Wednesday, August 26, 2020

Free Essays on Elementary Schools

In the book The Battle for History, John Keegan, discusses the a wide range of perspectives on World War II. He considers other authentic works, for example, Robert M. Kennedy’s The German Campaign in Poland, Christopher Duffy’s Red Storm on the Reich, The Struggle for Europe by Chester Wilmot and numerous others. He has just broke down these different works. He has summed up the authors’ significant focuses and utilized them to help his own hypothesis, despite the fact that Keegan’s hypothesis about the recorded history of the war is very muddled. The main hypothesis that I could determine, is that â€Å"[it] has not yet been written.† (30) What does he mean by this? The works refered to in the rear of the book number more than one hundred fifty. Various references are made to crafted by different creators. Keegan doesn't appear to tell anything from his point of view, however state what he has perused. All great and well considering this is histor y, however are the past occasions so obviously unchangeable? Keegan appears to raise inquiries all through the book, for example, did Roosevelt know about the assault on Pearl Harbor before it occurred? â€Å"There have likewise been investigations of the charge that Roosevelt had foresight yet decided not to follow up on it, as a methods for carrying the United States into the Second World War on the counter Axis side.† (17) Keegan doesn't do a lot to respond to these inquiries, basically carries them into the image. The book gives no vibe of completion or goals to the majority of the inquiries he realizes. Perhaps this was his motivation. Points in the book up starting with one spot then onto the next. In one section Keegan might be talking about the utilization of the Enigma, a business figure machine; in the following Keegan may start examining the utilization of U-vessels. In spite of the fact that there is some intelligent course through the book, generally the subjects are jittery, making the work be uneven and jumbled prattling. It appears as though the creator is attempting to press as much as possible into as hardly any pages as could be expected under the circumstances. Keegan does, how... Free Essays on Elementary Schools Free Essays on Elementary Schools In the book The Battle for History, John Keegan, discusses the a wide range of perspectives on World War II. He considers other chronicled works, for example, Robert M. Kennedy’s The German Campaign in Poland, Christopher Duffy’s Red Storm on the Reich, The Struggle for Europe by Chester Wilmot and numerous others. He has just broke down these different works. He has summed up the authors’ significant focuses and utilized them to help his own hypothesis, in spite of the fact that Keegan’s hypothesis about the recorded history of the war is very hazy. The main hypothesis that I could determine, is that â€Å"[it] has not yet been written.† (30) What does he mean by this? The works refered to in the rear of the book number more than one hundred fifty. Various references are made to crafted by different creators. Keegan doesn't appear to tell anything from his point of view, yet state what he has perused. All great and well considering this is history, however are the past occasions so unmistakably unchangeable? Keegan appears to raise inquiries all through the book, for example, did Roosevelt know about the assault on Pearl Harbor before it occurred? â€Å"There have likewise been investigations of the claim that Roosevelt had prescience however decided not to follow up on it, as a methods for carrying the United States into the Second World War on the counter Axis side.† (17) Keegan doesn't do a lot to respond to these inquiries, basically carries them into the image. The book gives no vibe of completion or goals to the majority of the inquiries he achieves. Possibly this was his motivation. Points in the book up starting with one spot then onto the next. In one section Keegan might be examining the utilization of the Enigma, a business figure machine; in the following Keegan may start talking about the utilization of U-vessels. In spite of the fact that there is some sensible course through the book, generally the subje cts are jittery, making the work be uneven and jumbled chattering. It appears as though the creator is attempting to press as much as possible into as barely any pages as could reasonably be expected. Keegan does, how...

Saturday, August 22, 2020

Essay Analysis The Structure And Language Of The Declaration Of Independence Example For Students

Article Analysis The Structure And Language Of The Declaration Of Independence WR122 paper, utilizing Jeffersons â€Å"Declaration of Independence† as a model-RJThe Declaration of LanguageWhen, over the span of human language, it gets fundamental for individuals tocreate or reclassify, words or expressions to communicate an item or an activity; and to assume,among society, the acknowledgment and use of these words and their definitions, in onesown language, or idiolect. A better than average regard to the assessments of humankind, requires thatAmericans ought to perceive slang embraced into language. We hold these facts to act naturally clear: that language is articulation of thought,in the type of discourse or composed images, that have settled upon implications. That, manylarge communicating in dialects contain lingos, or different adaptations of dialects inside acommunity, that are diverse in certain parts of punctuation, articulation, or jargon. That, since language is a type of ones own thoughts and articulation, everybody possesseshis or her own individual language, or idiolect. That, not exclusively does observation changelanguage, yet that language changes discernment. That, through the course of history,idiolects have molded tongues, which have formed language, which thus, have shapedconcepts. Traditionalists, to be sure, will direct that dialects will observe a restricted pathtoward a standard language. What's more, in like manner, articulation will observe the standards andguidelines that breaking point thought, instead of the capacity to reconsider old jargon and enrichnew ones. At the point when we talk, compose, learn, and think in a gradually advancing jargon, whichdoes not adjust to the more quick presentation of societies, ideas, style, andtechnology, we should add new importance to traditional vocabulary.Such has been thelanguage of Conservative American English speakers and scholars, who have discouragedthe ut ilization of inventive language and the utilization of lingos and idiolects. Numerous people havenot saw that new jargon is, at commonly, embraced into ones language. A largenumber of slang words and expressions have been viewed as standard in todays every day discourse. To demonstrate this, let us guarantee a couple of the many slang terms that have been received. Slang has been utilized, where different words appeared to be unfit to portray an idea orfeeling:â€Å"Awesome.†Ã¢â‚¬Å"Radical.†Ã¢â‚¬Å"Cool.†Ã¢â‚¬Å"Far Out†New words that were made to depict new technology:A â€Å"cellular† or cell phone. The â€Å"internet† or the PC and modem got to data roadway. â€Å"Electronic mail† or PC created mail. A â€Å"beeper† or an electronic paging gadget. Allegories, metaphors, and innovativeness likewise make slang:A weakling is a â€Å"chicken.†Money is â€Å"bread.†A â€Å"ride† is a vehicle. One thousand dollars is a â€Å"grand.†People eat â€Å"grub.†Smoking weed is a similar thing as smoking â€Å"weed† or â€Å"pot.†A can is the â€Å"John.†A latrine is the â€Å"can.†A can is the â€Å"hole.†A â€Å"Cop† is police officer. A â€Å"Pig† is additionally a police officer. In the event that something is â€Å"bad† it is truly â€Å"good.†Those who are â€Å"plastered† are smashed. The individuals who are â€Å"hammered† are tanked. Individuals who are driving excessively not far behind another vehicle are â€Å"tailgating.†Slang, additionally develops as phrases:A individual â€Å"Kicking Back,† is unwinding. â€Å"Cut to the chase† or arrive at the point. Acknowledge the results, or â€Å"face the music.† â€Å"Two pennies worth,† or a conclusion. â€Å"The entire nine yards† or everything. In the English language, we have requested of for the utilization of slang in language. Butour inventive language has been viewed as pointless to traditionalists of standardEnglish. Traditionalists, who themselves use jargon that was one after another consideredslang, are unfit to contend against it. Each language around the globe embraces slang that, at a certain point, was considerednonstandard to most of the individuals. Slang is utilized to give new shades ofmeaning. Slang is shared by presenting new ideas, similarly as new articles and thoughts areshared. All jargon sets up its significance through the acknowledgment of its idea intoones language.We must keep on communicating considerations through ones decision oflanguage, and acknowledge them, as we would acknowledge the significance of inventiveness and creativitywithin people. .ufec33e5f6053c642a852af290ca71e98 , .ufec33e5f6053c642a852af290ca71e98 .postImageUrl , .ufec33e5f6053c642a852af290ca71e98 .focused content zone { min-stature: 80px; position: relative; } .ufec33e5f6053c642a852af290ca71e98 , .ufec33e5f6053c642a852af290ca71e98:hover , .ufec33e5f6053c642a852af290ca71e98:visited , .ufec33e5f6053c642a852af290ca71e98:active { border:0!important; } .ufec33e5f6053c642a852af290ca71e98 .clearfix:after { content: ; show: table; clear: both; } .ufec33e5f6053c642a852af290ca71e98 { show: square; progress: foundation shading 250ms; webkit-change: foundation shading 250ms; width: 100%; darkness: 1; change: mistiness 250ms; webkit-progress: obscurity 250ms; foundation shading: #95A5A6; } .ufec33e5f6053c642a852af290ca71e98:active , .ufec33e5f6053c642a852af290ca71e98:hover { haziness: 1; change: murkiness 250ms; webkit-progress: mistiness 250ms; foundation shading: #2C3E50; } .ufec33e5f6053c642a852af290ca71e98 .focused content region { width: 100%; position: relative; } .ufec33e5f6053c642a852af290ca71e98 .ctaText { outskirt base: 0 strong #fff; shading: #2980B9; text dimension: 16px; textual style weight: intense; edge: 0; cushioning: 0; content improvement: underline; } .ufec33e5f6053c642a852af290ca71e98 .postTitle { shading: #FFFFFF; text dimension: 16px; text style weight: 600; edge: 0; cushioning: 0; width: 100%; } .ufec33e5f6053c642a852af290ca71e98 .ctaButton { foundation shading: #7F8C8D!important; shading: #2980B9; fringe: none; outskirt sweep: 3px; box-shadow: none; text dimension: 14px; text style weight: striking; line-tallness: 26px; moz-fringe range: 3px; content adjust: focus; content beautification: none; content shadow: none; width: 80px; min-stature: 80px; foundation: url(https://artscolumbia.org/wp-content/modules/intelly-related-posts/resources/pictures/basic arrow.png)no-rehash; position: total; right: 0; top: 0; } .ufec33e5f6053c642a852af290ca71e98:hover .ctaButton { foundation shading: #34495E!important; } .ufec33e5f6053c642 a852af290ca71e98 .focused content { show: table; tallness: 80px; cushioning left: 18px; top: 0; } .ufec33e5f6053c642a852af290ca71e98-content { show: table-cell; edge: 0; cushioning: 0; cushioning right: 108px; position: relative; vertical-adjust: center; width: 100%; } .ufec33e5f6053c642a852af290ca71e98:after { content: ; show: square; clear: both; } READ: Art Budget Cuts EssayWe, along these lines, the agents of an etymological society, do, in the Name, and byauthority of speakers and scholars of English, announce that slang revives language withnew ideas, thoughts, and intrigue; that slang permits language to develop with society; thatthere are no deciding elements in pronouncing a â€Å"true† language; and, that language containsvocabulary where its implications are changed and new ones are presented. Put your paper here.

