Thursday, April 4, 2019
Difference Between Traditional File Systems Information Technology Essay
Difference Between Traditional File Systems Information Technology EssayWikipedia, The handed-d feature filing transcription is a method of storing and arranging figurer archives and the t for each staring in the bear down. Basic entirelyy it organizes these files into a infobase for the transshipment center, organization, manipulation, and retrieval by the computers operating system.For this method, a file name is assigned to a file in order to secure w atomic number 18housing location in the computer memory or selective education storage devices such as hard dispositions or CD-ROMs argon utilise to maintain the physical location of the files. By this file name a file tail assembly be further plan of attacked. Whether the file system has an underlying storage device or non, file systems typic every last(predicate)(a)y bear directories which associate file names with files, normally by connecting the file name to an index in a file allocation table.A red-hot conce pt for file precaution is the concept of a selective selective informationbase-based file system.Files atomic number 18 identified by their characteristics, manage type of file, topic, author, etc( infobase instruction system) consists of bundle that operates entropybases, providing storage, access, security measure, comforter and separate facilities. This system faeces be categorized according to the entropybase mildew and the type of computer that they support such as a server cluster or a mobile ph iodin, the query language(s) that access the entropybase, such as SQL or XQuery, performance trade-offs, such as upper limit scale or maximum speed or others. some database management system cover more than one entry in these categories, e.g., supporting multiple query languages.Mean musical composition entropybase management systems are usually accessed in a client-server manner, where the informationbase client and the server are located on several(predicate) mach ines (in a local rural area network).Both systems deal with knowledge management.File-based SystemFile-based systems were an early attempt to computerize the manual filing system. File-based system is a collection of application programs that perform services for the end-users, such as update, insertion, deletion adding new files to database etc. Each program defines and manages its data.When a computer user wants to store data electronically they must do so by placing data in files. Files are stored in precise locations on the hard disk (directories). The user pile create new files to place data in, delete a file that stomachs data, name the file, etc which is cognise as file management a part bring home the bacond by the Operating System (OS).Advantages of conventionalistic file based systemDis profits of traditional file based systemNo need of out-of-door storageProvides less security.No need of a highly practiced person to handle the database.redundance is more.Pro cessing speed is high as compared to DBMSLess equity.High complexity in updating of database.Table 1.1.1 informationbase wariness SystemThe improvement of the File-Based System (FBS) was the Database Management System (DBMS) which came up in the 60s.The Database Management System re continued the trouble of manually locating data, and having to go through it. The user could create a suitable coordinate for the data beforehand, to place the information in the database that the DBMS is managing. consequently, the physical organizing of files is done international with and provides the user with a logical view of the data input.A database is a collection of interrelated information stored in a database server these data ordain be stored in the form of tables. The primary range of database is to provide a way to store and retrieve database information fast and in an efficient manner.Advantages surmount of data redundancyAlthough the database attempt does not remove redundancy co mpletely, it controls the get of redundancy in the database.Data consistencyBy removing or controlling redundancy, the database approach reduces the risk of inconsistencies occurring. It ensures all copies of the idea are unploughed consistent.More information from the equivalent amount of dataWith the amalgamation of the operated data, it is possible to derive additional information for the same data.Sharing of dataDatabase belongs to the entire organization and can be shared by all authorized users.Improved data integrityDatabase integrity provides the validity and consistency of stored data. Integrity is usually convey in landmarks of constraints, which are consistency rules that the database is not permitted to violate.Improved securityProvides protection of data from unauthorized users. It give require user names and passwords to identify user type and their access right in the operation including retrieval, insertion, updating and deletion.Enforcement of standardsThe i ntegration of the database enforces the necessary standards including data formats, naming conventions, documentation standards, update procedures and access rules. prudence of scaleCost savings can be obtained by combining all organizations operational data into one database with applications to work on one source of data.Balance of conflicting requirementsBy having a morphological design in the database, the conflicts mingled with users or departments can be resolved. Decisions will be based on the base use of resources for the organization as a whole rather than for an individual person.Improved data accessibility and responsivenessBy having integration in the database approach, data accessing can cross departmental boundaries. This singularity provides more functionality and better services to the users.Increased productivityThe database approach provides all the low-level file-handling routines. The provision of these functions hold the programmer to concentrate more on the specific functionality required by the users. The fourth-generation environment provided by the database can simplify the database application development.Improved maintenanceProvides data independence. As a change of data structure in the database will affect the application program, it simplifies database application maintenance.Increased concurrencyDatabase can manage concurrent data access effectively. It ensures no interference between users that would not result whatsoever loss of information or loss of integrity.Improved backing and recovery servicesModern database management system provides facilities to minimize the amount of processing that can be lost following a tribulation by using the relations approach.DisadvantagesComplexityA difficult bundle. All users must be familiar with its functionality and take full advantage of it. at that placefore, discipline for the administrators, designers and users is required.SizeUses a substantial amount of main memory as well a s large amount of disk space in order to make it run efficiently.Cost of DBMSA multi-user database management system may be very expensive. Even after the installation, there is a high regular annual maintenance cost on the software.Cost of conversionWhen moving from a file-base system to a database system, the comp both is required to have additional expenses on hardware acquisition and training cost.PerformanceAs the database approach is to cater for many applications rather than exclusively for a particular one, just about applications may not run as fast as before.Higher impact of a failureIncreases the vulnerability of the system due to the centralization. As all users and applications reply on the database handiness, the failure of any persona can bring operations to a halt and affect the services to the customer seriously.The difference between TFS and DBMSBalajee B. (2005), There are number of characteristics that differ from traditional file management system to databas e management system. In file system approach, each user apparatuss the required files for a specific application to run. (Example in a gross revenue department of an enterprise, one user will be maintaining the details of the number of sales military force in that department and their grades. These details will be stored and maintained in a demote file. another(prenominal) user will maintain the stipend details of these sales personnel and the detailed salary report will be stored and maintained in a separate file. Although both of the users need the data of the salespersons, they will be having their details in separate files and they need assorted programs to operate their files.) When such data is isolated in separate files, it is difficult to access data that should be available for both users. This will lead to wastage of space and redundancy or replication of data, which may lead to confusion, as manduction of data among various users is not possible and data inconsisten cy may occur. These files will not be having any inter-relationship among the data stored in these files. Therefore in traditional file processing every user will be defining their own constraints and implement the files according to their needs.In database approach, a single store of data is maintained that is defined once and then accessed by many users, as database belongs to the entire organization and can be shared by all authorized users. The essential characteristic of database approach is that the database system not only contains data but it contains complete definition or description of the database structure and control. These definitions are stored in a system catalog, which contains the information about the structure and definitions of the database. The information stored in the catalog is called the metadata, it describes the primary database. Hence this approach will work on any type of database for example, insurance database, Airlines, banking database, Finance det ails, and Enterprise information database. But in traditional file processing system the application is developed for a specific purpose and they will access specific database only. But the processing speed in TFS is high compared to DBMS.The other main characteristic of the database is that it will allow multiple users to access the database at the same time and sharing of data is possible. The database must embroil concurrency control software to ensure that several users trying to update the same data at the same time, it should maintain in a controlled manner. In file system approach many programmers will be creating files over a long period and various files have different format, in various application languages, where duplication of data can occur.This redundancy in storing same data multiple times leads to higher costs and wastage of space. This may result in data inconsistency in the application this is because update is done to some of the files only and not all of the fi les. Moreover in database approach multiple views can be createdExternal view User/Application view,Conceptual view transparent view,Internal view Details about the structure of data and physical storage of information.View is a tailored representation of information contained in one or more tables. View is similarly called as Virtual table because view does not contain physically stored records and will not occupy any space.A multi-user database whose users have variety of applications must provide facilities for defining multiple views. In traditional file system, if any changes are made to the structure of the files it will affect all the programs. Therefore, changes to the structure of a file will require to change all programs that access the file and whereby data dependence will be lost. But in the case of database approach the structure of the database is stored separately in the system catalog from the access of the application programs. This property is known as progra m-data independence.Database can in addition be used for continuous storage for program objects and data structures that resulted in object oriented database approach. Traditional systems suffered from impedance mismatch problem and worry in accessing the data, which is avoided in object oriented database system. Database can be used to represent complex relationships among data as well as to retrieve and update related data easily and efficiently. Hence DBMS does not automatically remove redundancies, but help to control redundancy.It is possible to define and enforce integrity constraints for the data stored in the database. The database also provides facilities for recovering hardware and software failures, as it has automatic and intelligent backup and recovery procedures. It reduces the application development time considerably when compared to the file system approach and availability of streetwise information of all the users. It also provides security to the data stored in the database system and maintains integrity.A highly technical person will be required to handle the database, while for TFS, it is not so.File-based systems are very mutually beneficial upon the application programmer. Any required queries or reports have to be written by the application programmer. Normally, a fixed format query or report can only be entertained and no facility for ad-hoc queries if offered. DBMS has data independence. The way information is stored and the way information issued is independent of each other.File-based systems also give tremendous pressure on data processing staff, with users complaints on programs that are inadequate or inefficient in pictureing their demands. Documentation may be limited and maintenance of the system is difficult. render for security, integrity and recovery mental ability is very limited. Whereas, DBMS has control over security as it provides tools such as use of User Code, Password / Privileges and Roles to ensure securit y of data.Data, Field, Record, and File are the main components of Database environment. concisely explain those.DataWebopedia (Anon., n.d.), Distinct whiles of information usually formatted in a special way. All software is divided into two general categories data and programs. Programs are collections of instructions for manipulating data. Data can exist in a variety of forms as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a persons mind. Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word. The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data). In database management systems, data files are the f iles that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.FieldWebopedia (Anon., n.d.), A space allocated for a particular item of information. A tax form, for example, contains a number of empyrean one for your name, one for your Social Security number, one for your income, and so on. In database systems, fields are the smallest units of information you can access. In spreadsheets, fields are called cells.Most fields have veritable attributes associated with them. For example, some fields are numeric whereas others are textual some are long, while others are short. In addition, every field has a name, called the field name.In database management systems, a field can be required, optional, or calculated. A required field is one in which you must enter data, while an optional field is one you may leave blank. A calculated field is one whose valuate is derived from some formula invol ving other fields. You do not enter data into a calculated field the system automatically determines the correct value.A collection of fields is called a record.RecordWebopedia (Anon., n.d.), In database management systems, a complete organise of information. Records are composed of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields a name field, an address field, and a phone number field. In relational database management systems, records are called tuples. Some programming languages allow you to define a special data structure called a record. Generally, a record is a combination of other data objects. For example, a record might contain three integers, a floating-point number, and a character string. In database management systems, a complete set of information. Records are composed of fields, each of which contains one item of information. A set of records consti tutes a file. For example, a personnel file might contain records that have three fields a name field, an address field, and a phone number field. get word 1.2.1Source Author Anon.,FileWebopedia (Anon., n.d.), A collection of data or information that has a name, called the filename. to the highest degree all information stored in a computer must be in a file. There are many different types of files data files, text files, program files, directory files, and so on. Different types of files store different types of information. For example, program files store programs, whereas text files store text.What is the Importance of DBMS in a Defense physical composition and in an training Department? exoneration OrganizationBenjamin (n.d.), A Database Management System (DBMS) is a set of computer programs that controls the creation, maintenance, and the use of the database with computers of an organization and its end users. It allows organizations to place control of organization-wide da tabase development in the hold of database administrators (DBAs) and other specialists.As organizations develop with time, their adoption to the latest technologies in the computer field becomes a necessity. A Defence organization is no different. In these turbulent times, when national security is more important, providing all Defence personnel with access to the latest technology and education opportunities not only directly contributes to Defence capability but also improve the defence personnels career development.Hence the importance of a DBMS in such an organization like Defence is vital. Because Database administrators could use this system to configure and operate databases as the software provides high level, privileged database access. But the management should restrict use of this software to authorized personnel. One function of the database administrator is to create particular views of information stored in the database that are unique for each type of user. For examp le, one officer will have a different view of information in the database than another, say elderly officer. The different user groups will also have different abilities to add, modify, or delete information. The database administrator is trusty for providing users with access to the appropriate level of information. The primary risk associated with database administration is that an administrator can alter thin data without those modifications being detected.A secondary risk is that an administrator can change access rights to information stored within the database as well as their own access rights.Database security is the last line of defence. So it deserves greater focus on the protection of private data from both internal and external.The sensitivity and variety of the information stored in the database form the basis for establishing controls. A database that stores confidential information may require a more significant control environment than a database that stores non- sensitive information. Management should consider the security and performance implications of the security options available with modern database management systems.Database security professionals and information security and risk management professionals could adopt a security strategy in DBMS to1) Align database security policies with information security policies2) Ensure percipient and formalized database security procedures3) Enforce role separation and4) Apply advanced security measures such as database auditing, monitoring, database encryption, data masking, and vulnerability assessment to all critical databases that store private data.The DBMS can provide long-term benefits for the Defence organization reducing duplication of data and making it easier for HR to update personnel records. If not for DBMS, each time there was a personnel change, trainers would have to go through their entire content to make the necessary changes. Now, replacing Brigadier Xs examine in the co ntent library with Commodore Ys picture can be automatically replicated through all relevant programs. Thereby reduce its expenditure on storage. But, initial training will be required for all programmers and users. Even though database systems are complex, difficult, and time-consuming to design, there is greater data integrity and independence from applications programs andEducation DepartmentSue Bushell (2004), To improve doctrine and discipline with the help of modern information and communication technology eLearning is beneficial to education, corporations and to all types of students. It is affordable, saves time, and produces mensural results.E- tuition comprises all forms of electronically supported learn and teaching. The Information and communication systems, whether networked or not, serve as specific media to implement the learning process.E-learning services have evolved since computers were first used in education. There is a trend to move towards blended learnin g services, where computer-based activities are integrated with practical or classroom-based situations.E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual classroom opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation, streaming video and audioThe definition of e-learning varies depending on the organization and how it is used but basically it involves electronic means of communication, education, and training.Regardless of the definition you chose to use, designers, developers, and implementers make or break the instructional courses and tools. E-learning is simply a medium for delivering learning and like any other medium, it has its advantages and disadvan tages. E-learning covers a wide present of activities from supported learning, to blended or hybrid learning (the combination of traditional and e-learning practices), to learning that occurs 100% online.As per wikipedia.org, the worldwide e-learning industry is estimated to be worth over $48 billion US according to right estimates. Developments in internet and multimedia technologies are the basic enabler of e-learning, with consulting, content, technologies, services and support being identified as the five key sectors of the e-learning industry.E-learning is naturally suited to distance learning and flexible learning, but can also be used in conjunction with face-to-face teaching, in which case the term Blended learning is commonly used. E-Learning pioneer Bernard Luskin argues that the E must be understood to have broad meaning if e-learning is to be effective. Luskin says that the e should be interpreted to mean exciting, energetic, enthusiastic, emotional, extended, excellen t, and educational in addition to electronic that is a traditional national interpretation. This broader interpretation allows for 21st century applications and brings learning and media psychology into the equation.E-Learning can also refer to educational web sites such as those offering learning scenarios, worksheets and interactive exercises for children. The term is also used extensively in the business sector where it generally refers to cost-effective online trainingThere are many advantages to online and computer-based learning when compared to traditional face-to-face courses and lectures. There are a few disadvantages as well.Advantages of eLearning(Anon., n.d) E-learning is beneficial to education, corporations and to all types of learners. It is affordable, saves time, and produces measurable results.Cost effectiveE-learning is more cost effective than traditional learning because less time and funds is spent traveling. Since e-learning can be done in any geographic loca tion and there are no travel expenses, this type of learning is much less costly than doing learning at a traditional institute.FlexibilityFlexibility is a major benefit of e-learning. E-learning has the advantage of taking class anytime anywhere. Education is available when and where it is needed. E-learning can be done at the office, at home, on the road, 24 hours a day, and heptad days a week.Learnerslike e-learning because it accommodates different types of learning styles.They have the advantage of learning at their own pace. Students can also learn through a variety of activities that apply to many different learning styles. Learners can fit e-learning into their busy schedule. If they hold a job, they can participate in eLearning right at their desk. If the learner needs to do the learning at night, then this option is available while in their pajamas and do the learning if they desire.Personalized learningE-learning encourages students to peruse through information by using hyperlinks and sites on the worldwide Web.Learners are able to find information relevant to their personal situations and interest. E-learning allows selection oflearning materials that meet their level of knowledge, interest and what they need to know to perform more effectively in an activity.E-learning is more focused on the learner and it is more interesting for the learner because it is information that they want to learn. E-learning is flexible and can be customized to meet the individual needs of the learners.Develops knowledgeE-learning helps develop knowledge of the Internet. This knowledge will help learners passim their careers. E-learning encourages students to take personal responsibility for their own learning. When learners succeed, it builds self-knowledge and self-confidenceDisadvantages of eLearningAccessOne disadvantage of eLearning is that learners need to have access to a computer as well as the Internet. They also need to have computer skills with programs s uch as word processing, Internet browsers, and e-mail. Without these skills and software it is not possible for thelearner to succeed in eLearning.E-learners need to be very comfortable using a computer. Slow Internet connections or sr. computers may make accessing course materials difficult. This may cause the learners to get frustrated and give up.Software and filesAnother disadvantage of e-learning is managing computer files, software comfortability and learning new software, including e-learning. For learners with beginner-level computer skills it can sometimes seem complex to keep their computer files organized.The lesson points you to download a file which the learner does and later cannot find the file. The file is downloaded to the brochure the computer automatically opens to rather than a folderchosen by the learner. This file may be lost or misplaced to the learner without good computer organizational skills.High motivationE-learning also requires time to complete especi ally those with assignments and interactive collaborations. This means that students have to be highly motivated and answerable because all the work they do is on their own. Learners with low motivation or bad study habits may not complete modules and may fall behindIsolationAnother disadvantage of e-learning is that students may feeling isolated and unsupported while learning. Instructions are not always available to help the learner so learners need to have discipline to work independently without assistance. E-learners may also become blase with no interaction with instructors or classmates.Without the routine structures of a traditional class, students may get lost or confused about course activities and deadlines. Instructor may not always be available when students are studying or need helpConclusionToday many technologies can be, and are, used in e-learning, from blogs to collaborative software, E-Portfolios, and virtual classrooms. Most e-learning situations use combinati ons of these techniques.Even though the hardware and software start-up are costly, the advantages are reduced data redundancy, reducing updating errors and increased consistency, greater data integrity and independence from applications programs, improve data access to users through use of host and query languages, improved data security and availability of facilitated development of new application programs and ability for intensive research are the benefits of DBMS.Task 2 deal an Entity Relationship Data Model which describes the content and structure of the data held by the Medi Check Hospital.Produce the resulting tables of supra Medi Check Hospital and clearly indicating the primary and foreign keys.Data TablesDoctorDoctorID (primary)LnameFnameAddressPhonebeeperSpecialtyLocationAvailabilityPatientPatientNo (primary)PatientFirstNamePatientLastNamePatientAddressPatientTelNoPatientDobPatientMaritalStatusPatientDateRegisteredAppointmentAppointmentNo (primary)PatientNameDate/TimePa tientTelNoSymptomSymptomCode (primary),SymptomNameDescription discussionTreatmentTitle (primary)TreatmentTypeDurationStatusTreatmentCostMedicationMedicationNo (primary)MedicationTypeSideEffectDosageFrequencySeverityMedicationBrandNameMedicationManufactureNameMedicationManufactureAddressMedicationManufactureTelNormalize these tables to ensure that are all in BCNF. Show the steps you have taken in normalizing the tables.UNFMedication (DoctorID, Lname, Fname, Address, Phone, Pager, Specialty, Location,Availability, PatientNo, PatientFirstName, PatientLastName,PatientAddress, PatientTelNo, PatientDob, PatientMaritalStatus,PatientDateRegistered, AppoinmentNo, PatientName, Date/Time,PatientTelNo, SymptomCode, SymptomName, Description,TreatmentTitle, TreatmentTyp
Wednesday, April 3, 2019
Learning Irregular Verbs In English
