Wednesday, October 30, 2019

Role of Strategic Information Systems in Airline Industry Essay

Role of Strategic Information Systems in Airline Industry - Essay Example At the end of the report a conclusion is given that further emphasizes the vitality of information technology in the industry, in general, and relates this importance with the business objectives of the organizations and their need to maintain a competitive edge in their current market. Every organization in modern business world, from and medium organizations to larger ones, depends on the updated use of information technology for their survival. For the larger companies the use of information technology is vital to maintain and control the amount of data involved. For example, Organizations like oil and gas supply companies, telecommunication giants and power and water companies cannot cope with the amount of customer bills every month or every quarter with out the use of information technology. The manual route to handle these jobs would be excessively complicated and will not allow the companies to make any profit. Such is the case with all the larger organizations such as banks and product based companies to all the major governments and government entities. The According to an article published in the IT supplement of The Daily Telegraph; larger organization today cannot last for as short as 24 hours if the IT support they enjoy is taken away from them (Laudo n & Laudon, 2006). Airline industry is one of the largest industries in the business world today. The amount of administrative and operations activities that are required is huge and extremely specialized in nature. The need of every small to medium and larger companies, in the airline industry, to remain in the development stage of their life cycle demands the usage

Monday, October 28, 2019

Gran Torino Review Film Studies Essay

Gran Torino Review Film Studies Essay Gran Torino, directed by Clint Eastwood, is a very moving and captivating drama. Its a simple story about tolerance and cultural differences, but also one of hope, self-sacrifice, and unlikely friendships. A former auto worker at Ford, Walt Kowalski has just had to put his longtime wife to rest when the story opens. From his scowl, it looks as if he would like to join her. Instead he sits on his front porch chugging can after can of cheap beer in the company of his yellow Labrador, Daisy, while watching the world at a safe distance with a squint and a stream of bitter commentary. The remaining members of his family, including two sons with big houses, big cars, big waistlines, have no choice but to let him stew alone. Gran Torino tackles racism head on. Although the main character Walt Kowalski, played by Clint Eastwood, is prejudiced against almost everyone, the film focuses on an Asian neighborhood, uncovering racism and violence. The neighborhood has gone down hill since it has become immigrant-dominated. The house next door is now owned by a Hmong family, a widespread South-east Asian minority, and Walt does not trouble to distinguish them from the Koreans he fought in the 1950s. Throughout the film, we learn Walt had to kill many Koreans as part as his duty as a soldier during that period of time. The film takes a twist when the bitter old war veterans life takes an unexpected turn after Thao, a shy, teenage boy who lives next door to Walt is bullied by his thuggish cousin and no-good buddies into joining their gang. His initiation test is to bust into Walts garage and steal his treasured 1972 Gran Torino. Sure enough, Thao does as the others ask. While trying to steal the Gran Torino Thao tr iggers Walts halogen security lights and Walt comes out running with an assault rifle. Little do Walt and Thao know, their meeting will change both their lives forever. Thaos family, led by his mouthy, friendly sister, Sue forces the teenager to do pay his dues from trying to steal Walts car by working for Walt, an arrangement that pleases neither the Walt nor the Thao. As the story unfolds and the gang members return and Walt reaches for his gun, the film moves from comedy into drama, and then tragedy into something completely unexpected. The film takes a hard look at a Hmong community and the gang life within as it twists tough situations until its truly exposed, finding a few laughs at the core. Gran Torino portrayals real life drama while injecting it with some necessary comedy, which gives it a bit of a balance and keeps viewers even more entertained. The way the comedy weaves effortlessly in and out of the gritty Clint Eastwood film makes it an even better film for most to enjoy. Clint Eastwood has a great and useful skill of creating terrific drama films with a message, Gran Torino is one of those films. Like many of Eastwoods other films, he plays a role that involves a stereotypical toughness. This film can be seen as a interpretation on many issues encompassing gangs, racism, the disrespect of the youth culture towards their elders, and forgiveness. To me, all of these issues tend to come to mind when reminiscing about the film. I truly believe these are what the film is really about and what it was meant to be about. Throughout the film, it is mind blowing to see many of the characters change for the better throughout the film, especially Walt. This is yet another great film from Clint Eastwood, and its a film that addressees important issues that cant be ignored. Although, some may say that Gran Torino may not be the greatest work by Clint Eastwood, I believe the film did a splendid job in terms of race issues. Gran Torino is a good example of a film th at takes an unbiased look at race issues. This is a well made film, and its not just giving you straight advice like most films dealing with similar subject matter. Melancholy is imprinted in every long shot of Detroits devastated, emptied streets and in the faces of those who remain to still walk in them. Made in the 1960s and 1970s, the Gran Torino was never a great symbol of American automotive might, which makes Walts love for the car more moving and emotional. It was made by an industry that now barely makes cars, in a city that hardly works, in a country that too often has felt recently as if it cant do anything right anymore except, every so often, make a movie like this one. The drama, Gran Torino provides a surprisingly enlightened view at understanding cultural diversity within a rapidly evolving American neighborhood. The movie interjects the need for communication, understanding, and a return to middle class values in a youth oriented culture. Gran Torino expresses an issue that has been one of conflict in our society today; racism. Walt Kowalskis attitude towards minorities seems very prejudice and close-minded. I believe Gran Torino is about two things. It is about the late blossoming of a mans better nature, and it is about Americans of different races growing more open to one another in the new century. I would recommend this movie to anyone who enjoys a drama/action film, and doesnt mind some foul language to go along with it. I think to some people this film can be a eye and mind opening experience. I believe it is important for people to see both sides of such a controversial issue, and that change is probably necessary in one way or another f or understanding, respect, and peace to surface

Friday, October 25, 2019

William F. Mays Rising to the Occasion of Our Death Essay examples --

There are three key audiences of the text for William F. May's â€Å"Rising to the Occasion of Our Death.† The first audience, in this case, would be legislative organizations or lawmakers who have researched and studied similar cases regarding euthanasia. Since May was as an ethics professor at Southern Methodist University, his tone is decidedly intellectual. An uneducated individual would find it more difficult to read his essay; for example, in declarations such as â€Å"Advocates of active euthanasia appeal to the principle of patient autonomy,† May's syntax and tone is formal, informative, and utilizes heavy technical jargon (May 662). In other words, it is authoritative, and enables the audience to view him as a credible source due to his syntactical confidence. Other organizations, lobbyists, or lawmakers who are researching evidence on euthanasia would certainly benefit from reading his expert opinion on the matter. Moreover, his desire to develop a â€Å"ju dicious, regulated policy† is a certain acknowledgement that he is attempting to legally call for regulations on euthanasia (May 662). The second audience that May is appealing to are conservative Christians, who are distinctively pro-life. As his article was originally published in well-circulated The Christian Century magazine, addressing this audience exposes members of May's audience who are unfamiliar with euthanasia to its technicalities by debating morality. His tone is similar to that of a sermon; instead of utilizing scientific facts or statistics, May chooses to exclude a logos appeal in favor of an ethos objective. He preaches on moral values about life and death, mentioning that â€Å"the best death is not always the sudden death† (May 662). According to May, preparation... ...ploying strong technical terms and establishing an extrinsic ethos, and exercising sub-arguments that would only benefit numerous groups of people, May strongly achieves his strategy of argument through ethos in terms of rhetorical persuasion. Works Cited Agatucci, Cara. "Cora Agatucci's Toulmin-Style Analysis of May's Argument." WR 122 Course Home Page. N.p., 06 Jan. 2010. Web. 31 Mar. 2014. May, William F. "Rising to the Occasion of our Death." The Christian Century Jul 11 1990: 662. ProQuest. Web. 31 Mar. 2014 "Opinion 2.21 – Euthanasia." Opinion 2.21 – Euthanasia. American Medical Association, June 1996. Web. 16 Mar. 2014. Perelman, Chaà ¯m, and Lucie Olbrechts-Tyteca. Facts, Values, and Hierarchies, The New Rhetoric. N.p.: n.p., n.d. PDF. The Stases and Other Rhetorical Concepts from Introduction to Academic Writing. N.p.: n.p., n.d. PDF.

Thursday, October 24, 2019

Anti-Aging Cream Goes Young

|Anti-ageing cream goes young | |2 Jun 2008, 0155 hrs IST, Amit Sharma,  TNN | | | | | | |  Print   | | | | |  EMail   | | | | |  Discuss | | | | |  Share | | | | |  Save | | | | |  Comment | | | | |Text:[pic] | | | | | | | | | | | | | | | | | | | |NEW DELHI: When consumer products major Hindustan Unilever (HUL) recently relaunched its Pond’s anti-aging skin cream range, it was not | | | | |only   | | | | | | | | | | | | | | |launching a ‘new-improved’ version of the product but also responding to a larger change in the core target consumers of anti-aging | | | | |products — from the middle-aged 35-40-years-old women to 20-something girls, yes, but even men too! | | | | | | | | | |Says Oriflame India national sales manager Shilpa Ajwani: â€Å"Today, we have customers in the 20-years-plus age group who start preventive | | | | |skin care through anti-aging creams and while women are still the larger consumer base, there is faster growth in demand for anti-aging | | | | |products by men too. This is unlike the scenario sometime back when classically 40-years-plus women were our target customers. †Ã‚   | | | | | | | | | |The company launches about six anti-aging products a month, which now account for over a quarter of its sales in India. | | | | | | | | | |Cosmetics are conventionally bundled into three categories — skin lightning, moisturising and anti-aging. Market research firm ACNielsen | | | | |puts the anti-aging cosmetic market in India at over Rs 60 crore. Though just over 2% of the country’s Rs 3,000-crore skin care market, | | | | |the anti-aging segment is the fastest growing at 93% year-on-year. | | | | | | | | |Anti-aging cosmetics include products as diverse as anti-aging lipsticks and eye balms, facial creams, hair lotions and  foot  creams. | | | | |Consumers pay Rs 500-6,000 for such products from brands like Mary Kay, Revlon, Schwarzkopf, Procter & Gamble, HUL, et al. | | | | | | | | | |Schwarzkopf Professional country head Mu rali Sundar confirms anti-aging products’ age defying trend: â€Å"With time, usage of anti-aging | | | | |products has got little to do with a person’s age. Rising consumer awareness means that people in their late twenties have started buying | | | | |our anti-aging hair care products. While the bulk of our customers are still women, men are fast waking up to hair-care. †Ã‚   | | | | | | | | | |While busy lifestyles and concomitant stress hasten skin aging, rising incomes and awareness are facilitating fast consumer adoption of | | | | |anti-aging products. But that’s not all, for there is also another important factor at play here. Consumers today opt to prevent and | | | | |correct rather than repair at a later stage. Marketers are quick to spot this trend and are responding appropriately. | | | | | | | | |Says HUL skin care category head Venkat Shridhar: â€Å"Today, sales of bulk of our anti-aging creams come from 28-30-years-old women. Personal| | | | |care spends have increased a lot in the past 3-4 years. Easy access to parlours, supermarkets and greater exposure to media have led | | | | |people to spend more on hygiene and  beauty. Hence, all our communication also highlights prevention as the way out to delay aging. †Ã‚   | | | | | | | | | |Agrees Mary Kay India senior marketing manager Nirupama Rao: â€Å"Anti-aging products have ceased to be prescriptive in nature. Today, they | | | | |are used for preventive purposes. Consumers realise that they help in delaying the damage caused due to aging. †Ã‚   | | | | | | | | | |Though the current penetration of anti-aging products is low, marketers see huge potential in the category and are prioritising for its | | | | |growth. Says Devendra Shinde, marketing head, Kaya Skin Clinic, Marico’s 56-store strong skin-care division: â€Å"Our age control Botox and | | | | |Fillers treatments have grown up to four times in the last year. | | | | |Currently, age control packages account for 15% of our revenues and are expected to grow even more robustly.    | | | | | | | | | |â€Å"We are witnessing a 30% year-on-year growth in the anti-aging segment. The age of consumers of anti-aging cosmetics is coming down | | | | |rapidly and there is increased penetration of these products in India. This segment is expected to contribute substantially to our | | | | |growth,† says Revlon India marketing director Deepak Bhandari. The company markets it s anti-aging products under the Revlon Reveal brand, | | | | |priced Rs 350-750. | | | |

