Tuesday, November 26, 2019

Baldwin vs. Buckley essays

Baldwin vs. Buckley essays It is easy to look back with hindsight and know who was right and who was wrong. When I first started researching the debate, I came across an article written about the James Baldwin versus William Buckley debate by a teacher who said, History is always being swallowed by the present. We see it today with the same sex marriage, gun control oppositionist, the Patriot Act, nationalized healthcare, and to some extent, drug laws. There are people alive today who believed with conviction in the stance that William Buckley, Jr. stood for; even after Buckley publicly withdrew is defense against desegregation. History, as it stands, has a way of forgetting those details. Just as you may know some who voted against same sex marriage, background checks for gun ownership, and mandatory healthcare; you also may know someone who stood for segregation however odd it may sound. The fact is, the issues at hand today is no different than the issues America had tried to keep previously. The importance of Buckley vs. Baldwin wasnt just academic, it was cultural. When you watch the debate, you can see that 1965 sat the precipice of change. You see in the room that it wasnt just that Baldwin won; it was Buckley showed up already having lost. For someone in the present looking back at that debate, they would have to understand who Buckley was and where he had come from; as well as where Baldwin came from, who he was, and how he ended up in the debate. When you truly understand Baldwin and Buckley, you can truly understand why the debate vote was heavily one sided. Before graduating from DeWitt Clinton High School in the Bronx, Baldwin had already published numerous poems, short stories, and plays in magazines; as well as serving as a youth minister in a Harlem Pentecostal church. Yet, after graduating, he had to put his plans for college on hold to support his seven younger siblings, his mother, and his father &nd...

Friday, November 22, 2019

Most Lopsided Presidential Elections

Most Lopsided Presidential Elections The most lopsided president election in U.S. history was Democrat Franklin Delano Roosevelts 1936 victory against  Republican Alfred M. Landon. Roosevelt won 98.5 percent or 523 of the 538 electoral votes up for grabs that year. Such a lopsided president election is unheard of in modern history. But Roosevelts victory is by no means the only lopsided presidential election. Republican Ronald Reagan won the most electoral votes of any president in history, 525. But that was after seven more electoral votes were added to the prize. His 525 electoral votes represented 97.6 percent of all 538 electoral votes. Definition of a Lopsided President Election In presidential elections, a landslide election is generally agreed to be one in which the winning candidate secures at least 375 or 70 percent of the 538 electoral votes in the Electoral College. For purposes of this article, we are using electoral votes as a measure and not the popular vote. It is possible to win the popular vote and lose the presidential race, as happened in the 2000 and 2016 elections because of the way electoral votes are distributed by states.  A landslide presidential election, in other words, may not always result in a similarly wide margin in popular vote because many U.S. states award electoral votes on a winner-take-all basis to the candidate who wins the popular vote in their state. Using the standard definition of a landslide victory in presidential politics, when one candidate wins at least 375 electoral votes, heres list of contested presidential races that were among the most lopsided in American history. Note: President Donald Trumps 2016 electoral victory does not qualify as a lopsided victory as he won only 306 electoral votes. Democrat Hillary Clinton won 232 electoral votes but carried the popular vote. List of Landslide Presidential Elections Under that standard definition, the following presidential elections would qualify as Electoral College landslides: 1996: Democrat Bill Clinton won 379 electoral votes against Republican Bob Dole, who received only 159 electoral votes.1988: Republican George H.W. Bush won 426 electoral votes against Michael S. Dukakis, who received only 111.1984: Republican Ronald Reagan won 525 electoral votes against Democrat Walter Mondale, who got only 13 electoral votes.1980: Reagan won 489 electoral votes against Democrat Jimmy Carter, who got only 49 electoral votes.1972: Republican Richard Nixon won 520 electoral votes against Democrat George S. McGovern, who got only 17 electoral votes.1964: Democrat Lyndon B. Johnson got 486 electoral votes against Republican Barry M. Goldwater, who got only 52 electoral votes.1956: Republican Dwight D. Eisenhower got 457 electoral votes against Democrat Adlai Stevenson, who got only 73 electoral votes.1952: Eisenhower got 442 electoral votes against Stevenson, who got only 89 electoral votes.1944: Democrat Franklin D. Roosevelt got 432 electoral votes against Republican Thomas E. Dewey, who got only 99 electoral votes. 1940: Roosevelt got 449 electoral votes against Republican Wendell L. Wilkie, who got only 82 electoral votes.1936: Roosevelt got 523 electoral votes against Republican Alfred M. Landon, who got only 8 electoral votes.1932: Roosevelt got 472 electoral votes against Republican Herbert C. Hoover, who got only 59 electoral votes.1928: Republican Herbert C. Hoover got 444 electoral votes against Democrat Alfred E. Smith, who got only 87 electoral votes.1924: Republican Calvin Coolidge got 382 electoral votes against Democrat John W. Davis, who got only 136 electoral votes.1920: Republican Warren G. Harding got 404 electoral votes against Democrat James M. Cox, who got only 127 electoral votes.1912: Democrat Woodrow Wilson got 435 electoral votes against Progressive Theodore Roosevelt, who got only 88 electoral votes.