Friday, August 21, 2020

Application Overload! - UGA Undergraduate Admissions

Application Overload! - UGA Undergraduate Admissions Application Overload! There is an interesting article out today that is a collaboration between The New York Times and The Chronicle of Higher Education titled Application Inflation: When is Enough Enough?. It is a very good read, and it deals with an important issue in College Admissions. The main focus of the story is about the balance of recruiting and getting a large number of students applying to a college in order to either have a stronger freshman class or to make your college look more selective by having a smaller admit rate (or both). This is a serious issue in college admissions these days, and one that does not have an easy answer. While I cannot speak for other college admissions offices, I will say that UGA does not want students to apply to us just to inflate the application numbers. If UGA is not a good fit for you as a college, I will not take is personally if you do not apply here. My belief has always been that a student should find a small number of colleges that fit their criteria, and they should not blanket the nation with admissions applications. While UGA wants to have a great pool of applicants to make our freshman class great, we do not want to mislead students about their chances, or use them as a pawn in the admissions guidebook ratings game. I am guessing that a majority of colleges feel the same way. One of my earliest posts on this blog was about the comparison between admissions and dating, with a focus on finding the right match. When my daughter reaches high school in three years and hits that scary world of dating, I am not going to suggest that she try to get as many date requests as possible just so she can reject a lot of boys and seem more selective. (On a side note though, I do hope that having a dad who works in UGAs admission office might make any potential boyfriends think twice about how they act!). Admissions decisions should not be about how either the college or the applicant is perceived by the outside world, but instead should be about how good a fit there is between student and university. The process should not be a contest about how many applicants a college denied, or about how many institutions a student was admitted to, but about what seems the best fit for both sides. And just so you know, if UGA were to have a 43% increase in applications from last year like the U. of Chicago did last year (I do not expect this!), this would mean almost 26,000 applicants, which would scare me to death! In my area in operations and selection, we are running a fine line in how many applicants we can handle, so adding another 8,000 or so applicants to the pool would overwhelm our office. UGA does want to continue to have great students consider us as a possible college match, and we would love to see our student body grow even stronger academically and personally. We communicate with prospective students, visit high schools, attend college fairs, etc., all to both help the prospective student know more about UGA and to recruit a strong class. But we do not want applications just for numbers sake. We want a good match, and so should you, and we wish you well in your college search!

Sunday, May 24, 2020

Italian Simple Prepositions - Preposizioni Semplici

Simple prepositions in Italian, or preposizioni semplici, are the magical little words that allow us to connect  the meaning, details, and specificity of actions: with whom we are doing something, for what, to what end, where, and where to. They are a neat little bunch, easy to remember,  and this is the order in which they are taught to Italian children. Italian Simple Prepositions List Di of (possessive), from, about 1. La moto à ¨ di Paolo. 2. Paolo à ¨ di Firenze. 3. Muoio di sete. 4. Parlo di Lucia. 1. The motorcycle is Paolo's. 2. Paolo is from Florence. 3. I am dying of thirst. 4. I am speaking about Lucia. A to, at, in 1. Vivo a Milano. 2. Vado a Milano. 3. A scuola ci sono molti bambini. 4. Non credo alle favole. 1. I live in Milano. 2. I am going to Milano. 3. At school there are many children. 4. I don't believe in fairy tales. Da from, from this moment on, around, through, over, to 1. Vengo da Milano. 2. Da domani non lavoro. 3. Abito da quella parte. 4. Da quella strada non si passa. 5. Vado da Piera. 1. I am from Milano. 2. From tomorrow on I am not working. 3. I live around that way. 3. You can't get there from that road. 4. I am going to Piera's. In in, at, to 1. Vivo in Germania. 2. Sono in palestra. 3. Vado in biblioteca. 1. I live in Germany. 2. I am at the gym. 3. I am going to the library. Con with, by means of/through 1. Vengo con te. 2. Con determinazione ha conseguito la laurea. 1. I am coming with you. 2. Through determination, she won her degree. Su on, on top of, concerning, about 1. Il libro à ¨ su una sedia. 2. Su questo non ci sono dubbi. 3. Scrivo un tema su Verga. 1. The book is on a chair. 2. About this, there are no doubts. 3. I am writing an essay about Verga. Per for, by way of or through, according to, in order to 1. Questo libro à ¨ per te. 2. Passo per Torino. 3. Per me hai ragione. 4. Il negozio à ¨ chiuso per due giorni. 5. Ho fatto di tutto per andare in vacanza. 1. This book is for you. 2. I am going by way of Torino. 3. According to me, you are right. 4. The shop is closed for two days. 5. I did everything in order to go on vacation. Tra between, in 1. Tra noi ci sono due anni di differenza. 2. Ci vediamo tra un'ora. 1. Between us there are two years' difference. 2. We'll see each other in an hour. Fra between, in 1. Fra noi non ci sono segreti. 2. Fra un anno avrai finito. 1. Between us there are no secrets. 2. In a year you will be finished. A or In? Note that in talking about living in a location, in and a can be somewhat confusing, but there are some simple rules: A is used for a city or a town;  in is used for a country or an island. For a state of the United States or a region of Italy, you would use in.   Abito a Venezia (I live in Venice); abito a Orvieto  (I live in Orvieto); abito a New York (I live in New York).Abito in Germania (I live in Germany); abito in Sicilia (I live in Sicily); abito in Nebraska (I live in Nebraska); abito in Toscana (I live in Tuscany).   Those rules hold with verbs of movement as well: Vado in Toscana (I am going to Tuscany); vado a New York (I am going to New York); vado in Nebraska (I am going to Nebraska); vado in Sicilia (I am going to Sicily).   If you are outside your home and you are going inside, you say, vado in casa; if you are out and about and you are going home, you say, vado a casa. In speaking about going or being somewhere habitual without specificity, you use in: Studio in biblioteca. I am studying at the library.  Vado in chiesa. I am going to church.  Andiamo in montagna. We are going to the mountains. If you are talking about going to a specific church or library or mountain, you would use a:  Vado alla biblioteca di San Giovanni (I am going to the San Giovanni library). Di or Da?   When discussing provenance, you use  di  with the verb  essere  but  da  with other verbs such as  venire  or  provenire.   Di dove sei? Sono di Cetona.  Where are you from (literally, whence you come)? From Cetona.  Da dove vieni? Vengo da Siena.  Where do you come/hail  from? I come from Siena.   Remember that different verbs call for different prepositions, and often you will find those specified in an Italian language dictionary: parlare di/con (to speak about/with), dare a (to give to), telefonare a (to call to).   In terms of verbs of movement, venire wants to be followed by  da. Some verbs can have either:  andare, for example, when used as leaving from somewhere:  Me ne vado di qui  or  me ne vado da qui (I am leaving here).   As you know, the preposition  di  expresses possession as well as place of origin: Di chi à ¨ questa rivista?  ÃƒË† di Lucia.  Whose  magazine is this?  It’s Lucia’s.Questa macchina à ¨ di Michele. This car is Micheles. A good way to remember the preposition of origin  da  and of  possession  di  is to think of names of famous Italian artists: among the many, Leonardo  da Vinci (from Vinci), Gentile da Fabriano (from Fabriano), Benedetto di Bindo (Bindos Benedetto), and Gregorio di Cecco (Ceccos Gregorio). Di  and da also can mean  of  as in a cause of something:   Muoio di noia.  I am dying of boredom.Mi hai fatto ammalare di stress.  You made me sick from stress.Ho la febbre  da fieno. I have hay fever (fever from hay). Da as To Someones Place Among the prepositions, da is one of the most maddening. Granted, it connects to many meanings: provenance (from a place or from something); a complement of time (from now on), and even a  causal complement, such as to cause something: un rumore da ammattire (a noise such as to drive you crazy); una polvere da accecare (a dust such as to blind you). Also, it can define the purpose of some nouns:   Macchina da cucire: sewing machineOcchiali da vista: eyeglassesPiatto da minestra: soup bowlBiglietto da visita: calling card But one of the most interesting (and counterintuitive) is its meaning as someones place, a bit like the French chez. In that capacity, it means  at: Vado a mangiare da Marco. I am going to eat at Marcos.Vieni da me? Are you coming to me/to my place?Porto la torta dalla Maria.  I am taking the cake to Marias.  Vado dal barbiere. I am going to the barbers (literally, to the barbers place).Vado dal fruttivendolo. I am going to the fruit and vegetable store (to the place of the man who sells fruits and vegetables). Articulated Prepositions The last three  sentences above bring us to articulated prepositions, which amount to prepositions added to the articles preceding nouns. You are ready: Delve in! Alla prossima volta! To the next time!