Wednesday, October 23, 2019

Diagnostic Urinalysis Lab Essay

Introduction/Background Today’s lab exercise is about diagnostic Urinalysis. Urine reflects the many chemical components found in blood. This test is a good measure of health of endocrine system, kidneys, and urinary tract. Artificial urine samples are used for today’s lab thank goodness. The test that this lab is mostly focused on is called â€Å"dipstick† urinalysis test where students will analyze the chemical composition of urine by dipping the chemical indicator stick or â€Å"dispstick† into a sample of urine. The chemicals in the pad of the indicator stick will react with various biochemicals, ions and salts found in urine and indicate the presence of hemoglobin, glucose, ketones, protein and specific gravity. The change in color indicates the quantity and presence of particular urine component. High level of glucose indicates the endocrine system’s inability to regulate sugar concentration. Dilute urine indicates the adrenal gland defect that prevents kidney from r egulating water and salt levels. Urine containing blood and protein indicates damage to a Kidney’s blood filtering system. Hypothesis: No hypothesis is necessary as this lab is an observational lab Objectives: The objective of today’s lab is to learn and understand diagnostic urinalysis. The focus of today’s lab is geared more towards dipstick analysis. Students are to complete the chart, answer all associated questions, and include references. Students will learn the importance of urine and the various diseases/problems that can be diagnosed using it. Students will diagnose the unknown samples of â€Å"Jane and John†. Materials: 1. Acetoacetic acid 2. Creatinine 3. Urine test strips – multisticks that can measure blood, glucose, ketones, pH and protein are required and should be also able to measure specific gravity – are needed. Brand recommended is Clinistick TM . 4. Five test tubes per group Procedure 1 (Calibration) Calibration This is to ensure that the data collected from the patient is accurate. You will be provided with the positive and negative standard solution. The Positive Standard determines whether the indicator determines the correct response to presence of chemicals in the urine. A false positive when using water will indicate that the â€Å"stick† is detecting substances that are not there. A false negative indicates that the stick is unable to detect the presence of substances that are present in the sample. 1. Obtain the negative and positive standard bottles. Note the color on the indicator stick prior to start of experiment. 2. Collect 2 tubes and label as â€Å"neg† and â€Å"pos† for negative and positive standard solution. 3. Pour  ¾ full of the tube with â€Å"neg† solutions in the tube labeled â€Å"neg.† 4. Pour  ¾ full of the tube with â€Å"pos† solutions in the tube labeled â€Å"pos.† 5. Insert the indicator stick in the tube la beled â€Å"neg.† Observe the color and odor of the solution. 6. Insert the indicator stick in the tube labeled â€Å"pos.† Observe the color and odor of the solution. 7. Record your data in the table as â€Å"+† or â€Å" –â€Å" to indicate positive or negative result. Procedure 2 (analysis of samples) Obtain a set of the urine samples to analyze. 1. Collect and label three tubes as normal (N), John , and Jane. 2. Pour Normal urine sample  ¾ full of the tube labeled N 3. Pour John’s urine sample  ¾ full of the tube labeled John 4. Pour Jane’s urine sample  ¾ full of the tube labeled Jane 5. Insert the indicator stick in the tube labeled N. Observe the color and odor of the solution. 6. Record the data 7. Perform the same test on the samples labeled John and Jane using new sticks and record your observation in the table provided above. Please refer to the attachment for interpretation of Urinalysis results. If not provided please ask your Instructor for the same. Discussion: This lab discussed urinalysis. Urinalysis is a diagnostic test that evaluates health of endocrine system, kidneys, and urinary tract. Urine can be visually examined sample for color (clear to dark yellow or red), and clarity (clear to cloudy), and odor. A complete diagnostic urinalysis includes a dipstick evaluation and a microscopic analysis. Dipstick evaluation includes parameters such as glucose, ketones, pH, protein, blood, bilirubin, etc. The microscopic visualization allows for detection of bacteria (UTI), RBCs, crystals (metabolic derangements), renal tubular cells (toxicity or severe renal disease), or transitional cells (from bladder). Acid urine and alkaline urine have crystals that form different from that of normal urine. Some terms that the students learned were glycosuria-excess glucose levels, hematuria-RBCs present in urine, hemaglobinuria-hemoglobin pigment is present in urine, ketonuria-high levels of ketones, myoglobinuria-high levels of myglobin (pigments that are released when muscles breakdown), and pH-measure acidity or alkalinity of urine. In order to be certain that values are correct, known negative and positive standards are used to compare with the clinical sample. This process is called calibration. Calibration should be done for all diagnostic tests and the equipment used to make these determinations. Calibration is necessary to avoid false negative and false positives. A false positive when using water will indicate that the â€Å"stick† is detecting substances that are not there. A  false negative indicates that the stick is unable to detect the presence of substances that are present in the sample. Conclusion: In conclusion, students successfully performed a urinalysis dipstick test. The lab had students test the negative and positive tests, and then the James and Jane urine samples were tested. John’s urine was clear and tested negative for protein, which indicated it was normal. The pee was slightly turbid. The urine had a strong odor and a specific gravity of 1.005, which is lower than normal urine. The pH of John’s pee is 5 and the glucose was extremely high with 1000mg, tested with small (+) amounts of ketones and also showed trace amounts of blood. Jane’s urine was a very light yellow with a very faint odor, tested negative for ketones, tested negative for proteins, had a pH of 6, and had a specific gravity of 1.015. The glucose was extremely high with 1000mg. Jane also showed About 250 Ery/nanoliters of blood in her urine. The protein portion of the dipstick tested for 100 (++) in Jane’s urine sample. Students learned different types of disease that could be associated with the test results that were discovered with the dipstick. Lab Questions: 1. What are the possible causes of John’s test results? John’s urine was clear and tested negative for protein, which indicated it was normal. The pee was slightly turbid which could be caused by Lipiduria, hyperoxaluria, chyluria, pyuria, excess phosphate crystals precipitating in alkaline urine, hyperuricosuria, or contamination with vaginal mucus or epithelial cells. The urine had a strong odor which could indicate alkaline fermentation, diabetic ketoacidosis, cysteine decomposition, gastrointestinal-bladder fistulae, or could be caused by medications or diet. John’s urine was observed to have a specific gravity of 1.005, which is lower than normal urine. Decreased specific gravity is seen in excessive fluid intake, renal failure, pyelonephritis, and central and nephrogenic diabetes insipidus. False low readings of specific gravity are associated with alkaline urine (a high-citrate diet). The pH of John’s pee is 5, which is considered to be within the normal range, but it is on the lower end which could be caused by diet and uric acid calculi. The glucose was extremely high with 1000mg, which is extremely strange due to that fact that  nearly all glucose filtered by the glomeruli is reabsorbed in the proximal tubules and only undetectable amounts appear in urine in healthy patients. False positive results are seen when high levels of ketones are present and also in patient taking levodopa. Something to remember about dipstick tests is that reagent strip tests are specific for glucose. John’s sample tested with small (+) amounts of ketones. A positive test, since ketones are not normally found in urine, is associated with uncontrolled diabetes, pregnancy without diabetes, carbohydrate-free diets, and starvation. False trace results may be seen in highly pigmented urine and in patiens taking levodopa. John’s urine also showed trace amounts of blood. 2. Of the diseases mentioned, what disease might John have? Of the diseases mentioned, it is believed that John might have either diabetes mellitus or a renal impairment. 3. How did you come to this conclusion about John’s condition? The conclusion was made that John might have diabetes mellitus, due to the high levels of glucose, slightly lower pH, and traces of ketones. The decreased level of specific gravity, and traces of blood lead to the belief that John may have a renal impairment. 4. What are the possible causes of Jane’s test results? Jane’s urine was a very light yellow with a very faint odor, tested negative for ketones, tested negative for proteins, had a pH of 6, and had a specific gravity of 1.015. All of these characteristics do not indicate abnormalities with Jane’s pee. The glucose was extremely high with 1000mg. False positive results are seen when high levels of ketones are present and also in patient taking levodopa. Something to remember about dipstick tests is that reagent strip tests are specific for glucose. Jane also showed About 250 Ery/nanoliters of blood in her urine. This could indicate lower urinary tract bleeding and inflammation/infection, acute glomerulonephritis, or lupus nephritis. The protein portion of the dipstick tested for 100 (++) in Jane’s urine sample. Proteinuria is indicative of renal disease, and small amounts accompany hematuria and acute urinary tract infection. 5. Of the diseases mentioned, what disease might Jane have? Of the diseases mentioned, Jane might have an acute urinary tract  infection/inflammation, or renal disease. 6. How did you come to this conclusion about Jane’s condition? The conclusion about renal disease is because proteinuria is indicative of renal disease. Jane might instead have an acute urinary tract infection/inflammation due to not only the protein in her urine but also the blood in the urine. 7. Why is Urine useful as an indicator of the endocrine and kidney disease? Urine is as an indicator of the endocrine and kidney disease because through its protein, pH, glucose, ketones, specific gravity, and blood that can possibly be found, physicians can diagnose disease. Urine indicates diseases with the kidney because the kidney is what filters out the body fluids that become the urine. 8. What is the laboratory procedure that can be used to test the presence of certain specific biochemicals in urine? The laboratory procedures that can be used to test the presence of certain specific biochemical in urine could be microscopic analysis, or even a urine electrophoresis test 9. Which blood chemical will be found in high levels in patients diagnosed with untreated diabetes mellitus? The chemical that will be found in high levels in the blood of patients diagnosed with untreated diabetes mellitus would be glucose. 10. How does odor help in diagnosis of disease? Odor of urine helps in diagnosing disease by merely alerting the patient that something is wrong. Because urine doesn’t have a very strong smell, if a whiff of something is particularly pungent when peeing, it may indicate that the patient could have an infection or urinary stones, which can create an ammonia-like odor. Diabetics might notice that their urine smells sweet because of excess sugar. Alkaline fermentation causes an ammoniacal smell, and patients with diabetic ketoacidosis produce a urine that may have a sweet or fruity odour. Other causes of abnormal odours are cystine decomposition (a sulphuric smell), gastrointestinal-bladder fistulae (a faecal smell), medications (eg, vitamin B6), and diet (eg, asparagus). 11. Define the following terms associated with urinalysis: Glycosuria: Glucose normally is filtered by the glomerulus, but it is almost completely reabsorbed in the proximal tubule. Glycosuria occurs when the filtered load of glucose exceeds the ability of the tubule to reabsorb it (i.e., 180 to 200 mg per dL). Etiologies include diabetes mellitus,  Cushing’s syndrome, liver and pancreatic disease, and Fanconi’s syndrome. Ketonuria: Ketones, products of body fat metabolism, normally are not found in urine. Dipstick reagents detect acetic acid through a reaction with sodium nitroprusside or nitro-ferricyanide and glycine. Ketonuria most commonly is associated with uncontrolled diabetes, but it also can occur during pregnancy, carbohydrate-free diets, and starvation. Hematuria: Hematuria can be glomerular, renal, urologic, and exercise-induced. Urologic causes of hematuria include tumors, calculi, and infections. Urologic hematuria is distinguished from other etiologies by the absence of proteinuria, dysmorphic RBCs, and erythr ocyte casts. Even significant hematuria will not elevate the protein concentration to the 2+ to 3+ range on the dipstick test. (23) Up to 20 percent of patients with gross hematuria have urinary tract malignancy; a full work-up with cystoscopy and upper-tract imaging is indicated in patients with this condition. (24) In patients with asymptomatic microscopic hematuria (without proteinuria or pyuria), 5 to 22 percent have serious urologic disease, and 0.5 to 5 percent have a genitourinary malignancy. pH: Urinary pH can range from 4.5 to 8 but normally is slightly acidic (i.e., 5.5 to 6.5) because of metabolic activity. Ingestion of proteins and acidic fruits (e.g., cranberries) can cause acidic urine, and diets high in citrate can cause alkaline urine. (15-17) Urinary pH generally reflects the serum pH, except in patients with renal tubular acidosis (RTA). The inability to acidify urine to a pH of less than 5.5 despite an overnight fast and administration of an acid load is the hallmark of RTA. In type I (distal) RTA, the serum is acidic but the urine is alkaline, secondary to an inability to secrete protons into the urine. Type II (proximal) RTA is characterized by an inability to reabsorb bicarbonate. This situation initially results in alkaline urine, but as the filtered load of bicarbonate decreases, the urine becomes more acidic. Determination of urinary pH is useful in the diagnosis and management of UTIs and calculi. Alkaline urine in a patient with a UTI suggests the presence of a urea-splitting organism, which may be associated with magnesium-ammonium phosphate crystals and can form staghorn calculi. Uric acid calculi are associated with acidic urine. Hemoglobin: The presence of free hemoglobin in the urine, an abnormal finding, that may make the urine look dark. Hemoglobin in the urine is termed hemoglobinuria. Hemoglobin is  the protein in the red blood cells which carries oxygen from the lungs to the tissues of the body and returns carbon dioxide from the tissues to the lungs. The iron contained in hemoglobin gives red blood cells their characteristic color. Red blood cells are normally taken out of circulation after approximately 4 months; they are trapped and disassembled in the spleen, bone marrow, and liver. If, however, red cells hemolyze (break down) within the vascular system, the components are set free in the blood stream. Free hemoglobin is bound by haptoglobin (another protein) and reprocessed. But if the level of hemoglobin in the blood rises above the ability of haptoglobin to reclaim it, hemoglobin begins to appear in the urine — there is hemoglobinuria. Hemoglobinuria is a sign of a number of conditions including: acute nephritis, burns, kidney cancer, malaria, sickle cell anemia, a transfusion reaction, tuberculosis of the urinary tract, and many other conditions. References: Benejam R, Narayana AS. Urinalysis: the physician’s responsibility. Am Fam Physician 1985;31:103-11. Brendler, CB. Evaluation of the urologic patient: history, physical exami-nation and urinalysis. In: Campbell MF, Walsh PC. Campbell’s Urology. 7th ed. Philadelphia: Saunders, 1998:144-56. Fogazzi GB, Garigali G. The clinical art and science of urine microscopy. Curr Opin Nephrol Hypertens 2003;12:625- 32. Hanno PM, Wein AJ, Malkowicz SB. Clinical manual of urology. 3d ed. New York: McGraw-Hill, 2001. Kiel DP, Moskowitz MA. The urinalysis: a critical appraisal. Med Clin North Am 1987;71:607-24. Laboratory manual for physiology, 2005. Leman P. Validity of urinalysis and microscopy for detecting urinary tract infection in the emergency department. Eur J Emerg Med 2002;9:141-7. Rabinovitch A. Urinalysis and collection, transportation, and preservation of urine specimens: approved guideline. 2d ed. Wayne, Pa.: National Committee for Clinical Laboratory Standards, 2001. NCCLS document GP16-A2. Sheets C, Lyman JL. Urinalysis. Emerg Med Clin North Am 1986;4: 263-80. Van Nostrand JD, Junkins AD, Bartholdi RK. Poor predictive ability of urinalysis and microscopic examination to detect urinary tract infection. Am J Clin Pathol 2000;113:709-13.