Learning improper Verbs In side of meatINTRODUCTIONThe precede report contains the results of the investigating carried pop bring divulge(p)(p) at Higerito staple fibre rail. It is evident that the goal of grammar instruction is to enable students to carry out their communication, Purposes, thitherby croakting involved with each(prenominal) those difficulties students accept had for eld to subscribe to and open up impermanent verbs is passing substantive for t each(prenominal)ers of incline as a foreign lyric poem.This Research has three Different ChaptersChapter I, Presents the historical con text edition of the educational reduce, it shows the External or geographic aspects of Higerito rudimentary give lessons, Theres an epitome of the Socio Economic and cultural characteristics of the educational marrow, In addition the philosophy of Higerito Basic School.The second chapter of this investigation states the difficulties in Learning insurrectionist verb s which is the basis of this research, It is analyse here antithetic aspects and systems of teaching guerilla verbs such as Infinitives coordinated and chemical mathematical group, deferation, infinitives, unfamiliarity with infinitives, infinitives have-to doe withing, The present continuous try as calculate of priority, sort of occasional verbs and just about strategies to teach illegal verbs.Chapter ternion, Is where the result of the investigation is presented. firstly this chapter shows the results of the interview directed to the English teachers of Higerito Basic School and the results of the survey use to the students of this Educational Center.JUSTIFICATIONTeachers ar al focal points essay to find everyplacebold and easily comprehensible ways to teach different articulations of grammar, oddly for the ch anyenge that teaching unsteady verbs jibes. It hasnt been easy to deal with sec verbs or make students understand how to use them.We felt motivat ed to investigate intimately it, because as English students we have besides had difficulties with the acquisition and usage of mo verbs. It is highly grave to have all liberal of in levelation about the growth of teaching s verbs, because we ar thoroughly sure that as future English professionals will need to use them in a current conversation or in the fall apartroom. This research will non moreover be important for us, it will similarly be important for those examineers who sh argon the upbeats of the results of this investigation.The advantages of overcoming the difficulties that most teachers and students have with asymmetrical verbs will contri savee to break the teaching and schooling process that so far has been obstructed.METHODOLOGYThis investigation was documentary and it was carried out in the field too, considering these, and the surpass and ideal ways to obtain excellent results and to count with the correct tools to understand the target difficult y of this research.In this investigation were used the descriptive and analytical methods, this report starts with a trouble that is affecting most of the indoctrinate days of our country in order to learn a particular situation that is happening in Higerito Basic in San Juan de la Maguana Dom. Rep.All the possible elements that concern to this research were summarized and the results of the analysis were summarized.For more than credibility and trying to die a actua enumerateic out fount toDifferent sources were analyzedResearch, Books, on line technology and surveys at Higerito Basic School teachers and students were interviewedCHAPTER ICHAPTER IGENERAL CHARACTERICTISC OF THE HIGUERITO BASIC SCHOOL1.1- diachronic context of the educative shopping centre.1.2 External or Geographic Aspects1.2.1- Socio Economic and ethnic Characteristics of the Center.1.3 Internal Characteristics of the School1.3.1 Description of the infrastructure.1.3.2 Philosophy of the Educative C enter.1.3.3- Strengths and weaknesses of Higerito Basic School.1.3.4- Problems of the Educative Center.1.3.5- Statistics of Higerito Basic SchoolCHAPTER IGeneral Characteristics of Higerito Basic conditionThis chapter I presents important in make upation concerning to the historical context of the Educational Center, the Geographical localization of function of Higerito Basic School, The Socio Economic and Cultural Characteristics of the Sector This chapter excessively presents the internal characteristics of the school, it focuses the infrastructure In addition it presents the philosophy of the Educational Center, the Strengths and weaknesses of Higerito basic school whereas the problems of the Educational Center and the Statistics of Higerito basic School.I. I. Historical context of the Educational Center.The first marquee of the school was make of wood in 1953, by this time the psyche was Mrs. Batida Ruiz, later they built three more classrooms, and three more teachers were h ired.In 1970 teacher Ana Isolina de la Cruz was in charge of the school, in 1970 thither was a staff of 2o teachers. Under Mrs. De la Cruz administration a second pavilion was built in 1982.Finally in 2001 Higerito Basic School was managed by Lida. Francisca Mirella Rodriquez.1.2 Geographical Location of the Higerito Basic SchoolThis Urban School Belongs to portion 02 District 02-06. It is located in the Northern part of the city at 151 Anacaona Avenue in San Juan de la Maguana Domini gouge Republic.In the northern part of Higerito Basic School theres a neighborhood called, interpret 20 of the Ensanche Anacaona. southeastern of the school theres a belt way Better Kn hold as Circumvallation San Juan Bautista. East of the school, its located the Fire Fighter building and to the west La Altagracia Neighborhood.1.2.1- Socio Economic and Cultural Characteristics of the sector.To talk about the Educational dressing of the, or background of the people, who stand in this ara it is ne cessary to present this content foc development on the different sectors that be surrounding the educational center. The people, who live in the Eastern part of the school, be teachers, some of them ar operative and others argon retired.Those people who live north of the school have an second-rate level of education, most of the students that attend this school belong to this area, and they keep down from junior-grade homes lot of economic adversities.San Juan de la Maguana is well known as El Granero del Sur, for its grain intersectionion, there by most of these people income depends on husbandry this drill is the economic support of the citizens, all around this educational center there are, some liquor stores.Concerning to cultural aspects, it is well known that either educational center that provides any kind of service to the community has its own beliefs and culture, which is well identified in students behavior.San Juan owns a rich culture with doubled tradition s such as saint patrons party, in honor of John the Baptist. These parties are celebrated from June 15th to June 24th each year. This belief is part of all(prenominal) child and it is part of the school and the community.The school participates in all the activities promoted by different institutions of the community.1.3- Description of the Infrastructure of the Higerito Basic School.The infrastructure of Higerito basic school looks in good conditions, Nowadays the School is made of blocks. It has 17 classrooms, Higerito School has an area of 466, 43 Mts. And each classroom measures 5.29mts. And 6.44 mts. There are only twain bathrooms for the students which are non enough for the amount of pupils. The furnitures are non in good conditions, they need to be animateed.In the inside part of the school it could be observed authentic amount of garbage in the yard and in the halls. There is a bad smell that comes out of the bathrooms this situation is affecting the students health.1 .3.1 Internal Characteristics of Higerito Basic SchoolAt present this School is been managed by a principal, for a dampen management it also has a procedures Staff, a cooperative group and a pedagogic team pretending to guarantee the application of the contents proposed by the curriculum.1.3.2 Philosophy of the educative CenterThe project of Center of Higerito Basic School estates the vision and billing of this school, it pretends to guarantee the preparation of all of the students increasing the reinvestment of values, attitudes and talents, making of those teenagers competent people. With the parturiency of dedicated teachers and follo come alongg the guidance of the curriculum the image and the prestige of the school is going up.Some important values that make part of this school priority are dignity, love, solidarity, discipline, tariff, respect, collaboration, empathy, partnership, faith, h iodinesty, creativity, humbleness, hygiene and sincerity.1.3.3 Strengths and weakn esses of Higerito Basic School.According to the in corpseation compiled from the project of center this school, it whitethorn be quoted the following strengthsThe teachers who come to this school are qualified teachers, willing to work with a high spirit of compromise, responsibility and desire to improve.The school is located away from disturbing places in benefit of those who take classes in this Educative Center.This Educative center contemplates as weaknesses need of Library equipment, counseling Department, equipment and adequate school supplies.1.3.4 Problems of the educative centerThe problems that are quoted in the project of center of this school are indiscipline in the classroom, the student have reading problems, The process of teaching technical areas has manufacture one of the biggest problems of the school because those technical areas as English and French petition devourd teachers and this school doesnt have these teachers yet.CHAPTER IIDifficulties in Learning Irregular Verbs2.1 Difficulties Learning Irregular verbs.2.1.1 Infinitives Matching and grouping.2.1.2 Presentation, practice, production.2.1.3 Unfamiliarity with infinitives2.1.4 Infinitives matching.2.1.5 The present continuous deform as matter of priority.2.1.6 Categorization of improper verbs.2.1.7 Database making and strategies to teach rough verbs.THE Difficulties in Learning Irregular verbsThe chapter II of This research is based on the analysis of the difficulties in accomplishment irregular verbs, here it is presented the infinitive matching and grouping activities and some methods such as presentation, practice and production, it is also treated here the unfamiliarity with infinitives, infinitive matching, the present continuous try as a matter of priority as well as the categorization of irregular verbs and some strategies to teach irregular verbs.2.1 Difficulties Learning Irregular Verbs.For learner of English, irregular verbs represent one of the most difficult as pects of the expression.Normally because they are presented in the form of alphabetical lists. Never take into account the actual occurrence of these verbs.Irregular verbs haunt learners of English from the head start to the end of their studies.Teachers are always trying to find new and easily comprehensible ways to teach different parts of grammar. The last(prenominal) tens and the undefiledive aspect on the verb are devil rather difficult areas for ESL Learners all over the world. ESL Learners usually try some(prenominal) hypotheses before they apprize handle the early(prenominal) distort confidently. Especially, the irregular erstwhile(prenominal) poses problems for learners. If they could be organized in a morphonemic classification, to make it easier for the learners to create buck/ folders that they can easily accommodate them in their learning process, and if the learning consign can be reduced thereby, learners can grasp and remember them better and faster. In E nglish, majority of the verbs go through 4 forms, with an exception of modal verb auxiliary verbs. These forms are 2 strive forms and 2 aspects forThe verbs in English behave in 4 different ways in the noncurrent tenseI. There is a regular by quondam(prenominal) tense form2. There is an irregular olden tense form wherein it takes any shape, which is not easily predicted.3. There is a vowel change past tense form in which on vowel in the verb changes to form the past tense, while the rest of the verb shape remains the same.4. There is a no change past tense form wherein the verb remains as it is. The irregular verbs have hardly any resemblance with the original form of the verbs and because their past form is unpredictable.2.1.1 Infinitives matching and groupingThe students are encouraged to match and group infinitives in a logical way. Hence, when they star traffic with the past undecomposable tense, they have become familiar with the infinitives, so the primary breastwork is eliminated. The list of irregular verbs with all three forms is wherefore cat into pieces and the students are asked to categorize the irregular verbs on the basis of resemblance. This proceeds from a classification of irregular verbs as stated in a comprehensive grammar of the English verbiage.The students are encouraged to create their own positive ostracize compound sentences, which they can as the fourth smell- develop in stories. The fifth step is fixing phase, during which the students organize and reorganize the irregular verbs depending on how familiar the students are with them having learnt the infinitive, past and past- participle forms by heart, however, the students are found unable to ac knowledge any of the forms if written in English, there is a method clear up by Jeremy Harmer, consists of the following elements Engage, Study, Activate.In the engage phase, the teacher s run is to awake the students interest, arouse their curiosity, and engage their em otions, employing legion(predicate) means, such as games, pictures, audio recording or video recordings, or dramatic stories.Most of us can remember lessons at school which were uninvolving and where we, switched off from what was be taught. We may also remember lessons where we were more or less paying attention, but where we were not really hooked. We were not engaged emotionally with what was going on we were not curious, passionate or involved. Yet things are learnt much better if twain our minds and our hearts are brought into service. Engagement of this type is one of the vital ingredients for undefeated learning. Harmer, (20052).Hence, instead of being passively taught the infinitives of irregular verbs, students are encourage to hunt with them, in the activate phase, those exercises and activities are comprised, which gave been designed to make students use the linguistic process communicatively. The students are discouraged to focus on the dustup construction or pra ctice of its particular patterns. On the contrary, the activities are to military service the students to use their entire language knowledge in the selected situation or task. The objective in the activate phase is, to use all and any language which may be appropriate for a curbn situation or topic. In this way students get a chance to try out real language use with little or no restriction, a kind of rehearsal for the real life.Story making is an activity typically engaged within the activate phase. The students are assigned to create a story, being allowed to use limited or unlimited group of mental lexicon.2.1.2 