Tuesday, December 31, 2019
Business Continuity Plan - 1973 Words
Business Continuity Plan Paula Munoz, University of Pheonix Course: SEC/330ââ¬â Industrial Security Craig Barnhart August 9, 2010 The Phoenix Chemical Company is a large industrial manufacturer for the chemical resins and plasticizers and employs more than 5,000 employees in three separate locations. Its headquarters is in Boise, Idaho, research and development is located in Boston, Massachusetts, and all warehousing, manufacturing, as well as transportation distribution operations are in East Saint Louis, Illinois. Phoenixââ¬â¢s progressive management includes aâ⬠¦show more contentâ⬠¦For this reason it is important to keep the process integrated vertically and horizontally (Le Pree, 2007, p. 4). Essentially, developing plans and drills, and employing those strategies from one department to another, keep an organization safe and in business. By simply integrating these emergency or incident responses with internal and external parties will help processors cope when a crisis occurs. Resourcing the Aftermath In the event of a major disaster it is critical for Phoenix to identify the resources necessary to meet the needs of displaced workers, injured personnel, address related family and community needs. Phoenix will maintain command control elements in execution of this business continuity plan and ensure effective follow-through. The assigned leadership will direct all internal and external communications that comes from the organization. When a disaster happens and there are displaced workers there are many issues that will need to be addressed. Phoenix will determine the immediate future plans and opportunity for a return to work. If employees are displaced for a long amount of time, or even permanently, different options will be made available. As a minimum, Phoenix will work with the human resources department to find possible jobs in other locations. A relocation package will be made available if aShow MoreRelatedBusiness Continuity Plan For A Business1425 Words à |à 6 PagesIntroduction Business Continuity Plan (BCP) is made in order to continue business operation when the business site is adversely affected by some natural calamities like flood, storm, earthquake, fire, communication failure or by some terrorist attacks and crimes. This plan explains the measures taken by the organization to recover its business operation or operation transferred to another business site. Business continuity plans are made to recover from both short term and long term disasters. Plan Purpose:Read MoreBusiness Continuity Plan Essay650 Words à |à 3 Pagesdecided to develop a business continuity plan (BCP) with the full support of management. Instructions: DLIS business continuity plan will come into effect as soon as all elements meet specific guide lines and have been tested. Scope: DLIS will build and maintain a business continuity plan to insure operations will continue in the event of a single point of failure. Objective: DLIS has a warm site located 50 miles from the head quarter office ready to conduct business with a fully mirroredRead MoreQuestions On Business Continuity Plan1534 Words à |à 7 Pages1.1 Business Continuity Plan 1.1.1 Introduction EPCOR must be able to execute business recovery procedures in response to events that destroy or interrupt critical business functions / processes / services. This section governs the implementation of business continuity actions in the event of a disaster that results in the loss of the facility (and hence, any lesser disruption) or significant loss of personnel (e.g. Pandemic), and the corresponding interruption to normal business functions. ForRead MoreBusiness Continuity Plan For Motorsport Ltd1688 Words à |à 7 PagesBUSINESS CONTINUITY PLAN FOR MOTORSPORT LTD Version: 1 Produced by: Motorsport consulting team Date Produced: 11/12/2015 Approved by: Updated: Should be reviewed by the 10th June, 2016 The Business Continuity Management Team will review the Policy and Framework bi-annually; it will also be reviewed when significant changes occur within the Motorsport business operations. This document consists of â⬠¢ Policy Statement: outlining the approach of Motorsport to the Business Continuity Plan (BCP). â⬠¢Read MoreBusiness Continuity Plans And The Disaster Recovery Plan1580 Words à |à 7 Pages Business Continuity Plans (BCP) Paul D. Singleton Jr. March 11, 2015 ISSC481: IT Security: Planning and Policy Karen Paullet American Public University Business Continuity Plans (BCP) The Business Continuity Plan (BCP) and the Disaster Recovery Plan (DRP) are twin resources derived to preserve vital organization operations when facing an unsuspecting disaster. A disaster can be either natural or man-made. Natural disasters include floods, fires, earthquakes, and lightning strikesRead MoreThe Disaster Recovery Plan And A Business Continuity Plan928 Words à |à 4 Pagescontrasted business continuity plans with disaster recovery plans A disaster recovery plan and a business continuity plan, are very important to all business and their marketing plan. These plans provide detail strategies on how the business will continue to operate, before, doing and after a disaster. About 25% of business that do not have these plans and are hit by a disaster, fail to reopen. (Smith, n.d.). This is why a disaster and recovery and business continuity plan are important to a business ifRead MoreBusiness Continuity And Disaster Recovery Plan809 Words à |à 4 Pagesimplement business continuity and disaster recovery plan. Numerous individuals think that a disaster recovery plan is the same as a business continuity plan, however a DR plan concentrates on restoring IT framework and operations after an emergency. It s just one piece of a complete business continuity plan, whereas business continuity plan looks at the continuity of the whole organization. Table 1 Differences between key terms Risk management Emergency response Business continuity What couldRead MoreSample Business Continuity Plan Essay3103 Words à |à 13 Pagesï » ¿ MD Health Business Continuity Plan Table of Contents MD Health Business Continuity Plan The purpose of the Business Continuity Plan is to provide a series of defined procedures and protocols to protect MD-Health; to minimize or contain the extent of damage to University facilities and property; to allow communication systems to function in spite of suspension of normal operating conditions; and by and large, to enableRead MoreBusiness Continuity Plan For The Small Home Based Business1968 Words à |à 8 PagesEvery business, from well-established organizations such as Microsoft to the small home based business that operates out of a basement is bound to experience operational setbacks from time to time. These setbacks can be both positive and negative interruptions of normal business flow. For example, an organization might experience a demand for a product at a rate not originally anticipated, generating more revenue than expected, but leaving the organization struggling to avoid back order. OrganizationsRead MoreA Business Continuity Plan For Sunshine Machine Works 1495 Words à |à 6 PagesTranscript ââ¬â Sunshine Machine Works In this day and age, a business continuity plan is essential to an organizations risk management. A large organization like Sunshine Machine Works understand that time is critical when it comes to natural disasters or man made interruptions to their network systems. When a system is offline for excessive amounts of time, could mean a loss to the organization. Thatââ¬â¢s why having an effective business continuity plan is vital to keeping operations for being disturbed during
