Thursday, December 26, 2019

An Analysis Of Death, By Emily Dickinson - 1056 Words

In the course of Emily Dickinson’s poems, she has shed some light on how she views death. Like the jumbled feelings before death. The departing soul’s path to ever after, hysteria, or ending up in a void. Some of her poems may seem contradictory or rather different from the other. However, they are all set in place to showcase Emily’s viewpoint that there are many different types of possible outcomes after death. Through these three poems, she has been able to personify death in vastly different forms of lighting. I Heard a Fly Buzz – When I Died represents the idea that there is no â€Å"eternity† after death, only a decomposition that leads to an endless void. Depending on how you look at it, the tone could be of terrible fear, peace or†¦show more content†¦A higher power is believed to take the soul to another life. Through deteriorating senses, the speaker is awaiting this being to grace their presence and guide them to the next realm thought to be, and just before slipping into oblivion the narrator is granted only a measly fly a sign of only decomposition to come. When swindled out of life’s last expectation the soul disperses. A contrasting idea of death appears in Dickinson’s poem Because I Could Not Stop for Death --. Here, death is portrayed as a journey towards â€Å"eternity†. The poem depicts a vision of some sort of afterlife, where the deceased is transported to a realm where time doesn’t exist. This is Dickinson’s view of death through rose-tinted glasses. The poet paints death as a gentleman; as a man willing to wait on the narrator. â€Å"We slowly drove he knew no haste And I had put away my labor and my leisure too, for is civility† the speaker in this poem is able to throw away their leisure for such a gentleman as death. After Death stops for the needlessly busy narrator who had no time to worry about death, they embark on a journey together towards eternity, passing by the speaker’s life; a school, representing youth and education, the fields of grain, which represent growth, and a setting sun, representing the ending of life. Like a day it passes q uickly. When the poet says, WeShow MoreRelated Analysis of I Heard a Fly Buzz When I Died and Because I Could Not Stop for Death by Emily Dickinson593 Words   |  3 PagesAnalysis of I Heard a Fly Buzz When I Died and Because I Could Not Stop for Death by Emily Dickinson Emily Dickinson wrote many poems in her lifetime. She writes two of my favorite poems. They are: ?I heard a Fly buzz when I died? and ?Because I could not stop for Death?. They both have similarities and differences from each other. There are similarities in these two poems such as the theme and the observentness of the narrator. Both of the poems themes involve death. In ?I heardRead MoreEmily Dickinson : The Point When A Reader1749 Words   |  7 PagesHorieh Introduction to Literature Professor Knoernschild November 27, 2015 Emily Dickinson At the point when a reader hears the name Emily Dickinson, they consider a female who composed verse that has been surely understood for a considerable length of time and years. Much to their dismay that Emily Dickinson established American Literature, and began an entire unrest of verse. The procedure Dickinson used to keep in touch with her verse was at no other time seen and was the foundationRead MoreEmily Dickinson s `` Because I Could Not Stop For Death `` Essay1355 Words   |  6 PagesModernism for Emily Dickinson has to do with the uncertainty. Emily Dickinson was a somber thinker who doesn’t try to enlighten anyone of anything. Her poems were uniquely written and she wrote about the uncertainty, which makes her poetry easy to empathize with in the 21st century. The 21st century, is a period of science which is used as a tool to make sense of the uncertainty. Emily Dickinson uses her poetry as a means to question and observe the trauma of human existence. For instan ce, she doesn’tRead More Literary Analysis of Emily Dickinsons Poetry Essays1053 Words   |  5 PagesLiterary Analysis of Emily Dickinsons Poetry   Ã‚  Ã‚  Ã‚  Ã‚  Emily Dickinson is one of the most famous authors in American History, and a good amount of that can be attributed to her uniqueness in writing. In Emily Dickinsons poem Because I could not stop for Death, she characterizes her overarching theme of Death differently than it is usually described through the poetic devices of irony, imagery, symbolism, and word choice.   Ã‚  Ã‚  Ã‚  Ã‚  Emily Dickinson likes to use many different forms of poetic devicesRead MorePsychoanalytic Criticism on Emily Dickinson Essay1086 Words   |  5 Pagestheir mind created such works. When considering the work of Emily Dickinson, psychoanalytic criticism comes into play with the role of explaining the many meanings behind her poetry, as to make the reader relate to such poetry on a deeper level or not to who she was as a human being. Many critics believe that using a psychological criticism approach to understand an author’s literary work leaves common sense behind. For them, such analysis disregards the environment in which an author created theirRead MoreAmerican Authors Research Project: Emily Dickinson644 Words   |  3 PagesBetween 1858 and 1864 Emily Dickinson wrote over 40 hand bound volumes of nearly 1800 poems, yet during her lifetime only a few were published. Perhaps this is why today we see Dickinson as a highly influential writer, unlike those during her time who did not see the potential. Emily Dickinson wrote towards the end of the romanticism era, but considered more of a realist, ahead of her time and one to shape the new movement. The main characteristic of Romanticism that Dickinson portrays in her writingRead MoreEmily Dickinson s A Route Of Evanescence And Because I Could Not Stop For Death1167 Words   |  5 PagesEmily Dickinson Emily Dickinson published only a few poems during her time. Her work was only truly discovered after her death of kidney disease in 1886 at the age of fifty-six. Upon her death her sister Lavinia Dickinson found hundreds of poems tied into a book stitched together by Emily. People claim that she is the most original 19th Century American Poet and is now considered one of the towering figures of American literature. Although She is known for her unconventional broken rhyming meterRead MoreEssay about Death in Emily Dickenson1313 Words   |  6 PagesDeath in Emily Dickenson With the thought of death, many people become terrified as if it were some creature lurking behind a door ready to capture them at any moment. Unlike many, Emily Dickinson was infatuated with death and sought after it only to try and help answer the many questions which she pondered so often. Her poetry best illustrates the answers as to why she wrote about it constantly. She explains her reason for writing poetry, â€Å"I had a terror I couldRead MorePersonification Of Death859 Words   |  4 Pagesof death is unknown to everyone. Death is eternal. A person cannot come back to tell the living about the death experience. Death is the one aspect of life that is guaranteed no matter what the circumstance. In the poem, â€Å"Because I could not stop for Death† by Emily Dickinson, she uses personification, symbols and metaphors to portray death as a person. In the poem, â€Å"Because I could not stop for Death†, Emily Dickinson personifies Death. In the first line, â€Å"Because I could not stop for Death†, theRead MoreEmily Dickinson1172 Words   |  5 PagesEmily Dickinson’s works are studied by various audiences from high school students to college scholars. Even without striving to hope that her works would impact so many generations, Dickinson has influenced many generations of poets and plays a major role in the development of American Literature. Dickinson did not become famous for her works until after her death in 1886. Not only is Emily Dickinson’s work important to the study of American Literature, most of her writings were composed during