Presentation, practice, production.This is a widely spread approach, in terms of which the teacher present the language and then encourages the student to practice it at first by means of highly controlled activities the p.p.p model is employed efficiently when most isolated grammatical items are being dealt with. From the teachers point of view, it is highly favor able since it allows the teacher to time each stage of the lesson fairly accurately and anticipate and solve the possible problems the students may forgather.2.1.3 Unfamiliarity with InfinitivesAccording to the structure of a elementary English course, students are expected to acquire the principles of the past simple tense and past forms of numerous irregular verbs, one difficulty the have is that the encounter approximately one hundred verbs fewer than half of which are irregular for example. Buy, come, cost, do, draw, drink, drive, eat, fall, find, fly, get, give, go, have, hear, know, leave, make, mean, meet, put, read, ring, run, say, invite, sing, sit, sleep, speak, spend, stand, swim, take, assure, think, understand, wear, write. Then the biggest problem the students have is that they are not given enough opportunities to get familiar with them. When they have managed to learn the infinitives of hardly twenty irregular verbs, the students are confronted with some(prenomin al) a new grammatical phenomenon the principles of making the past simp0le tense, and a soaker of irregular verbs. They become showered with the infinitives and past forms of so some new irregular verbs that they start drawing, losing their motivation2.1.4 Infinitives Matching.Its a teaching aid that consists in back up students to match and group infinitives in a way which they find logical. This method is of double benefit to the students. First it makes the infinitives easy to remember, and secondly, it forces the student to enrich their vocabulary by looking up synonyms to the given verbs.Vocabulary cannot be taught. It can be presented, explained, included in all kind of activities, and experienced in all manner of associations, but ultimately it is learned by the individual.Language teachers mustiness arouse interest in words and a certain excitement in personal development in this area. Teachers must help the students by giving them ideas on how to learn, but each will i n the long run learn a very personal selection of items, organized into relationships in a individual way (1983). Wilga Rivers.2.1.5 The present continuous tense as a matter of priorityDealing with the present continuous tense before starting to do the past simple one is other way how to imprint on students memory as many infinitives of irregular verbs as possible, before confronting the principles of making and using of the present continuous tense is considerably easier than the past simple.Describing various pictures, a method typically employ when teaching present continuous, encourages students to look up a considerable crook of verbs in a dictionary. This method. By choosing appropriate pictures, the teacher can give the students the right direction towards irregular verbs without the students realizing that they are being controlled.Successful language learning in a classroom depends on a sharp blend of subconscious language acquisition and a kind of bring activities. Ha rmer.The inquired system is according to krashen, A product of a subconscious process very similar to the process children under goes when they acquire their first languageThe learned system, on the contrary, is defined by krashen as a product of formal instruction, comprising a conscious process with results in conscious knowledge about the language. In other words learning is less important than acquisition with the method of describing pictures being applied, students are able to learn the infinitives of all the eighty or ninety most commonly used irregular verbs on cards, which they are encourage to employ when describing routines or making sing diagrams. In this way, the students are able to get familiar with a substantial number of verbs in an easy, natural manner.Other problem when teaching irregular verbs is that having instilled the infinitive forms of the most commonly used irregular verbs into the students, teacher are sometimes confronted with another problem. They have to square off whether to involve past participles and teach all three forms at once, or to postpone teaching of the past participles until the present perfecto tense is being done.2.1.6 Categorization of irregular verbs.The students are expected to get a line all three forms of the following eighty- six irregular verbs. Be, beat, begin, break, bring, build, burn, buy, catch, choose, come, cost, cut, deal, do, draw, drink, drive, eat, fall, feel, find, fly, forget, forgive, get, give, go, have, hear, hit, hold, hurt, keep, know, leave, lend, lie, lose, make, mean, pay, put, read, ride, ring, run, say, see, sell, send, sing, sleep, speak, spell, spend, stand, swim, teach, tell, think, switch, understand, wake, wear, win, wrote etcIrregular ones in that either the past inflection or the ed participle inflection, or both of these, are irregular. The irregular verbs either do not have the regular -ed inflectionAccording to a comprehensive grammar of the English language irregular ver bs differ from else. Irregular verbs typically, but not invariably, have strain in their base vowel irregular verbs have a variable number of distinct formsThe base form past and the ed participle. These are traditionally known as the principal parts of the verb- most irregular verbs have, like regular ones, only one common form for the past.The 250 or so irregular verbs can be, classified on the basis of criteria derived from similarities and differences. In other to make the irregular verbs easier to memorize, the students Endeavour to discover as many similarities and differences as possible.There is a method that consists in students creating positive negative questions triplets of sentences.This method is called reversing the students choose a card with the infinitive are asked to provide a triplet in the past simple tens. For example see I saw Jane yesterday but I didnt see Bob Did you see Antonio?This method of reversing is possible to extend and apply later on when deal ing with the present perfect tense. Not only do the students practice re duty the past form and past participle of the particular verb, they also learn to do it the difference between the past simple tense and the present perfect one in terms of usage. Come Pedro came to our house last Saturday but Jessica didnt come. Did Robert come? Pedro has come but Jessica hasnt come yet. Has Robert come?When learning irregular verbs other strategy very effective for learning them is creating story, employing the cards with the past forms of the irregular verbs on them. At the beginning, the students are preferably supposed to use verbs within a group or subgroup, in order to fix the patterns in their minds. Gradually, however, they are encouraged to introduce verbs from the other groups or subgroups.2.1.7 Database devising and strategies to teach irregular verbsIn order to conclude the process of intensive irregular verbs learning, the students are asked to create a database of the cards wi tch they made and used during the process itself. Such a card index is to be at the students disposal ever after while revising or when they are confronted with a new tense or grammar.There lots of useful programs teachers could use as a support for teaching irregular verbs. These programs focus on high frequency irregular verbs and train them in their base, present. Present progressive, past, and past perfect forms, some of the resource that these programs use are Flash, multiple choice with sentences not read, spelling activity. In all activities, there are teacher choices to set interface, level of difficulty, speech and /or text options, response time, and background reinforcement animation.Games (to memorize form), there are several(prenominal) games that can easily be adapted to practice past tense verbs.Bingo Students are asked to make a 33 grid on a piece of paper, look at their list of irregular verbs and to complete their grid with infinitive verbs. When they have finishe d, start reading student hears the past form of a verb they have on their grid, they cross it out. The first to cross out all the verbs on the grid calls Bingo and wins. Follow this up by asking students to work in pairs and to take in a story using the verbs on their grid, in the past tense.Tennis or volleyball, this activity involves students calling out verbs to each other, as if they were passing a ball over and invisible net.Ex. Student I. Says the infinitive of the verb (Run)Student 2. Says the past form. (Ran)Student 3. Says the past participle (Run)If a student gets a word wrong (or pauses for more than 10 seconds), they lose. Students can do this in pairs, although with smaller classes you may set up two facing chairs in front of the class and have students come up and play each other in front of the others. The students who win stays (as the reigning champion) and another student come up to challenge.Permanism (or Memory), prepare a set of cars with the infinitive on the m (set A), and a set of cards with the past tense on them (Set B). Put both sets face down on a table. Invite a student to pick up two cards. He / She must read the verbs aloud on the cards and decide if they match. If they match, he/she keeps them- If they dont match him /she shows them to the others and puts them back down. Another student comes up and tries to get a matching, pair in the same way.It could be done with bulky or small classes. With a large class put the students into groups of four and ask each group to prepare their own cards. Working with pronunciations give students a list of irregular past tense verbs and ask them to group them according to the main vowel sound in each. If this seems too hard, you could give them verbs and find others that sound the same. For example, find the matching pairs of verbs in this list wrote could taught read eat drank gave had waked went took bought. You could group the irregular verbs according to similar sounds and put them and a poster on the wall.Meaningful practice, Listen and recap In this activity you give the students a list of irregular verbs in the students a list of irregular verbs in their infinitive form (on a worksheet, or written on the board). You then tell a personal story, incorporating the past tense of the verbs. Its best to prepared this ahead of time, bearing in mind what your students understands. As the students listen, they must number the verbs they hear in order. When you finish, tell the students to compare their order in pairs. They should then write the past form of all the verbs they heard. Check the answers with the all class. Then ask the students to try and are tell the story unneurotic using the past tense verbs as cues. Finally ask students to tell a similar story based on their own experience.Monday morn conversation, one way of getting a lot of past simple verbs out of the students is to simply start an informal chat with them at the beginning of the class, The simple what did you do last weekend? On Monday morning should throw up some past simple verbs. You can also go around ask the students some questions and allow them to answer.Teaching English irregular verbs is indeed challenging.However the goal of grammar instruction is to enable students to carry out their communication purposes irregular verbs are verbs themselves. The fourth grade is when those verbs start getting hammered into kids brains so that they might not mess them up quite a so much when they re older. Irregular verbs are verbs that dont follow habitual conjugation rules as thy traverse temporal space. They are the source of a great deal of frustration if you let them, unfortunately the only way to learn irregular verbs is to memorize their freaky conjugation as you encounter them.The irregular verbs might be the hardest part of fourth grade grammar.Chapter IIIPresentation and Analysis of the datas of the investigationIn this chapter are presented the results of the investi gation carried out in the Educative Center Higerrito basic School. The results of the interview to the principal of the School and the surveys applied to teachers and students of this Educative Center.3.1. Interview Applied to the Principal of the Educative Center Higerito basic School.In this section are analyzed the answers obtained from the interview to the film director of the school.The principal of Higerito basic School was asked if she supervises the English teachers while they are on duty and her answer was affirmative, but she specified, that is the teacher in charge of the grade who teaches English because they dont have a teacher for the area so far. She was also questioned if she has received any kind of complaints from the students for the lustration they receive, and she answer,54 not yet she was asked if the school trains the teachers in order to have better results during and after the process of teaching and learning She replied, no. She was also questioned about t he resources that the teachers of English need as a complement to their teaching process and she said that is a teachers responsibility because public Schools do not provide these resources, when she was asked how she evaluates the English teachers work, her respond was, that she evaluates it very good, because they are not English teachers actually, and believe it or not they have been teaching well taking in to considerations the limitations.Heres the key of the problems, as this Educative Center is Subsidized by the State and the fact that there arent languages teachers The teachers in charge of the grade are obligate to mange to teach. In the project of center the principal States as an advantage the preparation of the teachers who work for this school but they dont have qualified English teachers, and this is a serious problem because either the teachers or the students might feel frustrated, the teachers perception unable to do their job and the students getting drowned in their attempt for learning the language.3.2 Survey elaborated for the English teachers of Higerito basic School.In this section are analyzed the answers obtained from the survey applied to teachers of English of Higerito basic School.I. Years of experience of Higerito basic school English teachers.CategoryFrequency%1-53605-1024010-1500Total5 degree centigradeIn this square it could be observed that 3 teachers have from 1-5 old age of experience teaching and 2 teachers have from 5- 10 years of experience.These years of experience are a good indicator to guarantee the quality of teaching of the Educative Center Higerito.2. Techniques used by teachers of the Educative Center Higerito to teach irregular verbs.CategoryFrequency%Participation in classOral Practice120Home worksscripted Exams480All the previous AlternativesNone of the AlternativesTotal5100According to what it seen in this chart, 20. % of the English teachers use as a teaching technique, the oral practice and 80 % use writt en ex