Monday, December 23, 2019
Employment Legislation, Fall 16.2 Essay - 883 Words
Employment Legislation, Fall 16.2 Name: Courtney Nemec 1. Do an Internet search to find a definition for equal opportunity (include your source). Please do not use only google.com as a source, look for another source. ââ¬Å"the aggregation of policies and practices in employment and other areas that do not discriminate against persons on the basis of race, color, age, sex, national origin, religion, or mental or physical disability.â⬠Dictionary.com http://www.dictionary.com/browse/equal-opportunity For the next few questions, go to the Wisconsin Department of Workforce Development and check out fair employment law at:| http://dwd.wisconsin.gov/er/discrimination_civil_rights/fair_employment_law.htm 2. On the Fair Employment Law page, what is the time limit for filing a discrimination complaint in Wisconsin? (bottom of page) There is a 300-day time limit for filing a discrimination complaint. 3. Find and select the link in blue that says, ââ¬Å"Arrest Recordâ⬠. a) In your own words, what is the difference between an arrest record and a conviction record (one sentence)? An arrest record is the information that a person has been taken into custody and held for investigation, while a conviction record is the information that a person has been convicted of some kind of crime (i.e. misdemeanor, felony, or other offenses). b) Can an employer refuse to hire or discharge a person with a pending charge or conviction because other workers or customers donââ¬â¢t want theShow MoreRelatedWomen Employment in India7222 Words à |à 29 PagesDISCRIMINATION (Women employment in China and India) Sunida Singh Expo36@gmail.com 082 WE FORGET TO TAKE A PHOTO TOGETHER ^ ^ TABLE OF CONTENT Introduction3 Gender discrimination4 Global Women Employment6 Women Employment in Chinaâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦11 Women Employment in India14 * Labor force trends amp; legislationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦15 * Managementâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..16 * Changing Work Placeâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦17 Successful case to promote women employment AVON China, the companyRead MoreAdmi 202 Study Guide Final5257 Words à |à 22 Pagesprefer. Equal employment opportunity regulations: regulations to protect people from unfair or inappropriate discrimination in the workplace. Canadian Human Rights Act: Ensures that any individual who wishes to obtain a job has an equal opportunity to apply for it. Bona fide occupational requirement: When an employer may choose one applicant over another based on overriding characteristic of the job. Employment Equity Act: Federal legislation that designates four groups as employment disadvantageRead MoreMonetary Policy of India During Recession6337 Words à |à 26 Pagestrade credit for banks and corporates. Both these factors led to pressure on credit and liquidity in the domestic markets with the knock on effects. And the third, the fall in global trade and output had impact on consumption and investment demand. The cumulative impact of all this was a slowing down of output and employment. Despite the slowing down, India is still the second fastest growing economy in the world. Moderation in growth After clocking an average of 9.4 per cent during threeRead MoreBusiness Plan For A Airasia Berhad5862 Words à |à 24 PagesDecember 2014 (BBC News, 2014). Then, identify the factors associated with increased passenger demand. 2. Business Profile 2.1 Introduction AirAsia Berhad had established in 2001, the headquarter is located at Petaling Jaya in Malaysia with an employment an eight thousands of people (AirAsia Berhad,2014). Subsequently, under the leadership of Tan Sri Fernandez, the company minus the 40 million ringgit high debt began AirAsia arduous journey as an entrepreneur, and created a miracle fabulous (AirAsiaRead MoreUK - Analysis Report31935 Words à |à 128 Pagessince 1980. The decline has continued in 2009 with falling consumption and investment demand. External demand has also remained weak because of a slowdown in the global economy. Furthermore, economic problems have adversely affected the country s employment rates. The crisis is expected to lead to a sluggish growth in 2010 because of the huge fiscal deficit coupled with new borrowing programs. Although the deficit fell from 3.4% of GDP in 2003 to 2.7% in 2007, it increased to 5.6% of GDP in 2008, owingRead MoreAnalysis of the Causes and Measures of Curbing Fraud in the Banking Sector25289 Words à |à 102 PagesGovernment-issued standard identification numbers such as social security numbers are also valuable to the fraudster. Information may be obtained from insiders (such as dishonest bank or government employees), by fraudulent offers for employment or investments (in which the victim is asked for a long list of personal information) or by sending forged bank or taxation correspondence In some cases, a name/SIN pair is needed to impersonate a citizen while working as an illegal immigrantRead MoreIssues and Trends in the Automotive Industry: Implications for Eastern Ontario14151 Words à |à 57 Pagesassembly facilities is at a provincial, rather than regional or municipal level. Ontario is a strong location that will compete for these facilities. The Canadian OE parts sector experienced significant growth in sales and in employment through the past 10 years. Employment has grown to in excess of 100,000 and shipments to over $30 billion annually. This growth has seen the emergence of an industry with high volumes and strengths in a number of specific sub sectors. The Canadian OE parts sectorRead MoreIndia After 20 Years8147 Words à |à 33 Pageseighties and nineties. These twelve countries were: China (8.2), Vietnam (4.6), South Korea (6.1), Chile (3.3), Mauritius (4.4), Malaysia (3.4), India (3.6), Thailand (4.6), Bhutan (4.3), Sri Lanka (3.1), Botswana (4.7) and Indonesia (3.5). (The number falls to 9 if we specify a minimum population of 3 million). Nine of these 12 countries are in Asia and, fortunately, they include the three most populous: China, India and Indonesia. (See Table 6). If we take the full 25 years (1981-2006), Indiaââ¬â¢s per