Heavy and not designed to be carried around. Requires integrating into computer system. Medium-weight. Plugs into computer USB or Firewire port. Lightweight and small. Durability and Reliability Easily scratched and will then not work. Can only be written to once. Can be snapped. Can be damaged by strong magnets or heat. Quite reliable but can crash – when the read/write head crashes into the platter. Sometimes happens on laptops when dropped. Can be damaged by magnets.Same concerns as internal hard drive. Floppy Disk Magnetic Slow access Internal Hard Disk Magnetic Fast access (dependent on speed of motor RPM – rotations per minute) Portable Hard Disk Magnetic Large 40Gb to 640Gb Medium-fast access (dependent on connection method, e. g. USB cable) Flash drive (USB stick or memory card) Blu-ray disc DVD (Digital Versatile Disc) Solidstate Optical Optical Medium/Larg Medium-fast access e (dependent on connection 1Gb to 64Gb method, e. g. USB cabl e or card reader) Large Fast access 50Gb Large Fast access 4. 7Gb Not affected by magnets.Quite hardy. Can be dropped without damaging contents. Easily scratched and will then not work. Easily scratched and will then not work. Lightweight and flat. Lightweight and flat. 22 Binary Logic You need to be able to: (a) explain why data is represented in computer systems in binary form (b) understand and produce simple logic diagrams using the operations NOT, AND and OR (c) produce a truth table from a given logic diagram. Computers use binary as it's a lot simpler. Each CPU is made up of millions of transistors which can only have two states (ON/OFF).Anything can be converted into a binary number so a computer can understand, process and store it. NOT Gate NOT Truth Table Input Output 0 1 1 0 Flips the input, e. g. 0 becomes 1 and 1 becomes 0. AND Gate a b Waits for 1 on both inputs before outputting a 1. AND Truth Table Input Input Output a b 0 0 0 0 1 0 1 0 0 1 1 1 OR Gate a b Wait for 1 on either input before outputting a 1. OR Truth Table Input Input Output a b 0 0 0 0 1 1 1 0 1 1 1 1 You can practice with NOT, AND and OR gates using the following website: http://logic. ly/demo/ 23 Representation of data in computer systemsNumbers You need to be able to: (a) convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa (b) add two 8-bit binary integers and explain overflow errors which may occur (c) convert positive denary whole numbers (0-255) into 2-digit hexadecimal numbers and vice versa (d) convert between binary and hexadecimal equivalents of the same number (e) explain the use of hexadecimal numbers to represent binary numbers. Denary and Binary conversions Numbers greater than 1 can be represented in binary by using more bits. e. g. 129 can be represented in 8 bit (byte) binary as 10000001.Denary Binary 128 1 64 0 32 0 16 0 8 0 4 0 2 0 1 1 This means that if you put a 1 on each increased by double bit (i. e. 11111111) the highest denary for each new bit added to the left. number 8 bits (a byte) can store is 255; 128+64+32+16+8+4+2+1 = 255. Notice how the number To convert binary into denary, just add together the denary numbers above each bit that has 1 in it, e. g. 10000001 = 128 + 1 = 129. To convert a denary number into binary, find the highest value that will go into it and then continue down the number of bits with the remainder until there is nothing remaining. 4 For example, to convert 44 into binary 8-bit format: 44 is smaller than 128 and 64 so we place 0s in those bits: Denary Binary 128 0 64 0 32 does go into 44 with remainder of 12, so we place a 1 in that bit: Denary Binary 128 0 64 0 32 1 The remainder of 12 is smaller than 16 so we place a 0 in that bit: Denary Binary 128 0 64 0 32 1 16 0 8 does go into 12 with remainder of 4, so we place a 1 in that bit: Denary Binary 128 0 64 0 32 1 16 0 8 1 4 does go into 4 with with nothing remaining, so we place a 1 in that bit: Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 nd 0s in all the remaining bits: Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 2 0 1 0 Therefore 44 as an 8-bit binary number is: 00101100. 25 Adding two binary numbers together Adding two binary numbers together is not as scary as it sounds or looks. It uses the same principles at the denary number system (Hundreds, Tens, Units). For example: Work from right to left, like you do when adding denary numbers using HTUs. 00010010 + 00010100 0+0=0 0+0=0 0+0+1 1+1=0 0+0=0 0 0 11 0 0 1 1 0 0+0=0 1+0=1 0+1=1 (carried over) = 1 (carry 1)Let’s convert it back into denary to check it is correct: Denary 128 Binary 0 16 + 2 = 18 Denary 128 Binary 0 16 + 4 = 20 Denary 128 Binary 0 32 + 4 + 2 = 38 64 0 32 0 16 1 8 0 4 0 2 1 1 0 64 0 32 0 16 1 8 0 4 1 2 0 1 0 64 0 32 1 16 0 8 0 4 1 2 1 1 0 So as 18 + 20 are 38. Then we know the binary calculation is correct! 26 Hexadecimal Numbers Programmers started to use hexadecimal to reduce mistakes and make it easier for them to underst and than using lots of 0s and 1s. Denary and hexadecimal conversions Hexadecimal uses a base 16 system = 0-9 and then A-F.That means that the denary number 15 is equal to F in hexadecimal. The denary number 16 is equal to 10 in hexadecimal (which means 1 lot of 16) The highest denary number represented in 8-bit (byte) binary is 255 and was represented by 11111111. In hexadecimal this would be represented as FF (15 lots of 16 + 15). Confused?! Remember, F in hexadecimal represents 15. Therefore F0 would be 15*15=240. The second F is 15, therefore FF = 240+15 = 255. To convert denary to hexadecimal you can divide the number by 16. For example, to convert 141 into hexadecimal do the following: 141 / 16 = 8 remainder 13. /16 = 0 remainder 8. Therefore, working from right to left, the hexadecimal number is 8 13 (and 13 is represented as D in hex) so it would be 8D. Alternatively, convert the denary number into binary and then binary to hexadecimal. 