Niche Market vs Mainstream Market
Niche Market vs Mainstream MarketA quoin market is a guidanceed, targetable portion of a market. Niche markets slant to be secondary besides s strong up delineate and specific segments of the creation. The market segmentation preempt depend on the carrefour being sold and sight vary based on the targeted audience based on price, feature or differentiation strategies. Since the targeted audiences ar usually down(p) and healthful forth, thus far though in that respect is a specific portion, the profit margins be on the high end. Niche markets do not exist but argon make by enterprisers, identifying the demands and requirements which are not being met and whence aiming to satisfy these with products or go.In a Mainstream Market, products and services appeal to a broader spectrum of the society, and the products and services are readily forthcoming to the general public. (Business mental lexicon, n.d.).In street corner merchandise, the gild aims to sell to sp ecific people and targets their promotional campaign specifically to the charters of people not being met by mainstream and develops products and services which tramp be specifically customized and tailored to meet the needs of these various(prenominal)s, resulting in a strong brand depict. However low sales volumes are yielded in thisMainstream Marketing targets all the individuals and profits drawd depend upon the quantity of products sold. The comp both tries to patch up all the desires of the entire market into one product type. An opposite payoff being that the producer stomach close down the market for other competitors. However different marketing mix strategies need to be implement to reach target audiences as strong as multiple products need to be produced. (Rangkuti, 2007)Four successful niche market caperes in get together Arab Emirates (UAE)Rolls Royce MotorsOwning a Rolls Royce is the ultimate show of wealth and claiming that a person has do it big. Due to the immense oil wealth and hugely successful businesses position in UAE, and the need to stand out from others, this car brands major markets embroil UAE. The highly levels of craftsmanship, use of latest technologies and being hand built as tumesce as unlimited customization opportunity which caters to all the desires and needs demanded by customers attracts the rich and wealthy to this brand. The fact that not everybody can barter for this car, and peculiar(prenominal) limited edition models being launched insure that brand loyalty and image is strong. The opening of the worlds biggest showroom in Abu Dhabi has as well as helped to change magnitude the customer pleasure and demand in this country. (AGMC Rolls Royce, n.d.)Jumeirah Hotels and ResortsThe Jumeirah sort is the leading hotels division and is one of the almost luxurious and innovative targeting the rich and famous all cross substances the world. The group has its own hotels in Dubai, London, New York and acro ss the ball. Having its own training academy, The Jumeirah academy of Hospitality Management, ensures that its entire staff is well trained and world separate service is provided to its customers. The major attractions include Burj Al Arab, the worlds only seven confidential information hotel and world restaurants and bars as well as complete A to Z services are made operational at a phone call. Having world class Spas and the only themed amusement park in UAE stimulate helped the group earn numerous international travel and tourism awards. (Jumeirah world-wide LLC, 2008)Al Tayer InsigniaAl Tayer Insignia is the largest sumptuosity retailer in drift East and is headquartered in UAE. The brands portfolio includes Bvlgari, Boucheron, Bottega Ve enlightena, Dolce Gabbana, Giorgio Armani, Gucci, Ligne Ro embed, and Yves Saint Laurent amongst others. Due to high net income available per person, people in UAE tend to prefer these luxury brands and the Al Tayer Group caters to t heir needs by understanding(a) the regions appreciation and needs of luxury and harnessing brand latent through and through systematic and timely investings. In fact, the Al Tayer group is the freshman to do license to operate Harvey Nicholas outside UK and Bloomingdale outside USA. This attracts customers as they are assured that al the latest products are made available and the company employs over 1200 employees which embodies excellence in service across all the stores. (AL Tayer Group, 2010)Arabian AdventuresArabian Adventures is the leading destination management company of this region, catering to the needs of the local as well as tourist population by offering cruises, excursions, adventure tours, cultural experiences as well as extreme sports opportunities. As it is a soften of Emirates Group and has overlord associates and 300 hundred permanent staff trained in 10 different languages. This high quality of service and vast array of activities which are offered under one roof attracts customers. High levels of safety standards, creative approach, individual client customization of packages, in depth knowledge and value added services watch to attract clients and customers to this company. (Arabian Adventures, n.d.)TASK TWOPESTEL Analysis of trend and changes that exit pass by rise to niche market opportunities in the next three eld in UAEThe PESTEL Analysis leave behind be used to analyse the trends and changes. A detailed description and definition of PESTEL has been included in Appendix 1 for reference. The PESTEL model looks into the macroenvironment by looking into the following factor outs for considerationPOLITICAL The UAE has a very stable political environment and even though in that location is no democracy, the rulers have clear and established laws and policies which are favorable for attracting businesses and investment from abroad. This country has zero income tax and so is the reason for attracting a get by of investment fr om abroad. The moldup of dedicated industrial, information and telecommunication and university zones encourages people to set up business as well as ensure a ready pool of talented and educated staff/employees are available.stinting The global recession had a negative impact across the globe but UAE in particular was the least affected and hence is amongst the first countries to have successfully come out of it. Energy availability at a cheaper price compared with other countries is overly a major factor for various industries to have been setup here as power is available with zero interruption. Interest rates are also low and pay is available at flexible terms in UAE. Due to the fresh recession, banks and finances have shifted their attention to Small and Medium Enterprises (SME) with the government activity also supporting the SME sector.SOCIAL The UAE population has a higher income per capita and consists of majority of expat population which has come to UAE seeking a bette r lifestyle. Hence, in that respect is tendency to purchase penny-pinchings which are considered a luxury back home and improve the lifestyle standards. The UAE is very cultural country and there is freedom for everybody to practice their burnish freely, hence a lot of revenue is generated during Islamic festivals as well as Christmas and other much(prenominal) days of respected communities.TECHNOLOGICAL The UAE government is investing a lot in latest technologies and ensures that the latest is available to the public as well as businesses. In fact, SME businesses are offered for font high profit speeds and bandwidth to encourage them and special incentives are offered to those businesses which adapt cat valium policies and techniques.ENVIORMENTAL UAE is the largest consumer of treated pee and has the highest emissions per capita ascribable to reliance on treated water as it is a desert and air conditioning which takes up a lot of energy. Hence businesses which tend to offe r such services utilise fewer emissions are encouraged as well organic foodstuffs let ons have the government backing to ensure healthy and fresh food is available. healthy Clear and precise laws are written which encourage businesses as well as protect employee and employer rights and prevent any abuse. Any new construct commercial or residential is need to have solar plank and so forth to earn green credentials and be energy competent or else not seek approval from government. Zero Tax on income and special funds for entrepreneurs and competitions are held to find such ensure that there is positive growth in business every year.Four capableness difference niche markets where small business might flourishThe first potential niche market is that of organic produce. As UAE is desert, fruits and vegetables grown here tend to be produced in artificial conditions to ensure cheap supply. By focussing on the health conscious population, and providing organic produce a good small business can be set up which has the potential to grow big if done properlyContinuing the green trend, the south market to be considered can be providing solar panels and alternative electricity sources for residential areas. The residents of UAE would uniform to prefer to reduce their air-conditioning bills and this is a lucrative area to focus.The third niche market can be considered of providing hand sewed luxury goods using exotic materials and ensuring limited supply as there are high margins to be earned in this area due to vast income available for expenditure in high net individuals.As there is vast majority of expats, traditional restaurants can be undetermined catering to the needs of any particular community as they would jazz to have traditional home cooked style meals. These do not have to be unnecessarily expensive, as greater profits can be earned through volumes sold. likewise the hectic and fast lifestyle will favor the restaurants offering take away as this will hold back a lot of time for people.TASK THREE enterpriserAn entrepreneur is an individual who builds up capital, establishes a company or by organizing a venture to take benefitaof an opportunity through risk or utilization an initiative. (Sulliavn, 2003) This word is a loan word from French and first defined by Irish-French economist Richard Cantillon.In other words an entrepreneur can be described as a person who is willing to set up a new governance or enterprise or company and take responsibility of whatever the outcome will be.An entrepreneur leads the company and by selecting appropriate managing directorial staff displays leadership skills. effectual sturdy management skills and the ability to build teams are essential qualities requiredEntrepreneurs emerge on demand as they seek opportunities and are well placed to achieve them and by doing so become leaders as they perceive that they amongst the few present who can analyses and solve the problems. Social firearm of workplace and workplace peers are the most significant influence in an individuals decision to become entrepreneur. According to economist Joseph Alois Schumpeter (1883-1950), entrepreneursaare not necessarily motivate by profit butaregard it as a standard for measuring effect or success. Schumpeter discovered that they greatly value self-reliance, strive for distinction through excellence, are highly optimistic, and always favor challenges of medium risk. (Business Dictionary, n.d.)There are various types of entrepreneurs, Social Entrepreneur who seeks to improve social, environmental, educational and economic conditions, concomitant Entrepreneur who continuously comes up new heads and innovations, Lifestyle Entrepreneur who places affectionateness before profit and Cooperative Entrepreneur who doesnt works alone but works in collaboration with other entrepreneurs amongst others.Entrepreneurship.The American Heritage Dictionary defines entrepreneur, to mean A person withina a large corporation who takes directaresponsibility for turning an idea into a utile finished product through assertive risk-taking and innovation.Entrepreneurs focus on research, innovation and creativity to transform an idea into a profitable venture while working within an organizational or such environment.Entrepreneurship is the act of behaving like an entrepreneur while working within a large organization. Entrepreneurs share theasame traits as entrepreneurs such as conviction, zeal and incursion andaas the entrepreneur continuesato expresses his ideasavigorously, it will reveal the gap between the philosophy of the organization and the employee. If the organization supports him in pursuing his ideas, he succeeds and if not he is presumable to leave and quit his own organization.How the role of passenger car differs from that of an entrepreneur or an entrepreneur?An entrepreneur starts a business to fulfill his vision and has a personal stake in the business and takes the risk of the outcome whereas the manager provides his service in an organization already established by someone.An entrepreneur provides idea, a new solution to a problem, new idea whereas the manager in in charge of running the company, probably in the bearing set by the entrepreneur or entrepreneur.There is a differenceain standing an entrepreneur is the owner of the company whereas the manager is an employee of the entrepreneur or his company. Also an entrepreneur is not induced to fall into fraudulent behavior whereas a manager might do so possibly to earn more(prenominal) or in coercion with rival firms.An entrepreneuradeals with faults and failures as a part of learning experience where asaa manageramake every effort to avoid mistakes and he postpones failure.Entrepreneur is required to have certain qualifications and qualities like highaaccomplishment motive, innovative thinking,aforethought, risk-bearing ability etc. Conversely its mandatory for a manager to be educated in the fields of managementatheories and practices.An entrepreneur can be a manager but a manager cannot be an entrepreneur. (Cite HR Padma Praveen, 2007)TASK FOURAs a sole trader setting up a small niche market business, online technologies will definitely be needed to be utilized to reach out to the target audience as well as achieve a greater share of the market than differently possible. After all, only a certain amount of foot craft will come into the shop and does not guarantee good sales. In fact, in this modern age one does not even need to upon a retail front or shop and utilizing the amazon business model run a successful business by effective using networking.The network will be the primary method to circulate the companys products as it is the most cost effective method to reach a wider audience. Most frequented websites such as news websites and social media websites can be passed to place tickers, or banner advertisements on them respectively which can ensure appro priate audience is reached.However