capitaRead MoreAchievement of the Millennium Development Goals (Mdgs) for Education in Ethiopia14429 Words à |à 58 Pagescountries; (5) a 4 Percent average annual rate of expansion of agricultural production; and (6) a 9 Percent annual rate of expansion of manufacturing output. Other goals and objectives of the strategy included the attainment, by the year 2000, of full employment, of universal primary school enrollment, and of life expectancy of 60 years as a minimum, with infant mortality rates no higher than 50 per 1,000 live births. In 1990, the General Assembly concluded that its goals for the Third UN DevelopmentRead MorePrimary Sector of Economy17717 Words à |à 71 Pagescountries by agricultural output in 2011. Agricultural output in 2011 | Rank | Country | Output in billions of US$ | Composition of GDP (%) | % of Global Agricultural Output | ââ¬â | à World | 4,130.689 | 5.9% | 100.0% | 1 | à China | 670.893 | 9.6% | 16.2% | 2 | à India | 333.652 | 18.1% | 8.1% | ââ¬â | à European Union | 323.284 | 1.8% | 7.8% | 3 | à United States | 180.778 | 1.2% | 4.4% | 4 | à Brazil | 146.040 | 5.8% | 3.5% | 5 | à Indonesia | 124.316 | 14.9% | 3.0% | 6 | à Nigeria | 87.483 | 35.4%
Saturday, December 14, 2019
Orgo Free Essays
Benzophenoneââ¬â¢s nonpolar nature makes it insoluble with water (which is polar), soluble with methanol (which is of intermediate polarity) and soluble with hexane (which is nonpolar). This is because generally, like dissolves like nonpolar will dissolve nonpolar but not polar, and vice versa. But note that this is an imperfect science you would expect hexane to dissolve faster and more completely than methanol (because of the differing polarities), but the opposite occurred. We will write a custom essay sample on Orgo or any similar topic only for you Order Now This may be ecause of benzophenoneââ¬â¢s ketone group, which adds a slight polarity to the molecule, making it a little polar, although mostly nonpolar. Biphenyl, which is completely nonpolar, will have similar solubilities as benzophenone: insoluble with water (polar), partially soluble with methanol (intermediate polarity) and soluble with hexane (nonpolar). But with biphenyl (unlike with benzophenone) the solubilities are exactly as expected, because of biphenylââ¬â¢s complete nonpolarity. But that explains any differences in solubilities between the two molecules. Polarity also played a role in the alcohol reactions: water, which is polar, will be insoluble with I-octanol (which is nonpolar), insoluble with I-butanol (also nonpolar), and soluble with methanol (polar). But itââ¬â¢s a little more complicated: the carbon chain of each of these organic compounds will always be nonpolar and therefore hydrophobic, but as these are alcohols, the -OH group, which is polar and therefore hydrophilic, comes into play as well. So itââ¬â¢s kind of a battle between the hydrophobic carbon chain and the ydrophilic alcohol group, and when the chain is long, as in octanol, it will overpower the alcohol. Conversely, in small alcohols like methanol (or ethanol etc. ), where the carbon chain is much shorter, it will exert a smaller hydrophobic force and the overall molecule will therefore be hydrophilic. The hexane-alcohol reactions had the opposite solubilities, due to hexaneââ¬â¢s nonpolar nature (and the rule of like dissolves like): soluble with I-octanol (nonpolar), soluble with I-butanol (nonpolar), and insoluble with methanol (pola How to cite Orgo, Papers
Friday, December 6, 2019
Welfare State Develop in Canada-Free Samples-Myassignmenthelp.com
Questions: 1.How did the welfare state develop in Canada. 2.How was this different than in the United States? 3.How did democracy eventually deliver? Answers: 1.The welfare state of Canada was developed subject to the powerful influence that it had over the business. This influence maintained a very close relationship with the federal government and remained unfazed on the fact regarding whether the Conservative or the Liberal party was in power at a given point of time. The welfare state always rested on the tension that was present between the two systems of decision-making (Langille, 2016). These two decision-making systems included the capitalist marketplace and the democratic government. The political system of Canada may have been described as a system that allowed accommodation of the elite. The welfare state was described to be able to confront the challenges that were posed by the factors of communism and fascism. This would have been possible if the political and social conditions of the concerned area were favorable. There had been a sufficient democratic pressure during the time span ranging from the 1940s to the 1970s. This le d to the Canadian state gaining more autonomy from the capital that it had enjoyed in the past. 2.The Canadian welfare state is known to differ from the United States in a number of ways. The Canadian political system have been known to be a tool of the populist sentiment, in spite of the elaborate system of balances and checks that have been used to circumscribe the power of the state of America. The Canadian business, unlike the United States have never been subjected to the strict anti-combines system of legislation (Langille, 2016). The Canadian state seemingly lays less focus on the merits of the free competition. The Canadian State is also seen to provide less support to the system of the organized labor. The Canadian nationals enjoy an extensive welfare state, which has been supportive of or has beholden to the concerned business. This may be the result of the fact that the state depended on the support that was provided by a concentrated community of the corporate sector. This community had been closely linked to the London and New York capitals rather than the workers who were based in Canada. 3.In these conditions, the common working people have to be organized and mobilized to perform in a collective manner provided they wanted to possess political powers. This would in turn help the democracy to run in a smooth manner. There had been an upsurge in the activities of the democracy after the Great Depression and the World War II. The labor rights to collective bargaining were secured by the labor movement. Thus, they were able to enjoy the share of the increasing productivity. The open nature of the Canadian economy did not allow the concerned government to maintain a steady growth, rise in the incomes and full employment. The civil rights struggle had broken out in the mean time in the country, which had been followed by the movements of environment, anti-war movements and the struggles for the rights of the women. Reports claimed that huge number of demands were being placed on the government due to the excessive practice of democracy (Langille, 2016). Reference Langille, D. (2016). Follow the money: How business and politics define our health.D. Raphael (3rd ed.) Social determinants of health: Canadian perspective, 470-490.