Wednesday, December 18, 2019

The Effects Of Violent Video Games On Human Behavior

Video Games are a form of media that continues to grow throughout society. As it grows and becomes fully adopted by adults and children alike, it seems as though a shroud of controversy follows suit. Many parents and those alike seem very afraid or reluctant to let their children play video games in today’s age. They fear for the long term affects such games might have on their children or even the short term effects. Many people see a correlation between aggressive behavior, violent moods, and bullying, when violent video games are in the equation. It seems as though it’s popular in today’s media to try and find a scapegoat or a specific target to point the finger and say, â€Å"it’s their fault!† video games have become that target. The following four literature reviews will explore research conducted on the effects of violent video games on human behavior, and try to reveal more light on the controversial topic. In a research article done by Christopher J. Ferguson, Cheryl K. Olson, Lawrence A. Kutner and Dorothy E. titled Crime Delinquency it’s stated that â€Å"Put simply, many measures used in video game studies claiming to represent â€Å"aggression† in fact do not correlate well with actual real-life aggressive acts† meaning, most studies that suggest playing video games and aggression are linked aren’t properly measured, which leaves room for invalid information (p. 766). The research article goes on to provide a diagram that shows while video game sales increased over a periodShow MoreRelatedDo Video Games Inspire Violent Behavior?1713 Words   |  7 Pagesregarding the effects of violent video games and the development of today’s youth. Many people believe that the violence in video games promotes aggression. According to Doctor Brad Bushman’s article, Do Violent Video Games Increase Aggression? he claims that violent video games leads to a ggression because it is interactive process that teaches and rewards violent behavior. Yet others believe that this not the case. Gregg Toppo of the Scientific American, writes in his article, â€Å"Do Video Games InspireRead MoreVideo Game Violence And Its Effects On Gamers1205 Words   |  5 PagesVideo Game Violence and its effects on Gamers In recent years there has been a significant increase of shooting incidents, specifically in America. When there is a shooting event the media is quick to question if the suspect had a history of playing violent video games. There is already the initial connection between video game violence and aggression; but is this connection scientifically correct? This topic interests me because of the increase in school shootings and violence. I have personallyRead MorePositive Effects Of Violent Video Games1161 Words   |  5 PagesViolent video games have been a popular pass time for American teenagers ever since the first ones were released. The most popular of these games are Grand Theft Auto, Call of Duty, Mortal Kombat, and Doom. It has become a popular belief that these games are directly linked to violent behaviors in our youth. Numerous scholars have set out to determine the validity of these assumptions through vast surveys and studies in America. All of these scholars share the belief that violent video gamesRead MoreViolent Behavior : The Contributors1706 Words   |  7 PagesTriggering Violent Behavior: the Contributors Violence can be everywhere but what may actually trigger violent behaviors is difficult to figure out. Many believe violent behavior is triggered by a certain outcome. Although this may be true, violent behavior can be triggered by a combination of factors. Media, Chemicals, and even society are all known as factors that can influence one to become violent. Forms of violent behavior include aggression, aggravation, and/or frustration. Aggression isRead MoreAdolescent Aggression Based on Violent Videogames1645 Words   |  7 PagesAggression Based on Violent Videogames Violent video games played by millions of people every day results in animated characters having hearts ripped out, heads decapitated, and blood squirting across the screen as their mutilated bodies are erased from the screen. Most players play these games to pass the time, increase hand eye coordination, and create harmless competitions amongst those playing. However, some who play these games are entranced by the violent aggressive behaviors demonstratedRead MoreAlbert Bandura Social Learning Theory1060 Words   |  5 Pagesviolence,  and  anti-social behaviors have caused society to point their finger at video games. Video game reformists claim that video game violence causes aggressive behavior which result in violent acts. The best way to approach society’s claim is with Albert Bandura’s cognitive-behavioral â€Å"Modeling† approach. This research shows that although video game violence may condone aggressive behavior,  it is not  the only factor triggering individuals to act aggressively or perform violent acts.   The â€Å"Modeling†Read More Violent Video Games and The Human Psyche Essay1343 Words   |  6 Pagesâ€Å"The effects of violent video game exposure, both positive and negative, on various behaviors are still highly contested within academia and the general public† (p. 608). Violence in video games is often wrongfully perused as a topic of extreme criticism pertaining to an individual’s act of violence in today society. Examples of such would include the shooting that occurred in April 2007 at Virginia Technical College; where Jack Thompson and Philip McGraw asserted that violent video games were theRead MoreThe True Cause Of Violent Behaviors1613 Words   |  7 PagesThe True Cause of Violent Behaviors in Today s Society There are volumes of media that are starting to harm the world in which we live. They have been linked to fourteen mass murders (Fletcher). Nine out of the top ten selling games have been labeled as violent and 42% of adolescents play them (â€Å"Children and Video Games†). These violent video games are a major problem in the United States and across the globe. Violent video games have a direct correlation with negative behaviors because they increaseRead MoreGame over: the Effects of Violent Video Games on Children Essay1416 Words   |  6 PagesGame Over: The effects of Violent Video Games on Children Seven hours. That is the amount of hours a day the average American child plays a video games (Anderson 354), and with technology advancing and games becoming more graphic, the concern over a violent game’s effect over a child’s development is growing. What does playing video games for seven hours do to a child’s development? Violent, role-playing video games adversely affects a child’s development and causes aggression in children and adolescents;Read MoreThis Article Provides A Brief Overview Of Existing Research1248 Words   |  5 Pagesoverview of existing research on the effects of exposure to violent video games. An updated meta-analysis reveals that exposure to violent video games is significantly linked to increases in aggressive behavior, cognition, affect, and cardiovascular arousal, and to decreases in helping behavior. Experimental studies reveal the linkage is causal. Correlational studies reveal a links to serious, real types of violence. Me thodologically weaker studies yielded smaller effect sizes than methodologically stronger

Tuesday, December 10, 2019

Compare To His Coy Mistress by Andrew Marvell to Upon Julias Clothes by Robert Herrick and their attitudes to love Essay Example For Students

Compare To His Coy Mistress by Andrew Marvell to Upon Julias Clothes by Robert Herrick and their attitudes to love Essay I am going to compare To His Coy Mistress by Andrew Marvell to Upon Julias Clothes by Robert Herrick and their attitudes to love. These two are very similar because they both describe their love for a woman. Next I will compare Remember by Robert Herrick to Since theres no help by Michael Drayton and there attitudes to love. Both this poems are about parting with a loved one. They all have different attitudes to love. Upon Julias Clothes by Robert Herrick is about a woman the author sees from far. The piece is written in first person this makes it easier for the poet to reflect his feeling to the reader. Whenas in silks my Julia. Herrick express to the reader that he thinks she is his. By say my Julia. I think this was quite common in those days . Men did see woman and as sexual objects and also they thought woman belonged to them. The rhyme scheme is AAA BBB it reflects how he walks. It a quick pace rhyme suggesting she is walking really quickly. In Upon Julias Clothes the poem using assonance Silks, methinks, liquefaction. All these words are linked together by assonance. The words silks and liquefaction are linked because they both paint a picture of a smooth image in your mind. Andrew Marvells To His Coy Mistress also contains a love theme like Upon Julia Clothes but this poem as a lot more admiration and beauty to it. Also Herricks poem is more sexual because he sees the woman as an object also Marvells poem is a lot more heart felt. Marvell wishes to make his love grow stronger with his woman. Love you ten years before the flood. This shows he will love her till the end of time. He really feels stronger for her unlike Herrick does for the woman he sees. When Marvell says vegetable love should grow vaster than empires. This means he would let his love grow slowly so that it became extremely strong. Marvells love grows stronger this is shown by the length of the poem. Its long so this shows in my opinion that he has a lot of love for her but also wants it to last forever but he still tries to trick her into having sex with him. Upon Julia clothes is brief because the poet sees Julia in a fleeting moment. Herrick love is not deep enough to be long. Upon Julia Clothes and to his Coy Mistress have some similarities. I think both of the authors do want to have sex with their women but they have a different type of love. I think in Upon Julia Clothes Herrick is just sexual attracted to her. I think this is because he says when as in silks my Julia goes, Then. then. methinks how sweetly flows. He describes the way she looks not the way she is. Marvell uses tactics to get Mistress to lose her virginity. In the first section he attempts to woo his mistress but then in the second section he introduces the theme of time. He says tempus fugil. Hes showing her time flies, that one day she will die, and if she keeps her virginity until death, she will lose it to the worms. The type of love that is shown is persuading love. In upon Julias clothes the tone of voice throughout the poem is very dreamy because the writer is captured by Julias beauty. The tone voice of voice in To His Coy Mistress is very different. It starts off very flattering and turns to threatening. In contrast to the poem mentioned so far (which include strong desires) Since theres no help. By Michael Drayton is about breaking of a relationship. .u50e324ba3b048f128aa732b47943a81b , .u50e324ba3b048f128aa732b47943a81b .postImageUrl , .u50e324ba3b048f128aa732b47943a81b .centered-text-area { min-height: 80px; position: relative; } .u50e324ba3b048f128aa732b47943a81b , .u50e324ba3b048f128aa732b47943a81b:hover , .u50e324ba3b048f128aa732b47943a81b:visited , .u50e324ba3b048f128aa732b47943a81b:active { border:0!important; } .u50e324ba3b048f128aa732b47943a81b .clearfix:after { content: ""; display: table; clear: both; } .u50e324ba3b048f128aa732b47943a81b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u50e324ba3b048f128aa732b47943a81b:active , .u50e324ba3b048f128aa732b47943a81b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u50e324ba3b048f128aa732b47943a81b .centered-text-area { width: 100%; position: relative ; } .u50e324ba3b048f128aa732b47943a81b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u50e324ba3b048f128aa732b47943a81b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u50e324ba3b048f128aa732b47943a81b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u50e324ba3b048f128aa732b47943a81b:hover .ctaButton { background-color: #34495E!important; } .u50e324ba3b048f128aa732b47943a81b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u50e324ba3b048f128aa732b47943a81b .u50e324ba3b048f128aa732b47943a81b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u50e324ba3b048f128aa732b47943a81b:after { content: ""; display: block; clear: both; } READ: Heaney as a Modern Poet EssayWe know this because it is written in the first line that the first person wants to kiss and part. Remember is also about parting but this is a different sort of parting, in Draytons poem the parting is about breaking up with a loved one cancel all our vows. He wants them to cancel the marriage vows they made to each other. Christina Rossetti poem is about asking the loved one remember her when she has died. Remember and be sad . This sort of parting is more loved based. Both the poems a roughly the same length because I think their both trying to get their point across. Draytons poem trying to show why he wants to break up and Rossetti poem trying to make the love one remember when she has died or when someone else as died. This is known as ambiguous. I think a lot of people would want their loved one to remember them in those times because a lot of woman died in child birth because there wasnt enough equipment. Also I think a lot of people in the time poem written would be struggling with there marriages because they didnt have marriage counselors to help them get through the rough times. The type of love that is shown in these to poems is parting love. I think Remember is more emotional than Since theres no help Since theres no help is quick and without fuss and emotion. The phrase that implies this is shake hands forever. The shaking of hands is a very formal act, symbolizing a mutual agreement to part. I think Rossettis poem Remember is more emotional this is shown by repetition. The poem uses the line remember me a lot. I think it uses this line a lot so you remember her forever. It makes you feel sad because you feel that the writer really feels passionate about her loved one remembering her. The tone of voice in Remember is sad because the woman who is writing the poem is going to die . I know this because she says Remember me when I am gone away gone far away into the silent land. The silent land is a place people believe you go when you have died. The tone of voice in Since theres no help. is less sad because the writer of the poem is only breaking up with a love one. All these poems have a different ideas of love. The more emotional ones are To His Coy Mistress by Andrew Marvell and Remember by Christina Rossetti. All the poems mentioned have a different purpose of why they have been written. The poem I liked the mot was remember because a lot of people want to be remembered when they die and writing poem is a good way to do it. The poem I least liked was Upon Julias Clothes because I didnt see the purpose of the poem and I dont agree with women been seen as sexual objects. Overall I enjoyed writing about the poems.