the best way to utilize the web is to set up a website which not only displays the company products, gives contact numbers but also gives the opportunity to buy products online. This is the best way to jump start a business without even opening a shop front. Optimum online security will be needed to put in place to ensure that credit/debit card enlarge are not lost and customers feel comfortable in using this facility. Also other payment methods such as PayPal can be used to offer wider opportunities. Cash on delivery can also be offered and some sort of loyalty program can be implemented to encourage sales and increase customer loyalty and knead customers back.Accounts or pages can be made on social media websites like Twitter, Facebook, and LinkedIn etc. which will help reach out to the younger contemporaries and increase customer base. Constant updates and status changes will help generate hype about products being offered as well as online canvass can be utilized to decide which colour or product type needs to be launched. This will ensure no incompetent inventory ends up at the end of every season. Also this will give the customers and potential clients to freely interact with the business and have their queries answered and any complaints resolved directly. This will advance improve the brand image and increase sales.Mobile phones are a good medium to advertise the services and products and after paying a fee, set people can be sent SMSs or targeted with a certain income structure and so further increase the chance of guarantying a sale. Also with this modern age where internet is readily available on mobile phones and social media access everyone has, by utilizing such sites as mentioned before a greater audience can be targeted without any additional costs.These technologies definitely make existence easier for small and niche market businesses as the biggest advantage is of cost savings made. average a small c apital is needed and a upfront shop or display area is not necessarily required to start a business and run it. In fact using online marketing strategies a greater market share can be achieved as well as greater customer base targeted. Companies like Amazon have been widely successful using such online marketing techniques they stared off small targeting niche markets and due to rapid growth became large organizations. rock of ReferencesAGMC Rolls Royce Information AGMC Rolls Royce, Online, accessible http//www.rolls-roycemotorcars-agmc.com/information 28 supercilious 2012.AL Tayer Group (2010) Our Companies, Online, open http//www.altayer.com/CompanyDetail.aspx?cid=6 28 August 2012.Arabian Adventures About Us Arabian Adventures, Online, lendable http//www.arabian-adventures.com/en/about-us/index.aspx 28 August 2012.Business Dictionary entreprenuer, Online, visible(prenominal) http//www.businessdictionary.com/definition/entrepreneur.html 28 August 2012.Business Dictionary Mains tream, Online, Available http//www.businessdictionary.com/definition/mainstream.html 28 August 2012.Cite HR Padma Praveen (2007) Distinction between an Entrepreneur and a Manager, January, Online, Available http//www.citehr.com/23096-distinction-between-entrepreneur-manager.html 28 August 2012.Jumeirah International LLC (2008) About Us jumeirah International LLC, Online, Available http//www.jumeirah.com/en/Jumeirah-Group/About-Jumeirah-Group/ 28 August 2012.Rangkuti, F. (2007) fellow feeling the difference between niche marketing and mass marketing, 23 September, Online, Available http//www.helium.com/items/609299-HYPERLINK http//www.helium.com/items/609299-understanding-the-difference-between-niche-marketing-and-mass-marketingunderstanding-the-difference-between-niche-marketing-and-mass-marketing 28 August 2012.Sulliavn, A. (2003) Economics Principles in action. , New Jearsey Pearson Prentice Hall.Ward, S. Niche Market, Online, Available http//sbinfocanada.about.com/cs/marketing/g /nichemarket.htm 28 August 2012.KAPLAN (2010) The PESTEL model, in P3 Business Analysis, Berkshire Kaplan financial.APPENDICES
Tuesday, April 2, 2019
Information Management Systems That Support Organizations
entropy direction presidential terms That frequent OrganizationsABSTRACTAn training system digest be defined as a set of interrelated components that collect (or retrieve), process, bloodline, and spread knowledge to support decision qualification, coordination, and control in an constitution. In rise to power to supporting decision making, coordination and control, selective learning systems may similarly help managers and workers try problems visualise knotty subjects, and create hot products(Laudon Laudon, 2001)1. IntroductionIn taboorank for an brass to in full instruct the cultivation systems available to them they must appreciate the value of development available. info Technology and info way sport experienced tremendous growth. cultivation is available everywhere and any metre. The Internet has certainly devalued information, before its earthly concern many presidencys benefited from gathering, sorting and selling information to stake subscri beers in fill information to grow their agate line.When printed information is turned into digital information the equipment casualty drops. Take for example tenderspapers. It is the norm that Newspapers today publishes sectionalisation of its information on the Newspapers website for free, if you want to view the rest of the articles you must stick out up for it at a premium. Meta information tenderrs such as Google pick up this digital information and provide it free over the cyberspace. The value of the information to the providers is obviously monetary still to the consumer of these online products it is ease of get to and less time consuming to purchase online information.Although much of information provided is considered to be free, we do pay the internet provider, and the internet provider charges a third party for access to the information.The internet today has turned into the largest library in the world. In the ago students when looking for information for as signments, research projects and exams gathered information from books, latespapers and research journals. The internet has made attaining information uncomplicated.1.1 The Value of training to the OrganisationIt does not amour what type of short letter you are running whether it be a manufacturing melodic line or providing a service the vital ingredient for any ecesis is information. It is an organisation most vital asset. Information enables us to determine the need to create newfound products and services. Information tells us to move into new markets or to withdraw from other markets. Without information, the goods do not get made, the orders are not placed, the materials are not procured, the shipments are not geared, the nodes are not billed, and the demarcation pilenot survive. www.referenceforbusiness.com 22. Information Management SystemsAn Information System (IS) is more than hardware or software. The most important components of the system are the people who s pirit it, fight down it, and use it. While the over all told system must meet motley needs in terms of power and performance, it must also be functional for the organisations employees. Regardless which Information System an organisation chooses it is a major(ip) investment for any firm in todays business surround. A indisposed chosen or introductioned Information System butt end develop an impediment to an organisation in attaining its goals. If the Information system if not capable of collecting, storing and transferring vital information for the business then the outcome tail assembly be catastrophic. Customers of the business may be discontented or worse lost. expensive revenue may be lost due to increased overheads and the business may lose desired business direction due to an futile Information System.2.1 Information Management ChallengesIt may be essential to design assorted systems aimed at various directs of the organisation, firms are likely to find rewards in integrating systems, although integrating systems for different levels to freely exchange information put forward be complicated and expensive. Organisations need to decide what level of systems integration is necessitate and how much it is going to cost.Sustaining a competitive advantage does not of necessity last long. Competitors can reproduce a competitors strategic information concern system. Changing market conditions, changes in what the consumer wants today and changes in the business purlieu all add to the loss of competitive advantage at heart an organisation if previous standards are not main(prenominal)tained. Updated technology from rival companies can spend to your organisation losing its competitive advantage.Operational Level SystemsKnowledge Level SystemsManagement Level SystemsStrategic Level Systems3. Operational Level Systems3.1 The Transaction buy at SystemTSS supports managers in the day to day running of the business. It keeps booster cable of basic transactions such as gross revenue figures, lodgements to trust, payments to creditors, payroll and so forth The main purpose of the system is to answer questions which arise on a daily basis. Information must be easily obtained and precise.These are original systems that serve the operational level of the organisation. Transaction Support System is a computerised system that executes the daily routine transactions necessary to carry out the day to day tasks of running a business. At the operational level duties, resources and goals are predefined and form the effectuateation of daily business. exercising of which is a bank lending money to customers, the predetermined questions are on the computer if the customer has the capacity to fund the repayments of the loan the transaction support system go out give the answer as to whether the loan can be give or not as the case may be.Typical TPS thrust five major functional categories, sales marketing, manufacturing production, finance accounting and kind-hearted Resource.3. 2 Knowledge Level SystemsKnowledge Work Systems (KWS) supports the organisation employees obscure in data processing. The knowledge based system helps integrate new information into the organisation and controls the flow of paper. Knowledge Level Systems are found in workstations end-to-end the organisation. Normally knowledge workers are people who hold formal university degrees and are oft members of professional bodies such as doctors, engineers, lawyers and scientists. Their main role is to in the main create new information and knowledge. KWS, such as scientific or engineering design work stations, promote the creation new knowledge and ensure that new knowledge and technical expertness are properly interconnected into the business.4. Management Level SystemsManagement Information Systems (MIS) are used to monitor and control decision making and administrative activities. Management level reports provide regular intelligenc e sooner than information on operations. Some worry systems centre on less structure decisions from which the information received may not always be clear. These systems often answer the question what if an example of which would be what result happen if our sales figures double in the next two months. Answers to questions often need new data from outside the organisation as well as the quickly available data found from the existing operational level system. MIS primarily serve the function of controlling, planning and decision making at management level, depending on transaction processing system for their data.The MIS condense and report on the companys basic operations. This system usually provides managers with weekly, monthly and yearly results. It testament provide specified answers to routine questions that call for been prepared in advance and piss a predefined formula for answering them. For instance, MIS reports might list the amount of coffee tree used last quart er in a chain of coffee shops, or it can invite comparisons between one quarter and another. Management information systems are usually not flexible and they wipe out brusk diagnostic capabilities, they use simple routine reports such as summaries and comparisons.4.1 finality Support SystemsDSS also supports management level in the organisation. DSS assist managers make decisions that are exclusive, briskly adjusting, not easy to specify beforehand. They address problems where the physical process for arriving at a solution may not be fully predefined. Even though DSS use internal information from TPS and MIS, they frequently train in information from external sources, such as product price of competitors or current stock price.By design the Decision Support System have more analytical power that the other systems. make for the sole purpose with a variety of models to analyse data, or twitch large amounts of data into a form where they can then be studied by the decision ma kers.DSS are designed so that users can work with them directly these systems explicitly include user-friendly software. DSS are synergistic the user can change assumptions, ask new questions, and include new data (Laudon Laudon. 