Thursday, May 14, 2020

Plagiarism And Its Impact On Ethics - 939 Words

Plagiarism â€Å"Plagiarism is defined as the borrowing of ideas, opinions, examples, key words, phrases, sentences, paragraphs, or even structure from another person s work, including work written or produced by others without proper acknowledgment.† - The definiton of plagiarism is taken from the mentioned link :https://www.ucmo.edu/student/documents/honest.pdf Is it ubiquitous in education sector ? Well ,Yes ! The internet is taken by storm on the number of research papers, articles and blogs on the cited topic : Academic Plagiarism is achieved by falsify/ fabricate/rob the information in scholarly education to clinch success has an humongous impact on ethics, originality and honesty of the individual .To eulogize ones’ work (papers/ research/articles) plagiarist have taken any medium to amplify triumph . Forms of Academic Plagiarism : The following are different forms in which academic plagiarism are performed. a. Rephrase : The plagiarist predominantly thinks the act of escaping infringement is simply rephrasing the words and altering the sentence of the original works in the assignments / papers. b. Without Acknowledging the source: The trend to imposter maverick’s work as your own in research / theses without citing the source is another form where the fraudster ethics attributes the lame success of cheating. c. Lifting Information : The unexceptional way of copying the data with cut and copy from the source to either avoid the last minute rush to complete theShow MoreRelatedThe Ethical Reasons For Plagiarism1459 Words   |  6 PagesPlagiarism is the process of taking some one else work or ideas and showing it as their own works (Oxford Dictionaries). The purpose of this study is to understand 6 different ethical reasons used by student to overcome with plagiarism and with help of these ethical reason, faculties can bring a solution to stop or prevent plagiarism. Where as unethical behavior can also lead to worries in school or colleges, so there is need to correct it so that it has positive impact on organizational ethics.Read MoreThe Importance of Ethics Academically and Professionally Essay1261 Words   |  6 Pagesparticular assignment was turned in, they was guilty of plagiarism. Consequently they received a zero on the assignment which resulted in them ultimately failing the cla ss. This incident affected them so badly that they immediately transferred schools. Personally knowing the classmate, when asked why they did it, they responded because they honestly thought they would not get caught. Although all of my professors would stress to everyone about plagiarism, I never understood how exactly they would know theRead MoreReport On Ethical Decision Making1055 Words   |  5 Pagesreport focuses on ethical decisions and how important they are, or aren’t, to commerce students. The report features information from scholarly articles and books relating to business ethics. Mainly, what ethics are, what factors impact ethical decisions, and how universities have taken steps to improve students ethics and behaviour, if that`s truly plausible. What is ethical decision making? Ethical decision-making is the means of assessing the available choices you have and selecting from themRead MoreEthics, Intellectual Property, And Piracy1379 Words   |  6 PagesPersonal and business ethics in an ever-expanding technological world are challenged in many different ways. Multiple communication methods and the availability of the Internet have made a large world much smaller in the context of information sharing, so the importance of understanding and utilizing measures to protect intellectual property and copyrights is vital to business success, ethical understanding and acceptance. In the following, I will specifically discuss the concepts of copyright, intellectualRead MoreAction Plan and Annotated Bibliography on Maintaining Academic Honesty1390 Words   |  6 PagesAnother form of academic dishonesty is plagiarism and presentation of falsified information. These examples are not exhaustive but present main issues that I need to tackle (C; Triggle D; Triggle, 2 007). However, the academic institutions have systems and programs in place to deal with academic dishonesty and any individual effort will only fit within this wider context. The first step is to familiarize myself with the topic of academic dishonesty and plagiarism, of which writing this essay is anRead MoreThe Effects Of Plagiarism1143 Words   |  5 PagesPlagiarism hinders intellectual advancement. The problems of plagiarism have been discussed for hundreds of years. With technologies, plagiarism becomes a fairly common practice in recent years. Plagiarism is actually recognized as a dishonest act from the 18th century when the original literature takes on more value within society. Readers want to read new creations of ideas and words from writers instead of seeing them polish the writings that have already been emitted. Writers are able at thisRead MoreJust Following Orders Essay1390 Words   |  6 Pagesof team that had to power to make absolute discussions. Discussion Question 2: Great Practices or Greed? Explain how ethics in business and the law are related. How are they different? What is the impact of ethical behavior on the development of social responsibility for businesses? I believe that very few times ethics in business and law are associated, ethics in business are unwritten rules for behavior on business practices and laws are written rules set by government to protect peopleRead MorePlagiarism And The Reasons College Students1618 Words   |  7 Pagesthat the substance, the bulk, the actual and valuable material of all human utterances— is plagiarism. Plagiarism damages reputations, both personal and universal; it promotes mediocrity, extinguishes creativity, limits educational experiences and exsanguinates learning. Metaphorically speaking, if a deadly virus is left untreated, an epidemic will begin and eventually will deplete a population. Plagiarism acts as a fastidious, pathogenic, virus infecting others with a mentality of mediocrity andRead MoreAcademic Ethics And Academic Integrity Essay1276 Words   |  6 PagesAcademic ethics are the moral codes or the shared standards of an academic enterprise and the core of its success (Occiden tal College, 2016). Basically, academic ethics require each student, to be honest, responsible, fair, respectful, give credit where it is due, turn in their original work, and etc. (Michigan State University, n.d.). Academic integrity requires students to do their own work without unauthorized help from others, cheating, lying, plagiarizing, and stealing (Valdosta State UniversityRead MoreBYOD Meets Big Data1210 Words   |  5 Pagesemployees. Dooly, M., Antoniadou, V. (2017). Educational ethnography in blended learning environments. Qualitative approaches to research on plurilingual education, 351-362. In this article, the writer has shed light on the impact of educational ethnography and its impact on enhancing the effectiveness of learning environment. The writer has also explained the term educational ethnography by stating that according to this term the research that is organized by the researchers should have original

Wednesday, May 6, 2020

The Top Secret Details About Looking for a Student to Write My Paper That Many People Do Not Know About

The Top Secret Details About Looking for a Student to Write My Paper That Many People Do Not Know About The best method to purchase a research paper on the internet is through us. There are two sorts of research papers you'll be able to acquire online sample papers and custom written papers. If you would like to purchase a research paper, online writing service like ours is precisely what you require. Order whenever you're ready and know which type pf research paper you have to get. If you get a Research Paper from us, we'll assign the very best American Research. Customized Research Paper Writing Services You Can rely On! Greatest Place To get Term Papers Online. How to get a Research Paper Online. If you don't understand how to begin your essay or where to search for supporting data, we'll be happy to help you. When you purchase research papers online there's numerous aspects which should be considered. A number of the factors you should. This is a particularly significant factor if you must compose a dissertation. Let's say you have to purchase essay for college. There are several kinds of essays, it isn't difficult to shed an eye on all your writing assignments. It's hard to select a service to purchase your essay from. It's crucial that the service you select knows for sure they're only employing the ideal essay writers. They could need to keep up a fantastic grade average to make certain they get in the school of their pick. AP courses are classes provided in high school that are thought to be college level. Also, as there are occasions when the educational college will hold one or more celebration at the same time, you may need to depend on a few other youngsters for newsprint photos, simply because they aren't part of the picture taking team. At the close of the training course, AP students have the option to choose the exam. There's a great deal of makers by having a deal that's great of that chance to be self-taught. In fact, there's a good deal of advantages to getting a diploma in graphics design that might help you in both the upcoming career, and directly to be fashion designer. Some folks are talented natural-born writers, but the majority of people can't just grab a pen or a keyboard and do it. Nevertheless, once you can set-up and begin a project in magazine printing, there exists a greater opportunity your companies will succeed. Most people don't even bother reporting others due to the fact that they feel it won't have an effect. Maybe it's the fact that I'm a creative and am always seeking new techniques to express my feelings. Consequently, you truly has to be inclined to sacrifice even more before you start experiencing the advantages of your very own tough work. Maybe it's a deep urge to prove that I'm capable. The Definitive Approach to Looking for a Student to Write My Paper There's no need to continue your search or search for a person who will have the ability to compose an essay for you within a limited time. If everything appears fine, you may download it immediately. It usually means that nobody can say that everything was discovered. The issue is that vague answers aren't good enough for science and decisions produced by choice aren't necessarily rational. If the one thing you've been thinking of lately is is there anybody to compose my essay for me, then you're at the most suitable place. The more you tell us about your requirements, the better essay help we'll be in a position to provide. The solution is really quite straightforward. Someone to compose my essay. The Downside Risk of Looking for a Student to Write My Paper For this reason, you don't have to fret about the price of your upcoming assignment. Take a look at our price calculator to discover what your perfect price for the paper is! This way that you do not risk your money since you can ascertain the price before finalizing your buy. If both of these guarantees aren't met then you ought to find paper writing services.

Tuesday, May 5, 2020

Music and History Essay Example For Students

Music and History Essay Hildebrand von Binge Play of Virtues At the beginning of the song, it wasnt singing instead she was talking. Then she started to sing right after she was done talking. I couldnt follow the translation because it sounded like Latin or French. I kept listening to it over and over but I couldnt understand what the words meant. She does have the most beautiful voice though. She sounds like an opera singer. I noticed when she hit high notes she sounded off key. It was way too high pitch and much louder, and stronger vocal. At the point when she went back to normal pitch, it sounds so much better and was a little quiet. The background sounds like music in a catholic church. I believe it is an chapel music with solo vocal without instrumental sound. In this song, the most striking feature is chapel music with monophonic texture. I think this song is successful because it is very calm and smooth background although some pitches are way too high for her to sing. She reached her highest pitch at 3:18 in the song. Music and History By diethylstilbestrol

Friday, April 3, 2020

Fifth Child Doris Lessing free essay sample

To my mind this book written by Doris Lessing is very difficult to understand. â€Å"The Fifth Child† is a very controversial story. It is about a young couple and its five children. Harriet and David want to have a big family and everything is perfect. They live happily together although they have financial difficulties. Family life is rather busy but everything goes its way until Ben – the fifth child – is born. Ben has a very aggressive character and he is emotionally and mentally handicapped. A child who can’t be socialized and thus in the end his behaviour is responsible for the destruction of the whole family. Doris Lessing plays with her readers’ emotions and their traditional views concerning children and family life.  In general children are regarded as nice human beings who can be easily be loved. But reality shows a different picture. Every family makes the experience that children aren’t always easy to handle but Ben in the â€Å"The Fifth Child† is really a monster – a human creature full of aggression and violence and there is no way to change his change his behaviour a nightmare for every family. We will write a custom essay sample on Fifth Child Doris Lessing or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Doris Lessing shows us that it is difficult to integrate some human beings into society. There are many reasons why children / people are socially and emotionally disturbed and it is clear that they produce many problems for their social surrounding as well as for society. There still remain many important questions for which it is necessary to find answers. i.e. â€Å"How can society treat these handicapped people in a human way?† or â€Å"What can society do in order to support parents by bringing up handicapped children?† or â€Å"How can they be integrated into social life?† or â€Å"What are the reasons why people are handicapped? â€Å"Is it possible to find solutions for their problems? â€Å"What is needed to help them?  Lessing tells us that society is rather unable to deal with these problems  and the frightening solution is the breakdown of Harriet’s and David’s family which could stand for our whole society. Furthermore Lessing tells us that we are full of unrealistic views concerning family life. We all are influenced by the traditional thinking having a house, having children should make us happy. But happiness never comes into being by having things or a family. We are ourselves responsible for happiness and one thing is clear as reality shows happiness can’t be planned. There are always obstacles presented by life which we have to overcome or not. Lessing presents us family life as a planned time of life which can be handled if everybody only wants to live together and to raise children this works until the time when Ben is born but then everything is different.  Many of us regard family as a community within which we can feel at ease. We think that a family helps us to relax from the stress at work but in reality family can be a place where people feel extremely unhappy, exhausted and exploited. It is a fact that family is presented us an ideal institution by various institutions i.e. church, conservative politicians, advertising. But nowadays times are different and people have the choice between the traditional way of living and new forms of relationship. To sum it up I think this book is at first sight not easy to understand. But if you take a closer look it tells you much about our modern society. To a huge extent it is frightening how Lessing develops a family drama. Until the end of the story you hope for a happy end but it doesn’t come. To my mind the description of Ben’s behaviour mainly his aggression and violence is so authentic that it is difficult to bear because reading about this produces so much bad feelings and I personally feel shocked about the fact that it is so easy that a family is totally destroyed by the misbehaviour of one member.