Monday, December 2, 2019

Systems Analysis Essay Example

Systems Analysis Essay Systems analysis can be defined as a disciplined process, which begins with the establishment of user requirements for a given application and concludes with the implementation of fully operational system The main stages of systems analysis are often referred to as the system life cycle. The following sections give a brief overview of their functions within the systems analysis process. Feasibility study The aim of this stage is to establish whether or not a proposal for the computerisation of a particular application is worthwhile or feasible. In simple terms, the feasibility study has to answer questions such as: Will computerisation achieve the users objectives?; We will write a custom essay sample on Systems Analysis specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Systems Analysis specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Systems Analysis specifically for you FOR ONLY $16.38 $13.9/page Hire Writer What type of system will be most suitable?; Will it be financially worthwhile? System investigation and design Assuming that the feasibility study produces a recommendation to proceed with computerisation of an application, then before any system specification is produced, an analysis has to be made of the processes and procedures involved in the application under consideration. For example, an analysis of Sales Order Processing should identify how orders are received, the order forms used and the procedures necessary to fulfil orders. Analysis is not simply the recording of an application as it currently operates through a variety of information gathering methods such as interviewing and observation, the requirements of a new system should be identified. Although the needs of the organisation are of obvious importance, employees are more likely to be concerned with matters of job satisfaction and working conditions. Successful implementation of a computerised system requires a great deal of work, involvement and willingness to co-operate by everyone concerned. If staff feel that their views have been considered such co-operation is more likely. Although users views are Important an outside observer can often identify problems with current practice which have never been questioned. A systems analyst from outside the firm needs therefore, to possess qualities of tact and diplomacy if his or her views are to be considered. The process of design should produce a complete picture of * the input, * processing, * storage and * output requirements of the new system. The picture will include * narrative descriptions, * flowcharts illustrating clerical procedures, * data flows and * the role of the computer in broad outline. The design of a computerised system should include as many improvements suggested in the investigation stage as is practicable and it will almost certainly be necessary to question tiers further when, for example, problems arise in the implementation of particular system requirements. Compromises will have to be made between what is desirable and what is practicable. Management and users may have specified requirements during the investigation stage, which prove either too expensive or extremely difficult to satisfy. System implementation System implementation or going live involves a range of preparatory. The main activities are as follow: * Development and/or testing of software. If an off the shelf system is chosen, then no development time is necessary, but testing is still vital. * File conversion. This is probably the most time-consuming activity in that all data relating to the application, which is currently held in manual files, has to be encoded onto the chosen magnetic storage medium. accuracy is vital and both software and clerical checking procedures should be employed. * Staff training and education. This may take a variety of forms but may be part of the proposals put forward by the chosen supplier. It is an extremely important activity if the systems effectiveness is to be maximised and if staff are to feel happy and confident in its operation. * Introduction of new clerical procedures. If the whole system is to function correctly, the computer processing aspect has to be supported by the clerical procedures designed to work with it. Part of staff training, therefore, has to be dedicated to purely clerical tasks such as the preparation of input data or source documents. * Choice of a changeover or going live plan. A number of alternatives are available and each has costs and benefits associated with it. Parallel running, requires that the old and new systems be operated alongside one another until the new system is fully tested. This minimises the risks consequent upon system failure, it is an expensive option in that it involves a great deal of staff time. Direct changeover is less expensive if the new system works but failure could mean catastrophe for the business. The plan used will depend on a number of factors, for example, the importance of the system to the success of the business. System maintenance After its initial introduction a system should be flexible to the changing needs of the business. An allowance for the businesss expansion should be made in the original system specification and the supplier should be able to satisfy those expansion needs as and when necessary. Equally, advances in hardware technology and the sophistication of software mean that a system soon becomes outdated. Even if a business chooses not to take advantage of improved software, hardware is likely to become less reliable and will need replacement after about five years of business use. Agreements on software and hardware maintenance should be established with the supplier and formalised in the contract signed by purchaser and supplier. The Feasibility Study The purpose of a feasibility study is to determine whether or not the purchase of a computer system can be justified. The study has to answer two fundamental questions: 1. Can the envisaged applications be carried out by a computer system more efficiently than with existing facilities?; 2. Will a computer system be economically viable?. Since the early 1 970s, prices of all types of computer system have fallen dramatically and their power has increased to such a degree that, for example, microcomputers challenge the minicomputer in their range of applications. This may be part of the reason why many organisations find it difficult to justify undertaking a detailed feasibility study and argue that no matter how limited their needs there is a computer system to satisfy them at a cost-effective price; it is only necessary to decide on its best application(s). Although this is an understandable view, it should be remembered that any item of equipment should be justified in terms of its costs and benefits to the business and that a computer system should be no exception. Although there are few businesses, which cannot benefit from computerisation at all, the process of carrying out a feasibility study disciplines the purchaser to think carefully about how it is to be used. In modifying the purpose of a feasibility study, the previous questions can be replaced by the following: 1. Which applications can be computerised to give most benefit to the organisation?; 2. What type of computer will be required?; 3. What are the likely acquisition and running costs?; 4. What are the likely implications, especially those concerning personnel and organisational procedures?. Pressures for computerisation There are many and various pressures which can trigger the thought of using a computer, either for the first time or, where a computer is already installed, for other applications still operated manually. Some examples are as follow: i. A business is expanding and to cope with the increased workload it appears that the only the alternative to computerisation is increased staffing. ii. A business is growing at such a rate that more information is needed to manage it properly. To obtain the information manually is too time-consuming and by the time it has been gathered is probably out-of-date. iii. Staff are being asked to work regular and increasing amounts of overtime and backlogs of work are building up. iv. Customers are complaining about the speed and quality of the service provided. v. Where stock is involved, it is difficult to keep track of stock levels and while some customer orders cannot be filled because of stock shortages, other stock is gathering dust on the shelves. vi. A great deal of advertising literature is constantly reminding business management that they are out-of-date and at a disadvantage with their competitors. vii. Other businesses providing a similar service use a computer. Examples (i), (ii) and (iii) suggest that the business is operating successfully and needs to take on extra staff or streamline its systems. Examples (iv) and (v) may be symptomatic of generally poor business management and in such cases, computerisation alone may not solve the problems. Examples (vi) and (vii) may tempt the management to computerise simply to keep up with the Joness. Although a computerisation programme resulting directly from one or more such pressures may be completely successful and worthwhile, the pressure itself should not be the reason for computerisation. Instead, management should establish the organisational objectives they wish to achieve through computerisation. Establishing objectives for computerisation It is important for management to establish what they are trying to achieve in terms of the overall objectives of the business and in the light of this, the objectives of the systems, which contribute to their achievement. For example, two major business objectives may be to improve the delivery of customers orders and to minimise the stock levels, which tie up valuable cash resources. The achievement of these objectives may involve contributions from several different information processing systems and the list may include the following. * Stock Control records stock movements and controls stock levels. * Purchasing responsible for the ordering of new supplies from suppliers. * Sales Order Processing receives customers orders and initiates the process of order fulfilment. * Purchase Ledger the accounting record of amounts owed and paid to suppliers of stock. * Invoicing the production of invoices requesting payment from customers for goods supplied. * Sales Ledger the accounting record of amounts owing by and received from customers for goods supplied. These and other applications within a business are interconnected by the information, which flows between them. Such connections can be illustrated with the use of data flow diagrams (DFD), which are described in Chapter 25. Establishing priorities for computerisation The applications which are going to bring greatest benefit to the business should be computerised first. Establishing individual system objectives The objectives of the relevant application must first be clearly understood. The following is a typical list for stock control serves to illustrate the definition of such objectives. * To maintain levels of stock which will be sufficient to meet customer orders promptly. * To provide a mechanism which removes the need for excessive safety margins of stock to cover customer orders. This is usually effected by setting minimum stock levels, which the computer can use to report variations below these levels. * To provide automatic re-ordering of stock items which fall below minimum levels. * To provide management with up-to-date information on stock levels and values of stocks held. Contents of the Feasibility Report The Feasibility Report should contain the following sections: Terms of reference These should set out the original purpose of the study, as agreed by management and detail the business objectives to be achieved, for example: (i) the improvement of customer service, such that orders are delivered within 24 hours of order receipt; (ii) the provision of more up-to-date management information on current stock levels and projected customer demand; (iii) a tighter control of the businesss cash resources, primarily through better stock management. Applications considered for computerisation The applications which may assist the achievement of the business objectives set out in the Terms of Reference are listed, for example: stock control; purchasing; sales order processing; invoicing; accounts. System investigations For each application under consideration