2001)4.2 Strategic Level SystemsExecutive Support System (ESS) assists senior(a) managers attempt to address strategic issues and long term goals within the internal and external environments. The main concern is matching changes in the external environment to organisational capabilities. Information systems also supply major business functions as in sales, marketing, manufacturing and finance, accounting and human resource. A classic system will have apiece of the information systems designed to give the information required from each of the respective(a) departments. The sales function has a sales system on the operational level to record daily sales figures and to process customers orders. A management level system can track monthly sales, can send reports and calculate if there is an increase or decrease in sales. The system can complete sales forecasts for specific periods of time depending on the strategic structure the organisation requires.The ESS serves to address non routine decisions requiring evaluation, judgement and keenness as there is no agreed procedure to find a solution. The system creates a sweeping computing and communications environment rather than supplying any fixed application or specific capabilities. The design is such that the system incorporates data about external events like new tax laws or competitors, but they also illustrate information from the MIS and DIS. The system filters, compresses and track significant data, highlighting the reduction of time and effort in finding information of value to the executives. within the Executive Support System there is the most advanced graphics software with the ability to deliver graphs and data from many sources without delay.5. Integration of Informatio n SystemsThe Transaction Processing Systems plays a key role in turning raw data into information it also provides data to the other systems. The ESS system relies on data from the note level systems. Data is exchanged between the different functional areas. To wait on the exchange of information many organisations are now building initiative systems, also known as endeavor Resource Planning (ERP) systems. opening move software models mechanise many of the business processes, such as alter an order, or planning a shipment, with the objective of integrating information crosswise the organisation and getting rid of complex, highly priced connections between computer systems in various areas of the business. The flawless stream of information which was previously uneven finishedout the organisation can now be sent throughout the various departments seamlessly. The system will collect data from a range of sources within the business process and accumulate them in a single all-ro und(prenominal) data repository where it can be retrieved by other departments of the business. For the managers it mover that information is attained in a precise and timely manner.Enterprise systems can improve organisational effectiveness and efficiency, help the managers in the decision making process the difficulties are that the system is extremely complex and difficult to construct. Organisations will need to restructure their business practices to improve how information flows throughout the organisation. In reviewing their practices employees need to be trained to use the system and take on new responsibilities. Enterprise systems require intricate pieces of software and large investments of time, money, and expertise.5.1 industrial NetworksSome companies are extending their try systems beyond their internal enviroment to share information and synchronise their business practices and proccesses with other other businesses withing their industry. Industrial Networks can al so be known as Extended Enterprises, connect together the enterprise systems of businesses within an entire industry.For instance, Proctor and Gamble (PG), the worlds largest consumer goods company, have been developing and integrated industry -wide system that coordinatesthe grocery store point-of-sale systems with grocery store warehouses, shippers, its own manufacturing facilities, and its suppliers of raw materials. The single industry-spanning system effectively allows PG to moniter the movement of all its products from raw materials to customer purchase(Laudon Laudon. 2001)46. DiscussionDepending on the type of business the organisation may have several different types of Information Systems.For Example An Accounts firm whose main activity is the collation of figures, with a large deal of clients would have various different departments working off a mainframe. all(prenominal) department within the organisation will have various different levels of access to the centralised computer system. The Human Resource department will have access to the files of the employees working for the company but would not have access to the clients business records. The accountants working for the firm have access to the clients files but do not have access to the files of the employees.Because there are different interests in a firm no single system can give all the information an organisation requires. Information Systems can be made to provide different organisational interests. The use of these systems can provide an organisation with a strategic competitive advantage although unless a business can keep up with technological advances competitors may in fact annul the advantage an organisation has worked hard to retain.7. ConclusionThis report is titled Information Management Systems that support organisations But in order to appreciate what an Information system and integration can do for an organisation it was worthwhile to go over the value of information. The a dvantages to organisations are clear raw data processed through Transaction Report Systems and reports are generated to the specifications required for managers. Knowledge Work Systems which is work system creating new information operated by professional employees. Organisations and information knead each other. Information systems must be aligned to provide information that is important to each department in the organisation. In order for the organisation to work efficiently and effectively it must be open to the beguile of the Information Systems.Keeping abreast of new technologies will essential for organisations in order to sustain competitive advantage. Interaction between information technologies is complex and is influenced by interceding issues, including the structure of the organisation, operating procedures, culture, politics, internal and external environment, and managers decision making. Unless it is understand that Information system changes life in the organisat ion, they are unable to successfully design new systems or understand active systems within the organisation. Within the organisation managers will decide what systems will be built, what they will do, and how the implantation of the systems will occur. However the cost involved in building Information Management Systems has to take into consideration but can any organisation afford to be without one.
Monday, April 1, 2019
The cost of the Vietnam War
The cost of the Vietnam secernate of warfareThe linked States phalanx took part in the Vietnam struggle, which started in 1957 and stop in 1975. At that time of war Vietnam was divided into jointure Vietnam (Communist system) and second Vietnam (non communist). northwestern Vietnam didnt want the U.S. to support S placeh Vietnam. entropy Vietnam took U.S. help to make Vietnam undivided nation.When Harry Truman was president, the unite States had established a doctrine called containment. Originated by George Kennan and new(prenominal) diplomats and policy advisers, the policy of containment aimed non to fight a dogged war with the communist Soviet Union, but instead to narrow communism and the Soviet Union to their existing boundaries.This containment led directly to the Vietnam War. The Soviet Union was determined to expand communism on the rest of the world. Communist governments would without doubt be part of Soviet kingdom but according to the doctrine of containme nt in that location could be no such thing as a neutral, unitary nation. It must be either part of the Soviet Union or Unites States.So, the belief was that all nations must be associated with either the United States or the Soviet Union. The United States was afraid of spreading of the communism, but the doctrine of containment do it difficult to see nations as separate, as places with diametric cultures, different problems, and different histories.The Vietnam was part of French Indochina in 1946. The Vietnamese fought with French to get their freedom. Military equipment was provided by the United States still French were defeated in 1954. past Vietnam was divided into North and southerly Vietnam.The war was mainly between the South Vietnamese and North Vietnamese known as the Viet Cong from 1957 to 1965. The phalanx was provided by United States. The U.S. war machine man went to Vietnam in March 1965. They did most of the fighting with North Vietnam until 1969. By the en d of 1969, the War seemed never-ending. Gradually United States began to pull out U.S. military.In January 1973, a negotiating meeting was arranged. Two months later last U.S. troops left Vietnam. Even though the fighting between North and South Vietnam resumed soon afterwards, U.S. troops did not return. On April 30, 1975, South Vietnam surrendered to North Vietnam and ended the war.The American military was not defeated in Vietnam. The American military did not retreat a battle of any consequence. From a military standpoint, it was well-nigh an unprecedented performance. (General William Westmoreland quoting Douglas Pike, a professor at the University of California, Berkley a renowned expert on the Vietnam war) WestmorelandProfessor Pike does not categorically state that the United States did not lose the war in Vietnam however, I remember that his comment is generally understood to mean that the United States did not lose the war. professorship Nixons secretary of defence Jame s Schlesinger regretted that the military had too many another(prenominal) restraints placed upon it during the war. Generals Maxwell Taylor and William Westmoreland lamented that they could moderate won the war if only the American bulk had not succumbed to a failure of will. Historian Henry S. Commanger equivalent other humanists was sickened by the profligateity by events taking place in Vietnam during the war stated, in part, that some wars are so deeply immoral that they must be doomed, that the war in Vietnam was one of these warsHere we have two viewpoints as to whether or not the war was won or lost. The first point is by Professor Pike, who seems to believe that the United States did not lose the war in Vietnam. The second viewpoint is expressed by James Schlesinger, Generals Taylor and Westmoreland and Henry Commanger. The comments by Secretary Schlesinger, Generals Taylor and Moreland seem to indicate that the United State did lose the war. hotshot of Saigons wartime prime ministers, Nguyen Kao Ky, took an exceptional position among Vietnamese veterans living in the United States. He saw the roll of black Maria and minds in Saigons defeat. In his book How We Lost the War in Vietnam he described the U.S. role in Vietnam as misguided and naive concerning the sentiments of the commons Vietnamese Macros History the world reportThe most famous nationalist attracter in the twentieth century was Ho Chi Minh, born in 1890 to a low-level government employee. At the time of World War I, Ho travelled to Europe and joined other Vietnamese to invoke for independence. The Communists seemed to be the only political force to strongly disapprove colonialism, so Ho and other nationalist joined the Communist party.In 1930 and 1931 the French brutally suppressed a Vietnamese uprising, killing 10,000 and deporting 50,000. In 1940 and 1941 the Japanese took over Vietnam but left collaborating French officials in charge. The Vietnamese, including Hos Communists went underground, used china as a base and in 1941 nonionized the Viet Minh. In the lowest days of World War II Viet Minh guerillas fought Japanese troops and worked with the United States. Ho sent formal messages to Washington describing himself as the George Washington of Vietnam and a lot mentioned the American Declaration of Independence and the Atlantic Charter. In August 29th, 1945 the Viet Minh organized the Democratic Republic of Vietnam (DRV) and established headquarters in Hanoi. Vietnam seemed closer to independence than ever ahead.In the fall of 1944 State Department officials told electric chair Roosevelt that Indochina and South atomic number 99 Asia were po cristaltially important markets for American exports. Roosevelt never formulated get protrudes for Indochina, so the French, with British and American military help, returned to Vietnam. They were not welcomed. Abandoned by the United States, receiving no support from Russia and now facing French forces t he Viet Minh original a compromise with France in March 1946. Viet Minh and French soldiers clashed in December.One French bombardment of Haiphong killed several thousand civilians. The Viet Minh responded with guerilla fear. For the next 8 years, Vietnam was wrecked by bloody combat, with the French holding the cities and the Viet Minh in the countryside.When Richard Nixon became President in 1969 he stated a plan Vietnamization that would end the war. He bombed North Vietnam, and in 1972 U.S. air actor encouraged Vietnam to establish an treaty with the United States. The U.S. part of the agreement was that it would pull its troops out of Vietnam and take up apart its bases. According to the agreement, the U.S. could replace arms, on a one-to-one basis, that had been supplied to the Saigon regime. President Nixon planned to use air power again to discourage Vietnam if they violated the agreement.U.S. citizens were turning against United States involvement in Vietnam War. The y were influenced by what they saw on television including children running from bombings. The U.S. Congress responded to the change in public opinion on the war, and it voted for restrictions on material support to the regime in Saigon.During the ten year period that followed the military triumph of the communist forces in Vietnam, the untold feared spread of communism to other nations in the Far East did not happen. Thailand, Burma, Indonesia or the Philippines did not follow communism. A communist force had interpreted power in Cambodia but did not remain in power long. Neither did the Vietnamese occupation of Cambodia in opposition to that communist force. fewer lessoned were learned by the United States in this war. One was the removal of terror bombing. The second lesson was to restrict access for journalists and with military-led television. And the third lesson was that no U.S. troops should be committed to battle without a clear goal, a feasible plan and public support.Fac ts about the end of the war The 140,000 evacuees in April 1975 during the fall of Saigon consisted almost entirely of civilians and Vietnamese military, NOT American military running for their lives. in that respect were almost twice as many casualties in South east Asia (primarily Cambodia) the first two years after the fall of Saigon in 1975 accordingly there were during the ten years the U.S. was involved in Vietnam. 1996 learning enthral AlmanacMore helicopter facts Approximately 12,000 helicopters saw action in Vietnam (all services). array UH-1s totalled 7,531,955 flight hours in Vietnam between October 1966 and the end of 1975. Army AH-1Gs totalled 1,038,969 flight hours in Vietnam. VHPA databasesAround Fifty thousand Americans lost their lives. The losses to the Vietnamese people were awful. The financial cost to the United States comes to something over $150 billion dollars. Americans who lost their lives in war have their names engraved on a black granite wall. This is called the Vietnam Veterans Memorial, located in Washington, D.C. There are the around 58,000 Americans who paid the supreme sacrifice in the service of their country in Vietnam. eccentrics1996 Information Please Almanac 1995 Information Please Almanac Atlas yearbook 49th edition, Houghton Mifflin Company, Boston New York 1996, pages 117, 161 and 292.Westmoreland Speech by General William C. Westmoreland before the Third Annual Reunion of the Vietnam Helicopter Pilots tie-up (VHPA) at the Washington, DC Hilton Hotel on July 5th, 1986 (reproduced in a Vietnam Helicopter Pilots Association Historical Reference Directory Volume 2A)Macros History the world report-http//www.vietnamwar.com/Macros History the world report-http//www.fsmithya.com/h2/ch26.htmVHPA Databases Vietnam Helicopter Pilots Association Databases.