Sunday, March 8, 2020

Microsoft Debate Essay

Microsoft Debate Essay Microsoft Debate Essay Name Bibles Microeconomics 10 February 2014 Microsoft Debate There was a debate over the status of Microsoft Corporation from a business standpoint. They supply the operating system to about ninety percent of computers but they do not have a clear-cut competitor when it comes to prices. Does this make them a monopoly? Do they purposefully keep prices low to discourage other computer companies from being able to compete with them? The question for lawmakers became: â€Å"Does Microsoft’s business strategy break any anti-trust laws?† Many different computer programs are automatically designed to be compatible with the Microsoft operating system. Personally, I don’t think that you can blame Microsoft for the actions of other computer programming companies. The inadvertent effect of the programming companies’ actions is that computer users are being encouraged to purchase Microsoft computers to ensure that their programs will be compatible. I don’t think this implication is enough to claim that Microsoft is a monopoly but the courts felt as if it was. Also, they are a good business where they do not totally take all of the business of the market and act as a total monopoly. Microsoft do almost have a complete control of the Operating System Market where almost 93% of computers are programmed with Windows instead of Mac OSX or a Linux Distro. Microsoft was charged with â€Å"1. Monopolizing the computer operating system market, 2. Integrating the Internet Explorer web browser into the operating system in an attempt to eliminate competition from Netscape, and 3. Using its market power to form anticompetitive agreements with producers of related goods,† (South-western College). Microsoft was said in court to be a monopoly and the decision of the judge and punishment was for Microsoft’s corporation to be split into two different corporations. One corporation would handle the operating system and the other corporation would handle the software and program development. This did not happen. Microsoft went through a series of appeals and their appeal even made it to the Supreme Court. Their appeal was denied by the Supreme Court and the Federal

Friday, February 21, 2020

Training and development in Human Resources Management (HRM) Essay

Training and development in Human Resources Management (HRM) - Essay Example On the similar context, development can be described as the process of attaining adequate knowledge as well as skills that might be utilised even in the future (Fitzgerald, â€Å"Training Versus Development†). Thus, development process prepares the human resources to take up further responsibilities in the future. Training and development program in an organization ensures that the skill development and up-gradation of its employees are carried-out in a structured process. It is essential for organizations in the current day context to properly train as well as develop their employees for the improvement of their business performances. This is because regular augmentation of the skills and proficiencies of the employees is necessary for developing innovative approaches for the production of new products and services in the organization (Haynes & Fryer, â€Å"Human Resources, Service Quality and Performance: A Case Study†). Thus, training and development of employees per forms an important role in the creation of innovation in the organization and also in bringing about positive organizational changes. Moreover, the training and development component of HRM plays a significant role in the succession planning of an organization. ... In the present research paper, the scope and dimension of training and development process will be attributed to a situation where the process is required to be implemented upon a newly recruited first line supervisor in a paper company, Jay Inc. The process will be imparted upon the newly recruited employee by the one previously holding the first line supervisor’s position and has now been promoted as store manager. The various required issues that will be essential for the promoted employee in order to impart training to the newly recruited employee will be discussed widely in this research paper. Job Analysis and Job Description Job analysis and job description are two of the most essential interconnected operations in an organization. Information about a job is collected through the process of job analysis, the findings of which are compiled in a job description. For the efficient creation of a job description, it is essential that the extent of information about the job i s kept large and wide. However, the information quality is the greatest determinant of the successful accomplishment of job analysis and job description. The collection process of information should be concentrated upon collecting realistic and accurate data. In this regard, the job incumbents are the most appropriate provider of information (American University of Beirut, â€Å"Job Analysis and Description†). Hence, in the case of Jay Inc, crucial information about the job details of first line supervisor can easily be gathered as the task has been provided to the employee who was in the same position, a few days earlier. The main task of the first line supervisors is to direct workers in the

Wednesday, February 5, 2020

Events Strategy Essay Example | Topics and Well Written Essays - 2000 words

Events Strategy - Essay Example To do these, Nokia forged tie ups with partners which include Microsoft Communicator Mobile, towards the enhancement of unified communications proposition (Microsoft Communicator Mobile for Nokia Debuts 2010). As a result, new applications for new handsets have been released, initially available to certain models such as E72 and E52. On top of these, there are also new features that aim at achieving customer convenience – the touch screen feature similar to Iphone, mobile internet browsing using the latest technologies, development of Ovi maps, among others. These consumer-friendly features are what drive the company to further work on its Marketing, Advertising and Promotional activities to reach the target market. Half of the job is to continue developing the brand, while half is to continue developing the market reach through advertisements and events. Nokia was a paper and rubber business back in the 1800s, eventually transforming into a cable and electronic business during the first decades of the 1900s. In 1979, it focused on the mobile phone making business (Story of Nokia 2010). However, it was in 1992 that they made a strategic decision to focus on Telecommunications by launching its 2100 series which sold approximately 300% more than the target (Nokia History 2010). Nokia remains to be the world’s top selling handset manufacturer with market share of 35% versus over ten competitor brands during the first quarter of 2010. However, this reflects a decline of 1.2% from last year’s sales, presumably from the decline in sales of their high end phones. What constitutes the current market share is the presence of its mid end phones that offers both benefits and cost efficiency (Gartner Says Worldwide Mobile Phone Sales Grew 17% In First Quarter 2010). As such, with the continuous product development of the other handset manufacturers, Nokia is pressured to maintain market stature as the leading company. Nokia