Friday, November 29, 2019
Acknowledgement Essay Example
Acknowledgement Essay Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tagââ¬â¢s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequencyà electromagnetic fieldsà to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the schoolââ¬â¢s library is using the ââ¬Å"Library Systemâ⬠in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the systemââ¬â¢s database which can only store very limited information. We will write a custom essay sample on Acknowledgement specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the systemââ¬â¢s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the systemââ¬â¢s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), ââ¬Å"Integrated RFID and Sensor Networks: Architectures and Applicationsâ⬠, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled ââ¬Å"RFID Based Library Management Systemâ⬠which is very similar to the study being conducted by the proponents. In their studyââ¬â¢s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled ââ¬Å"Research Trends in RFID Technologyâ⬠wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, ââ¬Å"Student Recognition Using Radio Frequency Identification for Tarlac State Universityâ⬠, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the ââ¬Å"Design of RFID Interface System: A Prototypeâ⬠conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the studentââ¬â¢s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled ââ¬Å"Study on The Requirements and Options For RFID Application in Healthcareâ⬠proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, ââ¬Å"Storing and Reading Sensor Data from Battery Assisted Passive RFIDâ⬠, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled ââ¬Å"Automated Bus Fare Systemâ⬠is related to the system that the researchers is planning to create. In Balbacalââ¬â¢s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the userââ¬â¢s capability to pay. However, Aquino et. alââ¬â¢s (October 2009) ââ¬Å"Automation of the Movie Theater Charging Procedures Through the Use of RFIDâ⬠proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchersââ¬â¢ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villameââ¬â¢s (2010) research entitled ââ¬Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readersâ⬠, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the systemââ¬â¢s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITOâ⬠¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer ââ¬â an electronic device uses to manipulate data. B. USB Flash Drive ââ¬â is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk ââ¬â wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper ââ¬â use for writing down the documentation and other important information. E. Internet ââ¬â the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials ââ¬â used for additional reference. G. Printer ââ¬â used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the systemââ¬â¢s reliability and the userââ¬â¢s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: â⬠¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. â⬠¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. â⬠¢ The system was able to track whom librarian is accountable for the loss of a returned material. â⬠¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: â⬠¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed â⬠¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button â⬠¢ Module to Include visitors who donââ¬â¢t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement Essay Example Acknowledgement Essay Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tagââ¬â¢s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequencyà electromagnetic fieldsà to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the schoolââ¬â¢s library is using the ââ¬Å"Library Systemâ⬠in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the systemââ¬â¢s database which can only store very limited information. We will write a custom essay sample on Acknowledgement specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the systemââ¬â¢s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the systemââ¬â¢s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), ââ¬Å"Integrated RFID and Sensor Networks: Architectures and Applicationsâ⬠, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled ââ¬Å"RFID Based Library Management Systemâ⬠which is very similar to the study being conducted by the proponents. In their studyââ¬â¢s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled ââ¬Å"Research Trends in RFID Technologyâ⬠wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, ââ¬Å"Student Recognition Using Radio Frequency Identification for Tarlac State Universityâ⬠, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the ââ¬Å"Design of RFID Interface System: A Prototypeâ⬠conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the studentââ¬â¢s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled ââ¬Å"Study on The Requirements and Options For RFID Application in Healthcareâ⬠proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, ââ¬Å"Storing and Reading Sensor Data from Battery Assisted Passive RFIDâ⬠, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled ââ¬Å"Automated Bus Fare Systemâ⬠is related to the system that the researchers is planning to create. In Balbacalââ¬â¢s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the userââ¬â¢s capability to pay. However, Aquino et. alââ¬â¢s (October 2009) ââ¬Å"Automation of the Movie Theater Charging Procedures Through the Use of RFIDâ⬠proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchersââ¬â¢ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villameââ¬â¢s (2010) research entitled ââ¬Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readersâ⬠, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the systemââ¬â¢s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITOâ⬠¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer ââ¬â an electronic device uses to manipulate data. B. USB Flash Drive ââ¬â is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk ââ¬â wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper ââ¬â use for writing down the documentation and other important information. E. Internet ââ¬â the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials ââ¬â used for additional reference. G. Printer ââ¬â used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the systemââ¬â¢s reliability and the userââ¬â¢s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: â⬠¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. â⬠¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. â⬠¢ The system was able to track whom librarian is accountable for the loss of a returned material. â⬠¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: â⬠¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed â⬠¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button â⬠¢ Module to Include visitors who donââ¬â¢t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..
