Monday, September 30, 2019

Advantages and Disadvantages Living in the City

The percentage of agreement by the students that the increment affect their lives is higher than that stated they were not affected. Based on the observations, this may be due to male students only use a motorcycle as their regular transportation. For this reason, it may because of they were more interested to use car instead of other type of vehicles. So, the level of oil consumption by the female students were higher than the male students.We can conclude that, the students’ daily live were very affected by the increment of the fuel prices. Figure 7 Here, students who lived nearly to the campus will have the opportunity to walk to the class and they also contribute in environment’s protection. From our observation, this kind of transportations were most preferred by the male students and motorcycle also require low cost and easy to maintain. From our observation, female students used more car to go to the campus than the male students.They found that car is more comfo rt, even it requires better maintenance and high cost. Students have indicated that bus services in UTM was not so good. This may not happen, if the bus management is upgraded. Bicycle is good for getting good health and environmental protection but it only not all the students are preferred to use bicycle because it may be due to the state of various UTM’s topography. So, it can be seen that the FKA’s students was mostly preferred to walk to go to the campus. Advantages and Disadvantages Living in the City The percentage of agreement by the students that the increment affect their lives is higher than that stated they were not affected. Based on the observations, this may be due to male students only use a motorcycle as their regular transportation. For this reason, it may because of they were more interested to use car instead of other type of vehicles. So, the level of oil consumption by the female students were higher than the male students. We can conclude that, the students’ daily live were very affected by the increment of the fuel prices.Here, students who lived nearly to the campus will have the opportunity to walk to the class and they also contribute in environment’s protection. From our observation, this kind of transportations were most preferred by the male students and motorcycle also require low cost and easy to maintain. From our observation, female students used more car to go to the campus than the male students. They found that car is more comfort, even it requires better maintenance and high cost.Students have indicated that bus services in UTM was not so good. This may not happen, if the bus management is upgraded. Bicycle is good for getting good health and environmental protection but it only not all the students are preferred to use bicycle because it may be due to the state of various UTM’s topography. So, it can be seen that the FKA’s students was mostly preferred to walk to go to the campus.

Sunday, September 29, 2019

Qa 380 Quiz 1

* T * PERFORMANCE measures that are established for a process are known as metrics. T * Once a process is identified, defined, evaluated, and redesigned, the benefits of the process analysis cycle are realized. F * A service blueprint is a flowchart of a service process that shows which of its steps has high customer contact. T * The general principle that 80% of a company’s revenue is generated by 20% of its customers is known as the pareto concept. * A fishbone diagram identifies which category is most frequently observed out of all the categories for which you have data. F . a voluntary system by which employees submit their ideas on process improvements is used in the: opportunity identification phase of process analysis 2. the step in process analysis that immediately follows the process documentation phase is the : evaluate performance phase 3. the resources that management assigns to improving or reengineering the process should: match the process’s scope 4. proc ess analysis focuses on: how work is actually done 5. an effective tool for showing steps of a service process with a high level of customer contact is: service blueprint 6. hich one of the following statements concerning flowcharts is NOT true. The dotted line of visibility separates activities subcontracted form those done in house 7. all of the following are steps in setting a time standard using the time study method EXCEPT: Consulting cost accounting data 8. the manager of a supermarket would like to know which of several quality problems to address first. A tool that would be most helpful would be a: perato chart 9. a restaurant manager tracks complaints from the diner satisfaction cards that are turned in at each table.The data collected from the past week’s diners appear 10. the first step of the systematic approach to process analysis is (opportunity) 11. process (scope) is the boundary of the process to be analyzed. 12. A voluntary system by which employee submit th eir ideas on process improvements is called a (suggestion system) 13. (Metrics) are performance measures that are established for a process and he steps within it. 14. A group of people, who are knowledgeable about the process, meets to propose ideas for change in a rapid-fire manner. Such a session is called (brainstorming)