Thursday, November 21, 2019

Industry - Strategic Analysis Research Paper Example | Topics and Well Written Essays - 1750 words

Industry - Strategic Analysis - Research Paper Example Industry-Strategic Analysis This industry comprises of a number of establishments known as ‘Home Centers’ that are primarily engaged in retailing of products relevant to the repair and maintenance of homes. Such goods include lumbers, plumbing, electrical goods, hardware, tools, and lawn and garden supplies. Home centers also provide building materials and other consumer goods relevant with the repair and maintenance (census.gov). These goods are either purchased from domestic or international manufacturers of suppliers. Operators then retail these goods to the ultimate consumers through their stores (IBISWorld, 2006). Industry’s Dominant Economic Features This industry has a vast market size which is the dominant economic factor of the industry. Other economic factors are significantly affected by the market size in the industry. The annual sales of the industry are estimated at $135.4 billion. As the products offered by home centers are utilized by consumers in all the segments of the market, therefore the market size is extended to all the levels of the market. The business conducted in the industry is comparatively easy to operate therefore the industry is growing at a very fast pace. This scenario has initiated a stiff competition within the industry and major home centers are increasing at an unprecedented rate at the expense of smaller entities in the industry (Sinderman, 1997). The number of rivals within the industry is high. Since the goods produced by the industry are not dependent upon technology therefore the abrupt technological changes do not affect the operations of the industry to a significant extent. This allows the industry sufficient time to acclimatize with the changing trends. The products in the industry are mostly of a generic nature therefore there is not much differentiation between the products. The segments within the industry include specialized home stores that retail specialized goods only such as stores speci alized for plumbing, electronic goods etc. Such stores do not retail any other goods other than the specialized goods. Porter’s Five Forces Porter’s Five Forces analysis is conducted to determine whether an industry is attractive for entrepreneurs (Hitt, 2009). In order to analyze the home centers industry, the analysis is being conducted on Home Depot. Home Depot is an American retailer of home improvement products. Home Depot is the largest retailer of home repair and maintenance products in the US therefore it is one of the most important constituents of the industry (Form 10-K, 2010). Following is the Porter’s Five Forces analysis of Home Depot. Threat of Substitute Products Threat of substitute products outside the industry is low because there are no or less substitutes for the home repair and maintenance products. It was determined by the following facts. In case of plumbing, there is not other industry that produces such goods. Similarly, in case of good s like carpets, home decor goods, and other electronic goods for home maintenance, there are no substitute goods produced by any other industry. Therefore home depot has a low threat of substitute products. The main products produced by the company are tools, shelves, indoor and outdoor

Tuesday, November 19, 2019

Corporate Social Responsibility Case Study Example | Topics and Well Written Essays - 1000 words

Corporate Social Responsibility - Case Study Example It has been found out that the company should immediately take initiatives to engage in more innovative and benefit reaping CSR activities so as to improve its socially responsible image and ensure its long-term sustainability. Shell Oil Company is the American subsidiary of the multinational oil major company, Royal Dutch Shell. The Royal Dutch Shell is an oil company of Anglo-Dutch origin and is one of the largest oil corporations in the world. The head office of Shell Oil Company is in Houston, Texas. The company along with its share in the equity companies and the consolidated companies is one of the leading oil and natural gas producing businesses in the United States of America. The company is also engaged in the business of natural gas marketing, petrochemical manufacturing, and gasoline marketing. The main products sold by the company include fuels, oils, and oil card services. The company also deals with the production, exploration, and refining of natural oil and petroleum products. For this purpose, the corporate social responsibility initiatives taken up by Shell Company and the main motives of the corporation for adopting these CSR practices are discussed. The outcomes of the CSR activities are evaluated as per the effects of the different internal and external stakeholder groups and a discussion is made on how these activities have shaped up the image and reputation of the company among the global stakeholder groups. The report is concluded by providing suitable recommendations as to how the chosen company can improve the brand reputation by engaging in more innovative CSR initiatives.