Tuesday, October 22, 2019

The Meanings and Variations of Brother

The Meanings and Variations of Brother The Meanings and Variations of Brother The Meanings and Variations of Brother By Mark Nichol Brother, from the Old English word brothor and cognate with the Latin term frater and the Greek word phrater (both of which mean â€Å"fellow clan member†), means not only â€Å"a male with one or more parents in common† but has also come, by extension, to refer to a man with whom one has a bond or a common interest. It also applies to national or racial commonality, as in the term â€Å"soul brother,† which in American English describes a black male. In addition, it can refer loosely to a male relative or generically to something that is similar to something else. In religious contexts, it denotes a minister or a member of a religious order who has not been ordained. The plural is either brothers or, in formal and religious contexts, the archaic form brethren. The quality of being a brother, literally or figuratively, is brotherhood, and brotherly is the adverbial form. A blood brother is literally a brother by birth or figuratively someone with whom one shares a bond of loyalty; originally, the term alluded to the ceremonial exchange of blood between two men, often by mingling blood at the point of a slight self-inflicted wound. Brother-german is a technical legal term pertaining to the default definition of brother- â€Å"a man or boy who has both of the same parents as a given person,† as opposed to a half brother, who shares only one parent, or a stepbrother, the son of a stepparent. Likewise, a sister-german shares both parents with a given person. (The term german, from the Latin word germanus, means â€Å"having the same parents† and is unrelated to the proper noun referring to a person from Germany.) Brother-in-arms originally strictly referred to a fellow combatant in the same military service, but by extension it alludes to anyone one is closely associated with. (Because women have only recently had a significant role in the military, no equivalent term developed for female soldiers, but the term sisters-in-arms has been employed sporadically, such as in the title of a documentary about female soldiers in combat.) Idiomatic uses of brother include â€Å"brother’s keeper,† a reference to the biblical exchange in which Cain protests, â€Å"Am I my brother’s keeper?† when God asks the whereabouts of Cain’s brother Abel, whom Cain has killed. (The contemporary notion behind the phrase is of interdependent responsibility among people.) Meanwhile, â€Å"Big Brother† is a reference (from George Orwell’s novel Nineteen Eighty-Four) to an all-seeing authoritarian leader or any government entity that practices oppressive surveillance or control. However, â€Å"big brother† also refers generically to one’s older male sibling or to a man who mentors a boy to whom he is not related. Recent idioms include bromance, a portmanteau word from brother and romance, pertaining to depictions in popular culture of close platonic friendships among men, and brogrammer, a mash-up of brother and programmer that alludes to assertive, masculine computer programmers, a divergence from the stereotype of technologically adept but physically and socially awkward males. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:85 Synonyms for â€Å"Help†15 Words for Household Rooms, and Their Synonyms5 Tips to Understand Hyphenated Words

Monday, October 21, 2019

Constitutional Monarchy Definition and Examples

Constitutional Monarchy Definition and Examples A constitutional monarchy is a form of government in which a monarch- typically a king or queen- acts as the head of state within the parameters of a written or unwritten constitution. In a constitutional monarchy, political power is shared between the monarch and a constitutionally organized government such as a parliament. Constitutional monarchies are the opposite of absolute monarchies, in which the monarch holds all power over the government and the people. Along with the United Kingdom, a few examples of modern constitutional monarchies include Canada, Sweden, and Japan. Key Takeaways: Constitutional Monarchy A constitutional monarchy is a form of government in which a non-elected monarch functions as the head of state within the limits of a constitution.Political power in a constitutional monarchy is shared between the monarch and an organized government such as the British Parliament.A constitutional monarchy is the opposite of an absolute monarchy in which the monarch has total power over the government and the people. Power Distribution in a Constitutional Monarchy Similar to the way in which the powers and duties of the President of the United States are described in the U.S. Constitution, the powers of the monarch, as the head of state, are enumerated in the constitution of a constitutional monarchy. In most constitutional monarchies, the monarchs’ political powers, if any, are very limited and their duties are mostly ceremonial. Instead, real governmental power is exercised by a parliament or similar legislative body overseen by a prime minister. While the monarch may be recognized as the â€Å"symbolic† head of state, and the government might technically function in the name of the queen or king, the prime minister actually governs the country. Indeed, it has been said that the monarch of a constitutional monarchy is, â€Å"A sovereign who reigns but does not rule.† As a compromise between placing blind trust in a lineage of kings and queens who have inherited their power, and a belief in the political wisdom of the people being ruled, modern constitutional monarchies are usually a blend of the monarchal rule and representative democracy.  Ã‚   Besides serving as a living symbol of national unity, pride and tradition, the constitutional monarch may- depending on the constitution- have the power to disband the current parliamentary government or to give royal consent to the actions of the parliament. Using England’s constitution as an example, British political scientist Walter Bagehot listed the three main political rights available to a constitutional monarch: â€Å"the right to be consulted, the right to encourage, and the right to warn.† Constitutional vs. Absolute Monarchy Constitutional Monarchy A constitutional monarchy is a blended form of government in which a king or queen with limited political power rules in combination with a legislative governing body such as a parliament representing the desires and opinions of the people.   Absolute Monarchy An absolute monarchy is a form of government in which a king or queen rules with total unchallenged and unchecked political and legislative power. Based on the ancient concept of the â€Å"Divine Right of Kings† suggesting that kings derived their authority from God, absolute monarchies operate under the political theory of absolutism. Today the only remaining pure absolute monarchies are Vatican City, Brunei, Swaziland, Saudi Arabia, and Oman. After the signing of the Magna Carta in 1512, constitutional monarchies began to supplant absolute monarchies for a combination of similar reasons, including their often weak or tyrannical kings and queens, failure to provide funds for pressing public needs, and refusal to address valid grievances of the people.   Current Constitutional Monarchies Today, the world’s 43 constitutional monarchies are members of the Commonwealth of Nations, a 53-nation intergovernmental support organization headed by the sitting monarch of the United Kingdom. Some of the best-recognized examples of these modern constitutional monarchies include the governments of the United Kingdom, Canada, Sweden, and Japan. The United Kingdom Made up of England, Wales, Scotland, and Northern Ireland, the United Kingdom is a constitutional monarchy, in which the queen or king is the head of state, while an appointed prime minister leads the government in the form of the British Parliament. Bestowed with all lawmaking powers, the Parliament is composed of the House of Commons, the members of which are elected by the people, and the House of Lords made up members who have either been appointed or have inherited their seats. 28th September 1952: Princess Elizabeth watching her son Prince Charles playing in his toy car while at Balmoral. Lisa Sheridan / Getty Images Canada While the monarch of the United Kingdom also serves as Canada’s head of state, the Canadian people are governed by an elected prime minister and a legislative parliament. In the Canadian parliament, all laws are proposed by a popularly-elected House of Commons and must be approved by the royally-appointed Senate.   Sweden The King of Sweden, while the head of state, lacks any defined political power and serves a largely ceremonial role. All lawmaking power is vested in the Riksdag, a single-chambered legislative body composed of democratically elected representatives.   Japan In the world’s most populous constitutional monarchy, the Emperor of Japan has no constitutional role in the government and is relegated to ceremonial duties. Created in 1947 during the country’s post-World War II U.S. occupation, Japan’s constitution provides for a government structure similar to that of the United States. Newlywed Prince and Princess Hitachi pose at the doorway of the imperial Palace. Bettmann Archive / Getty Images The executive branch is overseen by a royally-appointed prime minister who controls the government. The legislative branch, called the National Diet, is a popularly-elected, bicameral body composed of a House of Councillors and a House of Representatives. The Japanese Supreme Court and several lower courts make up a judicial branch, which functions independently of the executive and legislative branches. Sources Bogdanor, Vernon (1996). The Monarchy and the Constitution. Parliamentary Affairs, Oxford University Press.Constitutional Monarchy. British Monarchist League.Dunt, Ian, ed. (2015). Monarchy: What is a Monarchy? politics.co.ukLearning with the Times: 7 nations still under absolute monarchy. (Nov. 10, 2008) The Times of India

Sunday, October 20, 2019

How to Get Started as a Freelance Writer in 6 Simple Steps

How to Get Started as a Freelance Writer in 6 Simple Steps How to Get Started as a Freelance Writer in 6 Simple Steps How to Get Started as a Freelance Writer in 6 Simple Steps By Ali Hale Would you love to be a freelance writer? Maybe youre hoping to make a bit of money on the side of your day job, or you want to find some work that fits around being at home with your kids much of the day. Perhaps youre hoping to launch a whole new career. You might well be feeling daunted before youve even begun, though. Theres just so much information out there: where do you even start? These  six steps are all you really need in order to get going: Step #1: Find Out How Self-Employment and Tax Works in Your Country Before you start freelancing, it’s important to figure out how self-employment (and particularly tax) works in your own country. You don’t necessarily need to do anything about it right away, but you do need to know what to expect. Here in the UK for instance, sole traders (the simplest set up for a freelancer) don’t have to register with HMRC (the tax authorities) from the first moment they start freelancing. They do need to be ready to submit a self-employed tax return on time, though – e.g. by the end of January 2020 for the tax year 6th April 2018 – 5th Mar 2019. If your country isn’t on this list, just search for â€Å"register as self-employed† and your country name, and you should find plenty of advice. Step #2: Create a  Gmail Account (for Email and Google Docs) Do you have an email address that looks something one of these? chocolatelover@hotmail.com GameofThronesfan@yahoo.com I’m sure it goes without saying that those aren’t very professional looking! Even if your email address uses your name (or your pen name), free providers like hotmail and yahoo have a bit of an â€Å"unprofessional† reputation. Gmail is much better regarded, perhaps because it started out being very popular with techy types, and is now so ubiquitous. So I’d recommend setting up a professional looking email address with Gmail, for now – something like yourname@gmail.com or yournamewriter@gmail.com. One important reason for having a Gmail address is that it also gives you a Google account, which you can use for Google Docs – I find that many clients want to collaborate in this way. If you prefer to have a really professional looking email address, then you’ll need to register a domain name of your own (e.g. mine is www.aliventures.com) and then set up an email address at that domain (mine is ali@aliventures.com). Step #3: Figure Out What Topics You Want to Write About Before you go any further with freelancing, it’s a good idea to figure out what you want to write about. You might think that it’d be best to write about anything and everything, in the hopes you’ll get plenty of work – but the truth is that clients prefer writers who have prior experience in a particular area. You’ll also probably enjoy freelancing more if you’re writing about topics you’re actually interested in. When you’re figuring out which topics to focus on, you might want to consider: Your personal life and experiences – e.g. if you’re a parent to school-age children, you could write about pregnancy, babies, toddlers, etc. Your professional life – e.g. if you work in IT, you might want to specialise in technical writing or in writing for blogs that cover techy topics. Your hobbies – e.g. if you love to craft, then you might want to look for blogs about craft or companies that sell craft supplies to write for. You can switch or add topics as you go forward in your career, but you’ll find it helpful to have some idea of the areas you want to focus on when it comes to the next two steps. Step #4: (Optional) Create a Website You don’t have to have a website in order to freelance – so if this is just a step too far right now, then feel free to skip it. At some point fairly early in your freelancing career, though, you’re going to want to have a web presence. You’ll want somewhere to direct potential customers, whether those are your current contacts, friends of friends, or people who read your guest posts (see Step #5). If you don’t want to spend any money at this stage, I recommend setting up a free website with WordPress.com (just follow their process step by step). Your website will have â€Å"wordpress† in the address, so it’ll look something like yourname.wordpress.com. While this isn’t the most professional option out there, plenty of freelancers do just fine with a free WordPress site – and I think it’s absolutely fine when you’re just starting out. Alternatively, if you’re fairly confident about techy things and if you have a bit of money to invest, I’d recommend purchasing web hosting, registering your own domain name (e.g. yourname.com) and setting up self-hosted WordPress on that site. Most web hosts have a simple â€Å"one click† installation process for WordPress, as it’s so popular. Step #5: Get Some Published Experience Before you can start landing freelancing clients, you need some experience: published pieces that you can show them as examples of your work. But how do you get that experience when you don’t have any clients? One simple way is to write guest posts for large(ish) blogs: a big advantage of these is that your posts will be online, so it’s very easy to send clients a link to them. You can also create a â€Å"Portfolio† page on your website with screenshots of and links to your work. Ideally, you’ll want to target blogs that fit in with the areas you want to write about, so that you’ve got relevant freelancing clips. Most guest posts are written for free, and although some freelancers feel you should never work for free, I think it makes sense to do so when you’re just starting out. (Don’t spend ages at this stage, though; three to five published pieces should be plenty.) You’ll almost always get the opportunity to write a â€Å"bio† to go along with your guest post (normally at the bottom of it). You can use this to promote your freelancing services, writing something like: Ali Luke is a freelance writer, specialising in blog content for small businesses. You can find out more about her and her services at  www.aliventures.com. If you want to freelance for magazines or print publications, rather than blogs or websites, then you’ll want to look for ways to get some experience with print. A good place to look is local free newspapers and magazines – they probably won’t be able to pay, but they’ll likely be very willing to publish your work. Step #6: Start Finding Clients If there’s one thing you take away from this post, make it this: Don’t use content mills. If you’re not sure what a content mill is, it’s a site where you sign up and get sent writing jobs. They often promise lots of work, or tell you how much writers can make – but the reality is that they pay peanuts. They often call themselves â€Å"article writing services†. Textbroker is a well-known one; Copify and iWriter are other examples. Content mills can’t afford to pay much, because their main selling point to their clients is that they’re a cheap way to get lots of content. So where else can you find work? Let family and friends know that you’re freelancing, and tell them what type of work you’re looking for. You never know when someone will know someone! Look at the ProBlogger jobs boards and Freelance Writing Gigs’ daily round-up of writing work. (There are plenty of other similar job boards online, but I’ve found that between these two, they cover all the good opportunities.) Pitch directly to websites (or magazines, or whatever type of publication you want to write for). Target local clients, perhaps with an ad in a local paper, shop window, or library, or by attending local small business networking events. Browse the website of companies that offer services related to your niche and in case they dont have a regularly updated blog contact them offering your writing services and explaining the benefits that fresh content would bring to their website. Think beyond writing articles. You can offer services such as crafting email marketing campaigns, writing e-books and reports, website editing and proofreading and so. Finding your first paying client can feel like a huge hurdle but once youve found one client, more will follow. In case you want more help, I have a 6-week program that covers all the aspects of getting started as a freelance writer, from improving your writing productivity to landing high-paying gigs, from promoting yourself online to running your freelance business efficiently. The course has been offered for 8 years and over 1300 students enrolled during that time. I offer a complete money back guarantee, and surprisingly no one ever asked for it! In order to celebrate its eighth anniversary we are offering the course for just $29, so check it out below before the promotion ends. Above all, if you decide to try freelance writing, make sure you persevere. Getting results takes time, as with virtually all endeavors in life, and the biggest mistake I see aspiring freelance writers making is giving up too soon. Hang in there for 6 to 12 months before you evaluate your results. Good luck! Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Freelance Writing category, check our popular posts, or choose a related post below:Apply to, Apply for, and Apply withRules for Capitalization in Titles15 Names and Descriptions of Effects