27 Binary to hexadecimal conversions To convert binary to hexadecimal you need to break it down into nibbles (blocks of 4 bits). For example, 141 as a binary number is: 10001101. The two nibbles are 1000 and 1101. Converting each nibble into denary we can see that 1000 = 8 and 1101 = 13.Remembering that 13 = D in hexadecimal then 141 would be represented as 8D. To convert hexadecimal to binary you just reverse the process. Convert each part of the hexadecimal number into nibbles of binary numbers. For example: Hex Denary Binary 8 8 1 4 0 nibble D 2 0 1 0 8 1 4 1 nibble 2 0 1 1 HELP! This conversion chart below may help to make sense of it all! Denary 0 1 2 3 4 5 6 7 Binary 0000 0001 0010 0011 0100 0101 0110 0111 Hexadecimal 0 1 2 3 4 5 6 7 Denary 8 9 10 11 12 13 14 15 Binary 1000 1001 1010 1011 1100 1101 1110 1111 Hexadecimal 8 9 A B C D E F 8 Using binary to represent characters You need to be able to: (a) explain the use of binary codes to represent characters (b) explain the term character set (c) describe with exampl es (for example ASCII and Unicode) the relationship between the number of bits per character in a character set and the number of characters which can be represented. Computers use the ASCII (American Standard Code for Information Interchange) format to use binary codes to represent numbers, letters and special characters. It uses 8-bits (byte) to represent each character, so every character has it’s own unique 8-bit ASCII code.Using the ASCII character set on the next page we can convert characters into binary numbers. For example, Isambard would be represented in binary as: I s a m b a r d = = = = = = = = 73 115 97 109 98 97 114 100 = = = = = = = = 0100 1001 0111 0011 0110 0001 0110 1101 0110 0010 0110 0001 0111 0010 0110 0100 Notice how the capital I is different from the lowercase i in the ASCII format. An upper and lower case version of each letter is present in the chart to enable the computer to tell the difference between them. If you remember what we said about binar y numbers back on page 23 then you know that 8-bits (a byte) can store up to 255 in denary.This means that the ASCII format can have up to 255 characters represented in a character set. 29 American Standard Code for Information Interchange character set Note: You don’t need to remember these codes for your exam but just be aware of how it works. 30 Using binary to represent images You need to be able to: (a) explain the representation of an image as a series of pixels represented in binary (b) explain the need for metadata to be included in the file such as height, width and colour depth (c) discuss the effect of colour depth and resolution n the size of an image file. Images on the computer are made up of lots of individual pixels (small squares of colour). If you zoom into any image enough times you will see these little blocks of colour. We can use binary numbers to represent each pixel. In a simple image, where there are only two colours (colour depth of 1) then we can si mply use a 1 for one colour, and 0 for another. For example, look at this small 3 x 3 pixel image below. The 1s represent the black colour and the 0s represent the white. 0 0 0 1 0 0 0 1 31 That is the principle behind storing images as binary. However, we also need to know a few other things about the image in order to display it correctly, i. e. its height, width and colour depth. Image Metadata Height Width Colour depth Resolution The height of the image in pixels The width of the image in pixels The number of bits available to represent each pixel The pixels per inch (PPI) – if the pixels per inch is high, then the resolution and image quality is also high.Without this metadata the computer would not be able to reconstruct the image properly. Colour Depth In a simple 1-bit colour depth image, we can only display two colours. However, in an 8-bit colour depth image (like the gif format), we can display 256 colours (one for each binary number from 00000000 to 11111111). In a 24-bit colour depth image (like the jpeg format), we can display just over 16 million colours! If we use more bits to store each pixel, then the file size will be larger. That is why . gif images are often smaller in file size than . peg images. Resolution If the image has a higher resolution, it has more pixels to store data about and is therefore larger in size. If the image is lower resolution, this means that there are less pixels per inch, which means less pixels to store data about and is therefore smaller in size. 32 Using binary to represent sound You need to be able to: (a) explain how sound can be sampled and stored in digital form (b) explain how sampling intervals and other considerations affect the size of a sound file and the quality of its playback.Sound is stored in the computer by taking samples of the sound wave at regular intervals and converting those into binary numbers (using