Saturday, November 30, 2019

THE RELATIONSHIP BETWEEN EMPLOYEE MOTIVATION AND PERFORMANCE Essay Example

THE RELATIONSHIP BETWEEN EMPLOYEE MOTIVATION AND PERFORMANCE Essay Motivation can be a key-contributing factor in employee performance. It is of great importance to an organization to recognize ways in which it can use employee motivation to positively affect employee performance. The methods used by organizations to motivate its employees are essential in determining how they affect employee performance. There are both positive and negative motivational tools that may be explored. The purpose of this paper is to examine the relationship between motivation and employee performance. Motivation is generally defined as the psychological forces that determine the irection of a persons level of effort, as well as a persons persistence in the face of obstacles. When a person has an increased level of effort and persistence in the workplace they tend to be highly motivated and this more often leads to a higher level of performance. However, the reason for an employees motivation may not necessarily be attributed to the organization. It is possible for an employee who is highly motivated to have low performance and the opposite for a lower motivated employee to have high performance. Although possible, most research studies show higher correlation between higher motivation and higher employee performance. There are both positive motivators and negative motivators that can be utilized by the organization. Positive motivators as employed by organizations may include employee benefits such as increased compensation, bonuses, stock options, profit sharing and other such rewards. Employees may be motivated by both intrinsic and extrinsic rewards. Intrinsic rewards may be the ability to work autonomously, acknowledgement, and an interest in the type of work they are doing. Extrinsic rewards may be employee recognition, monetary benefits, and other such material rewards. Negative motivators may include a bad performance review, verbal and written warnings, suspension, and termination warnings. An employer may use these various methods in which to motivate its employees. Performance is an evaluation of the results of a persons behavior: It involves determining how well or poorly a person has accomplished a task or done a Job. High employee performance leads to greater organizational success. We will write a custom essay sample on THE RELATIONSHIP BETWEEN EMPLOYEE MOTIVATION AND PERFORMANCE specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on THE RELATIONSHIP BETWEEN EMPLOYEE MOTIVATION AND PERFORMANCE specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on THE RELATIONSHIP BETWEEN EMPLOYEE MOTIVATION AND PERFORMANCE specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In order for an rganization to try to acquire higher levels of employee performance via increased employee motivation they must have a strategy to do so effectively. The strategy must ultimately focus on achieving organizational goals while maintaining ways in which to influence motivation, which then inspires employee performance. From the organizational standpoint, there are key factors that impact motivation and its effect on employee performance. One such factor is setting goals for employees that incorporate the vision of the organization. When goals are set for the employee t provides an incentive for the employee and also benefits the organization upon completion relatlve to tne organlzatlons goals as well. Anotner Tactor Is employee engagement. Employee engagement and input allows for a level of commitment from the employee and may serve as an organizations way to be in tune with employee concerns. It is also extremely important to recognize the treatment of employees as a factor of motivating employees and their performance. Employees that are treated well by their organization in turn feel that they are a valued member of the team and ssentially its employer. This contributes to the level of trust that the employee has in the organization and can positively impact how well they perform for the company. Also, it is important to have a clear sense of leadership demonstrated for employees so that they are able to learn from these qualities displayed by successful leaders in the organization. Great leadership helps to motivate employees to perform at high levels and achieve organizational goals, which provide employees with the opportunity to develop within the organization. There are several theories based on motivation provide support for the relationship between motivation and performance. These theories include: Expectancy Theory, MasloWs Hierarchy of Needs, Herzbergs Motivator-Hygiene Theory, McClellands Needs for Achievement, Affiliation and Power, Equity Theory and Goal-setting Theory. Expectancy theory suggests that motivation is high when employees believe that high levels of effort lead to high performance and high performance leads to attaining desired outcomes. MasloWs Hierarchy of Needs says that five basic needs must be et by people in the order from bottom to top with each higher level upward leading to motivated behavior. Herzbergs Motivator-Hygiene Theory focuses of two factors attributed to the workplace: 1) meeting basic expectations 2) leading to increased performance. McClellands Needs for Achievement, Affiliation, and Power identifies three needs for a person 1) achievement 2) affiliation 3) power; of which all three pertain to a persons desire to perform well, have positive interpersonal relationships, and the desire to influence others. The Equity Theory is ones perception of fairness elative to their work outcomes and work inputs. Goal-setting Theory focuses on motivation of workers in order to contribute to overall performance of organization based on goals set. All these theories provide explored background information for employee motivation and its relationship to performance. An employees performance isnt solely based on the level of motivation but has an enormous amount of potential to have the greatest influence. There has been consistent empirical evidence to suggest that motivated employees means better performance. Due to motivation being linked to employee engagement, satisfaction, commitment, and an employees intention to quit, it can be said that these major factors also contribute to performance. Their contribution to an employees performance can be directly linked therefore the way in which they serve as components of motivation shows linkage to employee performance. These indicators play a major role in an employees overall performance. An organization and its managements focus through the utilization of employing ways in which to motivate its employees as a performance enhancement should be a rlmary Tocus. I nere are countless ways In wnlcn tney are aDle to ao so ranging from both extrinsic and intrinsic rewards and employee recognition. However, these are valuable for leaders and their organization to know and actively participate in these activities as the idea of motivating employees is not only of beneficial importance to employees but also to an increased level of performance for company employees and the overall organization. Bibliography Motivation in Todays Workplace: The Link to Performance, SHRM Research Quarterly: Second Quarter-2010 http://www. hrm. org/research/articles/articles/ Owen E. Richason IV, Motivation Employee Performance, Small Business Houston Chronicle http://smallbusiness. chron. com/motivation-employee- performance-1964. html George, Jones. Understanding and Managing Organizational Behavior Sixth Edition. Upper Saddle River: Pearson Education Inc. , publishing as Prentice Hall, 2012. Nohria, Groysberg, Lee, Employee Motivation: A Powerful New Model, Harvard Business Review http://hbr. org/2008/07/employee-motivation-a-powerful-new-model/ aril