Saturday, October 19, 2019

Pop Culture and Technology Assignment Example | Topics and Well Written Essays - 250 words

Pop Culture and Technology - Assignment Example The technology is fairly simple and involves the in cooperation of lasers, maps and cameras that are sufficient in ensuring that the car remains on the same path and maintains a certain distance from other vehicles and obstacles. The U.S military has also invested in this technology. This technology is also feasible and useful as people who have disability and are at ages where they are unable to operate vehicle can safely commute to different areas. This technology has positive sociological implications as it is likely to help the less competent due to several pathologies or physiological ageing. In addition, it can reduce the number of deaths that occur in military conflicts as they will be no humans in the vehicles. There are some problems however, that involve the ability of the technology to make immediate decisions in some situation that may require human intuition. This is the main reason why debate still exists on the use of these vehicles today. John Anderton had surgery to replace his eyes. This surgery was to ensure that the retina scanners were incapable of detecting him. He kept his old eyes to ensure that he still had access to the entrance of Precrime (Molen et al., 2002). The minority report is coined after the vision of Agatha and the 2 other precogs. In the movie, Agatha sees the true future all the time and this is usually similar to the vision of the precogs, which sometimes only see the â€Å"possible future†. However, when her vision conflicts with the precogs it is labeled a â€Å"minority report† (Molen et al.,

Corporate finance Essay Example | Topics and Well Written Essays - 2000 words - 4

Corporate finance - Essay Example Breakavia is a newly formed country. The country has been formed recently by splitting from earlier communist states. The newly formed government of this country has recognised that there are many advantages in developing a democratic country and forming capital principles to regulate the country. Government also identified that the country has enough natural resources like oil and mineral reserves and therefore, it can functions as an independent state depending upon these huge natural resources sufficient for sustainable development of the country. As a newly developed country, the government thinks to invite the European multinational companies to enter to this market and use the natural resources which lead to overall development of the country in terms of many areas like economic development and employment and many more. For this purpose, the finance department of the country has decided to develop a standard tax regime and banking systems which will provide low cost finance for commercial and domestic housing development opportunity for developing tourism industry in the country. The government is also aiming to setting up Stock Exchange in Heeritis, the capital of this newly formed country. Therefore, to develop corporate sectors consists of domestic as well as foreign companies; the government is seeking corporate financial advice regarding development of a standardised corporate reporting for regulating businesses sector in the country. For this purpose, the finance minister of this country needs advice regarding two important areas of corporate finance. First, advice for standardised corporate reporting development by adopting any existing international standardised financial reporting. Second is importance of corporate governance in business and as an important part of annual corporate report the companies. International Accounting Standard

Corporate finance Essay Example | Topics and Well Written Essays - 2000 words - 4

Corporate finance - Essay Example Breakavia is a newly formed country. The country has been formed recently by splitting from earlier communist states. The newly formed government of this country has recognised that there are many advantages in developing a democratic country and forming capital principles to regulate the country. Government also identified that the country has enough natural resources like oil and mineral reserves and therefore, it can functions as an independent state depending upon these huge natural resources sufficient for sustainable development of the country. As a newly developed country, the government thinks to invite the European multinational companies to enter to this market and use the natural resources which lead to overall development of the country in terms of many areas like economic development and employment and many more. For this purpose, the finance department of the country has decided to develop a standard tax regime and banking systems which will provide low cost finance for commercial and domestic housing development opportunity for developing tourism industry in the country. The government is also aiming to setting up Stock Exchange in Heeritis, the capital of this newly formed country. Therefore, to develop corporate sectors consists of domestic as well as foreign companies; the government is seeking corporate financial advice regarding development of a standardised corporate reporting for regulating businesses sector in the country. For this purpose, the finance minister of this country needs advice regarding two important areas of corporate finance. First, advice for standardised corporate reporting development by adopting any existing international standardised financial reporting. Second is importance of corporate governance in business and as an important part of annual corporate report the companies. International Accounting Standard

Friday, October 18, 2019

Expectation Interest Coursework Example | Topics and Well Written Essays - 1000 words

Expectation Interest - Coursework Example Usually, the defendant would be awarded damages that equal to the cost of cure. For most defective goods, that equals to the diminution in their value. But for some defective goods, the diminution in value is not equal to the cost of cure (Ruxley Electronics v Forsyth (1996)). In those instances, the courts would ascertain damages that are just and fair pertaining to the merits of the case. These are called ‘loss of amenity’ damages (see Ruxley).   Where the breach is caused by non-delivery, the buyer may also sue for damages which would be calculated by the difference between the market value and the contracted value of the good (s. 51 SGA 1979). If, on the contrary, the buyer refuses to pay, the seller can claim for the loss of profits on the good (Charter v Sullivan [1957]).Reliance loss  This seeks to put the claimant into the position as if he never entered into contract (McRae v Commonwealth Disposals [1950]). Often, the reliance interest is already covered by the expectation interest.Restitution Interest   In this claim, the contract is set aside and the claimant seeks to obtain the price paid for goods that were not delivered (Whincup v Hughes [1871]). This claim may also be used to recover profits that the defendant made as a result of the breach (Attorney-General), though it is only allowed when other forms of remedies are exhausted and even then, the courts may order the defendant to award the claimant a share of the profit instead of the entire sum. The claimant is also under a duty to mitigate losses.... Thus, if both parties knew that the claimant was going to use the goods to make a profit, he is entitled to recover those lost profits (Victoria Laundry (Windsor) Ltd v. Newman Industries Ltd (1949)). Damages for pain and suffering may also be awarded where the claimant has expressly stated his concerns (such as presence of aircraft noise before buying a new property close to the airport) at the time of contract (Farley v Skinner [2001]) A claim for damages will fail if the damages are too remote. It will also fail if there is no causal link between breach and damage, and independent third party acts (London Joint Stock Bank v. Macmillan [1918]), natural events (see Monarch Steamship v Karlshamns [1949]) and claimant’s own unreasonable acts (Lambert v. Lewis [1982]) will keep the claim from succeeding. Word Count: 510 Q.2 Becka would be looking to pursue her remedies for breach of contract, as there is a possible breach of s. 14 of the SGA 1979. On the facts, she is a consumer , which brings in operation s. 15 conferring on her a right to reject the goods and be awarded damages at the same time at the discretion of the courts. The car was described in the ad as â€Å"regularly serviced, 2007 model†¦Ã¢â‚¬  along with other traits. S.14(2) of the SGA requires the car to be of satisfactory quality and s.14(3) requires it to be fit for purpose. Since Tower Hill is a business, these two are conditions. However, these conditions do not apply where the buyer has inspected the goods before purchasing or defects have been specifically brought to her attention before buying. Becka’s test drive may bar her from claiming on faults that she ought to have noticed. However, the facts are

Pollution Essay Example | Topics and Well Written Essays - 2500 words

Pollution - Essay Example â€Å"Total six percent of maritime transport of the world is done through and on the coasts of Red Sea. Red Sea is connected to Egypt, Saudi Arabia, Jordan, Syria, Sudan, Israel, Yemen, and Djibouti. Not only is the maritime trade, tourism also one of the most significant factors†. (Nasser, 2003). Red sea is one amazing body of water with high salinity and wonderful marine life which attracts hundreds and thousands of people from around the world every year. It is stuck among some of the most important countries of the world, hence all the Tourism. Despite all the beauty and utility, the security and survival of the sea is a major concern. Red Sea’s coral reef, eco system, and marine life is in danger because of the oil spill, waste dump by all the surrounding countries, mighty natural evaporation and lack of input by any rivers, and last but not the least is absence of awareness among the government and responsible people about the issue. Red Sea is no longer a scene of pure nature and complete harmony. Unnecessary buildings in the form of hotels and restaurants in order to accommodate tourists, has also diminished the natural and awe and beauty of the place. The concerns of the area not restricted. There are numerous problems affecting Red Sea. One of which is unrestricted fishery. The adjoining countries have been unable in bringing about effective rules and regulations for fishery and the consequence is disappearance of world’s precious species and marine life. Apart from unhindered developments of tourist resorts and unrestricted fishery, Oil spill in the area is also a huge concern. Since the sea is a major connection connecting Europe with Asia, it has numerous ships in waters at bays all the time and this causes mighty pollution. One of the factors to be understood is that the Countries that surround the sea are oil rich countries. They export oil and their oil rigs are almost constantly present in the sea and they

Thursday, October 17, 2019

Strickland vs. Washington, 466 U.S. 668 (1984) Research Paper

Strickland vs. Washington, 466 U.S. 668 (1984) - Research Paper Example He said that his lack of ability to support his family caused the stress. While the attorney was preparing for the hearing, although he spoke with the defendant about his background, he failed to ask for a psychiatric evaluation of the defendant, to seek a presentence report or to look for character witnesses. His decision of not presenting evidence concerning the emotional state and character of the defendant reflected his judgment that as to such matters, relying on the plea colloquy for evidence was advisable in order to avert the State from carrying out a cross-examination on the defendant as well as presenting its own psychiatric evidence. The article further states that the reason behind the defense attorney not requesting a presentence report was that it would have included the criminal history of the defendant, which would in turn undermine the claim that he did not have any considerable prior criminal record (1). Finding no extenuating circumstances that would make it rule otherwise, the trial court pronounced a death sentence on the defendant. The defendant, following the exhaustion of his state court remedies, filed a habeas corpus petition in a federal district court in Florida. He challenged the death sentence arguing that there had been a violation of his Sixth Amendment right for the reason that during the sentencing proceeding, his defense counsel had not represented him effectively/adequately. Subsequent to an evidentiary hearing of the defendant’s claim of ineffective assistance of counsel, the District Court denied relief. Although the Florida’s federal district court rebuffed the petition, the defendant appealed in the United States’ Court of Appeals for the Fifth Circuit, which reversed it holding that according to the Sixth Amendment, criminal defendants had a right to receive plausibly effective help from the counsel given the totality of the

Why I am not a Vegan Personal Statement Example | Topics and Well Written Essays - 750 words