Monday, November 25, 2019
Fellowship Opportunities for Writers in Berlin
Fellowship Opportunities for Writers in Berlin Berlin has long been known for its thriving international arts and literary communities. It is equally known for the support that exists for writers and artists in the city. Centrally located within Europe, it is an easy train ride or flight to other major cultural destination cities, including Barcelona, Florence, Paris, and Prague, and serves as a font of inspiration for creative people from all artistic walks of life. Many are familiar with writers such as Christopher Isherwood, Franz Kafka, and Robert Walser, who found inspiration for their stories in Berlin, and musician David Bowie, who recorded three albums while living in the city. Since moving to Berlin in July 2013, I have immersed myself in the local literary community and have found the following resources for international writers seeking short-term residencies here. American Academy in Berlin americanacademy.de/ Located in the lakeside Hans Arnold Center in the Wansee neighborhood of Berlin, the American Academy offers annual Berlin Prize fellowships to scholars, writers, and artists who represent the highest standards of excellence in their fields. Past Fellows include poets Susan Howe, Tom Sleigh, and C.K. Williams, and novelists Kiran Desai, Jonathan Safran Foer, and Ha Jin. The upcoming class of Fellows for 2014-2015 includes writers Mary Jo Bang, Tom Drury, and Adam Ross. Fellows commit to spend one academic semester (fall or spring) at the Academy, and the prize includes a monthly stipend, partial board, and a residence at the Center in Wansee. The deadline for applications for 2015-2016 is September 29, 2014. Deutscher Akademischer Austausch Dienst/German Academic Exchange Service DAAD North America daad.org The Artists-in-Berlin Program (Berliner Kà ¼nstlerprogramm) of the German Academic Exchange Service (commonly referred to as DAAD) provides about 20 grants to international artists in the fields of visual arts, literature, music, and film, for an approximately one-year stay in Berlin. The grant includes a monthly stipend, an apartment, workspace (studio), and funds for projects. U.S. writers who spent a year in Berlin through the program include Eugene Ostashevsky, Robert Creeley, and Rosmarie and Keith Waldrop. The deadline for applications to the program is January 1, 2015. ZK/U-Zentrum fà ¼r Kunst und Urbanistik zku-berlin.org/ The ZK/U-Zentrum fà ¼r Kunst und Urbanistik (Center for Art and Urbanistics) provides residencies of two to eight months for artists, scholars, and practitioners (curators, activists, autodidacts, etc.) interested in cross-disciplinary theory and practice dealing with the city. Recent participants include poet Stephen Motika and novelist Alan Cunningham. For individual fellows selected for the program, depending on the studio-apartment and the length of the stay, costs can be between 500 and 800 Euros per month. ZK/U will work with selected fellows in support of efforts to obtain funding to cover the cost through external grants. The deadline for applications for the Autumn-Winter 2014-2015 residency is July 27, 2014. American poets who wish to spend time in Berlin, Germany (or other cities abroad), can also consider applying for the competitive Amy Lowell Traveling Scholarship (amylowell.org/), which awards one scholarship of approximately $54,000 to an American poet who agrees to spend the entire year abroad. The deadline for applications for the scholarship is October 15, 2014. Inspiration can be found everywhere. But sometimes, the opportunity to travel can bring you out of a rut and lead your writing in unexpected, and exciting, directions.
Thursday, November 21, 2019
SUMMARY of The Untold Story of Milk chapter 14 Essay
SUMMARY of The Untold Story of Milk chapter 14 - Essay Example The consequence of this realization was the invention of homogenization since it could fix the milkââ¬â¢s emulsion. As such scientists in the late 1890ââ¬â¢s invented the homogenization process as a means of emulsifying margarine. This process entailed the [passing of milk through hair-like tubules machine that helped in breaking the fat particles to much smaller granules hence the milk would remain in an emulsified state. another advantage of pasteurization was that it allowed milk to be transported for long distances. Hence both pasteurization and homogenization ensured that milk would stay emulsified and fresh for longer periods. However, these practices were not easily embraced by the consumers because these processes changed both the milkââ¬â¢s flavor and eliminated the famous cream line present in the traditional milk. Therefore, the industry players had a hard time convincing the consumers about the advantages of skimmed milk. In addition, to the rigidity in the adoption of skimmed milk there are other untold stories behind pasteurized and homogenized milk. Kurt Oster a native German scientist, who fled the Nazi war for America, was the first scientist to research on the connection of skimmed milk and cardiac diseases. His curiosity was however, triggered by the absence of plasmalogen in the arteries and the presence of xanthine Oxidase (XO), a hormone that should not be present in the blood arteries. His initial study was aimed at investigating plasmalogen which forms a substantial part of the surrounding muscles of the heart as well as the cells that form the arteries walls. The lack of plasmalogen in these tissues triggered an urge in Oster to do more research especially after associating it to atherosclerosis. In addition, Oster experienced two heart attacks and this created the rage to research more on cardiac ailments. However, as he researched he did not find
Wednesday, November 20, 2019
The term globalization used in relation to a host of social, economic, Essay
The term globalization used in relation to a host of social, economic, cultural and political processes - Essay Example To provide the reader with a broader meaning of globalization, I provide lists of selected definitions from recent authors and writers. These experts are from different disciplines and organizations as well as from both poor and rich countries. The organizations include the United Nations systems, universities, and leading media outlets. The disciplines include management and journalism. Still, the list must be seen only as a small sample and is not intended to be comprehensive. "It is the inexorable integration of markets, nation-states and technologies to a degree never witnessed before-in a way that is enabling individuals, corporations and nation-states to reach around the world farther, faster, deeper and cheaper than ever before, and in a way that is enabling the world to reach into individuals, corporations and nation-states farther, faster, deeper, cheaper than ever before." "Globalization is the growing interdependence of the world's people a process integrating not just the economy but culture, technology, and governance. People everywhere are becoming connected-affected by events in far corners of the world." "Present day globalization is a unique convergence of technological, economic and political forces of daunting power and influence, having a massive impact on all aspects of public and private life in economic, social, political and cultural affairs at global, national and local levels. As