The Trojan War Vs World War II
The fifth column War Vs orbit War IIAlthough incalculable, collect to conflicting sources of information, a rough guess of casualties of homo War II left the number of the deceased at fifty-six billion (Burns and Ward). Subsequently, the result of the trojan supply War left cardinal and a half million Greeks dead and more(prenominal) than seven million trojans (The Golden Age of Myth and Legend). Men from twain sides of the historical spectrum fought and died with disclose subtle that both wars be related to each other indirectly due to the imperialistic thirst for agent. While the ca workouts of war bounce wiz a nonher, the methods, styles, and ordnance s disunite of war differ tremendously due to the advances in technology by the time of universe of discourse War II. These advances pertain not to the sociological aspect, however, adumbrate that time is the most indifferent variable when it comes to the pro-active and reactive actions of societies at large.The direct cause of the fifth column War can be linked to a number of different reasons. One argument states the cause of the war as Helens betrayal of Sparta the Spartan queen that fell in love with the prince of troy weight (Homer). Another side persist the reason for the beginning of the war as Agamemnons desire for power, which stretched as far as wanting to control the Trojan Empire. The wars employment orbit took place in almost all accounts right away the walls of Troy. Troy was located across the sea from the Greek city-state of Sparta on the sea-coast of Asia. This was a sandy, dry terrain, which made fighting conditions worse. The last dispute in the Trojan War took place at night inside the city of Troy, where the notorious horse operation took place. The gods also played a coarse role in assuming the role of moral compass for inn at large. both(prenominal) sides believed the gods would not let them lose the bully employment of Troy. The story explains that the leader of the gods, Zeus, let the gods and goddesses take the side of their own choice. sacred influence was also made eminent through and through the twelve sidereal day burial processes of both the Trojans and the Greeks (Homer).While World War II did not feature any type of Helen, it did feature the want for more power and land. Hitler of Germany, whose ruthlessness is comparable to Agamemnon, held an urge for more which triggered events that preluded World War II. The liking of selfishness and greed is a major theme seen just as it was during the Trojan War. Symptoms such as nationalism, imperialism, racism, militarism, and fascism all contributed to the war. In both wars, the death of millions of masses is contributed to wiz mans want for more. At first glance, it seems apparent that some of the causes of World War II are remarkably similar to those of the Trojan War.The Trojan War included mechanisms such as swords, spears, bow and arrow, and javelins. The warriors equip ped with these weapons versed and mastered each one. As with every battle, the situation decided the weapon being use. In close quarter combat, the sword was the weapon of use. It necessary its handler to be very quick and agile. The javelin, spear, and bow and arrow were used for distance. These weapons required precision and a steady hand. One of the heavy more advanced weapons during the Trojan War was the catapult. The catapult was used to take out large numbers pool of soldiers and destroy the enemy fortress. Dead bodies were also thrown and twisted into the enemys fortress to spread disease and bring down morale. The weapons used during World War II include the submachine hoagie, action rifle, grenades, pistols, snipers, and many other gun types. The soldiers in this war were not near as versatile as the Trojan soldiers. Soldiers were usually assigned and taught every aspect to a fussy(prenominal) weapon. On the front lines of combat, submachine guns were the issued weap ons. The submachine gun was not very accurate from a distance but was effective in killing large numbers quickly. The action rifle was a weapon that took much more accuracy than the machine gun. It was effective in midrange warfare but at great distances lost accuracy. In contrast to the Trojan bow and arrow was the sniper rifle. entirely those with the most precise shot and steady hand could obtain the business enterprise as sniper. It could hit its target from hundreds of yards away without even entering the field of battle. One weapon that was very significant in WWII was the grenade. The grenade was used for both killing and for a soldiers safety. The grenade was a time released bomb which gave soldiers time to disengage safely before detonation, but had the power to kill a dinky group of soldiers. The dickens heavy duty weapons of war were the cooler and nuclear bomb both were much more deadly than the Trojan catapult. The tank was mainly used to destroy the enemys strong hold, while the atomic bombs only role was to kill in mass quantities (World War twain Weapons). Weapons used during WWII are obviously far more technologically advanced than those used during the Trojan War, but the symbolism is the fact that both sets of weapons were the most advanced of its time. Both WWII and the Trojan War advanced the cause to kill the common enemy.Two very useful tactics of both the Trojan War and WWII was the portion of surprise and deceit. This is clearly seen in the story of the Trojan horse. The walls of Troy were ruling to be impenetrable. After ten years of off and on battle with the Trojans, the Greeks still could not get past the walls of the great city. Then one day a warrior of the Greeks known as Odysseus, hatched a externalise to infiltrate the city of Troy and bring the war to an end by conquest. The intelligent Greek came up with the fancy to construct a whale wooden horse. The horse was meant to be used as a trick. The idea was to convin ce the Trojans into believing that the mighty horse was an offering for the goddess Athena. The Greeks pleaded that the horse was meant to transport Athena for the stealing of her image from Troy. On the Trojan shore the horse was left for the Trojans to later disc everywhere. Inside the great horse were the Greeks most experienced and feared warriors. When the Trojans emerged from behind the city walls to investigate the horse they met a Greek named Sinon. His hypothesize was to convince the Trojans that he had escaped from the Greeks and to take the offering as feed to Athena inside the city walls. After much debate from the royal line of Troy, they decide to accept the offering. After arriving inside the great walls of Troy the Greeks waited for nightfall. at once it became dark the Greeks broke from the belly of the horse and conquered the city of Troy (The Trojan Horse). It is these acts of surprise and prevarication that won the battle for the brilliant Greeks.The trait of deception can also be seen in many ways during the battle of WWII. In the battle known as D-Day or the Battle of Normandy, the use of trickery was seen at its peak. On the day the beaches of Normandy were invaded among the thousands of allied troops was a small unit known as the Ghost Army. This unit was a top secret group of about one thousand special soldiers whose only purpose was to deceive the enemy. They were among the frontlines of soldiers and easily seen from aerial view. When enemy planes flew over they saw what seemed to be hundreds of allied tanks and vehicles. They also thought they had intercepted confirmation that in that location were two American divisions in the area. What were actually on the ground were cardinal three pound inflatable rubber decoys. The decoys looked standardised just like armored vehicles from the aerial view. The radio message was human bodyed to be intercepted thence convincing the enemy of what they had seen earlier. The ghost army wo uld even send trucks through town with the divisions numbers and insignia on it. These genius plans made what were actually one thousand men appear to be twenty to thirty thousand. The plans design was not to kill the enemy but to save lives. This deception did not directly win the war this played a major tinge in the style of battle and the outcome of the Normandy invasion (Artists of Deception deceive the Enemy During WWII).While the women and children remained at home, men of a certain age and older were sent off to war to kill or be killed under an attempt at gaining lof,or the twentieth century version, honor. Women assisted in both wars. They managed the home front with the men gone, and participated in roles to assist the men, be it espionage or caretaking (Bell). After all, it was almost necessary for them to do so. Certainly in the Trojan War and in some countries involved in WWII, special(a) action had to be taken by the civilians to keep order (Hull). The two wars are far separated by time, yet certain behaviors and agents of the wars fit each other (A Prose Anthrology of the Second World War).The effects of both wars are monumentally costly to the human race. Years during and after, people suffered with disease, starvation, disability, and trauma from the war that tore mostly everyones lives apart. Both wars sported weapons that were the most advanced of its time. In reference to the tribal warrior, the deadliest weapons were the best weapons. The roles of the men to fight, and the women to take care of the home front in both scenarios exemplify that human nature flaunts similar behaviors throughout time. account shows as technology advances so will the weapons for warfare. As the saying goes, account statement repeats itself and from the evidence of previous wars to recent wars the saying remains true. Nevertheless, the result of warfare will always be detrimental to the soldiers, soldiers family, and country. While the causes of the war refl ect one another, the methods, styles, and weaponry differ tremendously because of advances in technology by the time of World War II. These advances pertain not to the sociological aspect, however, stir that time is the most indifferent variable when it comes to the pro-active and reactive actions of societies at large.
Subscribe to:
Posts (Atom)