Saturday, September 28, 2019

Acknowledgement

Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator.The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Stud y Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification.The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information.On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library use rs of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the StudyGenerally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the sy stem’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration.This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers.Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system.The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual ParadigmBelow is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records.Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign LiteratureHolloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information.Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies.They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system.Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the proj ect that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and improve the current way of identifying students at Tarlac State University.The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes.Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of a rrival and departure within the school premises. B. Related Studies Foreign StudiesA study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard.His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services m ade a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study.Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students.This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that th e researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie TheaterCharging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems & improve charging operations of the system implied on improvement in the efficiency, reliability & accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of.In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers.This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations.It often uses visual aids such as graphs and ch arts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. SamplingThe researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered.Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture.If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be cond ucted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System.After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft .Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed SystemUser and Needs of the Study Proposed system is the T anauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization.Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books a re all able to be achieved. The library can adopt RFID technology aim of improving the self-service.Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 ImplementationProgram Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had an y wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike.The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface.C. Hard Disk – wherein the system is stored and the soft co py of the documentation is saved. D. Ballpen & Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives.Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the rese archers put a login form on the system to ensure that no one can access or view, only the end user can use it.Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1.Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. P roviding back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and RecommendationSummary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind.Modified waterfall was the research model used by the researchers which helped them in the distribution of the tas ks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. ConclusionThrough months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month.They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. RecommendationsFor the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..

Friday, September 27, 2019

Employee Relation E-portfolio Essay Example | Topics and Well Written Essays - 1500 words

Employee Relation E-portfolio - Essay Example Equally important, I have realized that gone are the days when workers could depend on the trade unions and employers to look after their welfare, while they focused more on their careers. This is because with the shortage in employees’ skills and knowledge, today’s working environment has become tougher. Besides, today’s employment patterns have undergone significant changes. To illustrate, nowadays, most employees are focussing on setting career goals that are short term, while they constantly update their skills in order to grasp the available opportunities. This paradigm shift has been caused by the recruitment behaviours of organizations, governments, and other agencies. As such, it is arguably true that over the recent years, the idea of job satisfaction and organizational career success has taken a broad twist, as many employees no longer depend on a regular promotions within a single organization. Comparatively, I have come to learn that present day employees are focussing on developing their organizational skills and knowledge in a way that they will become valuable members of an organization. Hence, in a bid to increase the organizational performance as well as decrease employment costs, many companies have adopted the use of temporary employees thus changing their employment patterns. By using the temps, the company does not only save on the salary costs arising from fewer benefits and lower wages, but also in the underlying fact that the organization will relatively use fewer resources in training the temps. In addition, using the temps has allowed companies to become more flexible since the management has the capability of terminating the work relationship whenever the need arises. This session was highly educative as it provided me with quite a huge bank of knowledge more pertaining the bargaining rights of employees. I also realized that today, a number of countries have adopted newer forms and

Thursday, September 26, 2019

Risk management case Essay Example | Topics and Well Written Essays - 500 words

Risk management case - Essay Example A table would be a suitable way to present your answers, with columns for the risks, the strategy and the type of strategy For such company as XYZ Ltd that specializes in technological devices for customers with visual impairment, risks in project implementation can be associated with its planning, cooperation with the provider of services, TECHNO Company in particular, the quality of components chosen by TECHNO and risk of losing potential customers due to the high competition in this sphere. Raz, Shenhar and Dvir (2002) consider that project risks are characterized by undesired events such as delays, excessive spending or unsatisfactory project results. Hence, for XYZ Ltd if the project planning in terms of developing of new watch would contain difficulties in using a new specific feature of voice recognition by the customers with certain disabilities, that will create the risk of usefulness of the entire project. For that purpose an advantage will be in arranging the watch the way to be easy in use by people with visual impairment. Despite the fact that in the present many techniques and suggestions were introduced for project execution, there are still gaps from various perspectives, which require managers to be responsible for making a progress of project (Razaque, Bach, Salama & Alotaibi, 2012). For XYZ Ltd, such approach is given to the third company-provider, TECHNO, which is responsible for developing of innovative speech recognition component using cheaper technology. The risk here is that while cooperating with TECHNO, XYZ can lose customers in other products if the new watch technology will be developed by TECHNO in the wrong way and the needs of customers will not be expected. As the main strategy of managing such risk can be tracking and combining of efforts of both companies in order to develop a good product. The other risk from XYZ Ltd perspective can be associated with the quality