Saturday, November 16, 2019

High school Essay Example for Free

High school Essay In the last semester of junior high school, I left home for my study experience in Sydney. Though I initially had a hard time because of language barrier, I later made friends with my interesting enthusiasm and friendliness. Thereafter, I also studied abroad in Canada, an experience that helped expand my general perspectives in life. Here I also faced some unpleasant and embarrassing racial prejudice but my approach with positive view of life won over many as friends. High schools experiences helped me pull through the long and arduous time when I served in the military. The two years and nine months of military service transformed me into an individual with strength, patience, and will power. During grueling training I bit down and became even more involved. The training was usually exhausting, but the feeling of pride do instilled in us a sense of confidence and will power. As our unit was placed along side American troops near the military perimeter, many American officers and soldiers came to visit our unit. One day I was summoned by the battalion commander as an interpreter, and ever since then my area of specialty changed from a counterattack gun to the role of an aide to the battalion commander. Life there was not one for soldiers but for executive ranks in the battalion and was full of hardships for a mere soldier like myself. Again, I developed good relationship with many in the executive ranks with my characteristically enthusiastic personality. I fully utilized my influence to act as a negotiator between the two groups when conflicts arose. I was able to overcome jealousy of fellow soldiersand we laterrelied on each other for mutual relationship. I still fondly look back to the fulfilling memories of how my small help brought back liveliness to our days in the battalion. The cherishment of these memories and the continuation of personal development are made possible by the help of my family, who have always been by my side and have always been my greatest supporters. I strongly believe that my wonderful personality comes from my family. I have been born into the happiest family in the world, and grew under the world’s most outstanding parents. My conservative father taught me the importance of leadership, responsibility, and diligence through daily activities I do in life, and my mother personally showed me endless love. My brother equally gave me an unwavering support, revealing to me those things that are important in my life for consolidation. The memories I have from my past experiences make up my life, and they are the motivation that cheer me to continually forge ahead in life. My family, friends, and even the people that I say hello to whose names I don’t even know are all part of my network and my life. I have thus learned from unforgettable experiences and strongly convinced that a positive viewpoint lends happiness in life. With confidence and pride I look forward to writing

Thursday, November 14, 2019

Minors and the Death Penalty Essay -- essays research papers

A.  Ã‚  Ã‚  Ã‚  Ã‚  Should the death penalty be given to minors? The two groups against this issue, are the religious and medical groups. They believe they are too young to know what they have done. The medical groups believe adolescents are less developed than adults and should not be held to the same standards. . The opposing side, held mostly by state officials, feel if they are old enough to commit the crime they, old enough to get the punishment, including death.   Ã‚  Ã‚  Ã‚  Ã‚  B.   Ã‚  Ã‚  Ã‚  Ã‚  The very first execution of a minor was in1642 with Thomas Graunger in Plymouth Colony, Massachesetts. In the three-hundred years since that time, a total of approximately 365 persons have been executed for juvenile crimes, constituting 1.8 percent of roughly twenty-thousand confirmed American executions since 1608. Twenty-two of these executions for juvenile crimes have been imposed since the reinstatement of the death penalty in 1976. These twenty-two recent executions of juvenile offenders make up about 2 percent of the total executions since 1976. The death penalty for juvenile offenders has uniquely become an American practice, in that, it appears to have been abandoned by nations everywhere else in large part due to the express provisions of the United Nations Convention on the Rights of the Child, and of several other international treaties and agreements   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  C.  Ã‚  Ã‚  Ã‚  Ã‚  The reason this is a moral issue because the death of a human being is a moral issue, and if that human being is not even an adult, than it makes it an atrocity that he/she was put to death by are legal system that in all aspects is placed there for our protection. The punishment is for the criminal, but in reality the only people being punished is the family of the juvenile in question.   Ã‚  Ã‚  Ã‚  Ã‚  D.  Ã‚  Ã‚  Ã‚  Ã‚  Capital punishment is more expensive than a life imprisonment sentence without the opportunity of parole. Florida spent an estimated $57 million on the death penalty from 1973 to 1988 to achieve eighteen executions, that is an average of $3.2 million per execution. It costs six times more to execute a person in Florida than to incarcerate a prisoner for life with no parole. The average cost of a capital trial in Florida is ... ...y between the law breaker and society. Just punishment is binding and not to be mitigated by any utilitarian consideration. Kant also believes in â€Å"blood guilt† and the necessity for cleansing criminal actions.   Ã‚  Ã‚  Ã‚  Ã‚   H.   Ã‚  Ã‚  Ã‚  Ã‚  This issue is pretty touchy to me, because i could support both side of minor being put to death. I agree with if they do the crime, they can do the time, but at the same time they are just little kids and they do not know better. The way I see how this situation can change is that instead of holding the child responsible for the crime hold the parents in contempt. The reason I say this is because a study shown shows that most juvenile convicts come from a broken home. The old saying goes â€Å"monkey see, monkey do.† I believe if these children would have had the chance of growing up in a stable family upbringing, there is a good chance that they would have been upstanding citizens. So my belief may be torn apart on the subject, I'm am going to have to say that I am against the death penalty for minors, because i believe they don not know what they do, because of a lack of immaturity and lack of experience in life.