an analogue-to-digital convertor). The computer can then re-create the sound by reve rsing the process. The file size and quality of the sound recording is affected by the sample rate and bit rate. The sample rate refers to the number of samples taken each second. It is measured in Hertz (like the CPU clock speed). If the sound wave is not sampled at a higher enough rate, this can lower the quality of the sound recording, but the file size would be smaller.If the sound wave is sampled at a higher sampling rate, this will increase the quality of the recording, but the file size will be much larger. The bit rate refers to the amount of bits used to store the different levels of sound at each sampling interval. The more bits, the greater range of levels that can be distinguished. This also has the affect of increasing the file size if the bit rate is high (e,g. 16-bit instead of 8-bit). 33 Computer Communications and NetworksNetworks You need to be able to: (a) explain the advantages of networking stand-alone computers into a local area network (b) describe the hardwar e needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points (c) explain the different roles of computers in a client-server and a peer-to-peer network (d) describe, using diagrams or otherwise, the ring, bus and star network topologies (e) describe the differences between a local area network and a wide area network such as the Internet explain the terms IP addressing, MAC addressing, packet and (f) protocols (g) explain the need for security measures in networks, such as user access levels, suitable passwords and encryption techniques (h) describe and justify network policies such as acceptable use, disaster recovery, failover, back up, archiving. Why network? Allows computers to communicate with each other and share resources, e. g. peripherals (printers, scanners), storage, internet access. Data Packets Information is sent around a network in data packets. Data is broken down into packets to be sent over the network and ofte n may take different routes to get there. It contains info on where it needs to go (the address) and the packet number and an error-checking facility to ensure the packet arrives intact and can be put back together in the right order. 34Basic components of a local area network (LAN) Client/ Computer Hub, Switch or Router See next page for explanation of each. Server In a Client-Server network, the server handles the logins, applications and file storage. Modem Interfaces between the Internet and the network. Shared Peripherals Networks allow peripherals like this printer to be shared by all the computers on the network. Internet 35 Hub, Switch or Router? These are not the same. You need to know the difference between them. Hub A hub receives all data sent over the network and sends it to all the other devices on the network. Only the device who the data packet is for will acknowledge it; the other devices will ignore it.A switch is bit more intelligent than a hub and it learns which devices are on the network (and their port number/address) and only sends the data packet to the computer who is the intended recipient. This is more efficient than a hub as it doesn’t result in lots of unnecessary network traffic. A router is cleverer still than both hubs and switches. It can re-direct network traffic and deal with different packets in different ways. It can protect the computers on the network by hiding them from the outside world (i. e. a firewall). Some routers have a modem built-in and wireless capabilities. Most homes have a 4-port wireless broadband router to access the Internet. This combines the router and modem functions. Switch RouterWireless access points don't require a physical connection and therefore are suited for a variety of different devices and provide access to network over an area, e. g. iPad or smartphone. IP address The IP address (Internet Protocol) is a computer's unique address on the network, e. g. 192. 168. 0. 1 is usually your home router's address. On the Internet, each website has its own or several IP addresses. 36 MAC address The MAC address (Media Access Control) is a hexadecimal number that is unique to that particular device. Hey! Did you know that there are 281,474,976,710,656 possible MAC addresses in the world? That’s a lot of MACs baby†¦ huh huh! Network Protocols Protocols are a set of standards and guidelines that tell computers how they should handle the sending and receiving of data over the network.TCP/IP (Transmission Control Protocol and Internet Protocol) Used to exchanged data between computers on a network and route packets between networks and over the Internet. Used on WWW to transfer webpages and web content from the website host server to the computer requesting the page. Used to transfer files between computers over a network. Used to transport emails. HTTP (HyperText transfer Protocol) FTP (File Transfer protocol) SMTP (Simple Mail Transport Protocol) LAN or WAN? A L AN is a Local Area Network which is usually set-up within a certain area, e. g. a building or group of buildings – hence the term â€Å"local†. A WAN is a Wide Area Network which is usually on a nationwide or worldwide scale. The Internet is an example of a WAN – a series of interconnected LANs. 7 Network Topologies A network can be set up in three main ways: Ring 4 3 5 1 2 All the computers are linked