Application of ethical values to the business Essay

Application of ethical values to the business - Essay Example The second code is about professionalism that should be adopted to contribute towards public interest and to support public preferences. A person should not always work for his own benefit only; rather he should do well to others as it is rightly said "Do good have good". The third code is objectivity that is essential for business growth and to avoid controversial downfall. One must avoid self interest in business activities that would be beneficial both for him and the firm. Every person has his own point of view but one cannot impose them on others so we should avoid such situations as much as we can. The fourth code is confidentially that refers to the information obtained in business relationship is not disclosed outside the firm without proper and specified authority, so that the clients may feel secure. It is our moral duty to keep one's secret in complete guard. The fifth code is competence; all the tasks performed by the employees should be in relevance with their ability, d ue skill and care, which is the only way to get efficient work by the employees and I personally think that an employ is better adapted to the work if he has a good command on it because If you want to do justice to your work you should do it properly and it only happen if you have enough knowledge about the task. The sixth code of my business ethics is courtesy. My staff should behave with courtesy with the dealers and the customers so that we may get positive response. As far as the question of my employees is concerned that how I will enable them to establish shared ethical position, for this I must say that Once Napoleon Bonaparte had said, "There are two levers to set a man in motion, fear and self-interest."(Napoleon) My prior method to enhance the ethical position of my staff is through developing their self-interest which is the most appropriate scheme. Their interest can be build up by introducing bonus system for exceptional work and by increasing their nominal and real wages; this will certainly assure their interest towards their duty and they shall work with greater responsibility and shared ethical codes. I shall guide my staff that you should work with integrity in all professional, business and personal financial relationships. You should not provide misleading statements and should be free from frauds and errors so that the customers may feel secure and rely on us while dealing with us. You should ensure that your conflicts of intere sts are not compromised. You should do your best for objectivity in all professional and business judgments, so that our business may not suffer from any type of controversial downfalls. You should carry out your work with due skill, care, diligence and expeditions, and with proper regard to your expertise which is expected from you. You should not

Wednesday, September 25, 2019

Final exam praperation Essay Example | Topics and Well Written Essays - 500 words

Final exam praperation - Essay Example These were ranked to have higher survival rate compared to the other media that was available such as fresco wall paintings and other textiles. Despite the materiality being mixed with a culture that was full of barbaric artists, it led to the growth of artistic heritage of the Roman Empire and the iconographic traditions of the early Christian church. It also resulted in the production of the remarkable legacy of artists (Low, 2012). Monastic influence contributed more in the production of this early medieval art and architecture in many ways. Monk and nuns had a duty of performing occasional practical services during the early days. They nursed the sick, assisted those that were poor gave advice to the leaders that do not believe in God and provided shelter. For the culture as a whole, monasticism offered the society a spiritual outlet and dealt with important consequences for the medieval art. Encouragement of legacy, learning and kept the principals of the ancient journalism was the work that entitled to monks and nuns (Low, 2012). A community that comprised of men and women was to be governed by the set of regulations that were formed by monks. During this period, Christianity was described as being the late antique art. The changing phase was undergone in the new Roman art during this time, and it later abandoned classical style and Greek realism. The leaving gave an impact, and it was done in favor of mystical and hieratic style. Monasticism was then regarded as the primary on the impartial art that came because of the eastern parts of the empire (Low, 2012). I agree. Gregory was more educated, and he was known for his prolific writings when compared to his predecessors as pope. He was the founder of the present day’s revision of the Roman worship, and he was the author of developments and contributions of the divine