Why I am not a Vegan - Personal Statement Example Discussion and facts backed up by authentic research which are presented in this paper are basically meant to illuminate the reality of the claim that we humans are naturally meant to eat meat not only because our digestive systems are well suited to break down animal protein, but also because meat bags higher position on the scale of food value than plant sources. I am proud on not to be a vegan because meat fulfils my daily energy requirements better than plant foods ever can do. I find people around me, who happen to be rigid vegetarians, munching different types of snacks all day long because their energy requirements do not get fulfilled by relying on plant sources alone like tofu, soybeans, etc. and their vigor markedly recedes consequentially. In order to meet with the amount of calories required to be consumed by a person per day, vegetarians have to cook and eat some portion out of every item from a variety of plant foods at one time while people who do not hesitate in indul ging with meat consumption do not have to go through any such trouble. One meat item is more than often found equivalent to a variety of plant foods, therefore though vegetarians may claim that relying less on meat sources can save humans from many cardiovascular disease, this also remain an open reality that saying goodbye to meat means a great decline in human energy level which gets distorted as a result of consuming vegetables low in food value. People should consume meat fearlessly because even if certain diseases are found to be linked with certain cardiovascular diseases like high blood pressure and heart attacks, this issue can be ruled out easily by reducing the amount of meat consumed on daily basis, rather than quitting meat altogether and following fake vegetarian concepts like eating a meat burger can be anything close to an unethical act. One credible defending point which can be used by meat lovers against vegetarians is that plants would be extinguished today if all humans become vegetarians which would leave no food for cattle as well. â€Å"If we only consumed plants, all the farmland now used to raise livestock would have to be used to raise edible plants, which could mean no livestock† (Hayward). I am also not a vegan because eating vegetables alone can never provide me with the kind of stamina and power which is required to fight various infection and diseases by a normal human being. Research identifies that eating meat not only maintains the balance of sound body health, but it also helps one in combating against several infections by providing enough strength to a person. It also remains a reality that though many efforts are made by vegetarians to advance their cause of saving animals and relying on vegetables, meat forms a fuller source of food for humans than vegetables or other plant sources do. Meat does not happen to be a source of high quality protein alone but research shows that it does much more to enhance human health because â€Å"its loaded with other healthful goodies, including high levels of: iron; B vitamins like niacin and riboflavin that provide healthy skin and nerves as well as help digestion† (Opposing Views, Inc.). Slacking around with minimal energy but showing off by maintaining a slim body status does not seem to form a very excitable idea for me to cut down on meat and go for plant foods,

Wednesday, October 16, 2019

Strickland vs. Washington, 466 U.S. 668 (1984) Research Paper

Strickland vs. Washington, 466 U.S. 668 (1984) - Research Paper Example He said that his lack of ability to support his family caused the stress. While the attorney was preparing for the hearing, although he spoke with the defendant about his background, he failed to ask for a psychiatric evaluation of the defendant, to seek a presentence report or to look for character witnesses. His decision of not presenting evidence concerning the emotional state and character of the defendant reflected his judgment that as to such matters, relying on the plea colloquy for evidence was advisable in order to avert the State from carrying out a cross-examination on the defendant as well as presenting its own psychiatric evidence. The article further states that the reason behind the defense attorney not requesting a presentence report was that it would have included the criminal history of the defendant, which would in turn undermine the claim that he did not have any considerable prior criminal record (1). Finding no extenuating circumstances that would make it rule otherwise, the trial court pronounced a death sentence on the defendant. The defendant, following the exhaustion of his state court remedies, filed a habeas corpus petition in a federal district court in Florida. He challenged the death sentence arguing that there had been a violation of his Sixth Amendment right for the reason that during the sentencing proceeding, his defense counsel had not represented him effectively/adequately. Subsequent to an evidentiary hearing of the defendant’s claim of ineffective assistance of counsel, the District Court denied relief. Although the Florida’s federal district court rebuffed the petition, the defendant appealed in the United States’ Court of Appeals for the Fifth Circuit, which reversed it holding that according to the Sixth Amendment, criminal defendants had a right to receive plausibly effective help from the counsel given the totality of the

Tuesday, October 15, 2019

Academic Honesty Essay Example | Topics and Well Written Essays - 1250 words

Academic Honesty - Essay Example Dishonesty among students can be suppressed to ease implementation of academic policy program me. It is the mandate of one who receives a scholarship to out-source information and seek for guidance in all his undertakings. It is through this that he will get adequate knowledge on the ongoing programmed policies. Honesty adherence reflects one’s commitment to willingly and readily work under any management. Ignorance of the outlaid policies is not in any way a defense mechanism to evade punishment. Lecturers expect students to produce their own assignments and highly avoid duplication of their colleagues’ work (Kirkland, 2009). A well formulated honesty policy depicts a fine image of the institution to the external human race. The school managerial team would come up with several guidelines to emerge to an academic honesty policy statement. It should be strictly adhered to and its violation be considered un- invulnerable. The motive behind the formulation of an academic honesty policy would vastly be to eliminate the negative students’ behaviors in which failure to instantly deal with them lead to adverse results. This eventually portrays a dull picture of the institution to the outsiders. The criteria used in its formulation has to side with both the institution as well as the students. (That is, it favors all the parties assisting in its formulation). This is through ensuring that the organization of an Academic Honesty Committee involves both the students’ council and the institute’s legitimate decipherable team. The standards of this honesty policy should not limit the students to receiving of the assistance they seek. It should subject students to discipline as soon as they violate the set standards. In it, lecturers outline procedures, which the students follow and avoid being dishonest (Choong & Brown, 2007). There are also the measures to be taken and applied as one must face the consequences of his mistake. However, students should anticipate for a better follow up of the policy and ensure they operate within its basics as they look forward to both positive and negative reinforcement. Instructors assertively apply disciplinary measures on the policy breakers and hence help to bring down resistance to the policy. It is worth noting that, the st udents are ready and satisfied when a certain set sequence of dealing with policy violators is administered on them (Choong & Brown, 2007). This is due to the reason that the students’ council is involved in the giving out of ideas in the formulation of this policy. This then makes them not to resist to any action their instructors administer on them. Punishment should be applied to the violators and is done best by reporting to the body chosen to give authorization to the policy. The committee looks forward to a positive adherence of students presumed to be alluding to the so-called policy. The disciplinary measures to be applied must be made known to them and it is the obligation of the council to substantiate the norms required of students. They edify them through various ways such as prevention, confrontation and lastly by reporting. In prevention, there is prior knowledge of the honesty policy, which the lecturers partially give to the students during their admissions to the various campuses. Such information gives the scholar a hint on the institution’s programs (Kirkland, 2009). The three are also ways of evading academic dishonesty. Academic wise, the instructors set assignments, which first oblige an open discussion and later assign them some exceptional responsibilities to partake. When student get involved in

Monday, October 14, 2019

Symbolism in the novel The Great Gatsby Essay Example for Free

Symbolism in the novel The Great Gatsby Essay F. Scott Fitzgerald uses much symbolism in his literature, here in the novel The Great Gatsby. He uses the image of Doctor T. J. Eckelburgs eyes to symbolize a godlike being. Fitzgerald uses the symbol of the two women in yellow at Gatsbys party to represent the values of the 1920s. The food provided at Gatsbys party symbolically represents the members of 1920s society. F. Scott Fitzgerald uses Symbolism in the novel The Great Gatsby as an accurate reflection of life in the American 1920s. In The Great Gatsby the symbol of T. J. Eckelburgs eyes represent a godly being watching over society. Fitzgerald incorporates the eyes into his novel to represent a pair of all seeing, all knowing and judging eyes, which are meant to intimidate. The character of George Wilson believes that the eyes are the eyes of God. I spoke to her, he muttered, after a long silence. I told her she might fool me but she couldnt fool God. I took her to the window- With an effort he got up and walked to the rear window and leaned his face pressed against it, -and I said God knows what youve been doing, everything youve been doing. You may fool me but you cant fool God! Standing behind him Michaelis saw with a shock that he was looking at the eyes of Doctor T. J. Eckleburg, which had just emerged pale and enormous from the dissolving night. God sees everything, repeated Wilson. (p.167) Through Wilsons beliefs Fitzgerald explains that the eyes can see everything including Myrtlesinfidelities. Myrtle is a typical person of the 1920s. She has put her own life and interests ahead of everyone elses including her husbands. The eyes of God are frowning down on the 1920s society. But above the grey land and the spasms of bleak dust which drift endlessly over it, you perceive, after a moment, the eyes of Doctor T. J. Eckleburg. The eyes of Doctor T. J. Eckleburg are blue and gigantic-their retinas are one yard high. The look out of no face but, instead, from a pair of enormous yellow spectacles which pass over a non-existent nosehis eyes, dimmed a little by many painless days under sun and rain, brood on over the solemn dumping ground.(p.27-28) Through Fitzgeralds wording in describing the image of Eckleburgs eyes the reader develops a mental image of an omnipotent being who is constantly watching over the land. The reader discerns that the eyes not only see  everything but that they eyes are morbidly unhappy. The use of the word brood suggests that whatever the eyes are seeing has made their owner disappointed. This is Fitzgeralds way of indicating that the people of the 1920s are disgraceful and undignified because of their selfishness. People of the 1920s spent large sums of money on themselves, and they would attend parties where they didnt know the host. This type of behaviour is why the 1920s are known as a decadent era. The eyes not only symbolize a god-like being but also Fitzgerald himself and his negative views of 1920s society. Fitzgeralds negative views of society are also portrayed through his depiction of certain guests at Gatsbys parties. The symbol of the two women dressed identically in yellow at Gatsbys party depict the values of the people of the 20s. The two women in yellow meet Jordan and Nick at one of Gatsbys party and are entirely self involved. Do you come to these parties often? inquired Jordan of the girl beside her. The last one was the one I met you at, answered the girl in an alert, confident voice. She turned to her companion: Wasnt it for you Lucille? It was for Lucille too. I like to come, Lucille said I never care what I do, so I always have a good time. When I was here last I tore my gown on a chair, and he asked me my name and address- inside of a week I got a package from Croiriers with a new evening gown in it.(p.47) Lucille admits that her general attitude toward life is that she doesnt care what she does as long as she has a good time. Her entire motivation in her life is to enjoy herself. When all she was asked was if she came to the parties often she also felt the need to inform the rest of the guests of her trivial anecdote. The reason that these women are indicative of the generation is because of their self-absorbed character and their egotistical nature. Gatsby. Somebody told me- The two girls and Jordan leaned together confidentially. Somebody told me they thought he killed a man once. A thrill passed over all of us. The three Mr. Mumbles bent forward and listened eagerly. I dont think its so much that, argued Lucille sceptically; Its more that he was a German spy during the war. One of the men nodded in confirmation. Oh know it couldnt be that because he was in the American army during the war.(p.48) The two women are spreading vicious rumours about their host purely for the sake of attention. They are so egotistical that they are  willing to tarnish the reputation of the man who has invited them into his house, simply on the basis that they want to be the centre of everyones attention. In Fitzgeralds opinion, people of the 20s were mainly made up of this type of person. The symbols of the food served at Gatsbys party represent and personify the people of the 20s. Gatsbys house frequently receives crates of oranges which demonstrates the wasteful character of people in the 1920s. Every Friday five crates of oranges and lemons arrived from a fruiterer in New York-every Monday these same oranges and lemons left his back door in a pyramid of pulpless halves. (p.45) This incredible wastefulness is representative of people who lived in the 1920s. They were wasteful to the extreme because they assumed that they deserved to be wasteful and carefree. After so many years of being unhappy from, among other things, World War I. During the war, they were forced to ration everything, so the twenties was the time to gain back their selfishness. Their personalities are also symbolised by the colossal food buffet served at the party. On buffet tables, garnished with glistening hors doeuvre, spiced baked hams crowded against salads of harlequin designs and pastry pigs and turkeys bewitched to a dark gold. (p.44) These symbols all personify the people of the 20s. The people garnished themselves in glistening jewels and clothing just to impress the people that they met. They are all spiced implying that they have made themselves into something that they are not by spicing up their lives with fancy clothing and costumes which hide who they really are. They design themselves as they think they will be most accepted, and are bewitched by the brightness and glow of popularity and richness. People of the twenties wore costumes and this is part of what Fitzgerald is trying to convey. In the novel The Great Gatsby, Fitzgerald uses the literary technique of symbolism to reflect what life in the 1920s was like, through Fitzgeralds eyes. The image of Doctor T. J. Eckelburgs eyes is used to signify a disappointed godlike being. Fitzgerald uses the two women in yellow at Gatsbys party to as a symbol to represent the values of people in the 20s. The food provided at Gatsbys party is symbolic of people who lived in the  20s. Through Fitzgeralds use of symbolism to describe the costumed characters of the 20s the reader can learn to constantly, and consistently examine the people that they surround themselves with. The novel also teaches the lesson of being true to ones self, since true closure may only come once honesty is achieved. Fitzgerald is not only a consequential author but an effective moral adviser as well. Bibliography: Fitzgerald, F. Scott. The Great Gatsby. Macmillan Publishing Company. New York. 1992.