there should be: * a description of the existing system; * an assessment of its good and bad points. For example, the sales order processing system may be slow to process customer orders and this results in poor delivery times, which in turn causes customers to take away their business; * an estimate of the costs of the existing system. For example, apart from the cost of staffing, an estimate has to be made of the cost of lost business, which could be avoided with an improved system. Envisaged system requirements This section should detail, in general terms, those aspects of each application which need to be improved and a broad outline of how each system may operate following computerisation. Costs of development and implementation These will include both capital costs and revenue or running costs. Capital costs are likely to be incurred for the following: (i) computer hardware; (ii) systems software and software packages (either off-the-shelf or tailor-made); (iii) installation charges for hardware and software; (iv) staff training. Revenue costs include those for the maintenance and insurance of the system. In addition, unless there are existing computer specialists in the organisation, additional suitable staff may need to be recruited Timescale for implementation This will depend on the scale of the operation, the type of application and whether or not packaged software is to be used. Expected benefits These are more difficult to quantify than the costs but may include, for example: * estimated savings in capital expenditure on typewriters and photocopiers; * more efficient stock management allows customer service to be maintained whilst keeping stock levels lower. This releases valuable cash resources and reduces possible interest charges on borrowed capital; * expansion in business turnover, without the need for extra staff and reduced overtime requirements. Other considerations The staff have to support any development for it to be properly successful and this usually means consultation at an early stage in the feasibility study and the provision of a proper staff-training programme. Customers must also be considered. For example, when a customer receives a computer produced invoice it should be at least as easy to understand as the type it replaced. Assuming that the feasibility study concludes that the proposed computerisation is worthwhile, according to the criteria set out in the report, then more detailed investigation and design can follow. System Investigation and Design Introduction If the feasibility report gives the go-ahead to the computerisation project, then a more detailed investigation of each candidate system begins. The facts gathered about each system will be analysed in terms of their bearing on the design and implementation of a computerised version. The objectives of the analysis are to gain a thorough knowledge of the operational characteristics of the current system and to settle, in a fair amount of detail, the way in which a computerised system will operate. It is extremely important that the new system does not simply computerise existing procedures. The design should, as far as possible, ignore existing departmental structures, which may inhibit the introduction of different and improved procedures. The aim of the investigation and design process is to produce a specification of users requirements in documented form. This is referred to as the Statement of User Requirements and will be used to tender for supply of hardware and software. Fact-finding methods There are several methods, which can be used to gather facts about a system: (i) interviewing; (ii) questionnaires; (iii) examination of records and procedure manuals; (iv) examination of documents; viii. observation. Each method has advantages and disadvantages and the method or methods chosen will depend on the specific circumstances surrounding the investigation, for example, the size of the business, the number of staff employed and their location and distribution. Interviewing This method has much to recommend it, in that the facts can be gathered directly from the person or persons who have experience of the system under investigation. On the other hand, a business with a number of geographically distributed branches makes the process of extensive interviewing expensive and time-consuming. Further, interviewing skills need to be acquired if the process is to be effective. The interviewer needs to know how to gain the confidence of the interviewee and ensure that the information, which is given, will be of value in the design of the new system. Questions need to be phrased unambiguously in order that the interviewee supplies the information actually required and a checklist of points will help to ensure that all relevant questions are asked. Of course, the interview may need to stray from the points in the checklist, if it becomes apparent that the interviewee is able to provide relevant information not previously considered. For example, clerical procedur es may be designed quite satisfactorily but may be made less effective because of personality conflicts between staff. Such tensions may only be revealed through personal interview. The interviewer also needs to detect any unsatisfactory responses to questions and possibly use alternative methods to glean the required information. Unsatisfactory responses include: * Refusal to answer. Such refusal may indicate, for example, that set procedures are not being followed and that the member of staff does not wish to be incriminated. * Answer with irrelevant information. It may be that the question is ambiguous and has to be re-phrased in order to elicit the required information. * Answer with insufficient information. If a system is to be designed which covers all foreseeable user requirements and operational circumstances, it is important that the analyst has all relevant information. * Inaccurate answer. The interviewer may or may not be aware that an inaccurate answer has been given but it is important that other sources of information are used to cross-check answers Questionnaires Questionnaires are useful when only a small amount of information is required from a large number of people, but to provide accurate responses, questions need to be unambiguous and precise. The questionnaire has a number of advantages over the interview: * each respondent is asked exactly the same questions, so responses can be analysed according to the pre-defined categories of information; * the lack of personal contact allows the respondent to feel completely at ease when providing information, particularly if responses are to be anonymous; * questionnaires are particularly suited to the gathering of factual information, for example, the number of customer orders received in one week; * it is cheap, particularly if users are scattered over a wide geographical area. A number of disadvantages attach to the use of questionnaires: * questions have to be simple and their meaning completely unambiguous to the respondents; * if the responses indicate that the wrong questions were asked, or that they were phrased badly, it may be difficult to clarify the information, particularly if the respondents were anonymous; * without direct observation it is difficult to obtain a realistic view of a systems operation. The questionnaire often provides only statistical information on, for example, volumes of sales transactions or customer enquiries. Examination of records and procedure manuals If existing procedures are already well documented, then the procedure manuals can provide a ready-made source of information on the way procedures should be carried out. it is important to realise that procedures detailed in manuals may not accord entirely with what actually happens. The examination of current records and the tracing of particular transactions can be a useful method of discovering what procedures are carried out. Special purpose records, which may involve the ticking of a box when an activity has been completed, can be used to analyse procedures, which are causing delays or are not functioning efficiently. The use of special purpose records imposes extra burdens on staff who have to record procedures as they happen and the technique should only be used when strictly necessary. Examination of documents It is important that the analyst examines all documents used in a system, to ensure that each: * fulfils some purpose, that is, it records or transmits information which is actually used at some stage. Systems are subject to some inertia, for example, there may have been a one-off requirement to record and analyse the geographical distribution of customers over a single month and yet the summary document is still completed because no-one told the staff it was no longer necessary; * is clear and satisfies its purpose, for example, a form may not indicate clearly the type of data to be entered under each heading. In any case, it may well require re-designing for any new system which is introduced. The documents, which should include, for example, source documents, report summaries, customer invoices and delivery notes, help to build a picture of the information flows which take place from input to output. Observation It is most important to observe a procedure in action, so that irregularities and exceptional procedures are noticed. Observation should always be carried out with tact and staff under observation should be made fully aware of its purpose, to avoid suspicions of snooping. The following list details some of the features of office procedures and conditions, which may usefully be observed during the investigation: * office layout this may determine whether the positioning of desks, filing cabinets and other office equipment is convenient for staff and conducive to efficient working; * work load this should indicate whether the volume of documents awaiting processing is fairly constant or if there are peak periods of activity; * delays these could show that there are some procedures which are constantly behind schedule; * methods of working a trained observer can, through experience, recognise a slow, reasonable or quick pace of working and decide whether or not the method of * working is efficient. It is important that such observations should be followed up by an interview to obtain the co-operation of the person under observation; * office conditions these should be examined, as poor ventilation, inadequate or excessive temperatures, or poor lighting can adversely affect staff efficiency. Often the observation will be carried out in an informal way but it may be useful on occasion to, for example, work at a users desk, so as to observe directly the way that customer orders are dealt with. It is important to realise that a user may put on a performance whilst under observation and that this reduces the value of the information gathered. Documenting the results of analysis A number of standard approaches, apart from narrative description, can be used to document the result of the system analysis, including: data flow diagrams (DFDs); organisation charts system flowcharts. Their applications are illustrated in the following section, which examines the categories of information, which need to be gathered and recorded during a system investigation. Categories of system information The major categories of information which need to be gathered involve: * functional relationships and data flows; * personnel and jobs; * inputs; * processes; * outputs; * storage. Functional relationships and data flows A business has a number of functional areas, such as Sales, Accounts, Stock Control and Purchasing, each having its own information system. However, the computerisation of a system in one functional area cannot be carried out without considering its effects on the rest of the business. Information systems within a business interact with and affect one another. The business, as an entity, also interacts with and is influenced by individuals and organisations in the surrounding environment and the businesss individual information systems should be co-ordinated to allow the achievement of overall business objectives. The data flows between individual functional areas can be illustrated with the use of a data flow diagram. Personnel and jobs It is possible to design a computerised system without involving staff, but it is likely to be less successful, partly because users can provide valuable insights into the practical aspects of system operation and partly because they will feel