Tuesday, November 26, 2019

The White Immigrants in America

The White Immigrants in America It is true that the whites, also known as Caucasians, are the dominant group in America. However, they are not a basis to understand the experiences of the minority groups. They only help get a glimpse of what the ethnic minority lacks. This is because they are the reason for the mediocre lives of the ethnic minority. The only way to understand the experiences of the ethnic minority is by learning about these specific ethnic minority groups. Direct interaction with these groups is one way of achieving this. The white Americans lead better lives and their lifestyles cannot be used to understand that of the ethnic minority groups. Even though the whites have equal exposure to the best available privileges and opportunities, they vary in terms of socioeconomic status. I think that the skin color signifies a lot because by the mere fact of racial cross-breeding, discrimination does not end. Some of the ethnic minorities are descents of European immigrant but their black color of African origin and non-white facial features alienates them. The dominance by the whites nonetheless has stood the tests of time. The whites in America are a mixture of various immigrant descents but despite the cross-breeding, the white Americans continue to dominate in the US. There are various definitions that in use when referring to the term whites/Caucasian.Advertising We will write a custom essay sample on The White Immigrants in America specifically for you for only $16.05 $11/page Learn More One definition has it that the whites are of European immigrant descent while another more recent definition has it that the whites are descents of Europe, Middle East and North Africa. The latter definition is presumably due to constantly diversified racial categories of the whites. Hence, everyone with white characteristics based on his or her skin color or facial features is a white regardless of his or her primordial race. The fact that ethnic minority exists shows that ethnicity is very eminent in the U.S. It is because of ethnicity that the whites hold socioeconomic power, and they don’t suffer from prejudice and discrimination. The American national identity is for the whites hence; they are the nationals of America. But even the ethnic minorities have a bearing on the white identity. Thus, they should enjoy the same privileges as the â€Å"white Americans†. Just the same way Barack Obama of East African descent received an equal opportunity to seek the American presidential seat is the same way that the ethnic minorities should receive equal opportunities to seek high paying jobs. To some extent, this instance supports the proposition that discrimination against the ethnic minority has decreased. The notion by most whites is in fact changing and they believe that they are a different people who respect everyone. This needs confirmation because in the U.S., despite the fact that some ethnic minorities hold high job positions, a high preference is toward the whites. High job positions, which are the basis for social power and wealth, are mostly held by the dominant ethnic groups. Structural discrimination is the reason for this kind of discrimination, which still exists in the U.S. As a way of clearing itself of discriminating against the ethnic minorities, white Americans point accusing fingers at structural discrimination. The ethnic minorities are not aware of structural discrimination. According to them, structural discrimination exists only in the eyes of the whites. Much as they whites try to vindicate themselves of not being discriminative, the facts speak for themselves. The whites embrace ethnicity rooted in aspects such as skin color and social privileges, and because of these the less privileged in society (ethnic minorities) get looked down upon.Advertising Looking for essay on ethnicity studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More