Sunday, October 13, 2019

Birth Control Through the Times Essay -- Contraceptives, Birth Control

The idea of men and women having control of their familial future is nothing new. In fact, the use of contraception dates back to ancient Egyptian times. Despite the controversy that often surrounds the use of birth control, history shows that the need for pregnancy prevention existed even before most modern religions were established. This paper will cover the colorful history of what we now know as birth control, through the centuries and up to modern times. Hopefully, this can give the audience a good idea about how necessary this concept is, and to look at the idea of controlling your destiny with objectivity. Beginning in ancient times, people saw a need to control the amount of children that they may have. One civilization in particular, the ancient Egyptians, had novel approaches to birth control. Drawings found from the time, around 3000 B.C., depicted men wearing condom like devices. This civilization also had what is called a pessary, which is an object or mixture that is inserted into the vagina to block or kill sperm. Some of their mixtures may have included pebbles, crocodile dung, or even rock salt. The Egyptians also used sea sponges drenched in lemon juice; much like a woman today might use a sponge with a spermicidal. The Egyptians weren’t the only ancient civilization to utilize birth control methods; the ancient Greeks used a method of post coital birth control. This method was employed when the couple was done with sexual intercourse, and the woman was to squat and apply pressure to the abdomen to rid the vagina of semen. Yet another approach from within the same ti me period was that of Aristotle, who recommended that women â€Å"anoint that part of the womb in which the seed falls† with olive oil, cedar oil, or f... ...e or not to have children. This is a pattern that will no doubt persist in the future as long as laws allow it. With that said, hopefully some insight can be gained by learning about the history of birth control, and perhaps it can demystify this taboo that no one wants to talk about. Works Cited Clemmitt, Maricia. "Controversies of Women's Access to Birth Control." Women's Health 2006. Gale Opposing Viewpoints in Context. Web. 18 Feb. 2012 Cornblatt, Johanna. "The History of Birth Control." Newsweek - National News, World News, Business, Health, Technology, Entertainment, and More - Newsweek. Newsweek, 2009. Web. 18 Feb. 2012. "Religious Views on Birth Control." Wikipedia. Web. 18 Apr. 2011. http://www.wikipedia.org. Stacey, Dawn. â€Å"What Do Religions Say About Birth Control and Family Planning?† About.Com 2011. www.about.com. Web. 5 March. 2012.

Saturday, October 12, 2019

Sigmund Freud’s Interpretation of Sophocles’ Oedipus Tyrannus Essay exa

Sigmund Freud’s Interpretation of Sophocles’ Oedipus Tyrannus Throughout the years, there have been many interpretations of Sophocles’ Oedipus Tyrannus. However, one of the most interesting interpretations of the play would have to be one that uses the theories of Sigmund Freud to analyze the actions of the characters. The use of various aspects of Freudian theory such as the id, ego, superego, and the Oedipus Complex reveals Oedipus and his behaviors throughout the course of the play. In order to completely understand Oedipus and his actions, we must first understand the basics of Freud’s theories. One of the most well known aspects of Freudian theory is the Oedipus Complex. We can already see a relationship between the Oedipus Complex and the play just by looking at the name of this particular theory. The Oedipus Complex is a characteristic of young boys in which they experience a strong attachment toward their mother and feelings of hatred and jealousy toward their father. "The ‘little man’ would like to have the mother all to himself. The father’s presence is disturbing [to the boy]. When the [father] shows tenderness toward the little boy’s mother, the little boy is irritated, and he expresses satisfaction when the father is away or on a journey" (Mullahay 25). The young child would like to have his mother’s attention at all times, and he would also like to have his father out of the picture. The Oedipus Complex theory also states that the boy may not only want his father out of the picture, but he may also want to be in his father’s place when it comes to having sexual relations with the mother. According to Freud, many boys have this strong desire to be sexually intimate with their mother. Another of Freud’s theo... ...known of his secret desires and wanted to castrate him. In this way, castration theory can be related to the Oedipus Complex and the theory of the id, ego, and superego. To many, Freud’s theories seem bizarre and eccentric. Once we learn and understand his ideas, we can see how these theories can be connected with Oedipus Tyrannus. Now that we understand Freud’s ideas, and his interpretation of Oedipus Tyrannus, we can make our own judgements and form our own thoughts and ideas of the play. Works Cited: Mullahay, Patrick. Oedipus Myth and Complex. A Review of Psychoanalytic Theory. New York: Hermitage Press, 1951. "Psychoanalytic Criticism." Assumptions College. Worcester, Massachusetts. October 11, 2000 http://www.aswsumption.edu/HTML/Academic/users/ady/HHGateway/Gateway/Psychapp.html. Rudnytski, Peter. Freud and Oedipus. New York: Columbia UP, 1987.