less motivated if they have had little or no influence on the final design. A formal organisation chart can be used to gain an overall picture of staff relationships and responsibilities but it should be borne in mind that designated and actual job responsibilities can differ radically. For example, it may turn out that a junior sales clerk is carrying out the checking of orders, which should be the responsibility of the sales supervisor. Thus, it may be necessary for the analyst to draw an alternative informal organisation chart to show the actual working relationships of staff. An example is given Apart from identifying working relationships between staff, it is useful to draw up brief job descriptions so that consultation on individual system procedures can take place with the appropriate staff. For example, a job description for a sales clerk may include the following activities: completion of standard order forms; checking stock availability; notification of orders to accounts. Therefore, although the sales departmental manager may have knowledge of such procedures, the sales clerk will have practical experience of their operation and should be consulted. System inputs A number of details concerning the data inputs to a system need to be established: * source. It may, for example, originate from a customer, a supplier, or another department in the business; * form. The data may arrive, for example, by telephone, letter, or a standard form such as an order form or suppliers invoice; * volume and frequency. For example, the number of orders received daily or weekly; * contents. For example. the individual items of data which appear on a suppliers invoice. Such information will allow the analyst to make recommendations on the most appropriate methods of computer input. The design of appropriate input methods also has to take account of several tasks involved with the collection and entry of data to a system: * recording. For example, the completion of a customer order form following receipt of a customer order by telephone; * transmission. For example, the order details may need to be transferred to another department or branch of the business for encoding and computer processing or they may be keyed in directly at the point of collection; * visual checking. It may be, for example, that a customer order has no quantities entered; * encoding. Verification procedures need to be designed to prevent transcription errors when data is encoded onto a computer storage medium for processing; * validation. Data is checked by a data vet program against set limits of validity, for example, account numbers may have to fall between a particular range of values. Thus, decisions need to be made concerning: (i) data collection procedures; (ii) methods for the transmission of data to the place of processing; (iii) data entry, data verification and data validation procedures. Data collection The designer needs to be aware of the available input technologies. These can be divided into two categories, keyboard entry and data capture technologies such as bar code reading, optical character reading (OCR) and optical mark reading (OMR), which allow direct input to the computer from specially designed input forms. Keyboard entry This is the most common method of input and requires the transcription of data from source documents. These can be designed to minimise the possibility of transcription errors at the data collection stage. Direct input Bar codes are pre-encoded and are thus immune from errors of transcription (assuming that the bar code is correct in the first place). Optical mark reading requires that pencil marks be used to indicate particular values from a limited set on a pre-designed form. Although no keyboard entry is required, mistakes may be made by the originator of the document and good design is therefore important. Data transmission It may be that no data transmission is necessary because the data is processed at the point of collection. For example, customer orders may be recorded on order forms at the sales desk and then taken into the next room for keying into the computer. Alternatively, the data may have to be transmitted some distance, perhaps to another floor of the building or to another building some miles away. A fundamental decision has to be made, whether to localise processing at the points of collection, or to use a central facility with data communications links from each location. Data entry The data entry method chosen will depend on the data collection methods used and may involve keyboard transcription from source documents or data may be captured directly from bar codes, OCR or OMR type documents. Where keyboard transcription is used, verification and validation procedures are likely to be interactive, in that the data entry operator has to respond to prompts on screen and make corrections as and when the system indicates Most small business computer systems will be used for on-line processing, where transactions are processed immediately with master files at the data entry stage. Consequently, validation and verification have to be carried out immediately prior to the processing of each transaction. On-screen verification At the end of each transaction entry, the operator is given the opportunity to scan the data on the screen and to re-enter any incorrect entries detected. This usually takes the form of a message at the bottom of the screen, which is phrased in a way such as Verify (yes or no). On-screen validation Character, data item and record checks, such as range and mode checks, can be made each time the RETURN key is pressed during data entry. For example, the screen may prompt for the en-try of an account number, which must be 6 digits long and be within the range 000001 to 500000. Any entry which does not conform with these parameters is erased and the prompt re-displayed for another attempt. Appropriate screen dialogue to allow the data entry operator to enter into a conversation with the computer is a crucial part of the input design process and is dealt with as a separate topic in Chapter 21. Batch data entry The type of keyboard transcription used will be affected by the type of input data. Where, for example, files only need to be updated weekly, transaction data may be batched and entered onto magnetic disk for processing at a later stage in one update program run. System processes All the clerical and machine-assisted processes, which are necessary to achieve the desired output from the given inputs, need to be identified. This will allow the systems analyst to determine the role of the computer in the new system, the programs necessary to take over the processing stages and the changes needed to clerical procedures, before and after computer processing. There are many instances when the processing requires not only the input data but also data retrieved from files. For example, to generate a customer invoice requires: i. input data concerning commodity codes and quantities ordered; ii. data from the stock master file concerning prices of items ordered by reference to the input commodity codes; iii. customer details from the customer master file. The above processes can be completely computerised but other processes may require human intervention. For example, before a customer order is processed, the customers credit status may need to be checked and referred to a supervisor before authorisation. Non-standard procedures Most processes will follow standards suitable for their particular circumstancesIt is important, however, that the investigation identifies and notes any non-standard procedures. For example, what procedure is followed when there is an insufficient quantity of an ordered item to completely fulfil a customer order? It may be that some customers will take part-orders, whilst others require the full quantity of an item or none at all. If non-standard procedures are needed, it is important to know their complexity, how often they are used and what extra information is required. Ideally, a system should be designed to cope with all possible circumstances, but cost sometimes forces a compromise. Document flow System flowcharts can be used to model the movement and interaction of documents and the data they record, as well as the processes involved. In order that the involvement of each section, department or personnel grouping in the processes can be identified, the system flowchart is divided into columns representing these divisions of responsibility. A system flowchart may use a range of standard symbols, which are illustrated in Figures below. A number of standards exist for the drawing of system flowcharts and the range of symbols used depends on which stage of the investigation and design process has been reached. For example, in the early stages of investigation of an existing manual system, there will be no representation of computer methods of input, processing, output or storage. At a later stage, when computer methods are being considered, it will be necessary to use suitable symbols in the flowchart Flow Chart Symbols Figure illustrates example of a manually operated order processing and invoicing system. The Figure illustrates example of a batch processing stock file update of a stock master file. Notice the sorting and validation stages, which are essential to batch processing systems Most business systems require alternative actions to be taken dependent upon some variable condition or circumstance. For example, 15 per cent customer discount may be allowed if the invoiced amount is paid within, say, 14 days of the invoice date, after which time all discount is lost Batch Processing Stock File Update Of A Stock Master File. In order that computerised and non-computerised processes can be properly designed, the investigation must identify all: * decisions made during system operation; * conditions and circumstances which lead to alternative decisions; * actions to be taken following a decision. Figure represents the computerised aspects of a similar system, but does not show detail procedures needed to prepare, for example, the data for input or the distribution of output. A computerised system must have the necessary clerical procedures to support it. Some decisions and consequent actions will need to be documented for clerical procedure guidelines, whilst others which involve computer processing will form part of program specifications used in program writing or as bases for choice of packaged software. System outputs * output design first requires identification of the following: * data items required as output. Some may be revealed in the existing system, whilst others may be requested by users as being desirable in any new system; * form of the output, for example, whether or not printed copy is required; * volume of data with each output and the frequency of the output. This information assists decisions on the type and number of output devices required. On-line orderprocessing Based on the above information, the following tasks can be carried out: i. selection of an appropriate output device to display or communicate the outputs. ii. designing output screen and document layouts. System storage (files) The storage of historic and current information is a vital part of any business system. For example, to produce a payslip not only requires transient input data concerning hours worked and sickness days but also data on rate of pay, tax code, deductions of tax and superannuating to date etc., which are held in the payroll master file stored on magnetic disk. Information on the contents of files will be gathered from existing manual files, together with responses from users regarding the output requirements of any new system. If packaged software is to be used then the contents of files will be dictated by the package, in which case some data item types may be surplus to requirements, whilst others which are required may not be available. File contents Each file consists of a number of logical records, each of which has a number of associated data items. For example, each stock record in a stock master file may include: Stock Code; Description; Unit Price; Minimum Stock Level; Re-order Quantity; Quantity in Stock. File organisation and access This concerns the logical ordering of records within a file. Database management systems (DBMS) An increasingly popular alternative to traditional file processing systems is to construct databases controlled by a DBMS. The design process requires that data is analysed according to subject