Tuesday, November 12, 2019

Hrd Needs Analysis: Salon Receptionist Training Program Essay

1) Identified Need: Â  a) The training program is a response to a felt need within Avatal Salon. Because the receptionists and the business as a whole feel that the operations at Avatal need to improve in order to meet the needs of our clientele, the business needs to reestablish proper training and operation methods. The desire is to improve efficiency and accuracy, as the staff is currently lacking in this area. b) Instruction can only address problems related to lack of knowledge, deficiency of skill, and attitude. i) The need identified is proper training in Salon Iris software used by the receptionists to gain knowledge on the different tasks it is able to pursue, step-by-step instruction on how to accurately use the software in various scenarios, and to eliminate the errors brought to attention by clients. c) Avatal Salon, to view in a business perspective, is at risk when any problems concerning booking appointments or lack of reminder calls are made because it is crucial that appointments are accurate to keep the salon in business. d) Currently, I have identified a need for software training, as the salon has received two to six complaints, weekly, each based on individual instances of inaccurate booking and pricing issues from clients. These complaints have arisen as a result of operational errors – receptionists have made mistakes in properly booking clients as well as failing to confirm appropriate appointment times. When an appointment is improperly scheduled, clients are receiving confirmation phone calls informing them of the times they should have been scheduled for as opposed to the time reflected in the stylist’s appointment book. These issues need to be addressed, and can be solved easily by proper use of Salon Iris software. 2) Applicability of Technology: e) Most hair salons have traditionally operated without the need for technology. Modern trends, however, have allowed salon-based software to create a more efficient and seamless experience for both clients and salon employees. f) Current use of the Salon Iris software available to Avatal provides to dozens of different actions that are beneficial to the business when the persons using it are properly educated. 3) Providing a Competitive Advantage: g) In the beauty industry, competition is constantly increasing. With countless salons in the area providing similar services, it is a smooth operational system that allows Avatal to thrive and meet the needs of their clients. ii) Losing business to the competition is a struggle every salon faces, all measures should be taken to not only keep all clients around, but also to keep them satisfied. iii) Every haircut, color application, eyebrow wax, and so on all contribute to the success of the business and just one mistake in an appointment can throw off the rest of the appointments for that particular hair stylist on the given date. iv) Furthermore, the salon software allows Avatal to track the profitability of the business by tracking the success of promotions, calculating the income from various services and product sales, and providing useful benchmarks for salon staff. 4) Utility of Formal Training Program: h) Implementing a training program when the salon is closed allows for formal instruction, an opportunity to provide feedback, highlights the major areas of concern, eliminates the pressure of making mistakes with clients loyalty at stake, and also lets even the employees with a bit more experience to gain knowledge beyond what they already know. i) Many receptionists have expressed feelings of being undertrained as a result of their own assessment as well as feedback from the clientele. j) Receptionists expressed feelings of incompetency to perform in their position because of the lack of training provided once the problem was brought to the owners’ attention. v) The group of new hires was trained on-the-job for only a short time with only brief knowledge and skills pertaining to the software that a more experienced receptionists offered during training. k) All eight receptionists currently employed by Avatal Salon will be mandated to participate in the training program. vi) Observing the learners and collecting data throughout the training program when all learners are being analyzed, rather than just the newly hired persons, will provide Avatal Salon with accurate data to prioritize the objectives being addressed by instruction as well as getting the group of learners to work together as a team. Furthermore, a uniform training program will allow the same accurate information to be communicated to all employees at one time, as opposed to on a case-by-case basis. l) Appropriate instruction will resolve the problem faced by Avatal Salon for the present time and also future training programs. vii) Instruction is intended to provide each learner with the knowledge, skills, and abilities to perform this position competently. viii) Instruction given in lecture, group discussion, and group role-play forms is intended to allow the group of learners to address the need for improvement and provide prioritization skills to carry out tasks in a time wise and orderly fashion. 5) Instructional Goals: m) Avatal Salon has targeted three areas that will be greatly served by instituting this new training program: ix) First, the training program will allow for current mistakes to be corrected. All receptionists will learn the importance of scheduling clients with the stylist they have requested. x) Next, the receptionists will be trained on accurate time scheduling. This refers to the duration of each appointment – if one appointment is scheduled for less time than is required for that specific service, every other appointment for that day will be affected. xi) Finally, the training program will go to the overall experience of clients. By cutting waiting time and inaccurate booking, clients will feel comfortable and confident when making their appointments, and this will help the salon’s client retention rate and success of referrals.