Friday, November 22, 2019

Cheapest auto insurance rates in El Paso

Cheapest auto insurance rates in El Paso This far western city in the state of Texas features a growing economy with towering skyscrapers, highways connecting different parts of Texas, beautiful driveways and tourist places that attract people from all over the world. So there is a lot of travelling going on in El Paso. Auto insurance is a must if you are living in El Paso. The state department of insurance requires all the cars to be insured. The minimum coverage requirement in El Paso is known as the 30/60/25 law. As per this law, you will be covered in three forms of insurance coverage. Individual bodily injury liability in which the company will pay a maximum of $30,000 to the person for injuries sustained in an accident. Second is total bodily injury liability whereby a total sum of $60,000 would be paid for all the persons seated in the car whi have been injured. The last is property damage liability whereby the company shall pay $25,000 for any damages caused to property. It is evident that being one of the biggest cities of Texas, Best Auto Insurance is a huge cost in El Paso. The average cost of insurance coverage in El Paso is higher as compared to the national average cost. So people are always looking forward to saving money in terms of insurance cost by opting for companies offering cheapest car insurance in El Paso. The rate of insurance prevailing in a city depends on a number of variables. One of these variables is the type and model of vehicle that is driven most in the city. According to research data, the most driven cars in El Paso include Ford, Chevrolet, Nissan Altima, Honda Accord and GMC Sierra. Apart from this, factors like number of accidents that take place in a city also determ ines insurance rate. As per ranking of safe driving, El Paso ranks as 50th city among 200 cities of the US which is not quite good ranking. Driving conditions in El Paso are also a bit difficult which lead to chances of accidents. Overall the weather in El Paso is hot and humid throughout the year. But when it rains, it can bring floods and thunderstorms, impairing the visibility of drivers. Road conditions are also not up to the mark and lead to accidents. Majority of roads are rated average or poor in condition. This leads to traffic congestion and accidents become a possibility. The amount of traffic rules violations prevailing in a city also impacts the rate of insurance. El Paso has some serious issues with drunk driving which the city aims to curb. Moreover, the high number of theft of vehicles also causes the average rate of insurance to go high in Texas. The good news for residents is that there are a number of companies from which you can shop ariud and get the cheapest auto insurance rate in El Paso. Some of these are Allstate, Farmers, GEICO, Progressive and USAA. These are the top insurance companies in El Paso that offer the cheapest auto insurance rate.