Tuesday, September 24, 2019

Issues in global business Essay Example | Topics and Well Written Essays - 500 words - 2

Issues in global business - Essay Example Small number of employees in SME can be cared and motivated optimally, leading to effective performance from all of them. However, the disadvantage is, in SMEs the leader or founder will have maximum influence from top to bottom, without any organizational structure horizontally or vertically. The problem with it is, when something goes wrong there will not be any management teams to point out the mistakes. Also, SMEs with their limited resources will not be able to provide quality products or services, when compared to large companies. As pointed out by, SMEs provide employment to basic sections of the societies, as they integrate well with it. SMEs will be mainly established not separate from the towns or cities, but within the by lanes and streets in a particular locality. So, it can provide employment to many of the unemployed living in that locality. This way, it can give employment to maximum people, elevating their lives and also contributing to the local economy, thereby national economy. Because of this, SMEs are regarded as the most important ‘engines’ for economic growth by the governments. So, to further encourage SMEs, governments will allocate land, power, water, etc at subsidized rates, will also impose lesser taxes, etc. This way, SMEs can come up in many places benefiting many

Monday, September 23, 2019

How employees react when facing organization change and what HR Literature review

How employees react when facing organization change and what HR manager should do - Literature review Example None of the mini computer companies could succeed in the business of personal computers Business schools and medical colleges are finding a hard tome to transform their curriculum according to the types of doctors and managers that are in demand in the market (Christensen & Overdorf, 2000, p.67). There are numerous other examples displaying the same challenge. It is seen that change efforts fail primarily because employers fail to handle the resistance towards change from employees. Managing change successfully means managing the fear of people. However, the peoples’ reactions to change efforts remain irrational and unsuccessful. Resistance towards the change originates from the fear of the unknown and apprehensions about a loss. HR managers play the crucial role of managing the reaction or response of employees towards the change process. The apparent reason to peoples’ fears is the way they perceive the change process, while the back end reaction to the change process is the extent to which they are equipped to deal with the change process. ... The project brings forth numerous critical reviews and suggestions of researchers and practitioners on the subject and delivers a critical analysis. It also puts forth their views regarding how changes can be managed effectively through effective people management procedures (Adair, 2007, p.124). Literature Review- How employees react when facing organization change and what HR manager should do Employee Resistance to Change- Critical Analysis The research begins with analysis of the greatest challenges of managing change initiatives in the organization. Managing organizational change is a difficult process as the conditions under which it is undertaken at the initial stage keeps changing. As situations keep shifting it becomes increasingly difficult for the top managers and agents to prepare for manage the change process in a way which satisfied both employers and employees. It is not surprising to understand that change resistance has attracted immense attention from practitioners and researchers. Immense attention has gone into the understanding of determinants and sources of change resistance. The general public and the media have gone into various forms of active resistances such as protests and strikes. Some of the other forms of organizational resistances are passive resistance, which is comparatively less observable, but has immensely attracted the concern of employers in organizations. Unsurprisingly, resistance towards change initiatives account for being one of the most crucial sources of organizational change failures (Conger & Kanungo, 1998, p.8). Meyer, (1982) and Nadler, (1998) have defined the concept of organizational change as the effort or the series of efforts which is designed in a manner to bring about change or transformation in