it influences states and their partner actors, it is also exploited and shaped both positively and negatively by those with the foresight and resources to appreciate its power. Yet, so diverse and overwhelming is globalization's manifold influences that no one group or sector can control or stop it. As such, it has been responded to and manipulated by a range of actors in the public, private and civil society actors, is instigated in good and bad motives, and has benefited some social and economic groups, but has hurt others who have become more vulnerable and disempowered due to its influence." -United Nations (2000:10) "Globalization has three dimensions: cultural-ideational, politico-institutional, and economic. There are three ordinarily ranked levels of economic integration: existence of global infrastructure, harmonization and convergence of economic policies and institutions, and/or borderlessness. To understand the policy implications of cross border economic integration, we need to focus on flow of goods and services as well as factors of production-land, labour, capital, entrepreneurship, and technology." -Aseem Prakash and Jeffery A. Hart (1998:611) "All institutions have to make global competitiveness a strategic goal. No institution, whether a business, a university, or hospital, can hope to survive, let alone to succeed, unless it measures up to the standards set by the leaders in its field, any place in the world. The world economy is increasingly becoming global. National boundaries are impediments and cost centers." -Peter F. Drucker (1999:61, 63)"We cannot live as isolated individuals. As market
Monday, November 18, 2019
The role of a project manager Essay Example | Topics and Well Written Essays - 2000 words
The role of a project manager - Essay Example roject manager is an individual who has the general responsibility for the successful planning, initiation, execution as well as closure of a project. A project manager is a person who is responsible for carrying out all the tasks and operations that are included in project management. Thus, the project success as well as failure centralizes on the project managerââ¬â¢s shoulders (Haughey, 2009). This paper presents a detailed analysis of roles and responsibilities that a project manager carries out. The purpose of this research is to analyze the impact of project managerââ¬â¢s performance on a project. This paper will also outline some examples of bad project management. Project management is a systematic way to scheduling and managing project activities and resources from beginning to end. Additionally, these project activities are divided into five phases, first phase is initiation, second is planning, third phase is executing, fourth is controlling, and last phase is completion or termination of the project. In addition, these phases of project management can be used in approximately any kind of project, since their purpose is to organize the different processes of project development (TechTarget, 2008).The fundamental reason for starting a project is to achieve particular objectives. In other words, the purpose for managing the processes as a project is to put attention on the jobs and control for the accomplishment of the objectives on small group or an individual. Additionally, a project is normally a temporary endeavor encompassing a lot of interconnected operations or processes, assigned a considerable cost, and continuing for few weeks or, months, or years. However, the management of a project is a complex and challenging task and the roles of project managers vary with the project requirements (Turban et al., 2005, p.309; Meredith & Mantel, 2006, p.13). The role of a project manager changes with the nature projects. Since, every project has unique nature,
Saturday, November 16, 2019
Definition Nature And The Humanities
Definition Nature And The Humanities Nature is the vague and elusive subject of millennia of thought. It is the tangible self evident life found in both backyards and expansive forests. Nature is a container for and of life, created but uncreatable. It is thought by some to be the creation of deliberate intention but which is unable to be created by human efforts. Of all the elusive traits attributable to this vague object of thought, an important concept may be found behind all of the endless contradictions Nature so fervently thrusts upon its observers: Nature itself may actually be a symbol for something greater which poets and authors have alluded to. The nature of Nature is living. Many descriptions can be attached but dead, lifeless, empty, exanimate are not among them. Often those words are readily employed to describe a place where Nature once was found but no longer resides. Reflecting the ever apparent principle of duality Nature exhibits its closeness to Divinity by being both the most accepting and the most rejecting of forces. Nature will accept any outcast and might very well be so rejecting as to kill anything that dares step into the expansive realm it dominates. Many inhabitants live in the home Nature creates but those creatures only reflect what Nature has given them: life. Yet the recipients are not Nature. Nothing in it can be taken and said to be Nature itself but without the creatures which inhabit it, Nature ceases to live. The closer an object tends to be to the source of life of all that is living, the more it is subject to symbolic attribution. It becomes an archetype. In addition Nature is nebulous, which compounds the capacity for symbolic usage. And the authors who grasp this concept are only able to describe it in a nebulous manner, as they see it. The preceding three cardinal examples lead up to the concluding example of why Nature is so conducive to symbolic attributions. There is a cornerstone reason, more important than all the others as to why Nature holds so much meaning to humans, without which nothing else would matter in our understanding. It is a truth everyone knows but few truly know. This apparent self contradiction so characteristic of Nature gives another hint at what it is. If a person looking for red on a rainbow has found yellow then orange, red is not far off. This leads to the conclusion Nature is an objectively real, living entity given life by its observers. Nature is living but apparently not conscious. Nature is objectively real but cannot maintain its separate existence without the life given to it by both its observers and inhabitants. Nature gives life to everything without which nothing would have life. These truths lead to understanding Nature is alive but might only have a collective unconscious for a mind. Depending on the readers beliefs this may be due to the Creator of life not giving a single physical holding place for consciousness to function. Or it may be because Nature has not evolved enough to have developed an unconscious, let alone a conscious mind. But there may be a more sublime possibility, one which helps explain its symbolic and powerful nature. Nature might be cognisant at the self conscious level of awareness but at a scale unobservable by humans, similar to how cells in a brain exhibit many characteristics of Nature but at a much smaller scale. This is a practical reason, as opposed to the more nebulous reasoning it might at first seem to be. Nature might be too big to be within the human realm of comprehension. And humans