Friday, October 11, 2019

Library System

Chapter I The Problem and Its Background 1. 1 Background of the study The role of the Gordon Heights National High School Library Booking system is to help manage the effectiveness of library services. A Library system can help in creating an organize list of borrowed and returned books. Not every school that have a library has a library system; it is commonly manually operated by the librarian. Meaning the librian manually writes or saves borrowed or returned books in a writing material. Students make use of their library card before they can borrow any books.The librarian proceeds with the process of lending books by the students through the use of library card. The school is planning to switch from a manual system to an automated system so that the files are not all over the place and lessen the time in terms of borrowing and processing of books. Figure 1 Vicinity Map Figure 1 Vicinity Map Vicinity Map Bernadette F. Tamayo Asst. Schools Division Superintendent Bernadette F. Tamayo Asst. Schools Division Superintendent Organizational Chart DR. Roger L. Nuque ES 1-Mathematics Secondary DR. Roger L. Nuque ES 1-Mathematics SecondaryLourdes G. Gonjoran ES 1- ALS, Private Schools Lourdes G. Gonjoran ES 1- ALS, Private Schools Ricardo E. Ednave ES 1-Values Education Secondary Ricardo E. Ednave ES 1-Values Education Secondary Dr. Roland M. Fronoa ES 1-AP, Music & Arts Secondary Dr. Roland M. Fronoa ES 1-AP, Music & Arts Secondary Daniel P. Miguel ES 1-EPP,TLE, Disaster Preparedness Daniel P. Miguel ES 1-EPP,TLE, Disaster Preparedness Nelson Oliva ES 1-Filipino Secondary Nelson Oliva ES 1-Filipino Secondary Saturnino D. Dumilao ES 1-MAPEH Secondary Saturnino D. Dumilao ES 1-MAPEH SecondaryMarietta G. Abuhin ES 1-TLE Secondary Marietta G. Abuhin ES 1-TLE Secondary Samuel Boqueron ES 1-Science Secondary Samuel Boqueron ES 1-Science Secondary Teresita F. Edquiban Administrative Officer V Teresita F. Edquiban Administrative Officer V Figure 2 Organizational Chart 1. 2 Co nceptual and Theoretical Frameworks Theoretical Framework The Theoretical Framework illustrates the current manual process of the daily transactions of the Gordon Heights National High School Library. First, the student needs to present the book and give the library card to the librarian.The librarian will confirm and manually records and write the book information, date received and date to return in a library slip. The student will receive the book and the library slip. INPUT PROCESS OUTPUT Student gives the library card and the book to the librarian. Student gives the library card and the book to the librarian. Librarian records the information and also writes the book information in a library slip. Librarian records the information and also writes the book information in a library slip. The student receives the book he/she borrowed with the library slip.The student receives the book he/she borrowed with the library slip. The librarian receives the book and returns the library ca rd to the student. The librarian receives the book and returns the library card to the student. The Librarian updates the information and checks if there is any penalty. The Librarian updates the information and checks if there is any penalty. Student/s returns the book he/she borrowed and presents the library slip to the librarian. Student/s returns the book he/she borrowed and presents the library slip to the librarian. Figure 3 Theoretical Framework Conceptual FrameworkThe conceptual Framework illustrates the process of the proposed system. The librarian manages the Library through the system. In the system the student will give the book and the book information to the librarian. The librarian will verify the book if available through the system, if it is available the librarian will take the library card. The student will then receive the book. INPUT PROCESS OUTPUT Book records database is updated and returns the library card. Book records database is updated and returns the lib rary card. Librarian updates the book’s information and the book record.And verify if there is a penalty charge. Librarian updates the book’s information and the book record. And verify if there is a penalty charge. Students return the borrowed book/s and give the library card. Students return the borrowed book/s and give the library card. Librarian lends the book and the information will be save in the database Librarian lends the book and the information will be save in the database Librarian will check student’s information, the book’s information and then she/he will input the information Librarian will check student’s information, the book’s information and then she/he will input the informationStudents borrow the books and present it to the Librarian with their Library card. Students borrow the books and present it to the Librarian with their Library card. Figure 4 Conceptual Framework 1. 3 Statement of the Problem General Since the li brary use a manual system, the work load of the librarian is increased. Manual processing consumes more time and effort. The library needed to be organized and accurate. Specific 1. The said Manual System is time consuming. 2. Frequent loss of data. 3. Duplication of data may occur. 4. No security regarding confidential information. 1. 4 Research Objectives General ObjectivesTo provide a Library Booking System for school library that will provide library functions and lessen work. The objective of the project is to keep information of books such title of the book, name of the book, author and any other important information. Specific Objective 1. To be able to create a system that can fasten the workloads of the librarian. 2. To develop a system that can back-up data to prevent loss of data. 3. To provide an accurate and non-repeatable data with the use of the system. 4. To ensure a more secured system that the librarian can only access. 1. 5 Significance of the ResearchThe benefici aries for the proposed system will consist of the students who are the end users and the librarian as the administrator. The librarian will benefit because the workloads that was time consuming will fasten. Each transaction would not take-up much time. It will also lessen the chances of confusion or data error. With the proposed system, the librian/user can learn basic computer knowledge. Their computer handling skills will be developed by applying it in the proposed system. This proposed system will mostly remove or lessen the manual procedures therefore improving work efficiency and ease of work. . 6 Scope and limitation The objective of this system is to keep information of books such as titles of the books, names, authors and etc. The system also keeps information of borrowed and returned transactions. As our database, we will be using Microsoft Access and will also use Microsoft Visual Basic 2006 as our program language. The system is only accessible to the librarian. 1. 7 Defi nition of Terms Library – a place set apart to contain books, periodicals, and other material for reading, viewing, listening, study, or reference, as a room, set of rooms, or building where books may be read or borrowed.Librarian – A person who is a specialist in library work. System – A set of interacting or interdependent components forming an integrated whole. Database – a large amount of information which is stored in a computer. Chapter II Review of Related Studies This chapter includes the review of related literatures gathered during data collection by the researchers. The survey of the related studies is a crucial aspect of the planning of the study. These literatures have been used as basis and guidelines in developing the proposed system. . 1 Related Studies 2. 1. 1 Foreign The University of Chicago Library http://www. lib. uchicago. edu/e/about/factsheet. html As a center of intense intellectual inquiry, the University of Chicago Library share s with the University of Chicago the aspiration to be the most dynamic research and learning environment in the world, supporting the University's commitment to research and teaching in the sciences, social sciences, humanities, and the College and to using its intellectual resources to help solve the world's problems.Forty-five percent of the Library’s collections are non-English and published outside the United States, supporting faculty research with a global impact and making the Library a mecca for international scholars. The Library is a leading advocate of digitization as a method of preservation and has created 50 digitized collections that are accessible online, with items ranging from medieval manuscripts to early editions of Chopin scores to maps of Chicago before and after the Fire.The Library also works with faculty to preserve electronic research data including the Sloan Digital Sky Survey and the Oriental Institute’s Persepolis Fortification Archive. Ten nessee Electronic Library TEL(n. d. ). Retrieved from: http://tntel. tnsos. org/about. html The Tennessee Electronic Library (TEL) is a virtual library that you can access from your home pc, your school library computer lab, or your iPhone – anywhere with an internet connection.TEL provides access to over 400,000 electronic resources, including magazines, scholarly journals, podcasts, videos, e-books, test preparation materials, federal census records, Tennessee primary source materials etc. All types of not-for-profit libraries participate in TEL and benefit from the wide range of information TEL databases offer, including homework help to new readers, consumer health information, business resources, leisure reading suggestions, current event essays, academic and civil service test preparation help, and genealogy and family history sources.Over 1. 2 million searches are performed each month across the various TEL databases. Since 1999, the Tennessee Electronic Library has be en dedicated to providing equal access to this expansive collection of electronic resources for all Tennesseans. At its inception, the Tennessee Electronic Library provided access to 18 databases that covered a variety of subjects, including humanities, education, business science, current events, art, politics, economics, social sciences, law, health, computers, environmental issues and general interest topics.TEL has grown into a resource of 33 databases supplied by six vendors. In addition to the Gale collection of databases, TEL resources also include EBSCO’s Points of View Reference Center, LearningExpress Library’s test preparation database, NewsBank’s Tennessee Newspaper Collection, the genealogy database HeritageQuest online, and World Book Encyclopedia. CISTI (Canada Institute for Scientific and Technical Information) http://cisti-icist. nrc-cnrc. gc. ca/eng/ibp/cisti/about/index. tml The Canada Institute for Scientific and Technical Information (common ly NRC-CISTI or simply CISTI) began in 1924 as the library of the National Research Council of Canada (NRC), the leading agency for research and development in Canada. This library took on the role of national science library unofficially in 1957 and became the official National Science Library in 1967. The name CISTI came in 1974 to reflect the wide scope of services provided and the increasing role in the development of electronic information products and services for the science and technology community.NRC Canada Institute for Scientific and Technical Information (NRC-CISTI), as Canada's national science library, provides Canada's research and innovation community with tools and services for accelerated discovery, innovation and commercialization. It is one of the world's major sources for information in all areas of science, technology, engineering and medicine. Moscow University Library http://www. msu. ru/en/info/struct/depts/library. html The Moscow University Library, the o ldest in Russia, was opened in 1755.Mikhail Lomonosov, the founder of the University, saw the Library as a secular institution open to the general public and free for all its patrons. In the XVIII and XIX centuries it was the only free library in Moscow, very popular among the readership. Its patrons enjoyed the wealth of its extensive collections and often donated or bequeathed some valuable books and their private collections to the University Library. Today the role of the Moscow University Library System cannot be overestimated; it is invaluable for educating and training highly qualified specialists.The Library provides Interlibrary Loan service through its contacts with 352 institutions in 55 countries, the major university library systems among them. Being the member of the Russian Library Association, the Moscow University Library is a scientific and methodological center for libraries of other Russian educational institutions. The Moscow University Library System includes a bout 10 million books, 2. 5 million among them in foreign languages; every year the collections are added with about 130, 000 Russian and foreign books and periodicals.The Library is proud of its collection of rare books and manuscripts, including early printed books, early editions of books and periodicals, both Russian and foreign, from XVIII century to the present. The Library Archives hold materials by Russian outstanding scientists and scholars, writers and public figures. The Moscow University Library System currently serves about 65,000 patrons. In 16 different campus buildings there are 20 branches of the circulating library, 63 reading rooms, and a number of reference libraries. The new MSU Main Library Building on Lomonosovsky Prospect was opened in January 2005.In 1990 we started to add the Library’s traditional index card catalog with digitized catalogs. So far we have scanned the Author Catalog covering all the University Library sources acquired from 1755 to 200 5. The electronic catalog covers books and theses from 1990 to date. 2. 1. 2 Local University of the East: Library – Library System http://www. ue. edu. ph/manila/library/main. html The Main Library in Manila is the hub of the entire system of libraries in the campus. It is the largest among the libraries in the system.It has sections for Circulation, Reserve, CCSS Library, Acquisitions, Cataloging, Reference, Filipiniana, and Periodicals, which are housed on the second, third and fourth floors of the POD-CIT Building. The book and serial collections continue to grow and are also being enriched with a growing collection of materials in various media and formats such as CD-ROMs, online databases and access to the Internet. Bibliographic access to the library collections is through the Online Public Access Catalog (OPAC) terminals available in all the libraries National Library of the Philippines ttp://web. nlp. gov. ph/nlp/ On March 9, 1900, the American Circulating Library wa s established in Manila as a fitting memorial to American servicemen who died in Philippine soil. The Library was organized by Mrs. Charles R. Greenleaf and its first librarian was Nellie Young Egbert. The American Military Governor in the Philippines, by the authority vested in him by the United States Philippine Commission through Public Act No. 96 passed on March 5, 1901, accepted the Circulating Library as a donation of the American Circulating Library Association to the government.Public Law Act No. 1935, provided for the â€Å"the consolidation of all libraries belonging to any branch of the Philippine government for the creation of the Philippine Library†, and for the maintenance of the same, and other purposes. To carry out the provisions of this law, a Library Board was constituted consisting of the Secretary of the Public Instruction, the Secretary of Interior, the Secretary of Finance and Justice, and the other members to be appointed annually by the Governor Gener al.In 1916, The Philippine Library, Division of Archives, Patents, Copyrights and Trademarks of the Executive Bureau and the Law Library of the Philippine assembly were merged into one entity, called the Philippine Library and Museum. Twelve years later, the Philippine Legislature separated the museum from the library. Public Law No. 3477 (1928) established the National Museum under the Department of Agriculture and Natural Resources and changed the name of the Philippine Library and Museum to The National Library.Without advancing any reason for the order, the President of the Philippines changed the name of The National Library to Bureau of Public Libraries in accordance with Executive Order No. 94, series 1947. This order was followed by the most important piece of legislation enacted in our country up to the present time in so far as public libraries are concerned; Republic Act No. 411, otherwise known as the Municipal Libraries Law, authored by the then Senator Geronima T. Pecs on. Republic Act No. 3873 passed in 1964 brought back to the Bureau of Public Libraries its old name, The National Library.Currently, the library is known as the National Library of the Philippines (NLP) pursuant to Republic Act No. 10087 enacted in May 13, 2010. The NLP is located at T. M. Kalaw Street, Manila. University of the Philippines Diliman Library System UP Diliman(n. d. ). Retrieved from: http://en. wikipilipinas. org/index. php? title=University_of_the_Philippines_Main_Library The Main Library completes the six pioneering buildings of the campus, and is actually the first to be built as UP transferred from Padre Faura, Manila to Diliman in 1949. Library users now enjoy the benefits of the Computerized Library System employed by the Main Library.The UP Integrated Library System (iLib) a web-based system using Open Source technologies, which integrates all library processes, is accessible, user-friendly and can be remotely managed. A selected committee started developing i Lib on July 15, 200. It was first tested on June 09, 2007 in the library units of UP Diliman, and became fully operational by 11 February 2008. UP Students’ ID serve as their library cards when borrowing from the library. The iLib is now copyrighted, being issued a Certificate of Copyright Registration and Deposit by the NCCA of The National Library on July 16, 2008.Electronic journals and other databases can also be accessed through iLib and OPAC modules. Pangasinan Provincial Library (KOHA-Integrated Library System Online Public Access Catalogue) http://www. pia. gov. ph/news/index. php? article=1941331717775 LINGAYEN, Pangasinan, March 16 (PIA) — The Pangasinan Provincial Library in this capital town implemented the KOHA-Integrated Library System Online Public Access Catalogue to fully automate its library services in the coming months. KOHA is a Maori term which means â€Å"gift† or â€Å"donation† and is believed to be the first open source integrate d library system (ILS) in the world.The ILS, which can be operational even without internet connection, was derived from KOHA. It was developed by Katipo Communications for the Horrowhenua Library in New Zealand and was funded by the United Nations Educational, Scientific and Cultural Organization (UNESCO). The automation project aims to further implement a more versatile library system. Through KOHA, books will be made easier to locate and research studies will be made simpler, as well. â€Å"We have to embrace modern technology,† said Rafael Baraan, the provincial administrator, during the launching ceremony held last March 9. This project is another milestone undertaken by the province that will make life easier, putting Pangasinan in pace and in cadence with the entire world. Going global using cyberspace as the medium of communication is highly commendable. † Edgardo Quiros, National Library of the Philippines (NLP) Information Technology Division Chief, hailed the provincial government for fully embracing modern technology that will serve as a pivotal bridge towards further developing and improving library services in the country. Quiros mentioned that as of December 2011, the Philippines has the most number of KOHA system being adapted in local ibraries with Pangasinan Provincial Library as one of the leading provincial libraries in terms of modernization followed by the Cavite Library. With the advent of modern technology in the library system, youth will benefit in utilizing its services for their research and study. In just a click of a finger, information is made accessible to them. It is also useful to those who wisely spend their parents’ hard-earned money. Instead of going in computer shops, they could just visit the library for their educational needs. 