area, for example, raw materials or staffing, rather than by department or functional area. Choice of storage device Choice is concerned with storage capacity, mode and speed of access. Data Flow Diagrams Data Flow Diagrams are a widely used technique for representing the information flows of a system. They are a particular feature of SSADM methodology (Structured Systems Analysis and Design Method). They arc used in the early stages of a systems analysis to provide an understanding of the present system. As the project proceeds they are used to represent the required and also as a basis for program specification. DFDs can be drawn at various levels of detail. At the high Level the DFD is known as a Context Diagram which shows the system as one box with flows going to and coming from external entities. This can then be decomposed into more detailed DFDs. A DFD can show the physical processing of the present system detailing the departments and individuals concerned in the work, or it can be a logical DFD which shows what happens to the data rather than how the processing is carried out. A logical DFD is useful as it frees the analyst from being over influenced by the present system. Purpose of A Data flow diagram It is a diagrammatic representation of information flows within a system showing: * how information enters and leaves the system. * what changes the information. * where information is stored. A DFD is also useful to: * show the boundaries and scope of the system. * check the completeness of the analyses * ensure that all information flows and activities have been considered. * show the major functional areas of the system and therefore identify particular program requirements. DFDs can he used by both technical and non-technical staff and is used in discussions between the analyst and the user. One of the greatest strengths of DFDs is that they can be used to describe a system at several levels. Components of DFDs External Entity The source of information provided to the system. Or the recipient of information provided by the system. An oval shape represents it. If understanding of the DFD can be enhanced then an external entity may be drawn more than once. Process A process transforms or manipulates data within the system. It is represented by a box and will include a numeric identifier, the location of the process, and the process identifier. When naming processes begin with a verb and follow it by an object. e.g. Make Delivery, Receive payment. The object should always be singular. Data Store Data stores may be manual or computer files, and represent the place where a process places data so that it can be retrieved later. Each data store is labelled with the letter M for manual or D for computer and is given a number. Data Flow Represented by an arrow which should be labelled with the data that is being carried (never use a verb on a data flow). Boundary A boundary is sometimes drawn around a DFD to show the limits of what is being investigated. Levels of DFD Level 0 DFD (Context Diagram) Shows the entire system a single black box communicating with the external entities. Level 1 DFD An outline DFD using typically up to 12 process boxes. It shows: * system boundaries, * external entities * main system flows, * main system functions. * data stores. Level 2 and 3 DFD Successively more detailed DFDs showing up to 8 process boxes per DFD. Data Flow Diagrams How do you start? Case study Example Draw a Data flow diagram of the following scenario Data flow diagrams A manufacturing company has a strict health and safety policy. They have a small health and safety department, which maintains safety levels in the organisation. They require that employees report any problems to them if they discover faults within the organisation of a hazardous or potentially hazardous nature. Reports from employees are received in the Health and Safety department either by telephone, e-rnail or internal memo. This information is received by the health and safety administrator who logs the calls on his fault logging computer database. The computer database issues a unique problem number, which is given to the head of department of the employee highlighting the fault. The head of department is also provided with details of the nature of the problem. There are two health and safety inspectors employed by the organisation who investigate the problems when they occur. They are based in the health and safety department and are given the details of the problem and the fault number from the computer database by the administrator who logs the assignment of the task on the fault logging database. When the problem is investigated and therefore the task is completed the inspectors contact the administrator to advise them of the situation. The administrator advises the particular head of department that the necessary work has been carded out and the task is closed in the fault logging database. 1. Pick out relevant information and place in tabular form External entity Processes Data stores Data. flows employee report problem fault logging fault details head of dept collect problem ID No health and safety inspectors close problem Fault No assignment details Completed details Fault closed details Health and Safety Department Fault Reporting System 2. Context Diagram (no data stores) 3. Produce the Data Flow diagram Example 1 A purchasing department receives a purchase requisition from the stores. The requisition is checked, and an invalid requisition is returned to the stores for correction. An order is made out using a file of approved suppliers, and sent to the appropriate supplier. A copy order is filed. The requisition is filed. When the goods arc received the invoice is compared with the filed copy order and an invalid invoice is returned to the supplier. Valid invoices are passed to the accounts department for payment, and fulfilled orders are filed. Draw a Level 0 and level 1 DFD for the purchase requisition system. Example 2 When an invoice is received from a supplier, it is checked against a file of authorised purchases. If the invoice does not much an authorised purchase it is returned to the supplier with, a querying letter. If the invoice matches an authorised purchase, but is for an incorrect amount then it is returned to the supplier with a standard form. If the invoice reconciles, a payment authorisation is made out. A cheque is then sent to the supplier, and the invoice and the authorisation are filed. Draw a level 0 and Level 1 DFD for the system. Example 3 This case study is based on the video issue recording system of the Gentlepeoples Video Library Club (GVLC). GVLC specialises in obscure videos that are not readily available from other sources. GVLC lends only to members of the Video Society part of the exclusive and very desirable Gentlepeoples Club. Details of finance are outside the scope of the investigation. Any member of the club is automatically a member of the library. Club membership is for one year; a few new members are admitted on 1 January each year; new members are not admitted during the year. The library is set up along conventional lines, though members are not restricted as to the number of videos they may borrow at any one time. Videos are requested for return only if required by another member. Most active users of the library regularly change their videos. Two or three copies of popular titles are available. In order to borrow a video a member selects it takes it to the issue desk and gives the video and his club membership card to the librarian. The librarian takes the video ID card from the video sleeve and adds the membership number to the card. The librarian places the card in the loans file and the member leaves with the video. When a member returns a video. He or she presents the video to the librarian. The librarian finds the video card in the loans file and places the card in the video sleeve before returning the video to the library shelves. To reserve a video, which is on, can. A member asks the librarian and leaves their membership number. The Librarian finds a relevant video in the loans file and adds the members number on the reservation column on the video card. The librarian also makes a note of the member who has the video on loan and completes a return request card addressed to that member. The address is taken from the library copy of the club membership book. When the reserved video is returned the librarian puts the video under the counter and completes a Reservation Ready card addressed to the member who requested the reservation again taking the address from the membership book. Tine member requiring he video can then pick the video up from the librarian and have it issued in the usual manner. Members make many enquiries of the librarians: typical questions include is the video entitled Dziadek on loan? Which video did actress Anna Kucharski appear in? have we a video entitled Son of Arturo? Have we any videos on the subject Right Action? The librarians are able to answer these queries by inspecting the loans file the actor index the subject index and the title index. In addition to the above duties the librarians receive new videos from the social committee of the club. The selection ordering and payment for the videos is outside the scope of this investigation. On receipt of the new video the librarian has to make out a video card for insertion in the video sleeve and the relevant entries for the indexes. The librarians are also responsible for amending the library copy of the membership book with changes of address and at the end of the year far collecting the new membership bock from the Club Secretary. Answers Example 3 GLVC Video Library Context Diagram Level 1 DFD Activity 1 College Library 1. Zero Normal Form 0NF List Attributes Stud# Name Address TG Tutor Book# Title ISBN ReturnDate Identify Primary key and repeating attributes. Write out in 0NF using standard notation:- When an entity has has a Repeating Attribute (e.g book has several authors) The repeating attribute is shown with a line over it STUDENT(Stud#, Name, Address, TG, Tutor, Book#, Title, ISBN, ReturnDate) 2. First Normal Form -1NF Rule- An entity in First Normal Form must not contain any repeating attributes. Remove repeated attributes to form a new entity LOAN_BOOK. There are now 2 entities in 1NF:- STUDENT(Stud#, Name, Address, TG, Tutor,) LOAN_BOOK(Book#,Stud#, Title, ISBN, ReturnDate) (A composite key is required to uniquely identify each loan of a particular book) 3. Second Normal Form 2NF Rule An entity is in 2NF if it is 1NF and all non key attributes are fully functionally dependent on the whole of the primary key. ( 2NF applies to entities with composite keys, that is a primary key composed of two or more attibutes. An entity which is already in 1NF, with a single attribute primary key is automatically in at least 2NF) The STUDENT entity has a single attribute primary key and is therefore already in 2NF. The LOAN_BOOK entity has a composite primary key so we need to examine all the non-key attributes to ensure they are fully functionally dependent on the whole of the primary key. Non-key attribute Dependent on:- Title Book# ISBN Book# ReturnDate Book#, Stud# Therefore Title and ISBN need to be removed to form a new entity BOOK. Book# is included to provide a link. The tables in 2NF are now:- STUDENT(Stud#, Name, Address, TG, Tutor,) LOAN_BOOK(Book#,Stud#, ReturnDate) BOOK(Book#, Title, ISBN) 4. Third Normal Form 3NF Rule To be in 3NF an entity must be in 2 NF (and therefore in 1NF) and contain no non-key dependencies. Fields which are not part of the primary key must always depend on the primary key and not on anything else, such as another non key field. Consider the entity STUDENT, Name Address depend on the primary key but Tutor depends on the Tutor Group code TG and not on Stud#. They should therefore be removed to form a new entity, TUTOR. A copy of the code TG is left in the student table to form a link. STUDENT(Stud#, Name, Address, TG) TUTOR(TG, Tutor) Consider the entity LOAN_BOOK, return date is dependent on the primary key and therefore already in 3NF. Consider the entity BOOK, title is dependent on the ISBN and not on the Book#, this should be removed to create a new entity ISBN. A copy of ISBN is left in the BOOK entity to provide a link. BOOK(Book#, ISBN) ISBN(ISBN, Title) The final tables are:- STUDENT(Stud#, Name, Address, TG) TUTOR(TG, Tutor) LOAN_BOOK(Book#,Stud#, ReturnDate) BOOK(Book#, ISBN) ISBN(ISBN, Title) H. T. Harvey 6-Feb-03 1 of 18 Chapter 18