Saturday, November 9, 2019

Identify and fully describe the main developments Essay

1. Identify and fully describe the main developments of Operating Systems, giving examples of their origins and use. Batch Operating Systems were an early operating system available, and were first introduced in the mid 50’s. They were designed to make human manual work easier; humans were replicating identical jobs over and over again, hence in batch. A batch operating system keeps itself eventful; it does this by taking jobs from a batch queue, instead of waiting for people to submit jobs. The jobs are then processed one or more at a time under control of the operating system, however most jobs undertaken in this operating system would be single-task. These type of operating system were often left to work overnight, mainly because the jobs were ‘batched’ the next job in the queue would be commenced as soon as the previous job had been completed, this way of processing would allow for a large work load to be automatically completed without the requirement to wait and tell the computer to do the next job. Real Time Operating Systems (RTOS) are often embedded, meaning a integral part of a system inside another device. They have very little user interface capability. Real time operating systems like their name implies, respond to an input immediately. â€Å"Real time operating systems are capable of processing data so quickly that the results are available to influence the activity currently taking place. † [Computer Science 5th Edition, CS French, Ashford Press Gosport, 1996] Real time operating systems guarantee a certain capability within a specified time constraint; these time constraints are usually very rigid. If the system does not conform to this time limit, the system ultimately fails. They are used for various purposes; a few of these are medical equipment, industrial control systems and car computers. Parallel Systems have more than one processor to carry out a single job. The systems often carry out one single job using the resources of both processors of the machine; however some systems will have a processor dedicated to a single task. These operations work in parallel (side by side) of one another. Distributed Systems act as an illusion to a user. A multiple number of nodes are set up on a network, to allow data access or device sharing. This allows for other users of different machines to access data on another machine on the network. For example at college a student logs on to the machine, the machine seems local to the user, the user observes the system as using its own local drives and devices. However these Drives and devices are setup on a client-server machine but appear to be local to the user. Time Sharing Operating Systems allow multi-tasking, the operating system shares a slice of the processor resources to designated programs and users logged on to the system. For example, it is not unusual for a home user to have a word processing package, internet browser and a multimedia package to be open at the same time. Microsoft Windows is a great example for allowing this. Personal Computer Operating Systems were brought about in the early 70’s. However it wasn’t until the 1980’s that they became popular, and the focus of the operating system changed from the hardware aspect, to that of the user interface (how the user observes the operating system). Personal Computer Systems are simply operating systems that share the processors resources for single user’s tasks. The main concept behind personal computer operating systems is the user interface. The workings are important; however the main principal is that the user is entirely interactive with the system. These are perhaps the most difficult for designers to produce, as a very high level knowledge of user interface design is required. This is to allow users of any level to use the system comfortably. It allows for considerable power for a single user to run high-tech graphics and multimedia packages. These operating systems evolved in to very capable systems, allowing for heavy multi-tasking usage. Examples of Personal Computer operating systems are as follows: Microsoft Windows Linux Apple Macintosh MAC OS 2. Identify and fully describe the main purposes of an operating system. All components of the operating system are required to be covered, to clearly show an understanding of what each component does and how they ‘fit’ into the overall system design. Process Management Process management is a way of tracking processes and managing them in such a way that there is enough processor resources to correctly function. Process is another word for a task that is to be performed by the computer. Along with a process is a set of information about the particular process. The information required to track these processes are stored in a data package called a ‘Process Control Block (PCB). The process control block contains the following information about a process:   An identification number that uniquely identifies the process Owner ID – An identification of the user/device who the process belongs to   Priority – A number to represent its priority to the system   Status – What its current state is. This is 1 of 3 states (Ready, Waiting, Running). Units of Processor Time Used   Resources waiting for – for example paper for the printer.   Link to Another PCB –   Registers – the registers the process has contents in. Process ID 239845 Owner ID Chris. Oliver Priority 25 Status Waiting Units of Processor Time Used 264 Resource waiting for Disks [printer] Link to another PCB Next PCB in wait Queue Registers Contents of registers when process last stopped running An example of a PCB is shown below: this is for a print job A Processes state is diagrammatically shown below, this shows state transition and how it works. A process can be in one of five states; these five states are as follows: State Definition HOLD A process’s state at the beginning, this is when the devices and memory allocation size is decided. READY this state is when the process has been allocated all the resources required and is ready for being operated on by the computer RUNNING This state is when the process is in the CPU WAITING This is when the process stops because of an input or output waiting to be completed. The process is removed from the processor and is allocated this state. It is given this state until the input or output is given the all clear. FINISHED This is when the process has been finished, and all the devices used by the process have been released ready for the next process. Deadlocks Deadlocks occur when a multiple number of processes fight for very little resources available from the processor. For example one process has been granted the allocation of the modem, however is waiting for a text file, but process two has the text file and is waiting for the modem. In this instance each process will not gather the resources required because they have been allocated to another process, this is where a deadlock occurs. Process Management in an operating system has the job to destroy one of the processes to allow for one of the processes to be put in the ‘ready’ queue. Scheduling Scheduling is a method in the operating system that allows processes to enter the ready queue allowing them to then take execution. The strategies used to take these processes and allow them to be ready for execution are as follows:   Process the maximum amount of jobs.   