together in a ring and data packets are sent one way round. For example in the diagram above to get from PC 1 to PC 5 the data needs to go through PCs 2, 3 and 4. It can’t go anti-clockwise back to PC 5. Drawbacks: If there is one break in the ring then the network breaks down. Also not very efficient as a lot of network traffic doesn’t take the most direct route. Bus All the computers are connected to a central bus. You can add and take away computers easily in a bus network as the computers are connected to the central bus, rather than between one another.Drawbacks: Only one computer can use the bus at once which means only one computer can communicate at a time – the others have to wait until the bus is free before sending their data; this makes it slow. If a computer connected to the bus breaks down, then the network still runs but if the central bus breaks down then so does the whole network. 38 Star 4 3 5 1 2 All the computers are connected to central server. The server can handle multiple communications at once and re-directs traffic over the network. More computers can be added or taken away without affecting the network. Drawbacks: If the main server fails then the network goes down. Client-server and peer-to-peer networks In a Client-server network, the server acts as the main computer handling login requests, user storage, etc.The client could be any computer. The user can log on to any client and still access their stuff on the server. In a Peer-to-peer network, each computer shares information equally and pl ays an equal role in the network. Network Security Part of Data Protection Act 1998 requires companies who store data electronically to keep it safe and secure. Without security then anyone could hack into the network and intercept data packets. Confidential data packets should be encrypted so if they are intercepted they are unreadable. There may be a need to prevent unauthorised access to particular areas of the system; this could be controlled by passwords and different user levels, e. g. n the school a student can only access the student shared drive, whereas teachers can access both the student shared drive and the staff shared drive. 39 Network Management Policies Disaster recovery In the event of the system failing there needs to be plans in place to get the network up and running again as quickly as possible. Many organisations, such as banks, have a disaster recovery plan which may mean relocating to a different location (if the building is no longer accessible). Failover a nd backups If there is a power cut, many networks have UPS (uninterrupted power supplies) which are large batteries with enough charge to keep the network going long enough to shut it down correctly. If a hard drive fails, there is usually a backup which can take the strain.Networks are often backed up at least daily and these backups are stored off-site or in a fire-proof safe so in the event of a disaster in the building, the data is still intact. Maintenance Sometimes data needs to be kept but is not accessed regularly. This data can be archived off onto tape to help free up space on the network. Acceptable Use It is important for the network to have an acceptable usage policy to provide users with guidelines about what they can and can’t do using it. For example, it would use up vital network bandwidth if some users decided to play a network game or download the latest torrent from the Internet. If users start file sharing copyrighted materials, like music, using the netw ork then there is a legal issue to consider as well. 40 The InternetYou need to be able to: (a) describe the nature of the Internet as a worldwide collection of computer networks (b) describe the hardware needed to connect to the Internet including modems, routers etc (c) explain the need for IP addressing of resources on the Internet and how this can be facilitated by the role of DNS servers (d) explain the importance of HTML and its derivatives as a standard for the creation of web pages (e) describe common file standards associated with the Internet such as JPG, GIF, PDF, MP3, MPEG (f) explain the importance of compressing files that are transmitted via the Internet (g) describe the differences between lossy and lossless compression. What happens when you type in a web address in your browser? When you enter a web address in your browser, it heads off via your modem to your ISP’s (Internet Service Provider) domain name servers (DNS).These computers store the IP address(es) for each website and directs your request to the relevant server hosting the webpage you want to view. The information is then sent back to your ISP and then back to your computer. Why HTML? HTML (HyperText Markup Language) provides a standard format which any computer with web browser can interpret and display the pages. It allowed the World Wide Web to get going as there was a universal standard that everyone could now use to share information. 41 Common file formats used on the Internet . html . jpg HTML Web page JPEG image Used to store webpages Used to store photos as can show up to 16. 