Wednesday, November 27, 2019

How to Get an A 15 Must-Ask Questions Before Finals

How to Get an A 15 Must-Ask Questions Before Finals Finals have always been your nightmare? Now they are almost here, and you can’t afford to show up unprepared. Even if you’ve been studying like crazy, the stress and busyness of finals week can make it a tricky time. And you want to be prepared for anything that can happen, right? You have to be informed about everything from the location and time of exam to the type of questions, so that you dont take it too serious or not serious enough. That’s why it’s important to ask these vital 15 questions. They’re guaranteed to keep you from feeling confused and caught on the hop on the big day. 1. Will it be an open-book test? You don’t want to waste your time memorizing facts that you can simply look up in your textbook. Still, using a book in the wrong course can get you an F for cheating. Ask this up front to save your skin. 2. Can we bring notes? Like with the book, it’s wise to know if you can use study aids on your final. Also, it’s good to know how many notes you can have (like one page or 35 card). That way, you can spend time writing enough to get all your info onto a paper that won’t get you in trouble. 3. Is it a paper or online final test? Especially in a hybrid or online course, it’s vital to know whether your final will be online or in print. Often, courses will have both, and you don’t want to miss an entire section just because you didn’t know about it. How much of the overall grade does it count for? At the beginning of the course, your professor probably went over how much the final is worth in regards to your overall grade. Ask the question again. Sometimes, the weight of a final will change depending on how the class is progressing. 5. How much of the test is based on the lecture material? If you are in a course where there is a huge lecture component, it’s good to know how much will be lecture-based and how much will be directly from the book. That way you can focus your study where it will be most effective. 6. What is the structure of the test? In addition to how much will be based on lecture, you need to know the structure of the final exam. Is it true/false? Multiple choice? Multiple-multiple choice? Will there be an essay component? Then, look up test strategies for that particular test structure. 7. Will there be some extra-credit questions? It’s always good to know how many extra points you can earn if you happen to screw up. Every little bit helps. 8. Are there alternative testing methods? If you are a student who has test anxiety, problems with comprehension, or any other documented testing issue, you need to advocate for yourself and ask for an alternative assignment. A good professor will have an option that will allow you to be successful no matter what your circumstances. 9. Will the final exam include a practical element? Some courses – like nursing, foreign language, or laboratory science – might have a practical element or lab component. Make sure you know that ahead of time so that you are prepared interact on test day. 10. How much time will we have for the test? It’s always good to know how much time and how many questions are on the test. That way, you can gauge your progress and track how long you spend on each section. It’s the best way to ensure you complete the whole thing. 11. Will there be a retest? Although some professors have a high-stakes mentality (â€Å"One strike, you’re out†), many professors have an option to retake the test if you do poorly. Know this ahead of time so that you can plan accordingly. If you feel that the first attempt wont be successful, dont panic and find out more ways on how to live through finals to improve your chance to get high scores. 12. How will the test be graded? Will your professor be grading on a curve? Will certain questions be given more weight than others? Try to get the grading rubric ahead of time so that you can make sure your answers (especially essay answers) meet all the criteria of an A+ final. 13. Is there a practice test available? Preparation is the name of the game. If there are practice questions or a full-on practice final you can take, get that information now. You’ll be able to see your weaknesses right away and really focus your studying on what you need to learn. 14. What supplies do I need to bring? Some professors will have all the supplies you need on the day of the test. Others may ask you to bring pencils, â€Å"little blue books,† or calculators. Take it from the pros – you don’t want to be the one student who shows up to the calculus final without a graphic calculator. 15. What are the rules for the test day? For every teacher and course, there will be slightly different variations. Some teachers have rules about the spacing of the desks. Others say it’s okay to work in teams to finish the final. Whatever the individual rules in your classroom, make sure you know them so that you don’t break them. Any questions? Go ahead, comment below!

Saturday, November 23, 2019

Proofreading Techniques When Time is Tight

Proofreading Techniques When Time is Tight (Issue 24: November, 2009) What should you do when you must proofread a business document, but you face a panic-stricken colleague, a demanding boss, or a shortened deadline? As the holiday season and end-of-year deadlines approach, you’ll need to produce more documents in even less time. Assuming that the panic-stricken person who brought you the document gave you no specific instructions about what to look for and what to ignore, here is a list of three process checks, in order of importance:1) Check, Print, Find Reviewer: Work in pairs - ask a colleague to proof your documents, and return the favor. Run the document through grammar and spell-check. This won't catch everything, but it will flag typos. Print the document. Finding errors in print is much easier than on screen. 2) Check Format and Organization: Check the pagination. Make sure that the pages are numbered sequentially. If the document is to be copied double-sided, check to see that blank pages have been inserted properly and that all odd-numbered pages will fall on a right-hand page. Proofread the cover page and title page word for word. Make sure that the date is correct and that the company's and author's names are spelled correctly. Flip each page and look for any glaring errors such as missing figures or printer glitches such as grossly uneven page toner. Flip each page again (make a separate pass) and look at the format to see that headings and subheadings are the correct size and typeface, spacing and indentation are consistent, running headings are correct, and margins are the right size. Check the table of contents against the text. Make sure that all of the sections are included and that the wording in the table of contents matches the text. Check the page numbers against the text. If you have a PowerPoint document, you will likely find errors here. Look at the graphics and tables. Make sure they are numbered correctly and that their titles correctly describe what appears. #3 Read Most Important Text: Read the preface, executive summary, or any other introductory material that the reader is likely to look at first. Read the conclusion or final summary section. Read the headings and subheadings. Read the first sentence (or first paragraph, if there is time) of each section. If you have any time remaining, proofread known trouble spots. You'll notice that the first 2 processes do not involve proofreading text. If you're really crunched for time, verify the organization and style of the document first because: It is fast to do so. A poorly organized document is very unprofessional, and readily apparent to a reader. Worse yet, your reader will be lost in the disorganization. You will find the most obvious errors. Only once you verify organization and appearance (items 1-2), should you move to text review (item 3).Ideally, we need to allow enough proofreading time. But, sometimes we don't have that option. These techniques will save you when you're faced with too little time.

Thursday, November 21, 2019

Medical Anthropology Essay Example | Topics and Well Written Essays - 1750 words

Medical Anthropology - Essay Example Given these two definitions, it leads us to the assumption that some illnesses may be caused by certain diseases but these diseases are not necessarily a result of being feeling ill. An understanding of these two basic concepts is important especially when medical specialists are to diagnose patients who are from a culture that is different from their own. Social scientist have always lobbied to acknowledge the socio-historical upbringing if we are to understand a phenomenon, and the medical field should not be excluded from that. In fact, many literature like Joralemon’s â€Å"Exploring Medical Anthropology†, argues for the equal recognition of the societal context when giving diagnosis. This is because the socio-cultural aspect of a person will greatly affect his or her perception of himself in relation to the kind of illness the person is experiencing. Medical professionals may even be surprised at how much relevance these â€Å"inner thoughts† bear to help th em discover the true cause of certain diseases. Closely related to the terms disease and illness is also another controversial and contested subject in the medical science arena – the notion of â€Å"self†. ... This became the trend after the emergence of a long-standing hard and fast boundary between hard science and soft science, between real and folk medicine and both social science and natural science isolated each other when in fact, it should complement each other and should work hand in hand. The emergence of a new branch of anthropology eventually proved the abovementioned notion fallacious and insufficient; a serious claim against something that has prevailed during the majority of the scientific revolution. Medical anthropology provided a platform to bridge the gap between the social and natural sciences. After all, what the natural sciences discover or learn; it will in due course apply to social beings. Hence, it is irrelevant to create a strict dichotomy between social and natural sciences especially when we are in the pursuit of understanding cultural-specific diseases and illnesses and arriving at long-term solutions to address it. And Joralemon’s book provided an exte nsive discussion on the importance of incorporating the abovementioned socio-environmental aspect in the medical realm. The introduction of culture as an important facet in the business of health simultaneously (and perhaps unintentionally) evolved with the notion of â€Å"self†. In anthropological terms, there have been many definitions of the â€Å"self† and these include the following: (1) the self as the individual body, understood in the sense of the lived experience of the body self – hence, referring to the physical aspect. (2) The second definition of self ascertains the representational use of the body as a natural symbol with which to think about nature, society, and culture (Mary

Wednesday, November 20, 2019

Description and critical evaluation of an historic or contemporary Essay

Description and critical evaluation of an historic or contemporary piece of graphic design from any culture - Essay Example Graphic designs normally appear in the poster realm, website or advertisements (Landa 2013) Further, graphic designs have rightfully been with us through the centuries. In Greek, graphic is taken from the word graphein. In France, graphic is dessiner. In the Italian environment, graphic is disegno. Graphic design relates to drawing. Additionally, graphic includes the sketching process. In Latin, graphic is translated as mark. The Latin word for mark is signum. Planning and expression rightfully form part of the creation of the graphically designed artwork (Barnard 2013). Moreover, inspirational traffic signs, another graphic design area, are correctly used to universally maintain traffic safety. French, Japanese, Chinese and Italian tourists can understand the above traffic road signs. The stop sign message instructs the person to stop. The car driver will stop when the police officer holds up the stop sign. In a building entrance or exit, the stop sign instructs the persons to stop. The person is not allowed to continue entering the premises (Yin 2011). Further, the traffic signs correctly deliver other traffic safety messages. Graphic designers like Bruno Monguzzi use thought provoking designs to attract the design viewers (Poulin 2012). The traffic signs’ messages reduce the number of traffic accidents. The second sign shows the car is allowed to implement a U-turn. In a road reaches a dead end, the U-turn sign instructs the vehicle driver to turn around. The third sign shows the road is narrowing. The vehicle driver is instruc ted to be more careful, possibly slowing down. The fourth sign shows the road is slippery. The vehicle driver is warned that one’s vehicle may be in danger of slipping. Slipping may result to avoidable accidents. Furthermore, the above traffic signs rightfully comply with the two areas of graphic design. The first area focuses on bring a

Sunday, November 17, 2019

Maccabees and the Struggle with Paganism Essay Example for Free

Maccabees and the Struggle with Paganism Essay Maccabees were found in the books of the Old Testament. It narrated the Jewish historical struggle in their religious traditions. Around 175 B. C. there was a monarch known as Antiochus Epiphanes, son of King Antiochus the third of Syria that ruled the Jews. Jewish people were known to be faithful in the Law given by Moses. During their times, Roman empires were expanding and it included Judea in its empire. The Greeks and Romans both practice polytheism and paganism while the Jews were known as monotheistic. These major religious differences brought conflicts among the different civilizations and cultures. Antiochus and the Suppression of Judaism King Antiochus image as a king was that of a tyrannous, greedy and eccentric ruler. He was the foremost oppressor of the Jews. Even if Roman Empires were tolerant of other existing religious sects, the suppression of the Judaism occurred in their times. At first the Jews were free to exercise Judaism even with the presence of pressures in the virtues of Hellenism. But according to the book of First Maccabees there appeared in the land of Israel a group of traitorous Jews who had no regard for the law and they started to break from their customs. They came in terms with the Gentiles and followed their ways. They even asked the king for permission to follow their customs. This led them to built stadium similar to the Greeks. They even performed surgery to hide their circumcision and they also stop observing the Sabbath. Afterwards Antiochus performed other terrible things in the people of Judea and Jerusalem. He murdered the men in Jerusalem and plundered them with their gold, silver and other valuable things. He even destroyed the Jewish temples and force people to worship other gods and forget about their teachings and moral laws. â€Å"The Awful Horror† was committed to the Jewish people by King Antiochus. The Hasmonean or the Maccabees were the heroes that rebelled against paganism and restored Israel’s religious traditions.