might be so small they are outside of Natures ability to grasp. Cells live and die, form into individual types and perform individual functions, attack and defend themselves from other cells, eat and breathe. If the cells veer too far into the expanse of the body they might die from conditions harsh compared to where it was formed. At this time so much space is allotted to the universe as to render numbers hardly meaningful in relation to it, allowing instead only the ruthless application of an equally incomprehensible symbol: the infinite. Beyond the realm of both human comprehension and mathematics, N atures awareness might be found in the infinite. With archaic properties as powerful as these it is no surprise Nature is a strong a hook for symbolism. Still, Nature might only be a symbol for something greater than itself, something that holds the true properties which Nature can only symbolize. Authors who write on the subject seem to allude to not only Nature itself but the power behind it. This seems to refer to a God or Creator. Or it may be a divinity from the complete composition of everything. Authors do not write in consensus of a single Creator but do seem to agree that there is something behind Nature. Not so much religious as spiritual, these writers lead the reader to the conclusion there is a force there. It is a force that Nature is both symbolic and reflective of. Similar attributions can be derived from both this Great Spirit and Nature: living, powerful, dangerous, accepting, and rejecting. Nature may also at the same time, independent of spiritual symbolism, be a symbol of the self. People may go into Nature to reconnect to themselves. We might go to Nature to recharge and get away from artificial lifestyles. To project characteristics of the self onto a hook in psychology is called projecting. This allows for us to hook our own characteristics onto something that is outside us. So Nature could be either a powerful subjective hook which is similar to us in many ways or it might actually posses those traits. Either could be true or both at the same time and still lead people to seek out themselves in Nature as they have always done. Nature dominates. It is a force to challenge the self, allowing for outside experiences representative of internal workings. It waits to dominate or be dominated. Ironically and again consistent in its self contradictory nature, the dominator is waiting for domination. Either created or evolved, Nature remains a battleground to test the self against. It is a force to give meaning to the ability of anyone who puts themselves in its way. To survive a tornado, earthquake or even a night in a tent after roasting marshmallows at a cozy campfire with friends is a symbolic victory of the self over Nature. Nature fulfills a part of the soul which needs to dominate. By accepting this challenge and leaving a much safer civilized city, even for a short period, can give renewed vitality and meaning to life, if you survive. The symbolism of Nature is too expansive to be reduced to a definition any paper is able to give but applied and reasonable thought leads to both some comprehension of Nature and of the divinity it may be a symbol of. People who go to Nature to find themselves will. And people who turn to Nature as a place to recharge their lives with meaning and power will succeed. As long as life exists so will Nature. Although Nature may be damaged by human pollution or other non human events, Nature will live as long as life itself exists. A symbol for life, God and each every individual, it remains a powerful subject for authors, poets and others who have always and will rightfully continue to attribute those symbolic characteristics to Nature.
Wednesday, November 13, 2019
Descartes Skeptical Argument And Reponses By Bouwsma And Malcolm Essay
Descartes' Skeptical Argument and Reponses by Bouwsma and Malcolm In this essay, I will examine Rene Descartes' skeptical argument and responses by O.K. Bouwsma and Norman Malcolm. I intend to prove that while both Bouwsma and Malcolm make points that refute specific parts of Descartes' argument in their criticisms, neither is sufficient in itself to refute the whole. In order to understand Descartes' argument and its sometimes radical ideas, one must have at least a general idea of his motives in undertaking the argument. The seventeenth century was a time of great scientific progress, and the blossoming scientific community was concerned with setting up a consistent standard to define what constituted science. Their science was based on conjunction and empirical affirmation, ideally without any preconceived notions to taint the results. Descartes, however, believed that the senses were unreliable and that science based solely on information gained from the senses was uncertain. He was concerned with finding a point of certainty on which to base scientific thought. Eventually he settled on mathematics as a basis for science, because he believed mathematics and geometry to be based on some inherent truths. He believed that it was through mathematics that we were able to make sense of our world, and that the ability to think mathematically was an innate ability of all human beings. This theory becomes important in Descartes' Meditations because he is forced to explain where the mathematical ideas that he believed we were born with came from. Having discussed Descartes' background, I will now explain the specifics of his argument. The basis of Descartes' entire argument is that the senses can not be trusted, and his objective is to reach a point of certainty, one undeniable truth that fixes our existence. He said it best in his own words, "I will . . . apply myself earnestly and openly to the general destruction of my former opinions."1 By opinions he meant all the facts and notions about the world which he had previously held as truths. Any point which had even the slightest hint of doubt was discarded and considered completely false. Descartes decided that he would consider all things until he found that either nothing is certain, which is itself a point of certainty, or he reached the one undeniable truth he was searching for. In order to accom... ...admirable case for the validity of the senses, but upon careful examination he says very much the same thing as Bouwsma. Namely, that the senses are real to us. Bouwsma came to this point by examining the idea of the evil genius and the idea of "illusions". Malcolm came to it through examining the differences between fact, belief and sensory information. Despite the differences in how they discovered it, they both came to the same conclusion. The point is valid and their reasoning is sound, but it does not prove that Descartes is wrong. The strength of the skeptical argument lies in the fact that it can not be completely disproved. No one can prove or disprove the existence of an evil genius, they can only go so far as to say that it does not matter. This is essentially what Bouwsma and Malcolm have done. They tried to prove that the existence of the evil genius would not make a difference in our lives. For this reason, I believe that although Bouwsma and Malcolm have made a valid point, they have only touched the surface of Descartes' argument. They have succeeded in proving that life is not meaningless, but that was not the purpose of Descartes' argument to begin with.