Sharing out processing time equally to users   Providing acceptable response times, this is in the form of not running intensive programs while users are logged on to the system. Keeping devices as busy as possible.   Attempting to gradually freeing up of processes, instead of crashing.   Avoid Deadlocking Scheduling is comprised of three sections: 1 – Long Term Scheduling – this is where processes are batched together, when the resources and space are free the process is then executed. This type of scheduling is used for jobs like heavy overnight print jobs. 2 – Mid-Term Scheduling – this is where a decision is made as to whether the processor is to busy for the amount of processes attempting to use it, the decision can be then fixed by terminating processes. When the system is free again the process can be re-executed. 3 – Short Term Scheduling is a where the next process is selected from the ready queue; it uses algorithms to do this. Shortest burst time – being the time spent running before the process will have to wait before an input or output operation. Shortest remaining time is the processes that have very little time left; this inevitably allows space for another process to execute. Priority scheduling – a control that allow special circumstance processes to execute through the system quickly. Round robin – limits the time a process is allowed to run before it is removed, it is then placed back in the ready queue. Memory Management Memory is an area in which data and instructions are stored. These operations must be managed by an operating system in order for the system to be stable and to run fluently. Memory management within an operating system must ensure that a process has enough memory to run, ensuring it does not go in to another processes slot as this causes corruption. This management is a way of protecting memory from becoming unstable. Memory management is also responsible for using the computers other memory sources effectively, to ensure programs run smoothly and effectively. This is handled by using virtual memory; using the hard disc drive as a temporary memory source for processes and data. This can benefit the user in various ways: – The user is not rigidly restricted to space available. Using a large virtual memory space provides convenience for instances where large programs etc. are required to be stored in memory. – Users are using less physical memory; therefore the system can handle more users on the system. High Speed Cache is a fast memory storage; cache predicts the data that the CPU may need next, it then retrieves it from RAM and places it in to the high speed cache, this speeds up system performance, as cache is a lot faster than RAM is in providing for the processor. The operating systems task is to control an even flow of the processes and decide where they should go practically, moving processes to the best location as the scheduler asks it to do so. This scheduler knows what process is next in line therefore can tell memory it is next and to move it to a suitable location for it to be quickly accessed. Paging Paging is a method used in operating systems to make a program’s memory non-contiguous, in simple terms; allowing a program to be allocated to any memory location available. This is used when a bulk of data is bigger than the memory allocation it has been given; it firstly fills the memory allocation provided, and then stores the rest of the data in any space available in memory. This method of splitting the data is known as ‘Fragmentation’. This decreases system performance. Defragmentation To enhance the performance of the memory of a secondary storage medium, the operating system runs an operation called ‘Defragmentation’. Defragmentation is a process that sorts data in to a contiguous sequence. If a non-contiguous set of data is found, it will be relocated and stored as a whole. The image above is an illustration to show pictorially how a storage device could look in a data structure. As you can see fragmented files are scattered. If this data was attempted to be retrieved it would be slower feedback to the user as the data has been fragmented and would have to be found first. If data is to be found quickly and retrieved without a problem, the diagram below shows how a data structure should pictorially look. The image shows a contiguous data structure, with no fragmented files. This is the idea state for a system to be operated under. File and Disk Management TALK ABOUT HOW MEMORY IS STORED – i. e. CONTIGIOUS – Blocks of data are assigned in a complete row, using this method the files are simple to access. The space must be large enough to store all the data Files may become larger, therefore the space may be too small in the future, then it will need relocating (moved) This then causes fragmentation of the storage device. , NON CONTIGIOUS Files are recognised by operating systems and worked upon by using file extensions. A file consist of two parts, one being the unique name to the user, second being the file extension related to the program that runs that type of file. The operating system recognises exactly which program to open when the file is run. The way that files and data are managed, is critical to the performance of the computer and the security of the data. File management within an operating system provides a logical way for the user to observe there data, instead of having the complication of the physical implementation. Operating systems main job in this area is to ensure that data is stored and relocated correctly, as well as having the responsibility to process files, find space to store them, and to retrieve this data at any time. For example a . PDF file when run will be recognised by the operating system to be open in Adobe Acrobat Reader, providing the program is installed on the computer. An operating system can perform several different tasks towards files, they are as follows: Operation/Task Function Create finding space for it on storage medium, a new record made in directory Write Finds the file from directory and adds data to it. Read Finds the file then puts it in to memory and a read pointer is used to track where the next read place is to take place. In most operating systems however, a write pointer is held at this point, in-case the user intends to write to the file while reading Delete finds the file, then frees all space given to it, this is then erased from the computer Files are a collection of saved information that is stored on a type of storage medium for later retrieval. File attributes are the information related to the file, just like we have information related to ourselves, i. e. telephone number and home address. A files attributes