2. 2 SynthesisMany researchers have proven that organizing a library is a difficult task that requires a lot of effort, time and patience to be exerted. The bigger the library, the harder it is to maintain. Specially now, many libraries require more high-technology concern. The researchers were able to conclude that objectives and problems encountered of different schools in the study of related literatures are almost similar to each other. They have begun from manual process to an automated or electronic library system. Some of the schools decided that providing high quality library services are needed.Most of the systems said above are web-based and is the modern way on how to use or easy access to the library wherever you are. Chapter III Research Methodology 3. 1 Introduction The purpose of this chapter is to present the assumptions underpinning this research, as well as to introduce the research strategy and the empirical techniques applied. The chapter defines the scope and limitations of the research design, and situates the research amongst existing research traditions in The Library Booking System. 3. 2 Research Design Methods of Research UsedOur group used Literature Review Method wherein the study is focused on present research trends . It involves the recording, description, analysis and the presentation of the present system. Evaluating the credibility of sources is one of the most difficult aspects, especially with the ease of finding information on the internet. We can say that Chapter 2: Review of Related Studies can also be a Literature Review Method. Because when searching for possible related systems. Learning different types of information regarding the system. We can also think ideas that can greatly helped our system.It is very difficult to judge the credibility of an online paper. The main thing is to structure the internet research as if it were on paper. Bookmark papers, which may be relevant. 3. 3 Data Gathering Tools These are the instruments or tools that were use for gathering data in research used as basis for drawing conclusions or making inferences. Some of these tools are questionnaires, interviews, empirical observations,research and analysis used by the proponents as we conduct the proposed study. These are the only instruments or tools that we used: InterviewOn December 21, 2012 an interview was conducted just before the schools Christmas Break. Our group visited the site for the interview. The data gathering occurred by asking questions for much needed information such as book names,quantity and etc. Research Research is also important for adding any additional information using the internet. By searching different kinds of techniques/codes that can help in the development of the system. Questionnaire A pre-written series of questions used in gathering important information’s from the interviewee. This set of questionnaire was also used in the interview. AnalysisAnalysis is the process of breaking-up the whole study into its constituent parts of the categories according to the specific questions under the statement of the problem. This is to bring out into focus the essential feature of the study. 3. 4 Methods Used in Developing the Software Figure 5: Software Development Cycle Software Planning This software development method designates a plan in which a system analyst must first identify. Identify the meaning, to identify the product goals and requirement of the system. It must be put into consideration the capabilities of the programmer before deciding the product itself.Software Design Design is a visualization of the outcome of a product but then in software design, time is very essential because designing the software takes a long period of time to ensure efficiency, maintainability and reliability of the software. Software Development It can be considered as the most difficult phase because all the raw materials and information’s that were gathered will now be used to create the whole system. Software Implementation The phase of the software development method where software has already been debugged, documented and tested.The ob jective of the implementation phase is to deliver a completely functioning and documented Library Booking System. Software Operation and Maintenance Maintenance keeps the system functional at an acceptable level, correct errors and adapts changes in the new environment to provide new features and benefits. Chapter IV Presentation, System Analysis and Design This chapter presents the data gathered in each study. It consists of results and analysis in the form of figures, tables, graphs and text. 4. 1 System Analysis 4. 1. 1 Presentation of Data 4. 1. 1. 1 Feasibility Study 4. 1. 1. 1. 1 Operational FeasibilityThe Librarian will mainly use the system for record keeping and etc. The Librarian will operate the system from 8 am to 12 pm then 1 pm to 8 from Mondays to Fridays. 4. 1. 1. 1. 2 Technical Feasibility The proposed system will be using any common computer hardware composed of monitor, CPU, keyboard and a mouse. The system will be using the software Microsoft Office. This softwar e was also used for the database of the system. 4. 1. 1. 1. 3 Schedule Feasibility The timeframe of developing the program as well as the completion documents are estimated to be finished within 5 months, starting from November up to March. 4. 1. 1. 1. Economic Feasibility Operating Cost of Existing System Personel Unit| Item| Monthly Cost| Annual Cost| 1| Librarian| P 5,000| P 60,000| Table 1: Existing Personel Operating Cost Total Mothly Cost: P 5,000 Total Annual Cost: P 60,000 Supplies QTY| Unit| Item| Price/Item| Monthly Cost| Annual Cost| 1| Pc| Record Book | P 50| P 50 | P600| 3| Box| Library Card| P 400| P 1200| P14,400| 4| Pc| Ball Pen| P 10| P 40| P 480| 2| Pc| Liquid Eraser| P 35| P 70| P 840| 1| Pc| Memo Pad| P 30| P 30| P 360| 2| Set| Highlighter| P 50| P 100| P 1,200| Table 2: Supply Cost of Existing System Total Mothly Cost: P 1490. 00 Total Annual Cost: P 17,880. 0 Electric Consumption of Existing System Unit| Unit Device| Wattage| kWh| DailyHours| kWd| Monthly Consu mptions| Annual Consumptions| 1| Personal Computer| 425| . 425| 12| 5. 1| 107. 1| 1,285. 2| 1| AVR| 30| 0. 03| 12| 0. 36| 7. 56| 90. 72| 4| Flourescent Lamp| 128| 0. 128| 3| 0. 387| 8. 127| 97. 524| 2| Electrical Fan| 100| 0. 1| 12| 1. 2| 25. 2| 302. 4| Table 3: Electric Consumption of Existing System Conversion: 1 kilowatt = 1,000 watts Monthly Consumptions: kWd * 21 days Annual Consumptions: Monthly Consumptions * 12 months in a year Total Monthly Consumptions: 147. 987 kW Total Annual Consumptions: 1775. 44 kW Electric Cost of Existing System (In Pesos) Item| Monthly Consumptions| Monthly Cost| Annual Consumptions| Annual Cost| Personal Computer| 107. 1| P 738. 99| 1,285. 2| P 8,867. 88| AVR| 7. 56| P 52. 164| 90. 72| P 625. 968| Flourescent Lamp| 8. 127| P 56. 0763| 97. 524| P 672. 9156| Electrical Fan| 25. 2| P 173. 88| 302. 4| P 2,086. 56| Table 4: Electronic Cost of Existing System Rate: 1 kWh = P 6. 90 Monthly Cost: Monthly (kW) X 6. 90 Annual Cost: Annual (kW) X 6. 90 Total Monthly Cost: P 1,021. 1103 Total Annual Cost: P 12,253. 3236 Total Operating Cost of Existing System: P 90,133. 3236 or P 90,133. 32Operating Cost of Proposed System Personel Unit| Item| Monthly Cost| Annual Cost| 1| Librarian| P 5,000| P 60,000| Table 5: Proposed Personel Operating Cost Total Mothly Cost: P 5,000 Total Annual Cost: P 60,000 Supplies QTY| Unit| Item| Price/Item| Monthly Cost| Annual Cost| 1| Catridge| Ink| P 400| P 400| P 4,800| 1| Rim | Bond Paper| P 100| P 100| P1,200| Table 6: Supply Cost of Proposed System Total Mothly Cost: P 500. 00 Total Annual Cost: P 6,000. 00 Electric Consumptions of Proposed System Unit| Unit Device| Wattage| kWh| DailyHours| kWd| Monthly Consumptions| Annual Consumptions| 1| Personal Computer| 425| 0. 425| 12| 5. | 107. 1| 1,285. 2| 1| AVR| 30| 0. 03| 12| 0. 36| 7. 56| 90. 72| 4| Flourescent Lamp| 128| 0. 128| 3| 0. 387| 8. 127| 97. 524| 2| Electrical Fan| 100| 0. 1| 12| 1. 2| 25. 2| 302. 4| 1| Printer| 100| 0. 1| 12| 1. 2| 25. 2| 302. 4| Table 7: Electric Consumptions of Proposed System Conversion: 1 kilowatt = 1,000 watts Monthly Consumptions: kWd * 21 days per month Annual Consumptions: Monthly Consumptions * 12 months in a year Total Monthly Consumptions: 189. 567 kW Total Annual Consumptions: 2274. 804 kW Electronic Cost of Proposed System (In Pesos) Item| Monthly (kW)| Monthly Cost| Annual (kW)| Annual Cost| Personal Computer| 107. | P 738. 99| 1,285. 2| P 8,867. 88| AVR| 7. 56| P 52. 164| 90. 72| P 625. 968| Flourescent Lamp| 8. 127| P 56. 0763| 97. 524| P 672. 9156| Electrical Fan| 25. 2| P 173. 88| 302. 4| P 2,086. 56| Printer| 25. 2| P 173. 88| 302. 4| P 2,086. 56| Table 8: Electric Cost of Proposed System Rate: 1 kW = P 6. 9 Monthly Cost: Monthly (kW) X 6. 90 Annual Cost: Annual (kW) X 6. 90 Total Monthly Cost: P 1,194. 9903 Total Annual Cost: P 14,339. 8836 Total Operating Cost of Proposed System: P 80,339. 8836 or P 80,339. 88 Development Cost QTY| ITEM| PRICE| 1| Programmer| P 5,000| Table 9: Develo pment Cost Total Development Cost: P 5,000Presentation of Values Proposed System Operating Cost: P 80,339. 88 Development Cost: P 5,000 Total Cost of Proposed System: P 85,339. 88 Operating Cost of Existing System Total Operating Cost: P 90,133. 32 Benefits Existing Operational Cost – Proposed Operational Cost : P 90,133. 32 – P 85,339. 88 : P 4,793. 44 Payback Period Development Cost/Benefit : P 5,000/P 4,793. 44 : 1. 04 years Payback Analysis Years| Cost| Cum. Cost| Benefit| Cum. Benefit| 1| P 5,000| P 5,000| P 4,793. 44| P 4,793. 44| 2| P 0| P 0| P 4,793. 44| P 9,586. 88| 3| P 0| P 0| P 4,793. 44| P 14,380. 32| Table 10: Payback Analysis Figure 6 Payback Diagram . 1. 1. 1. 5 Result of the Feasibility Study The Operational Feasibility of the proposed system will provide the information on who can access the proposed system. In this case, the librarian is the one using the system for transactions. The required computer hardware and software that where needed to run th e proposed system was given in the Technical Feasibily The Schedule Feasibility determines the timeframe of finishing the proposed system. It is estimated to be finished within 5 months. The Economic Feasibilt calculates the diffirence between the cost of the Existing and the Proposed Systems. 4. 2 System Design 4. 2. The System Model 4. 2. 1. 1 System Processing Functions (DFD, System Flowchart) 4. 2. 1. 1. 1 DFD of Existing System (Borrow and Return) D1 D1 Library card Library card 1. 1 Input book/s information 1. 1 Input book/s information 1. 2 Borrow book/s 1. 2 Borrow book/s Librarian Librarian Borrower Borrower 1. 3 Record 1. 3 Record D2 Library Slip D2 Library Slip Borrower Borrower Borrower Info Borrower Info Librarian Librarian Book info Book info Book/s and Slip Book/s and Slip D3 Library Slip D3 Library Slip 1. 6 Update Record 1. 6 Update Record 1. 4 Return book/s 1. 4 Return book/s No PenaltyNo Penalty Book/s and Slip Book/s and Slip 1. 7 Compute Penalty 1. 7 Compute Pen alty Librarian Librarian 1. 5 Check for due date 1. 5 Check for due date Borrower Borrower Librarian Librarian Penalty Penalty Figure 7: DFD of Existing System (Borrow and Return) Figure 7: DFD of Existing System (Borrow and Return) DFD of Proposed System (Borrow and Return) 8. 0 Update Record 8. 0 Update Record 5. 0 Return 5. 0 Return Borrower Borrower Goes to Librian Goes to Librian Book/s Book/s 1. 0 Borrow 1. 0 Borrow Borrower Borrower Librarian Librarian 9. 0 Update Record 9. 0 Update Record 7. 0 Penalty 7. 0 Penalty 6. 0 Check Borrowed Book Info 6. Check Borrowed Book Info Librarian Librarian If not If not If past due date If past due date 2. 0 Input Book/s Info 2. 0 Input Book/s Info Librarian Librarian Book Info Book Info 3. 0 Save Information 3. 0 Save Information D1 Book Info D1 Book Info Librarian Librarian Borrower Info Borrower Info Librarian Librarian 4. 0 Update Record 4. 0 Update Record Figure 8: DFD of Proposed (Borrow and Return) Figure 8: DFD of Proposed (Borrow a nd Return) Flowchart of Proposed System (Form Login/Main) N N Is Username and Password correct? Is Username and Password correct? A A Login Form Login Form Enter Username and PasswordEnter Username and Password Start Start Y Y Displays Main Form Displays Main Form Menu = Book List Menu = Book List Menu = Book Acquisition Menu = Book Acquisition A A B B Menu = Security Menu = Security E E Menu = Penalty List Menu = Penalty List F F Menu = Exit Menu = Exit C C Menu = Book Borrow Menu = Book Borrow G G Menu = Book Return Menu = Book Return D D End End Figure 9: Flowchart of Proposed System (Form Login/Main) Figure 9: Flowchart of Proposed System (Form Login/Main) A A Flowchart of Proposed System (Book Acquisition) Flowchart of Proposed System (Book Acquisition) Book Acquisition Form Book Acquisition Form Start StartInput Book Info/Details Input Book Info/Details A A Database Database Change Book Info/Details Change Book Info/Details Y Y Change Book Info/Details? Change Book Info/Detail s? Is the Book Info Complete/Correct? Is the Book Info Complete/Correct? N N N N Delete Book Info? Delete Book Info? N N View Book Details View Book Details Y Y Save Book Info/Details Save Book Info/Details Y Y Search Book Info/Details? Search Book Info/Details? Y Y Database Database Delete Book Details Delete Book Details Database Database N N End End Figure 10: Flowchart of Proposed System (Book Acquisition) Figure 10: Flowchart of Proposed System (Book Acquisition)Flowchart of Proposed System (Security) Flowchart of Proposed System (Security) B B Database Database B B Security Form Security Form Database Database N N Y Y Delete Username Delete Username Y Y N N Change Username Details? Change Username Details? Y Y Search Username Details? Search Username Details? N N Y Y Save Username and Password Save Username and Password Username and PasswordCorrect? Username and PasswordCorrect? Start Start Create Username and Password Create Username and Password Change Username Details Chang e Username Details Delete Username Account? Delete Username Account? View Username Details View Username DetailsDatabase Database End End Figure 11: Flowchart of Proposed System (Security) Figure 11: Flowchart of Proposed System (Security) C C Start Start Flowchart of Proposed System (Borrow) C C Book Borrow Form Book Borrow Form Is the book available? Is the book available? Update Quantity Update Quantity Database Database End End Save student info and book info Save student info and book info N N Borrow Book/s Borrow Book/s Y Y Figure 12: Flowchart of Proposed System (Borrow) Figure 12: Flowchart of Proposed System (Borrow) D D Flowchart of Proposed System (Return) D D Is the return date over due? Is the return date over due? Return Book/sReturn Book/s Start Start Book Return Form Book Return Form Y Y Calcutate Penalty Calcutate Penalty N N Update Record Update Record Database Database Update Quantity Update Quantity End End Figure 13: Flowchart of Proposed System (Return) Figure 13: Flowchart of Proposed System (Return) E E Flowchart of Proposed System (Book List) Book List Form Book List Form E E Show Book Lisit Show Book Lisit End End Start Start Figure 14: Flowchart of Proposed System (Book List) Figure 14: Flowchart of Proposed System (Book List) Flowchart of Proposed System (Penalty List) Flowchart of Proposed System (Penalty List) F F F F Penalty List FormPenalty List Form Start Start Show Penalty List Show Penalty List End End Figure 15: Flowchart of Proposed System (Penalty List) Figure 15: Flowchart of Proposed System (Penalty List) 4. 2. 1. 2 Stored Data (ERD, Data Dictionary) Name Name 4. 2. 1. 2. 1 Entity-Relationship Diagram of Proposed System M M M M Return Return Book/s Book/s Borrower Borrower Author Author Volume No. Volume No. Librarian Librarian Book/s Book/s Year Year Section Section Book Title Book Title Request to borrow Request to borrow Volume No. Volume No. ISBN ISBN Publisher Publisher Author Author M M Book Title Book Title M M Gi ves to Gives to Librarian LibrarianPublisher Publisher ISBN ISBN Gets from Gets from 1 1 Username Username Password Password 1 1 Username Username Password Password M M Check for Penalty Check for Penalty Borrower Borrower 1 1 Pay Penalty Pay Penalty Save Save Librarian Librarian 1 1 Update Update Record Record Record Record 1 1 Figure 16: Entity Relationship Diagram of Proposed System Figure 16: Entity Relationship Diagram of Proposed System Borrower BookTitle BorrowerName BorrowDate Author ISBN Quantity Borrower BookTitle BorrowerName BorrowDate Author ISBN Quantity Database ERD of Proposed System Book BookTitle Author ISBN Volume Number Publisher Quantity Book BookTitleAuthor ISBN Volume Number Publisher Quantity Return BookTitle BorrowerName ReturnDate Author ISBN Quantity Return BookTitle BorrowerName ReturnDate Author ISBN Quantity Figure 17: Database ERD Diagram of the Proposed System Figure 17: Database ERD Diagram of the Proposed System Data Dictionary Login Field Name| Dat a Type| Width| Description| Required| Default value| Remarks| Username| Text| 15| Username| Yes| —| | Password| Text| 15| Password| Yes| —| | Book Acquisition Field Name| Data Type| Width| Description| Required| Default value| Remarks| Book Title| Text| 15| Book Title| Yes| —| | Author| Text| 30| Author| Yes| —| |ISBN| Text | 15| InternationalStandardBook Number| Yes| —| | Volume Number| Int| 15| Volume Number| Yes| —| | Publisher| Text| Publisher| Address| Yes| —| | Quantity| Int| 15| Quantity| Yes| —| | Security Field Name| Data Type| Width| Description| Required| Default value| Remarks| Username| Text| 15| Username| Yes| —| | Password| Text| 15| Password| Yes| —| | Book Borrow Field Name| Data Type| Width| Description| Required| Default value| Remarks| Book Title| Text| 15| Book Title| Yes| —| | Author| Text| 30| Author| Yes| —| |ISBN| Text | 15| InternationalStandardBook Number| Yes| —| | Quantity| Int| 15| Quantity| Yes| —| | Borrower’s Name| Text| 30| Borrower’sName| Yes| —| | Book Return Field Name| Data Type| Width| Description| Required| Default value| Remarks| Book Title| Text| 15| Book Title| Yes| —| | Author| Text| 30| Author| Yes| —| | ISBN| Text | 15| InternationalStandardBook Number| Yes| —| | Quantity| Int| 15| Quantity| Yes| —| | Borrower’s Name| Text| 30| Borrower’sName| Yes| —| | Table 9: Data Dictionary of the Proposed System Table 9: Data Dictionary of the Proposed System 4. 2. 2 Hardware, Software & User Interfaces . 2. 2. 1 Hardware Requirement Specification Hardware| Minimum Requirements| Processor| Intel Pentium 3 or AMD| Memory| 128 mb RAM or higher| Monitor| 800 x 600 Resolution or higher| Printer| Cannon HP Printer or higher| Table 10: Hardware Requirement Specification 4. 2. 2. 2 Software Requirement Specification Software| Minimum Requirements| Operating System| Win dows Vista or any Windows OS| Microsoft Office| Version 2007 or 2010| Table 11: Software Requirement Specification 4. 2. 2. 3 User Interfaces 4. 2. 3 System Back-up and Control Back-ups can be saved to any driver on the user computer.Or the back-up could be even saved using a flash drive and external hard drive, if they it is available. 4. 2. 4 System Implementation and Maintenance The software will be implemented for Gordon Heights National High School. The School Librarian will be the one using the system. Updating and maintaining of the system will be done depending on the changes made on the school library information. Chapter V Conclusion and Recommendation This chapter discusses the summary, conclusion and recommendation of the Software entitled, Computerized Library System for Gordon Heights National High School. . 1 Conclusion Based on the findings, the proponents have successfully developed the proposed system that meets the objective and solves the statement of the problem with regards to the study. The proponents concluded that the Gordon Heights National Highschool Library System is efficient to use based on the results of the study. As a whole, the proposed system and the existing system have a tremendousdistinction. The difference from the traditional to the proposed system is trulybeneficial to the library, librarian and