Monday, November 11, 2019
Student Success
Within the past nine weeks of this course I have learned and used many different strategies that will help improve the continual growth in my education and accomplish my academic goals. Some of the strategies and skills that I will apply in achieving academic success are Axiaââ¬â¢s educational resources, upholding academic honesty, setting and achieving my future goals, managing my time wisely, improving reading comprehension and retention skills, as well as applying my personality and learning styles. Since using Axiaââ¬â¢s educational resources I feel it has brought me one step closer to achieving my academic goals. Axia College has many useful technological tools that provide easy and functional methods of learning. One of the educational tools that I tend to use often is the Center for Writing Excellence. I like this tool because it provides many useful links such as the write point checker, plagiarism checker, as well as the Grammar Mechanics that provides grammar and punctuation rules, notes, and definitions that follow with the skills and drills quizzes. Another tool that is helpful in achieving academic success would be the University Library. Axiaââ¬â¢s University Library is a great tool that provides different search engines like EBSCOhost and Gale Power Search. These search engines provide article database searches, journals, books, theses, encyclopedias and many more. Axia Library is a great search engine that is more beneficial for student success with providing the option to search peer reviewed articles, find a specific publication, choose database by subject, and view all databases alphabetically. The University Library is a useful tool that I will take advantage of in furthering my education and achieving academic success. One major think I have learned in this class was upholding academic honesty is a major and serious policy that we as students must follow. Plagiarism is presenting someone elseââ¬â¢s work, ideas, and accomplishments as your own. I feel that plagiarism is wrong in every aspect whether or not you meant no harm; plagiarism is a serious violation of the student code of conduct and carries many penalties. By me learning and understanding what plagiarism is, this allowed me to create my own work without worrying about paying the consequencesââ¬â¢ for steeling someone elseââ¬â¢s words. Some examples of disciplinary actions you could encounter if caught for plagiarism can include a failing course grade, suspension, or even expelled from the University. Some strategies I have learned to avoid plagiarism would include submitting my assignment to the plagiarism checker at the CWE prior to posting my assignment to my instructor. I have also used the technique paraphrasing the information into my own words by using the dictionary and thesaurus provided by Microsoft Word. Another strategy I have learned was to make sure I am correctly citing my sources; because it indicates that I have respected the ideas of others. I have learned that it is very important to me as a student to uphold academic honesty throughout the rest of my education. Another strategy I have learned and will continue to take advantage of is setting and achieving my goals. I have the skill to set up and accomplish my future goals in life, as well as follow through with the end result in mind. One major long-term educational and career goal that I have set for myself would be to become head radiologist of a Medical Imaging Center. My short-tem goal I have set to reach my long-term goal would be to continue my current schooling with a high grade point average and finish my bachelors in science. Some obstacles I have encountered are juggling school, work, and family responsibilities. I have learned to prioritize my goals as well as arrange and handle things in order of importance. I have realized that Axia degree relates to my future goals with being able to juggle other responsibilities and have the convenience of online schooling without a dedicated time of day to still accomplish my future goals in life. Managing time wisely is another strategy I will use to accomplish my goals. It is very important to me to manage my time because I have so many daily activities on top of getting my school work done. I know that for me to succeed in life and accomplishing my goals I need to put aside extra time for class and studying. I also have to put time aside for working, and taking care of my other responsibilities. For me to manage my time wisely I will have to manage my goals progress as well as using school resources and technology that it provided for me. Another skill that I have learned and still are improving on would the reading and comprehension and retention skill. This is a very important skill to take advantage of for reading comprehension and mastering academic material. Some of these techniques include a few simple steps such as making sure to eliminate any possible distractions for example television, cell phones, etcetera. Also making sure you are in a quiet relaxed atmosphere. Analyzing your environment prior to reading to improve your comprehension is another useful technique on mastering academic material. Another useful tool that I have learned and will use in future courses to come to help improve mastering academic material would be the Survey, Question, Read, Recite, Review study technique as well as pulling vocabulary words from material. The SQ3R is very beneficial with the concept of grasping the material and content in academic readings. The last strategy I will apply to my continual growth in education and accomplishing academic goals would be applying my personality and learning styles. Since I began distance learning I have realized; that when I use certain learning strategies for my personality type and intelligence such as, bodily-kinesthetic intelligence or interpersonal intelligence it makes distance learning easier to manage. Since learning about my multiple intelligences and personality type; it has giving me many study techniques and strategies to apply to my future academic success. Since distance learning I have encountered people with many different intelligences and personality types allowing me to learn each otherââ¬â¢s learning strategies and techniques to build and improve on my weaker learning intelligences and personality types. By making all aspects of my intelligences stronger I will become an active and responsible thinker with the skill to accomplish my goals, the will and self-awareness to learn, as well as the ability to self-manage and monitor my progress. By following these strategies I will be off to a great start in pursuing my continual growth in education and accomplishing my future academic goals.
Subscribe to:
Comments (Atom)