Sunday, September 22, 2019

Causes and efects of Obesity Essay Example for Free

Causes and efects of Obesity Essay Obesity is a factor that increases risk developing a number of serious and potentially life – threatening disease. At present, obesity rates are rising in several developed countries such as the United States, Mexico, the United Kingdom, New Zealand and Hungary. Around a quarter of these countries’s population is overweight. This essay will look at some of the causes and effects of obesity. Firstly, energy imbalance most often causes obesity. Energy imbalance is the excess of energy in over energy out. Energy in and energy out are the amount of calories the body obtains and uses, respectively. If the amount of energy in is greater than the amount of energy out, your body contains unnecessary calories. Unecessary calories is transformed into fat. The more fat you get, the more weight you gain. Overtime, obesity is inevitable. The other major cause of obesity is lack of physical activities. Sufficiently practicing of physical activities is one of the best way help burn unnecessary calories. Therefore, lacking of volume of physical activities leads to extra calories retained. As a result, obesity happens. For intances, many people hace jobs that involve too much desk sittng and no physical activities. They do not use all the energy provided by foods they eat, and the extra calories are stored as fat instead, which causes obesity. Obesity is a risk factor for many dangerous disease. However, there are two most fatal effects of obesity.  Firstly, obesity has been known as the main factor of high blood pressure. High blood pressure is literally the pressure on blood vessels caused by high workload of heart. The obese body contains fat tissue that needs oxygen and nutrients to live, which requires more blood. Therefore, the heart must pumps more blood through blood vessels, and vessels indure high pressure of blood. This causes high blood pressure. The other consequence of obesity is type 2 diabetes. Diabetes is medical condition which makes blood sugar level higher than normal. This is the  result of insulin resitance. Obesity can cause resistance to insulin, the hormone that regulates blood sugar. When obesity causes insulin resistance, the blood sugar becomes eveluated. Even moderate obesity dramatically increases the risk of diabetes, such as blindness. To summarise, obesity derives from two major causes which are energy imbalance and lack of physical activities. Its effects are numberous but the most critical ones are high blood pressure and diabetes. People who are struggling with obesity should start to do more physical activities and have a balance diet in their daily life, so that they can lose weight and avoid obesity.