are vital in order for the operating system to create a file structure system, it does this by using the attributes to sort the files in to some kind of order. For computer data files there are a set of minimum attributes related to them, they are as follows: Attribute Name Role Name an identifier to the user, in the form of a string of characters Type the type of file it is, this is important as different operating systems handle different types of files differently. Location Information held about where the file is stored, usually in the form of a path to it. e. g. C:Documents and SettingsChrisAssignment. doc. Size The size of the file (in bytes) e. g. 270kb. Protection Permissions to who can access the file. I. e. Read Only Date when the file was created, modified or accessed. Author the person the file was created and saved by. Directories Directories are a hierarchical way of separating these files; directories simply make it simpler for users to relocate the file at another time. The root is the top directory of a file system; the root is determined by the operating system. The root directory is usually the bootable device on a home computer system. Commonly C: Paths are a list of directories that the operating system goes through to find a run able file. For example: C:windowscdplayer. exe The operating system will go in to the ‘root’ and then in to the directory ‘Windows’ the file named ‘cdplayer. exe’ will then be located and executed. Tree Structure – are of a hierarchical nature, therefore the top level is the root of the directory and every other sub directory from which all other directories stem off. A Backslash is used to separate and indicate directories within directories (sub directories) Directories allow a method for the operating system to easy locate files. Volumes are a fixed amount of storage space allocated on a device. If a hard disc drive has two partitions set up, then it is said to have ‘two’ volumes because it has two separate fixed storage spaces. Formatting a device in turn means to prepare it for read and write access. It does this by wiping all drive information that has been pre-set, it then tests each sector of the disc to ensure they are reliable enough for read and writing in and out of. File Allocation Techniques FAT (File Allocation Table) 32. Located on the storage device, basically holds the relevant information in a table, to find the data on the disk. its security does not measure up to that of NTFS and its filename size constraint is poor to that of NTFS. Searches from top to bottom when looking for a file. Contains the first block of each file on the disk, Requires a tremendous amount of space NTFS (New Technology File System) Used in Windows NT based operating systems Uses a similar table to that of FAT32 to keep track of file locations Looks at directory structure from the side to help speed up the location of files Uses Link Listed Allocation. Linked allocation creates inked lists using disk sectors as nodes. For example, if the sector size is 512 bytes, and it takes a 32 bit number to represent the next block address, then only 508 bytes can be used to store data (the other 4 bytes are used to locate the next file sector). This approach eliminates external fragmentation (since even the smallest block can now be used). Some problems with this approach are that seeking within a file is now difficult. For example, if we’re interested in the last 100 bytes of a 100mb file, we need to traverse all the sectors of the file (follow links) to get to the last 100 bytes. Another major issue is that we need to do a disk seek with every disk sector (unless disk sectors are contiguous). And yet another issue with this is that storing pointers on every disk sector uses up a lot of disk space. UNIX Used I-Nodes – an indexed file allocation method. Its fast for small blocks of data and can accommodate extremely large volumes of data RAM Disk RAM disks are a temporary storage solution, data cannot be permanently saved, and data is lost on any type of system shut off. I. e. system reboots. A Random Access Memory disk is a segment of the main memory that is left for extra storage if required. This is otherwise known as a ‘Virtual Drive’. The main use for this area is that of performing operations to files, this is a better way of performing operations as the rate at which they can be performed on are that much higher than that of a physical drive. Size constraints are a major problem with RAM disks, as they are limited to that only of the RAM contained in the machine. For example in modern home computer systems 256mb of RAM is contained, therefore only 256megabyte of RAM disc can be used. 256mb in today’s computing is very little in comparison to what users require. OS Services – files, copy, delete, rename, view, find, backup Directories – create, rename, list, delete Programming, Open, close, read, write, seek File allocation methods, FAT 32, NTFS, UNIX, Disk caching RAM disk Defragmentation I/O System Management DMA DMA takes control of the system by imitating the processor; it does this to enable itself to transfer data to and from the memory using the system bus. Buffering is required primarily because of the slow nature of I/O Device function. It is a way of smoothing out an I/O operation, Virtual Segmentation – each process is divided in to slices (segments) non-resident Caching and Spooling of Input and output devices Drivers System Components ( CPU, RAM, System Bus, Local Buses, Device Controllers, Control Registers, Devices). IO response System (polling, interrupts, I/O, DMA Kernal Layers, Purpose, Device, Drivers, System calls Device Management Device management controls hardware resources; this includes the control over selection and operation of the devices used for input, output or storage. 2. Select an appropriate type of operating system for the following ICT needs, giving the choice of current operating systems [trade names]: a) Local council office department in charge of the collection, and distribution of council tax. b) A national car-rental agency, whose main computing centre is located in Sheffield, through which all of the daily transactions for the business are conducted. c) An electro-plating circuit board manufactures. d) A travelling company representative, who uses technology to keep in touch with his office. 3. Research and identify the different operating systems currently available for desktop computers. From your research and investigations of these operating systems you must critically evaluate them. This evaluation should clearly demonstrate your understanding of the differences found including and potential disadvantages. Bibliography http://www. cse. lehigh. edu/~glennb/um/book/c10os. htm http://dragon. acadiau. ca/~dbenoit/3713/slides/pdf/Week2. 1_History. pdf http://cne. gmu. edu/itcore/processes/Time. html http://www. netnam. vn/unescocourse/os/35. htm#3. 5. 3%20Virtual%20memory%20concept http://www. cs. aue. auc. dk/~akbar/ospdfiles/wschap7. PDF Books [Computer Science 5th Edition, CS French, Ashford Press Gosport, 1996].