Monday, January 27, 2020

The strengths and limitations of duration analysis

The strengths and limitations of duration analysis As stated by the US Federal Reserve, interest rate risk impacts on a various range of stakeholders, and hence financial actors are interested in quantifying its impact. The most important practical tool to manage interest rate risk and to satisfy this main function for banks is duration analysis. In general duration Analysis is an econometric tool and in terms of Financial Economics it is defined as the mean length of time that passes until the present value is returned by a stream of fixed payments according to Macaulay (1938). Hence, Duration is a measure of the sensitivity of asset ´s prices to interest movements. My following essay defines duration according to Macaulay and presents special terms from the practice. Moreover, it considers immunization, hedging and Duration Gap Analysis as practical applications. The next part will discuss strengths and weaknesses of duration analysis. It concludes with todays importance of Duration analysis. There are two main reasons to study Duration according to Kopprasch (2006). Firstly, firms and especially financial intermediaries have tied up huge amounts of capital in fixed income instruments. These include bonds partly with optional characteristics or recent financial innovations like swaps, interest rate options or floaters. Hence, proper hedging of these instruments becomes important. Secondly, the key figure duration provides an intuitive approach to educate potential customers. This leads to a better understanding of financial instruments in general and how they behave when interest rates change. Bodie, Kane, Marcus (2006) Empirical studies and Figure 16.1 show six bond-pricing relationships: Firstly, theres an inverse relation between bond price and yield to maturity. Secondly, an increase in a bonds yield to maturity results in a smaller price change than a decrease of equal magnitude. Thirdly, long-term bonds are more sensitive than short-term bonds. Fourthly, interest rate risk, which is measured by the sensitivity of bond prices to changes in yields, is less than proportional to bond maturity. Fifthly, there is an inverse relationship between interest rate risk and bonds coupon rate, because a bond with a higher coupon rate pays a greater percentage of its present value prior to maturity. Sixthly, the yield to maturity at which the bond is currently sold is inversely related to the sensitivity of the bonds price to a change in its yield. This five observations were described Mankiel and are known as Malkiel bond-pricing relationships. The sixth property was demonstrated by Homer and Liebowitz (1972). Ingersoll, Skelton, Weil, (1978) stated that the key figure Duratio n can be interpreted as an attempt to quantify this qualitative observations through a single and numerical measure. The duration concepts has its origins in the work of Macaulay(1938), Samuelson (1945), Hicks (1939) and Redington (1952). Macaulay(1938) defined duration as the mean length of time that pass until the present value is returned by a stream of fixed payments. The proof that duration is an elasticity was provided by Hicks in 1939. This means that the price elasticity of a bond in response to an infinitesimal change in its yield to maturity is proportional to duration. But Fisher (2006) casts doubt on Hickss derivation. Nevertheless, his proof is generally acknowledged. Redington (1952) derived the duration independently and used it for portfolio immunization. The standard definition according to Macaulay is: subject to The weight is calculated by . In the special case of a zero bond, the duration equals the maturity, because no payments occur before maturity. Kopprasch (2006) mentions several different practical methods which are based on Macauleys duration and are used in practice. Effective duration is determined by the price movement to an incremental movement while holding the option adjusted spread constant. Option adjusted Spread (OAS) is a flat spread which is added to the yield curve in a pricing model and considers options like prepayments opportunities for mortgage backed securities. Hence, OAS is model dependent and incorporates volatility like variable interest rates or prepayment rates. Portfolio duration quantifies the Duration of a portfolio of different assets. It is based on the additivity of single durations. Additivity means that the duration of a portfolio is the weighted-average of the durations of the individual securities. The weights are the current market value of each security. The term Modified duration is calculated by the formula: Furthermore, the term partial durations or key rate durations is a vector of durations, where each duration is only valid for a limited maturity range. Spread duration recognizes that a change in the spread can affect the bond. This key figure was designed especially to value floaters which trade near par by definition. It often turns out that the market doesnt seem to trade the instruments with the predicted duration. Hence, empirical duration was developed to deal with these times. It is calculated by regressing price movements of the asset versus some market benchmark. The next paragraph considers two applications of duration in risk management: Hedging and immunization for a portfolio and Duration Gap Analysis. The change in an asset price due to change in interest rates can be calculated by: Fooladi (2000) describes that the realized rate of return encompass interest accumulated from reinvestment of coupon income and the capital gain or loss at the end of the planning period when the portfolio is sold. The two components impact the realized rate of return in opposite directions. Hence, in one point the two opposite effects of coupon reinvestment and capital gain or loss offset one another. When the portfolio duration equals the length of the planning period, the portfolio is immunized and the realized return will not fall below the promised rate of return. The second described application is Duration Gap Analysis which is an extension to the immunization approach, because it includes liabilities. A main function of banks is to provide maturity transformation. Hence, banks usually have short-term liabilities and long-term assets. As a consequence of this duration mismatch and shown by the third following equation, changes in interest rates have a direct effect on the banks equity value. The gap between the durations of the assets and liabilities ( is a measure of the interest rate risk of banks equity. Fooladi (2000) describes that banks may take modest bets by setting a duration gap or set the duration gap close to zero. The second equation shows how banks can adjust their duration gap by shifting weights on assets or liabilities. Bierwag and Fooladi (2006) specify that banks use off-balance-sheet securities like interest rate futures, options and swaps to reduce adjustment time and to save costs. Despite the shown strengths, there are weaknesses in duration analysis. As one can see in Figure 16.3, Duration is only valid for small changes, because the relationship between duration and price changes is derived by a first-order Taylor series approximation. Furthermore, Mishkin/Eakins (2006) criticise that interest rate changes have to affect all rates of maturities by exactly the same amount. Generally speaking, the slope of the yield shouldnt be affected at all and the yield curve is assumed to be flat. However, the shape of the yield curve fluctuates over the business cycle and consequently this expected slope change has to be considered. The mentioned partial duration and spread duration try to handle this shortcoming. Further problems involve uncertainty over the proportion of assets and liabilities. Estimates have to consider for example prepayment of loans, customer shifts out of deposits and uncertain cash payments due to default risk according to Fooladi and Roberts (2004). As Bierwag and Kaufman (1988) showed, default alters bonds cash flows and their timing. Additionally, one has to predict the stochastic process governing interest rate movements to value options. This can create a stochastic process risk which can be quantified by approaches to to measure interest rate volatility risk. Ho (2007) states that practitioners tie duration and vega measures which specify the sensitivities to the shift in the swap curve and the volatility surface, respectively. In his approach volatility risk is measured by the value sensitivity of an option to the change in the implied volatility function at the key rate points on the curve. Ingersoll, Skelton, and Weil (1978) argue that the assumed stochastic process to develop duration models is inconsistent with equilibrium conditions. Occurring large shocks to interest rates, riskless arbitrage became possible, but on the practical side the riskless-arbitrage argument seemed hypothetical. To overcome these weaknesses, Mishkin and Eakins (2006) mentions more sophisticated approaches such as scenario analysis and value-at-risk analysis and convexity which is a second-order Taylor series approximation and can be used as a correction measure. Paroush and Prisman (1997) strengthen this assumption and show that convexity (second-order) can be more important than the duration (first order). To put it in a nutshell, with increasing complexity of securities, myriad extensions have been added to the former duration analysis founded by Macaulay to handle the occurring risks. Furthermore, different duration measures face different assumptions about slope and shape of the yield curve or the stochastic process driving interest rates. One has to take in mind how accurate these assumptions are, because as seen in the recent financial crisis failures affect the entire economy, according to my starting statement. However, duration analysis is an adaptable framework and used carefully, a tool to get a first impression of interest-rate risk. Words: 1465

Sunday, January 19, 2020

Americaa Role in Iraq Essay -- Argumentative Persuasive Essays

America'a Role in Iraq As Afghan opposition groups and U.S. armed forces continue their successes in the war against the Taliban and al Qaeda, the American debate has quickly turned to the question of where the fight against terrorism should go next. In numerous public statements, President Bush has talked about a wide-ranging campaign against global terrorism. He has not committed to military operations against any other countries or terrorist organizations, but he has made it clear that the broader struggle against terrorism will be a long-lasting effort that could include the use of military force in regions beyond Afghanistan. A strong case can be made that Iraq's leader, Saddam Hussein, is so threatening to his people, his neighbors, and U.S. interests that the United States should use military force, unilaterally if necessary, to overthrow him. Proponents of such an approach, however, often underestimate the costs and risks involved. Instead of mounting a U.S. attack on Iraq as part of the current campaign, the Bush administration should take advantage of its success in Afghanistan to pressure allies and regional players to isolate Saddam's regime and to reinforce deterrence in an unambiguous way. A new "Bush Doctrine" should announce that Baghdad's support for terrorist networks, transfer of weapons of mass destruction to terrorist groups or individuals who target the United States, or the harboring of such terrorists will be considered an act of war and lead immediately to an American military intervention to overthrow the regime. Targeting Iraq There are many potential targets for a possible post-Afghanistan phase of the war—Abu Sayyaf guerrilla bases in the Philippines, for example, as well as terrorist headquarters and training camps in Somalia, Syria, and Lebanon. But none is more consequential or more prominent in the current policy debate than Saddam Hussein's regime in Iraq. Numerous outside analysts and (more privately) some senior Bush administration officials are already making the case that the next phase in the war on terrorism should be an effort to overthrow the Iraqi regime—if necessary, with U.S. military force. On November 26, President Bush himself appeared to raise the ante on the Iraq debate, stating that Saddam would "find out" what was in store for him if he failed to heed international demands to allow inspector... ...ime that would crack down on Iraqi smuggling, focus sanctions more specifically on the Baghdad leadership and weapons of mass destruction capabilities, and make civilian goods available for easier import into Iraq. Meaningful searches for Iraq's WMD capabilities would also be desirable, but only if they would be more effective than those of the late 1990s. America's allies and the regional powers need to understand that if Iraq cannot be contained with sanctions and stronger nonproliferation efforts, Washington may ultimately have to use force to achieve that goal. The U.S. administration should make it clear to the rest of the world that it cares a lot more about the well-being and future of the Iraqi population than does Saddam Hussein, and it should hold out a vision of American support for a future Iraq under a different regime. Reinforced deterrence, more vigilant nonproliferation efforts, and smarter sanctions will not make the Persian Gulf region risk-free or immediately free the Iraqi people from a brutal dictatorship. But they will serve the core goal of helping to prevent future terrorist actions like those of September 11 at a reasonable military and strategic cost.