Saturday, September 21, 2019

The Communist Manifesto by Marx and Engels

The Communist Manifesto by Marx and Engels The passage I have chosen to analyze critically is a part of the book The Communist Manifesto authored by Karl Marx and Friedrich Engels who are both political theorists. This particular passage has been taken from the second chapter of the book which is named Proletarians and Communists. The Communist Manifesto is considered to be one of the bravest books of all time. Karl Marx, after being banished from Paris for his comments on radical politics, he established a group of working class people from Germany and together they formed The Communist League. The testimonials of the communal principles of the group were written down which later took the form of the book, the Communist Manifesto. The book unwraps with the thought that- The history of all hitherto societies has been the history of class struggles. In the book, the authors talk about the drawbacks that have arisen in the society due to the formation of two classes: the bourgeois and the proletariats, and the antagonism between these two classes. In the first chapter of the book Bourgeois and Proletarians, Marx and Engels describe the rise of the bourgeois class, in which he thought the French revolution had played a huge part. He also explains that how tremendously the bourgeois class is harmful to the society and that it will be the cause of its own destruction. In the second chapter of the book Proletarians and Communists, the authors main focus is on the ideologies and features of the Communists and that they aim to work on behalf of the proletariats. He also expresses own thoughts regarding the modern bourgeois property features, wage-labor, capital accumulation and lastly ends his argument by saying, In place of the old bourgeois society, with its classes and class antagonisms, we shall have an association, in which the free development of each is the condition for the free development of all. Karl Marx and Friedrich Engels in this chapter mostly talks about the determined willpower of the communists towards the formation of proletariat into a class, overthrow the bourgeois supremacy and the power governance/takeover by the proletariat class in this chapter. They discuss many of the reasons why property and capital are at the power of the bourgeois class. In the passage I have chosen they argue that the wage labour creates only capital which in turn creates the property, but only for the bourgeois not the proletariats and this system needs to be changed in the society. In the first paragraph, the author talks about wage labour- the person who comes to work to earn a minimum salary for living. There is a certain aggression in the tone of the writing throughout the whole chapter which reflects their rage regarding the issue. They say that the average salary of a wage-labour is only the least possible amount of money needed for the worker to only come to work every day. What, therefore, the wage-labourer appropriates by means of his labour, merely suffices to prolong and reproduce a bare existence.- Marx and Engels seem to write this with complete offence and disbelief.ÂÂ   Because the scenario which they are talking about, which in fact still exists now, is that workers put their effort and are exploited constantly by the bourgeois class. The two dollars therefore expresses the relation in which labor-power is exchanged for other commodities, the exchange value of labor-power. The exchange value of a commodity estimated in money is called its price this is an extract from Karl Marxs writing Wage Labour and Capital in which he clearly explains that the wage labourer only receives the money in exchange for his work. This turns to the fact that a proletariat sells its own flesh and meat in exchange of a minuscule amount of money, which is completely undeserved. Moving on to an example from Adam Smiths book The Wealth of Nations. He says that a commodity is only priced at the cost of what it requires for the person to bring the product into the market. He explains the factors that are looked into while pricing a commodity where wage of the labour is only one of the factors; hence it is very distinct that the wage labourer cannot even afford to buy the product he himself has produced in the factory. His salary is just a bare minimum for him to afford some food and clothing so that he can come to work the next day to be exploited again by the bourgeois. The two kinds of societies that are talked about are the bourgeois or todays capitalist society, and the other is the imagined communist society which communists aim to establish. The authors expresses that in the capitalist mode of production, the workers are only seen as the work power or the force that will earn more capital for the bourgeois through their effort. But in the communist society, the whole proletariat class is a way to promote and enrich themselves and their lives too and not only serving the bourgeois. In bourgeois society, therefore, the past dominates the present; in Communist society, the present dominates the past- this statement is not very precise or clear, but from the lines written just before and after this statement it appears as if Marx and Engels think of the accumulated labour as the past and living labour as the present. Hence, the motivation and ambition to produce more labours will give rise to exploitation by the bourgeois on the present working lab our. The labourer only exists because it has to work for increasing the capital which brings me to the point that capital is materialistic, an inanimate object whereas the proletariat is a living person with will, wish and needs. Despite this being a fact, in the capitalist society, the bourgeois dominate the proletariats for which they gain no power or anything and are not free willed. Whereas capital, when controlled being a material object, has complete power to run anything or anyone. It is possible for the owner of capital to run his work without any particular labourer amongst the millions, but it is the labourers who are entirely and in a very complexed way dependent upon selling their labour. Also, the labourers do not have the opportunity to choose between a numbers of capitalists. In this way the labourers are destined to cope up with conditions in which they always give more labour power as an input than they get back in reward as the incentive. In the last paragraph from the suggested passage I have chosen, the authors seems to talk about the fact that the destruction of this cycle of manipulation and corruption, which is desired by the communists is thought to be unreasonable by the bourgeois society. The bourgeois society holds the communists accountable for depriving them of their individuality and freedom. By critically analyzing it appears that Marx and Engels critiques the existing capitalist society by saying that By freedom is meant, under the present bourgeois conditions of production, free trade, free selling, and free buying. In Capitalist mode of production the freedom is the freedom to buy and sell in the market for free, but only for the bourgeois.ÂÂ   Bourgeois desire to earn as much as capital they can earn needed that is crucial to acquire all the social power in the society. Throughout the whole writing it is very evident that Marx and Engels have persistently portrayed that the whole society is about the exchange of the propertied class and the property-less class. But this is only for profitable development of the former class by the help of the latter. The Communist Manifesto, being one of the most influential political theory books has been an inspiration for many also in the contemporary society today. It has very boldly addressed the social relations and structure of power in the society and how it depends on the production process. It has shown that proletariats are only worth to the bourgeois as long as it brings profits. But there are some aspects of the writing which makes us think about the usefulness and consequences of the establishment of a communist society. Marx and Engels point out several times that if the bourgeois possess majority of the property then exploitation will continue but an argument they also make is that the owner of the m eans of production do not work but make others work for them. Therefore, if proletariat forms into a class and earns property for them, they are also bound to become idle. Proletariats will also not work and fall under the bourgeois class and use their cogency to compel others to work for them. This circle of power struggles is bound to continue in different forms probably, which is why Marx and Engels writing is still essential.