Friday, November 15, 2019

We Must Solve the Climate Change Crisis :: Global Warming Essays, 2015

"For the sake of our children and our future, we must do more to combat climate change. Now, it’s true that no single event makes a trend. But the fact is the 12 hottest years on record have all come in the last 15. Heat waves, droughts, wildfires, floods—all are now more frequent and more intense. We can choose to believe that Superstorm Sandy, and the most severe drought in decades, and the worst wildfires some states have ever seen were all just a freak coincidence. Or we can choose to believe in the overwhelming judgment of science—and act before it’s too late." -- President Barack Obama We owe something to future generations in terms of conducting energy and environmental research and coming up with various energy policies that are forward thinking. Historically, the path to the future is created in the past. Our generation must commit itself to constantly researching energy and environmental impacts of energy to come up with innovative information. More specifically, research in climate change and how human use of energy impacts climate change is very important for the future. Additionally, policies need to be thought of, created, passed, and put into action properly. Based on the plethora of issues that we as a class have identified through our various energy policies, it is extremely apparent that there is a need for innovative policy for energy and climate change impacts in the US. Since we are only students, it is amazing to see how we were all able to come up with these policies, and it shows that policy makers definitely have a lot of work to do going forward. Who knows, maybe we will see policies similar to the ones we created become implemented in the future. Overall, it is important for policies to be created now for the future to look bright in terms of the way the United States uses its energy and regulates its emissions from energy overall. In the future, new policies will be created; however, they will need to assess the strengths and weaknesses of policies created today.

Tuesday, November 12, 2019

Beauty Products

Shilo Kumpf English 101, 12:40-1:40 Final Beauty Products Dry skin is no fun, try this lotion out and your skin will never be dry again. A lot of ads for beauty products will have girls in the Pictures that have flawless faces and their eyes are perfect there skin looks like it has never seen a pimple before. What I see a lot of is â€Å"clinically proven†. â€Å" Smoother firmer skin as well†. These are just a couple of sayings that I see a lot of in these ads. You see it for lotions and foundations as well.Looking at Ads can be deceiving I think. As I flip through my People, Elle, and Lucky magazines I,am noticing certain things that catch my attention. The flashy pictures showing the product on Taylor Swift, Pink, and other celebrities. They use a lot of celebrities in these ads, making people think that it will work cause they see their favorite celebrity is using the product. I see a Origins ad and it says â€Å"clinically proven to heal dry skin†, along wit h â€Å"Keeping your skin hydrated for a full 48hrs†. In this picture it shows a lant of some sort and some water for the hydrating part. Then is goes into a short summary of what the product can do for your skin telling you that your skin could be dry because it’s lacking a molecule that their product carries. Do you think the product really works? Or are they just trying to get you to buy their product? Just because you see the flashy picture and the celebrity you think to yourself, yes it will work.As I look in the magazines I come across more beauty products that have more celebrities telling you that one bottle help it all, moother face, no more lines covers evenly. Again you see that flawless face the perfect eyes and you think that their product works cause if Ellen or Taylor Swift uses it then it works. Covergirl, how many people actually use it? A lot of people probably use it cause again they see the nice flawless face it gives you the perfect eyes you will h ave if you use their eyeliner, foundation and mascara together all together. On their foundation ad it it shows Rihanna looking so good with her face glowing and the tag ine under her says, â€Å"Take off that mask and let your skin breathe with clean makeup! † So of course people see that and think I would love to look like Rihanna’s perfect face.Why do ads make you think that you will look like a celebrity if you wear there makeup? Another Cover girl ad is a Taylor Swift one her light skin looks perfect they have the rite lighting on it the tag line says, â€Å"introducing a breath of fresh air flawless coverage with a light as air feel† They use the word â€Å"NEW† as well to atch the attention of many girls out there. Seeing the word new catches my attention I want to see the new product and use it of course. Also they use the word natural to make people think its good for you. I think in my opinion is they use photoshop to make these celebrities look good and make the people buy it. I could get on my Photoshop and make myself look flawless. Cause we all know that nobody is perfect in this world, just because you use cover girl or have a lot of money to make you look good your still like everybody else. (597ct)

Sunday, November 10, 2019

Understanding Research Methodology

Understanding Research Methodologyour site – Dissertation TopicsWhat is Research Methodology? The research methodology is an integral part of your study, and explains the methods you are planning to use to prove your thesis or answer your research question. As an example, if you would like to research what customers think about a new product, you will need to design a research methodology that accurately answers the question: either interviews, focus groups, or questionnaires. The purpose of the research methodology chapter is to explain how you will conduct the research, and which data collection/analysis methods you will use. The research methodology will detail: The framework of the research, including philosophies, assumptions, and theories The methods, procedures, and techniques you use to ensure the reliability and validity of the research The philosophical orientation of the research Justification for choosing the given research methodology The ethical considerations and limitations of the selected research method. Designing Your Methodology Research When you write your methodology for your research, you must already have a clear working hypothesis and research questions. Preparing your research design is a challenging task, and involves the following tasks: Defining the basis of information (qualitative, quantitative, or both) Determining the subject matter of the research: basic, or experimental Identifying the research methodology approach: longitudinal or cross-sectional Determining the sample design: Data collection methods The plan for the data collection and analysis Generalisation and interpretation You have to justify your research methodology decisions by showing your understanding of different techniques. You also need to be aware of the risks and limitations of the selected data collection and analysis method, and show your competency in using different data analysis. What to Include in Your Research Methodology We have already covered mixed research methods in a different article, so be sure to check it out, however, in order to inform your readers about the study you have undertaken, you have to include the research strategy, research method, research approach and assumptions, data collection methods and tools, sample selection, research process, data analysis techniques, ethical considerations, and research limitations. Below you can see what to include in each part of your methodology research. Research strategy You need to state how you will gather information, complete your analysis, literature review, and how you will draw conclusions. Research method You must choose between qualitative, quantitative, or mixed research methods. Research approach and assumptions You need to state whether or not your research is based on any assumptions or hypotheses, and how you will approach the topic. Data collection methods and tools Detail the strategy you will use to collect information: surveys, observation, statistics, or interviews, and list the tools and software you will use. Sample selection Provide a sample selection and inclusion/exclusion criteria. In case you complete a research involving people, state the demographics of the sample. Research process Draw up a research process map that lists all the steps you have to ensure that the data will be reliable and delivered in a timely manner. Data analysis techniques State how you will analyse the results, for example software, spreadsheet, or thematic analysis in case you conduct a qualitative research. Ethical considerations Show your understanding of the ethical issues that might arise during the research and state how you will handle them. Research limitations You can state the limitations of the methodology uses, potential bias, or small sample size.Research Methodology ExamplesThe research methodology is needed for most PhD Theses and dissertations. No matter if you are writing about patients’ experiences in a hospital or research new technologies in data protection, this chapter will be essential. Below you will find some examples of using methodology research descriptions the right way.Nursing Research Methodology: Dementia CareThis study details the methods used for literature search for an empirical study focusing on different interventions for dementia care. The structure of this methodology chapter is different, as the study focuses on comparing existing research studies and drawing a conclusion. Check out the nursing research methodology to see the structure.Quantitative Research Methodology SampleWriting a quantitative research methodology chapter should justify the selection of the data collection and analysis tools, and detail the methods, sampling strategy, and instruments used for collecting information. As you can see, this methodology research chapter includes the ethical considerations and the problems and limitations at the end of the section. Read a sample quantitative research methodology chapter.Business Case Study Dissertation Research MethodologyAs you can see, the research methodology chapter is uniquely designed for case studies. In this sample, the author provides dissertation philosophy and a clear description of the research approach: mixed methods research, as well as the research strategy, detailing each step’s aim, sample size, type of questions, and the method of data analysis. The writer also provides a detailed description of the sampling method, primary data collection, and data analysis methods separately for quantitative and qualitative information. Read the full case study methodology chapter.Research Methodology for Quantitative Surveys Including Time HorizonsIn this quantitative survey dissertation methodology chapter, you will find an introduction that justifies the selection of the methods and research strategy, as well as a research philosophy, research approach, strategy, and time horizons. If you take on a large scale research that will take months to complete, it is a good idea to provide a time horizon. In this sample chapter, you can see that the author utilizes both primary and secondary research, and carries out a longitudinal research consisting of multiple phases. Therefore, a timeline helps planning all the steps and gives the reader a clear idea about the work involved in this study.Do You Need Help with Writing Your Research Methodology?If you are still confused about where to start writing your dissertation research methodology chapter, and would like some help selecting the right data collection and analysis methods, you can get in touch with our friendly team at our site, who have already helped many students in the past getting their research finished to a high standard, advising them on topics, methodology, and structure. Submit your question and get professional help from one of our academic researchers.