Saturday, January 11, 2020

Database Management System

Dinky Hire firm is a small family business that stocks general equipment such as garden tools, car maintenance tools etc. For hiring to its customers. A database system is required to simplify management of the business and to provide some financial information and maintaining stocks. Equipment's are classified under various categories.Equipment's are of different brands within each category. Brands are varies in their prices and obtained from various suppliers. The known categories are: a) Gardening Equipment d) Decorating Equipment g) Heating and Lighting b) Building Equipment e) Car Maintenance h) Miscellaneous c) Access Equipment f) Power Tools Prices of equipment offered by the various suppliers as well as the delivery time for that equipment must be kept in the DB. The firm arranges for business customers only, a 24-hour support to replace any Rosen or faulty equipment that on hire.Upon receiving a customer complain, an immediate delivery will be arranged to replace the faulty equipment provided that it is in stock. Otherwise, a refund for the full charged amount will be administered. Private customers though, in similar cases, must bring the faulty equipment(s) themselves and replace them with working ones or get a full refund if there isn't any available in stock. Business customers are given various membership categories for discount purposes. These are silver, gold and diamond memberships.Silver members get 10%; Gold members get 25% and Diamond members get 40%. Hiring equipment's for private customers are restricted to those who live within 5 miles radius from their address. This distance from the private customer address is measured on map on the wall and the information stored on the customer record the first time the hire equipment's. No such restriction exists for business customers. Requirements: The following sections specify the requirements of the system. The computer is to be used when a customer visits the company to hire equipment's.At this time the following processing is necessary for each transaction: ; If not already known (I. E. Not previously entered into the DB), the customer's details are recorded. ; The equipment to be hired, with expected return date, is recorded. ; The equipment stock as recorded in the database is updated automatically. When business customers' call for support to replace any broken or faulty equipment's on hire, a log must be made in the DB and whether replacement equipment is arranged and delivered or a full refund is given.When the equipment is returned, the following processing is required: ; The actual return date is entered. ; An invoice is printed which shows the item borrowed and calculates the total cost including VAT. The cost should be based on a rate for one day plus a rate for each additional day. The daily rate varies between weekdays and weekend days. ; The stock figures are adjusted. ; Business customer discounts will be calculated according to the membership category, whil e no discount is given to private customers. 2. 3. 4. Design and create a database to the above scenario.State any assumptions made (if any). Map the diagram in to Relational Schema and Proof your answer is normalized up to BC. Create the Database using Myself. Final report should contain: 0 Assumptions 0 Entity Relationship Diagram 0 Relational Schema 0 Proof of Normalization 0 Myself commands which you have used to create the database Assignment Background A Database Management System (DB'S) is a set of programs that enables you to store, modify, and extract information from a database, it also provides users with tools to add, delete, access, modify, and analyze data stored in one location.A group can access the data by using query and reporting tools that are part of the DB'S or by using application programs specifically written to access the data. Assignment Requirements 1 . The final document should be Professional and systematic computerized document. 2. It is essential to ha ve References (if any). 3. Assignment should be word-processed and should be spiral bound. 4. The page after the Cover page should be as the assignment marking scheme (Attachment No 001). 5. Submit the softwood of the assignment along with the bound hard copy. Written Assignment Format:To receive full credit, assignments should maintain the following format: 0 Font: Caliber, Size: apt. 0 Spacing: standard. 0 File type (for electronic submission by prior arrangement): MS Word (â€Å". Doc† only) 0 Name/headers/footers on each page. Page number on each page. Cover page/ Contains page. Rules and Regulation of the Assignment 1 . Assignments will NOT be accepted after the last date of acceptance under any circumstance. Database Management System BABCOCK UNIVERSITY ILISHAN REMO OGUN STATE PROJECT PROPOSAL IN PARTIAL FULFILLMENT OF THE COURSE SOFTWARE ENGINEERING COMPUTER SCIENCE ON HOTEL MANAGEMENT SYSTEM GROUP 8 PROJECT MEMBERS: 1. XXXXXXX 2. XXXXXXXXXXX 3. XXXXXXXXXXXX 4. XXXXXXXXXX 5. OBRUTSE ONAJITE 09/1635 6. OKOROSOBO TEMITOPE 7. OLAJIDE SEGUN 8. XXXXXXXXXX 9. XXXXXXXX 10. XXXXXXXXXX PROJECT MANAGER: MRS AYITE 1. INTRODUCTION A. BACKGROUND ‘Online Alumni System' An Alumni Management System is a system that helps in keeping the records of the past students in which that it can be sorted by the year or by their major.Alumni management system is implemented in various schools around the globe, so it can help the student to get together when there is the need to get together, maybe for a get together Dinner and so on. B. SCOPE /OVERVIEW The Online alumni system is designed to maintain the details of the past student, so when the school wants to check the year a student graduated for some unforeseen circumstances. Usin g this project, the administrator registers each past student into the directory and gives them their username and password so they can login and update their profile. The Alumni Management System provides following features. Members Directory * Online photo gallery * Comment posting facility C. STATEMENT OF PROBLEM The aim of the software is to develop a software that helps the university to keep good record of their old students, in order to refer to them when necessary, even on occasions where they want to make a year book for the graduating class or something. D. PROJECT OBJECTIVES OBJECTIVE: The central objective of this project is to provide facility for record system for the university committee. In previous system (i. e. Manual System), the student has to queue up to register his/her name in the alumni register on paper.Database Management System and DataThis was the fully time consuming, expensive etc. Through this product, he can update his database maybe when he is marrie d and he wants to change his status to married and so on. 2. SYSTEM ANALYSIS System analysis is the process of gathering and interpreting facts, diagnosing problems and using the facts to improve the system. System analysis specifies what the system should do. A system is a set of components that interact to accomplish some purpose. * Identifying the drawback of the existing system * Identify the need for conversion * Perform feasibility study * Identify hardware, software and database requirements Create a system definition that forms the foundation for subsequent work A. SYSTEM STUDY Overview of the Existing System In the existing system user can face so much problems. They have to waist so much time for the registering. This is the time consuming task. Sometimes user is very tired then they face the so much problem. Sometimes user feel the laziness, this is also failure for the existing system. B. FEASIBILITY STUDY The feasibility of a project can be ascertained in terms of techn ical factors, economic factors, or both. A feasibility study is documented with a report showing all the ramifications of the project.Technical Feasibility Technical feasibility refers to the ability of the process to take advantage of the current state of the technology in pursuing further improvement. The technical capability of the personnel as well as the capability of the available technology should be considered. Technology transfer between geographical areas and cultures needs to be analyzed to understand productivity loss (or gain) due to differences (see Cultural Feasibility). Since we are using PHP 5, Tomcat 6. 0 and so on technically our project is feasible. Economic FeasibilityThis involves the feasibility of the proposed project to generate economic benefits. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new industrial projects. The tangible and intangible aspects of a project should be translated into e conomic terms to facilitate a consistent basis for evaluation. Cultural Feasibility Cultural feasibility deals with the compatibility of the proposed project with the cultural setup of the project environment. In labor-intensive projects, planned functions must be integrated with the local cultural practices and beliefs.For example, religious beliefs may influence what an individual is willing to do or not do. Social Feasibility Social feasibility addresses the influences that a proposed project may have on the social system in the project environment. The ambient social structure may be such that certain categories of workers may be in short supply or nonexistent. The effect of the Project on the social status of the project participants must be assessed to ensure compatibility. It should be recognized that workers in certain industries may have certain status symbols within the society. Scope of Feasibility AnalysisIn general terms, the elements of a feasibility analysis for a pro ject should cover the following: I. Need Analysis This indicates recognition of a need for the project. The need may affect the organization itself, another organization, the public, or the government. A preliminary study is then conducted to confirm and evaluate the need. A proposal of how the need may be satisfied is then made. Relevant questions that should be asked include: * Is the need significant enough to justify the proposed project? * Will the need still exist by the time the project is completed? * What are the alternate means of satisfying the need? What are the economic, social, environmental, and political impacts of the need? II. Process Work This is the preliminary analysis done to determine what will be required to satisfy the need. The work may be performed by a consultant who is an expert in the project field. The preliminary study often involves system models or prototypes. For technology-oriented projects, artist's conception and scaled-down models may be used f or illustrating the general characteristics of a process. A simulation of the proposed system can be carried out to predict the outcome before the actual project starts. III. Engineering & DesignThis involves a detailed technical study of the proposed project. Written quotations are obtained from suppliers and subcontractors as needed. Technology capabilities are evaluated as needed. Product design, if needed, should be done at this time. IV. Cost Estimate This involves estimating project cost to an acceptable level of accuracy. Levels of around -5% to +15% are common at this level of a project plan. Both the initial and operating costs are included in the cost estimation. Estimates of capital investment and of recurring and nonrecurring costs should also be contained in the cost estimate document.Sensitivity analysis can be carried out on the estimated cost values to see how sensitive the project plan is to the estimated cost values. V. Financial Analysis This involves an analysis of the cash flow profile of the project. The analysis should consider rates of return, inflation, sources of capital, payback periods, breakeven point, residual values, and sensitivity. This is a critical analysis since it determines whether or not and when funds will be available to the project. The project cash flow profile helps to support the economic and financial feasibility of the project. VI. Project ImpactsThis portion of the feasibility study provides an assessment of the impact on the proposed project. Environmental, social, cultural, political, and economic impacts may be some of the factors that will determine how a project is perceived by the public. The value added potential of the project should also be assessed. A value added tax may be assessed based on the price of a product and the cost of the raw material used in making the product. The tax so collected may be viewed as a contribution to government coffers. Conclusions and Recommendations The feasibility study s hould end with the overall outcome of the project analysis.This may indicate an endorsement or disapproval of the project. Recommendations on what should be done should be included in this section of the feasibility report. 3. SYSTEM DESIGN System design provides the understanding and procedural details necessary for implementing the system recommended in the system study. Emphasis is on translating the performance requirements into design specifications. The design phase is a transition from a user – oriented document (System proposal) to a documented oriented to the programmers or database personnel. A. GRAPHICAL REPRESENTATION I.Entity Relationship Diagram It is clear that the physical objects from the previous section the administrator, rooms, customer all correspond to entities in the Entity-Relationship model, and the operations to be done on those entities. Date of Birth Date of Birth SEX SEX NAME NAME Student Student Email Email Address Address IS A IS A Alumnus Alumn us IS A IS A GRADUATION YEAR GRADUATION YEAR GRADUATE STUDENT GRADUATE STUDENT POSTGRADUATE POSTGRADUATE COURSE COURSE DEGREE PROGRAMME DEGREE PROGRAMME COMPUTING TOOLS A. METHODOLOGIES B. PROGRAMMING LANGUAGES TOOLS USED FOR DEVELOPING: Language -> PHPDatabase -> My SQL Web Server -> APACHE TOMCAT 6. 0 IDE -> NETBEANS Programming language choice affects the productivity and code quality in several ways. Programmers working with high level language achieve better productivity and quality than those working with low level language, because former is more expensive in nature. We have used HTML, PHP scripting languages for the coding as we have to make the software and these languages provide great compatibility and flexibility. Overview of Programming Languages Overview of PHP The PHP technology will be used to interface HTML.The PHP technology provides a seamless connection and presents an easy to use, PHP-like programming constructs that can be scripted within HTML files. Hypertext preprocessor is a technology for developing web pages that include dynamic content. A PHP page contains standard markup language elements, such as HTML tags, just like a regular web page. A PHP page also contains special PHP elements that allow the server to insert dynamic content in the web page. ADVANTAGES OF PHP 1. PHP supports both scripting and element-based dynamic content. 