Thursday, November 7, 2019

The Phenomenon of Phil essays

The Phenomenon of Phil essays The influence that Dr. Phil McGraw has on todays society is remarkable and his tell-it-like-it-is style is just what the Doctor ordered. Let us begin with Dr. Phils introduction to America on the Oprah Winfrey Show in 1998. Ironically, the year before is when the two first met in Texas. The Texas Cattlemans Association was suing Oprah Winfrey and Dr. Phil McGraw was part of Oprahs defense as Dr. McGraw is cofounder of Courtroom Sciences, the worlds leading litigation consulting firm. Oprah won her fight with the Texas Cattlemans Association and Dr. Phil won a great friendship with Oprah. After being introduced to Oprahs viewers, Dr. Phil was quickly made a household name and Americans wanted more. Hence, The Dr. Phil Show was born, with the help of Harpo productions, which is owned by none other than, Oprah Winfrey. According to the Nielson Media Research Group, The Dr. Phil show had 15.1 million viewers on September 16, 2004, which leads me to believe he is only getting better. If you do not watch television, there are several other ways to hear about Dr. Phils wisdom. He has written five, #1 New York Times Best Sellers. Without a doubt, he has saved many relationships and even marriages with his book, Relationship Rescue that comes with a workbook so the reader is actively involved with the book and it is proposals. Many, many people have taken his weight loss challenge on his show and even more have bought his, Ultimate Weight Loss Solution and are following his seven keys to weight loss freedom. Then, Self Matters with over 2,000,000 copies sold is a great source to help anyone find their, authentic self. His weight loss solution has even been implemented into many localized programs and support groups. All anyone has to do is buy the book, Ultimate Weight Solution and log onto http://ww...

Tuesday, November 5, 2019

Heres How Crabs Find Food

Here's How Crabs Find Food Crabs may be a favorite food for some people, but they need to eat too. They often live in dark or muddy areas, where it can be difficult to find prey by eyesight. So how do crabs find food, and how do they eat? And, interestingly, what types of food do they like to eat? How Crabs Find Food Like many other marine animals, crabs rely on their sense of smell to find prey. Crabs have chemoreceptors that allow them to detect chemicals in the water that are released by their prey. These chemoreceptors are located on a crabs antennae. These are long, segmented appendages near the crabs eyes that have both chemoreceptors and allow them to feel its surroundings. Crabs also have antennules, shorter antenna-like appendages near the antennas that allow them to sense their environment. A crab can taste using hairs on its mouthparts, pincers and even its feet. Senses of Taste and Smell Crabs have pretty well-developed senses of taste and smell. Fishing for crabs, or crabbing, using pots and cages relies on these senses, and makes it possible to catch crabs. The pots are baited with a variety of smelly things, depending on the target crab species. Bait can include chicken necks, pieces of fish such as eel, menhaden, squid, herring and mackerel. As the bait hangs in the trap in a bag or in a bait jar, odorous chemicals waft out into the ocean, attracting hungry crabs. Depending on water flow, these conditions can affect their senses to detect prey. What and How Crabs Eat Crabs arent picky eaters. They will eat everything from dead and living fish to barnacles, plants,  snails, shrimp, worms and even other crabs. They use their claws to grab food particles and put the food into their mouths. This is similar to the way humans eat using their hands or utensils. Crabs also use their claws to manipulate or break up the food so they can place it into their mouths more easily in smaller bites. When crabs have to break through shells of other sea life, their strong claws come in especially handy while their other appendages help them quickly move to catch various types of prey. Different Crabs, Different Diets Different crabs like to eat different types of sea life and plants.  Dungeness crabs, for example, may snack on squid and worms, while king crabs like to nosh on clams, mussels, worms and sea urchins. Basically, king crabs hunt for prey on the ocean floor and often eat decaying animal matter as well as live sea life. Sources and Further Reading â€Å"Frequently Asked Questions.†Ã‚  Blue Crab.â€Å"Encyclopedia of Tidepools and Rocky Shores.† Edited by Mark W. Denny and Steve Gaines, University of California Press, 2017.â€Å"Dungeness Crab.  Oregon Agriculture in the Classroom..Blue Crab Anatomy web.vims.edu.

Saturday, November 2, 2019

The Institution Of Religion And Its Main Aims Essay

The Institution Of Religion And Its Main Aims - Essay Example The institution of religion shoulders all these human concerns by explaining the unexplainable through applying more intangible terms such as the holy trinity, the purgatory, the reincarnated soul and others. Moreover, the concepts of heaven and hell that myriad of people believes in are social control mechanisms that the church put up in order to spawn a high degree of compliance from its devotees. The latent objectives of religion were the usual departure of anti-religion philosophers such as Karl Marx, Max Weber and the most controversial of all Friedrich Wilhelm Nietzsche. Many atheists or non-believers question the accuracy and truthfulness of the most illustrious literary work produced before the advent of humanity’s incessant malevolence, the Bible. Most atheists believe that the Bible is a compiled forged testimony of people who have lived thousands of years ago. For the empirical mind, oral history is value-laden and much susceptible to manipulation hence making its correctness objectionable. Yet, many non-believers do not entirely discard the truthfulness of the Bible; instead, they are clamoring for a thorough revisiting of the past through speculations coupled with scientific methods to verify the precision of the stories narrated in the holy book. On the other hand, existentialist philosophers not merely disregard the Bible but also the existence of a Supreme Being that is the invincible creator of all. Key figures in the history of humanity’s intellectual tradition placed them in their current position as thinkers to be venerated by their controversial and eccentric ideas, particularly against one of the most influential institutions in the world, religion; it in this argument that I will establish my defiant stance against religion.