7 million colours. Used for simple graphics and short animations – can show up to 256 colours.Used to store noneditable documents for viewing on the Internet using the free Adobe viewer software. Used to store music tracks. Compressed to make downloading faster. Used to store videos. Compressed to make downloading faster. Used for Adobe Flash files to add interaction and/or animations to websites. Used to store video files playable using free Apple viewer software. .gif Graphic Interchange format image .pdf Adobe Portable Document format .mp3 MP3 Music format .mpg MPEG video format .swf Shockwave Flash format .mov Apple Quicktime format Why compress on the Internet? The Internet can be slow at times, especially in it’s early days relying on early 56Kbps modems as opposed to the 3-4 Mbps average.Therefore if you could compress the files that were being sent on the Internet, then you sent smaller files, and smaller file sizes meant faster downloads. It also frees up the network and avoids clogging up the bandwidth. 42 Lossless versus Lossy Compression Lossless compression Compression used means the original file stays completely intact and unchanged. Used for text documents, data files and executable programs where it would not be desirable for parts to be lost. Used for multimedia files, i. e. sound, images, video. Lossy compression Compression which involves discarding parts of the file which won’t be noticed if they are not present.For example, it is possible to remove some data within an image and your brain fills in the gaps. Take a look at the images of the dog below: Source: wikipedia. org The image has more compression applied to it as you go from left to right. Even though the image on the right in heavily compressed, we can still see it is a dog. Our brain fills in the gaps. 43 Databases What is a database? A database is a persistent organised store of data which can be easily and quickly searched. They are most commonly used for Marketing, e. g. loyalty cards. Huge databases are searched for patterns in customer’s buying habits and then targeted coupons are mail shot to customers.The school has several databases to store everything from your behaviour logs and Brunels, to your address, date of birth and even how much money you have on your lunch card! Data handling software, such as Microsoft Access, allow users to: add tables, define fields and validation (create) add/edit/delete data (maintain) run queries to extract information from the database (interrogate) DBMS (Database Management System) Many large databases use a database management system (DBMS). This system separates the data stored from the data handling applications used to maintain and interrogate the database. Feature Concurrent usage Security Recovery & Backup Data integrity Why is this good? Allows multiple users to use the database at the same time Provides bility to allow/restrict data access to individuals or applications Provides backup solution and recovery tools to ensure data is not lost in event of failure Enforcing data integrity by ensuring data is consistent and adheres to the rules Relational databases A flat-file database is when all of the data and fields are stored in one table, e. g. an excel spreadsheet full of names and addresses – see below: 44 A relational database is when that data is separated i nto individual tables (entities) that are linked by a primary key (which appears in each table). Student Student ID First name Surname Class Class ID Student ID Teacher ID Teacher Teacher ID Name SubjectIn the example above, the STUDENT, CLASS and TEACHER are all tables (entities) in the database. The id is the unique piece of information (the primary key) that identifies each instance of a student, class or teacher. We couldn’t use First Name as the primary key in STUDENT as many people share the same first name – it isn’t unique enough! The advantage of separating the data into different entities is to avoid data redundancy – when the same data is stored in several places in the database. Let’s imagine if we stored the information above in a flat-file database (all in one table) – it would look something like this: Duplicated data Can you see the duplicated information?Not only does this use up space but it is easier to make a mistake (and lose data integrity) if we only update one of the records. E. g. if Miss Parsons gets married and her name changes to Mrs Smith then we need to make this change for every record in the database. If are using a relational database, because the Teacher’s name is stored in a separate table and linked to the rest of the entities, we only need to update it in the TEACHER table once. In the CLASS entity, both Teacher ID and Student ID are foreign keys (primary keys that when linked to another table become foreign keys in that table). Components of a relational database Tables Represents the entity in the database. Fields and primary keys are defined and data stored in the table. Create) Forms Provide a customisable user interface to add/edit and delete data (Maintain) Queries Allow data that meets specific criteria to be extracted and displayed (Interrogate) Reports Displays the results of queries in a customised format designed to be printed Querying a database 45 When interrogat ing a database, you need to specify the fields you wish to display and the criterion you will use to search. E. g. if you were searching for a car on a car supermarket website you might search using the make of the car you wanted: Make = â€Å"Ford† You could also use logical operators such as (NOT equal to), < (less than), > (greater than), = (greater than or equal to). E. g. Mileage