2. Allows developing custom tag libraries. . PHP pages are precompiled for efficient server processing. 4. PHP pages can be used in combination with servlets that handle the business logic. 5. High Security. . 6. High Quality tool supports. 7. Write Once, Run Everywhere. 8. PHP is vender Neutral Overview of Java Script Java script is a general purpose, prototype based, object oriented scripting language developed jointly by sun and Netscape and is meant for the WWW. Java script borrows most of its syntax from java but also inherits from awk and perl, with some indirect influence from self in its object prot otype system.Java Script is almost as easy to learn as HTML and it can be included directly in HTML documents. Java Script was developed independently of java. Java script is a high level scripting language that does not depend on or expose particular machine representations or operating system services. FEATURES OF JAVA SCRIPT Java script is embedded into HTML documents and is executed with in them. Java script is browser dependent. JavaScript is an interpreted language that can be interpreted by the browser at run time. Java script is loosely typed language. Java script is an object-based language.Java script is an Event-Driven language and supports event handlers to specify the functionality of a button. The Struts framework provides the flexibility to develop the much less coupled applications. It generalizes and strictly implements MVC-model View Controller Architecture. That is the basic need of our architecture. Overview of Apache Tomcat Apache Tomcat is a servlet container d eveloped by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a â€Å"pure Java† HTTP web server environment for Java code to run.Tomcat should not be confused with the Apache web server, which is a C implementation of an HTTP web server; these two web servers are not bundled together. Apache Tomcat includes tools for configuration and management, but can also be configured by editing XML configuration files. Overview of MySQL MySQL is a multithreaded, multi-user SQL database management system (DBMS) which has, according to MySQL AB, more than 10 million installations. MySQL is owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, which holds the copyright to most codebase. Libraries for ccessing MySQL databases are available in all major programming languages with language-specific APIs. In addition, an ODBC interface called MyODBC allows additio nal programming languages that support the ODBC interface to communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server and official libraries are mostly implemented in ANSI C. C. PLATFORM I. HARDWARE SPECIFICATIONS Processor: Pentium III or higher RAM: 128 MB or More Hard Disk: 20 GB or More Modem: 56KBPS / LAN Card II. SOFTWARE SPECIFICATIONS Operating System: Windows XP, VISTA 7. Web Server: ApacheFront End: JSP Back End: MySQL Scripts: JavaScript Language: JAVA III. User Interface Requirements The user of the proposed system requires that the developed software should be user friendly, have security access, and ensure the privacy of the administrator and produce results in timely manner. The users are not frequently exposed to the on-line hotel management, so the system interface to the user must be simple and understandable. The web pages must be user-friendly and must be in an easy-to-use style. The user must be able to easily switch among various I/O scree ns.The product is well designed so that it can be used easily by layman and also the users who are novices to the system. The system should be designed in such a way that only authorized users should be allowed to login to the system. The user interface should be as interactive as possible. A user-friendly interface must be provided so that the user can easily interact with the system and comprehend things in a quicker and easier way. The system must provide reliable and up-to-date information. The application should be efficient so that the user does not spend much time in training.Consistency will increase the confidence of the user in the reliability of the application. The user must be limited with a small set of operations to achieve the result. The application should be visually and conceptually clear. The interface should accommodate user mistakes easily and fast. It should minimize the errors and should handle them peacefully. IV. Database Requirements The database should be designed in such a way that it enhances the efficient storage, retrieval and manipulation of all the information associated. For instance all general information regarding an item attribute should be stored in a particular table.The concerned users should have the facility to query to the database and supply the basic information easily. Security mechanisms should be provided so that no confidential details should be accessible to unauthorized persons. The database should be organized in such a way that it helps in preparing various essential summaries needed for users. V. Functional Requirements The various functional requirements of the system can be summarized as: 1. A home page that is user friendly and ambiguous. 2. Administrator Login Facility 3. Links to other related sites. 4.Ability of Administrator to perform any tasks which you can see in my snapshots (below) and in my running project. 5. A login page for alumnus to create a new user if not registered VI. Non-Functional Requirements Non-functional requirements define the system properties and constraints that arise through user needs, because of the budgeted constraints or organizational policies, or because of the need for interoperability with other software or due to the external factors such as safety regulations privacy registrations and so on. VII. Other Requirements and ConstraintsPerformance Requirements * The database should be centralized and secure. * The system should be user friendly and easily accessible * The system must be reliable. Design Requirements The main objectives of input design are: * Controlling the amount of input * Keeping the process simple, avoiding errors. * The best thing in the input design is to achieve all the objectives mentioned in the simplest manner possible. The main objectives of output design are: * Identifying the specific outputs. * Creating reports for displaying and storing information. 4. MILESTONES A.TIMELINES I. DISTRIBUTION OF TASKS AND SUBTASKS II . TEAM MEMBERS RESPONSIBILITIES Each project member has been given a role to perform which will make the project work go smoothly. | | | | | | | | | | | | III. PROPOSED TIMEFRAME FOR EACH TASK AS ASSIGNED B. DEADLINES FOR EACH TASK AND MODULES C. PROPOSED DUE DATE 5. POSSIBLE TEST CASES AND PLANS 6. LIMITATIONS The Hotel Management System can be used for any organization that may require detailed information at one time or the other. This application covers a relatively large scope more than is highlighted in this project work.There is always room for improvement depending on the intending area of application. For the purpose of this project, however, we will use Arzu Hotels as a set case. The limitations of this project are: * Unavailability of sufficient time due to tight academic schedule. * Lack of internet connection to perform necessary research Despite these limitations, we will be able to design a functional Hotel Management System. 7. CONCLUSION From a proper analysis of po sitive points and constraints on the component, it can be safely concluded that the product is a highly efficient GUI based component.This application is working properly and meeting to all user requirements. This component can be easily plugged in many other systems. 8. APPENDIX I. Programming Programming is not only a creative activity but also an intellectually rigorous discipline. It is the part where the design is actually translated into the machine readable form which is called program. II. Programming Principles The main activity of coding phase is to translate design into code. If we translate the structure of the design properly, we will have structured programs. A structured program doesn’t just â€Å"happen†.It is the end product of series of efforts that try to understand the problem and develop a structured, understandable solution plan. It is all impossible to write a good structured program based on unstructured poor design . The coding phase affects bo th testing and maintenance , profoundly the time spent in coding is small percentage of the total software cost, while testing and maintenance consume the major percentage . The goal of coding phase is not to simplify the job of the tester and maintainer. III. Programming style A well written program is more easily read and understood both by the author and by others who work that program.A good Programming style is characterized by the following: * Simplicity * Readability * Good documentation * Changeability * Predictability * Good Structure IV. Selection of Coding Language All the programs coded should be based on a standard which can tend to the needs of all readers, i. e. it should provide degree of predictability in programs of a common type. There are many aspects to what the programs must do so to enable the different users to comfortably work on it. For example the program should: * Be corrective of the solution * Have maximum speed of execution * Be comprehensive and east to maintain Database Management System BABCOCK UNIVERSITY ILISHAN REMO OGUN STATE PROJECT PROPOSAL IN PARTIAL FULFILLMENT OF THE COURSE SOFTWARE ENGINEERING COMPUTER SCIENCE ON HOTEL MANAGEMENT SYSTEM GROUP 8 PROJECT MEMBERS: 1. XXXXXXX 2. XXXXXXXXXXX 3. XXXXXXXXXXXX 4. XXXXXXXXXX 5. OBRUTSE ONAJITE 09/1635 6. OKOROSOBO TEMITOPE 7. OLAJIDE SEGUN 8. XXXXXXXXXX 9. XXXXXXXX 10. XXXXXXXXXX PROJECT MANAGER: MRS AYITE 1. INTRODUCTION A. BACKGROUND ‘Online Alumni System' An Alumni Management System is a system that helps in keeping the records of the past students in which that it can be sorted by the year or by their major.Alumni management system is implemented in various schools around the globe, so it can help the student to get together when there is the need to get together, maybe for a get together Dinner and so on. B. SCOPE /OVERVIEW The Online alumni system is designed to maintain the details of the past student, so when the school wants to check the year a student graduated for some unforeseen circumstances. Usin g this project, the administrator registers each past student into the directory and gives them their username and password so they can login and update their profile. The Alumni Management System provides following features. Members Directory * Online photo gallery * Comment posting facility C. STATEMENT OF PROBLEM The aim of the software is to develop a software that helps the university to keep good record of their old students, in order to refer to them when necessary, even on occasions where they want to make a year book for the graduating class or something. D. PROJECT OBJECTIVES OBJECTIVE: The central objective of this project is to provide facility for record system for the university committee. In previous system (i. e. Manual System), the student has to queue up to register his/her name in the alumni register on paper.Database Management System and DataThis was the fully time consuming, expensive etc. Through this product, he can update his database maybe when he is marrie d and he wants to change his status to married and so on. 2. SYSTEM ANALYSIS System analysis is the process of gathering and interpreting facts, diagnosing problems and using the facts to improve the system. System analysis specifies what the system should do. A system is a set of components that interact to accomplish some purpose. * Identifying the drawback of the existing system * Identify the need for conversion * Perform feasibility study * Identify hardware, software and database requirements Create a system definition that forms the foundation for subsequent work A. SYSTEM STUDY Overview of the Existing System In the existing system user can face so much problems. They have to waist so much time for the registering. This is the time consuming task. Sometimes user is very tired then they face the so much problem. Sometimes user feel the laziness, this is also failure for the existing system. B. FEASIBILITY STUDY The feasibility of a project can be ascertained in terms of techn ical factors, economic factors, or both. A feasibility study is documented with a report showing all the ramifications of the project.Technical Feasibility Technical feasibility refers to the ability of the process to take advantage of the current state of the technology in pursuing further improvement. The technical capability of the personnel as well as the capability of the available technology should be considered. Technology transfer between geographical areas and cultures needs to be analyzed to understand productivity loss (or gain) due to differences (see Cultural Feasibility). Since we are using PHP 5, Tomcat 6. 0 and so on technically our project is feasible. Economic FeasibilityThis involves the feasibility of the proposed project to generate economic benefits. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new industrial projects. The tangible and intangible aspects of a project should be translated into e conomic terms to facilitate a consistent basis for evaluation. Cultural Feasibility Cultural feasibility deals with the compatibility of the proposed project with the cultural setup of the project environment. In labor-intensive projects, planned functions must be integrated with the local cultural practices and beliefs.For example, religious beliefs may influence what an individual is willing to do or not do. Social Feasibility Social feasibility addresses the influences that a proposed project may have on the social system in the project environment. The ambient social structure may be such that certain categories of workers may be in short supply or nonexistent. The effect of the Project on the social status of the project participants must be assessed to ensure compatibility. It should be recognized that workers in certain industries may have certain status symbols within the society. Scope of Feasibility AnalysisIn general terms, the elements of a feasibility analysis for a pro ject should cover the following: I. Need Analysis This indicates recognition of a need for the project. The need may affect the organization itself, another organization, the public, or the government. A preliminary study is then conducted to confirm and evaluate the need. A proposal of how the need may be satisfied is then made. Relevant questions that should be asked include: * Is the need significant enough to justify the proposed project? * Will the need still exist by the time the project is completed? * What are the alternate means of satisfying the need? What are the economic, social, environmental, and political impacts of the need? II. Process Work This is the preliminary analysis done to determine what will be required to satisfy the need. The work may be performed by a consultant who is an expert in the project field. The preliminary study often involves system models or prototypes. For technology-oriented projects, artist's conception and scaled-down models may be used f or illustrating the general characteristics of a process. A simulation of the proposed system can be carried out to predict the outcome before the actual project starts. III. Engineering & DesignThis involves a detailed technical study of the proposed project. Written quotations are obtained from suppliers and subcontractors as needed. Technology capabilities are evaluated as needed. Product design, if needed, should be done at this time. IV. Cost Estimate This involves estimating project cost to an acceptable level of accuracy. Levels of around -5% to +15% are common at this level of a project plan. Both the initial and operating costs are included in the cost estimation. Estimates of capital investment and of recurring and nonrecurring costs should also be contained in the cost estimate document.Sensitivity analysis can be carried out on the estimated cost values to see how sensitive the project plan is to the estimated cost values. V. Financial Analysis This involves an analysis of the cash flow profile of the project. The analysis should consider rates of return, inflation, sources of capital, payback periods, breakeven point, residual values, and sensitivity. This is a critical analysis since it determines whether or not and when funds will be available to the project. The project cash flow profile helps to support the economic and financial feasibility of the project. VI. Project ImpactsThis portion of the feasibility study provides an assessment of the impact on the proposed project. Environmental, social, cultural, political, and economic impacts may be some of the factors that will determine how a project is perceived by the public. The value added potential of the project should also be assessed. A value added tax may be assessed based on the price of a product and the cost of the raw material used in making the product. The tax so collected may be viewed as a contribution to government coffers. Conclusions and Recommendations The feasibility study s hould end with the overall outcome of the project analysis.This may indicate an endorsement or disapproval of the project. Recommendations on what should be done should be included in this section of the feasibility report. 3. SYSTEM DESIGN System design provides the understanding and procedural details necessary for implementing the system recommended in the system study. Emphasis is on translating the performance requirements into design specifications. The design phase is a transition from a user – oriented document (System proposal) to a documented oriented to the programmers or database personnel. A. GRAPHICAL REPRESENTATION I.Entity Relationship Diagram It is clear that the physical objects from the previous section the administrator, rooms, customer all correspond to entities in the Entity-Relationship model, and the operations to be done on those entities. Date of Birth Date of Birth SEX SEX NAME NAME Student Student Email Email Address Address IS A IS A Alumnus Alumn us IS A IS A GRADUATION YEAR GRADUATION YEAR GRADUATE STUDENT GRADUATE STUDENT POSTGRADUATE POSTGRADUATE COURSE COURSE DEGREE PROGRAMME DEGREE PROGRAMME COMPUTING TOOLS A. METHODOLOGIES B. PROGRAMMING LANGUAGES TOOLS USED FOR DEVELOPING: Language -> PHPDatabase -> My SQL Web Server -> APACHE TOMCAT 6. 0 IDE -> NETBEANS Programming language choice affects the productivity and code quality in several ways. Programmers working with high level language achieve better productivity and quality than those working with low level language, because former is more expensive in nature. We have used HTML, PHP scripting languages for the coding as we have to make the software and these languages provide great compatibility and flexibility. Overview of Programming Languages Overview of PHP The PHP technology will be used to interface HTML.The PHP technology provides a seamless connection and presents an easy to use, PHP-like programming constructs that can be scripted within HTML files. Hypertext preprocessor is a technology for developing web pages that include dynamic content. A PHP page contains standard markup language elements, such as HTML tags, just like a regular web page. A PHP page also contains special PHP elements that allow the server to insert dynamic content in the web page. ADVANTAGES OF PHP 1. PHP supports both scripting and element-based dynamic content. 2. Allows developing custom tag libraries. . PHP pages are precompiled for efficient server processing. 4. PHP pages can be used in combination with servlets that handle the business logic. 5. High Security. . 6. High Quality tool supports. 7. Write Once, Run Everywhere. 8. PHP is vender Neutral Overview of Java Script Java script is a general purpose, prototype based, object oriented scripting language developed jointly by sun and Netscape and is meant for the WWW. Java script borrows most of its syntax from java but also inherits from awk and perl, with some indirect influence from self in its object prot otype system.Java Script is almost as easy to learn as HTML and it can be included directly in HTML documents. Java Script was developed independently of java. Java script is a high level scripting language that does not depend on or expose particular machine representations or operating system services. FEATURES OF JAVA SCRIPT Java script is embedded into HTML documents and is executed with in them. Java script is browser dependent. JavaScript is an interpreted language that can be interpreted by the browser at run time. Java script is loosely typed language. Java script is an object-based language.Java script is an Event-Driven language and supports event handlers to specify the functionality of a button. The Struts framework provides the flexibility to develop the much less coupled applications. It generalizes and strictly implements MVC-model View Controller Architecture. That is the basic need of our architecture. Overview of Apache Tomcat Apache Tomcat is a servlet container d eveloped by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a â€Å"pure Java† HTTP web server environment for Java code to run.Tomcat should not be confused with the Apache web server, which is a C implementation of an HTTP web server; these two web servers are not bundled together. Apache Tomcat includes tools for configuration and management, but can also be configured by editing XML configuration files. Overview of MySQL MySQL is a multithreaded, multi-user SQL database management system (DBMS) which has, according to MySQL AB, more than 10 million installations. MySQL is owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, which holds the copyright to most codebase. Libraries for ccessing MySQL databases are available in all major programming languages with language-specific APIs. In addition, an ODBC interface called MyODBC allows additio nal programming languages that support the ODBC interface to communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server and official libraries are mostly implemented in ANSI C. C. PLATFORM I. HARDWARE SPECIFICATIONS Processor: Pentium III or higher RAM: 128 MB or More Hard Disk: 20 GB or More Modem: 56KBPS / LAN Card II. SOFTWARE SPECIFICATIONS Operating System: Windows XP, VISTA 7. Web Server: ApacheFront End: JSP Back End: MySQL Scripts: JavaScript Language: JAVA III. User Interface Requirements The user of the proposed system requires that the developed software should be user friendly, have security access, and ensure the privacy of the administrator and produce results in timely manner. The users are not frequently exposed to the on-line hotel management, so the system interface to the user must be simple and understandable. The web pages must be user-friendly and must be in an easy-to-use style. The user must be able to easily switch among various I/O scree ns.The product is well designed so that it can be used easily by layman and also the users who are novices to the system. The system should be designed in such a way that only authorized users should be allowed to login to the system. The user interface should be as interactive as possible. A user-friendly interface must be provided so that the user can easily interact with the system and comprehend things in a quicker and easier way. The system must provide reliable and up-to-date information. The application should be efficient so that the user does not spend much time in training.Consistency will increase the confidence of the user in the reliability of the application. The user must be limited with a small set of operations to achieve the result. The application should be visually and conceptually clear. The interface should accommodate user mistakes easily and fast. It should minimize the errors and should handle them peacefully. IV. Database Requirements The database should be designed in such a way that it enhances the efficient storage, retrieval and manipulation of all the information associated. For instance all general information regarding an item attribute should be stored in a particular table.The concerned users should have the facility to query to the database and supply the basic information easily. Security mechanisms should be provided so that no confidential details should be accessible to unauthorized persons. The database should be organized in such a way that it helps in preparing various essential summaries needed for users. V. Functional Requirements The various functional requirements of the system can be summarized as: 1. A home page that is user friendly and ambiguous. 2. Administrator Login Facility 3. Links to other related sites. 4.Ability of Administrator to perform any tasks which you can see in my snapshots (below) and in my running project. 5. A login page for alumnus to create a new user if not registered VI. Non-Functional Requirements Non-functional requirements define the system properties and constraints that arise through user needs, because of the budgeted constraints or organizational policies, or because of the need for interoperability with other software or due to the external factors such as safety regulations privacy registrations and so on. VII. Other Requirements and ConstraintsPerformance Requirements * The database should be centralized and secure. * The system should be user friendly and easily accessible * The system must be reliable. Design Requirements The main objectives of input design are: * Controlling the amount of input * Keeping the process simple, avoiding errors. * The best thing in the input design is to achieve all the objectives mentioned in the simplest manner possible. The main objectives of output design are: * Identifying the specific outputs. * Creating reports for displaying and storing information. 4. MILESTONES A.TIMELINES I. DISTRIBUTION OF TASKS AND SUBTASKS II . TEAM MEMBERS RESPONSIBILITIES Each project member has been given a role to perform which will make the project work go smoothly. | | | | | | | | | | | | III. PROPOSED TIMEFRAME FOR EACH TASK AS ASSIGNED B. DEADLINES FOR EACH TASK AND MODULES C. PROPOSED DUE DATE 5. POSSIBLE TEST CASES AND PLANS 6. LIMITATIONS The Hotel Management System can be used for any organization that may require detailed information at one time or the other. This application covers a relatively large scope more than is highlighted in this project work.There is always room for improvement depending on the intending area of application. For the purpose of this project, however, we will use Arzu Hotels as a set case. The limitations of this project are: * Unavailability of sufficient time due to tight academic schedule. * Lack of internet connection to perform necessary research Despite these limitations, we will be able to design a functional Hotel Management System. 7. CONCLUSION From a proper analysis of po sitive points and constraints on the component, it can be safely concluded that the product is a highly efficient GUI based component.This application is working properly and meeting to all user requirements. This component can be easily plugged in many other systems. 8. APPENDIX I. Programming Programming is not only a creative activity but also an intellectually rigorous discipline. It is the part where the design is actually translated into the machine readable form which is called program. II. Programming Principles The main activity of coding phase is to translate design into code. If we translate the structure of the design properly, we will have structured programs. A structured program doesn’t just â€Å"happen†.It is the end product of series of efforts that try to understand the problem and develop a structured, understandable solution plan. It is all impossible to write a good structured program based on unstructured poor design . The coding phase affects bo th testing and maintenance , profoundly the time spent in coding is small percentage of the total software cost, while testing and maintenance consume the major percentage . The goal of coding phase is not to simplify the job of the tester and maintainer. III. Programming style A well written program is more easily read and understood both by the author and by others who work that program.A good Programming style is characterized by the following: * Simplicity * Readability * Good documentation * Changeability * Predictability * Good Structure IV. Selection of Coding Language All the programs coded should be based on a standard which can tend to the needs of all readers, i. e. it should provide degree of predictability in programs of a common type. There are many aspects to what the programs must do so to enable the different users to comfortably work on it. For example the program should: * Be corrective of the solution * Have maximum speed of execution * Be comprehensive and east to maintain