Wednesday, November 20, 2019

Critical criminology Essay Example | Topics and Well Written Essays - 2500 words

Critical criminology - Essay Example Plato, for example was in favour of a penal system which was curative, seeking to reform wrongdoers, and spoke out against retribution because it only increases suffering and brings no good result. (Bauman: 1996 , p. 3) Increasingly, laws were created to sustain a dominant view of society and silence any resistance to this from people who would rather escape such tight regulation. An increasing reliance on scientific methods, using all the benefits of new scientific discoveries such as magnification, fingerprinting and evidence based practice had the advantage of rooting out superstition and religion as judicial tools, but it had the disadvantage of subjecting human beings to ever tighter systems of control and regulation. Eventually critical criminology emerged to take issue with the free will argument and look instead at a much wider range of issues which contribute to the way people behave in society. In modern western societies these different views coexist in the academic litera ture and in society at large, because there is no agreement on one single view of how to define crime, its causes, its remedies and the way society should deal with it. Mainstream Criminology and its main assumptions. The fundamental basis of mainstream criminology is the thinking of utilitarianism developed by writers like Jeremy Bentham (1748-1832). It is no coincidence that these ideas developed at a time when European society was becoming more urban and industrialized. (Morrison: 1995, pp. 71-76) The close proximity of large numbers of people, often in poor housing conditions and relative poverty, resulted in repeated crime waves and instability in society. This very rational approach to crime assumes that the needs of individuals must be balanced with the needs of society in general, and this results in a suppression of â€Å"deviant† behaviour which harms the majority. One of the good outcomes of this kind of criminology is that it clarifies what is sanctioned by societ y and what is not, and it provides a basis for setting up a universal legal and penal system that aims to treat people fairly. A less positive outcome is a tendency to promote the views and interests of powerful patriarchal figures, focusing on the maintenance of the status quo, and allowing people in law enforcement to abuse their power, often in institutionalised ways which become an inbuilt part of the system. The persecution of black people in America and the outlawing of gay people in most countries until very recently are examples of rules which set out deliberately to benefit one segment of society at the expense of another. Van Swaaningen believes that there are two major belief systems that have been at work in mainstream criminology since the Second World War and these are neo classicism and positivism which he explains as follows: â€Å"the first views crime as the moral lapse of the freely willed individual; the second, as a pathological determinism of individuals cause d by genetic, family or social defects.† (Young: 1997, p. vii) What these two approaches have in common is that they focus on the individual human being as the source of the problem, and they assume that dealing with crime is a matter of dealing with that person. This kind of criminology uses statistical evidence to build up a picture of how when and where crime occurs, and it focuses on methods of prevention and methods of detection and control of offenders. One big

Tuesday, November 19, 2019

Paper 2 Essay Example | Topics and Well Written Essays - 750 words - 9

Paper 2 - Essay Example passing the message and expressing emotion. He easily moves his tongue and lips to change sounds as he speaks and hence his voice articulation is good. He does not change his tone all through the video. His inflection is fairly even since they is little change in voice pitch. The quality of his voice is clear, and it matches the message being passed across. He accentuates stress on syllables in some words he utters. The pace of her words is smooth, and one can clearly hear all that she says. This video has at least three speakers, but the main speaker is Hope Solo. The tone of her voice changes depending on the kind of questions she is responding to. Her tone is both subjective and emotional at some point and at other times her tone becomes serious. She is very subjective when talking about the future of her career. Her voice becomes emotional when she talks about the harm that has taken place in her career. She uses long and short sentences to reveal her emotions at different points. The pace of her voice varies depending on her emotion. When speaking about positive issues she speaks fast but the paces slows down when she talks about the negative things. The volume of her voice also differs depending on the question she is responding to. At the beginning of the interview, the volume of her voice is high indicating confidence but she lowers it when the questions asked affect her emotions. Intonation of her voice is rises and falls depending what she is stressing on. Her voice articulation is perfect since she does not have any pronunciation problems. Her voice quality is clear, and she communicates with the reporter smoothly. The pitch of the voice in this video is moderately high since the speaker is confident about what he is talking about. His tone is bold and very convincing. He changes his pace depending on the stress that he wants to put. The pace of his voice reduces when he speaks about critical matters of entrepreneurship. A slowed pace

Saturday, November 16, 2019

Hypocritical Holden Essay Example for Free

Hypocritical Holden Essay Hypocrisy is found in all of us. Many of us have things about ourselves that we don’t want to share with others, and try to hide; perhaps we are trying to hide our hypocrisy. In The Catcher in the Rye, J. D. Salinger expresses through Holden Caulfield that hypocrisy results from not being able to connect with others. Although Holden accuses others of being phony, in reality, Holden is a phony himself and as a result of his hypocrisy, he is unable to connect with others, suggesting that to connect with others one must be able to accept other people’s flaws. Holden defines others as phonies because he is critical and has a negative utlook on the world and the people in it. When Holden makes observations of other people he often defines them as phony. For example, when Holden goes to the movies he observes a lady sitting next to him who is crying during the movie, â€Å"The part that got me was, there was a lady sitting next to me that cried all through the goddam picture. The phonier it got, the more she cried†¦ she had this little kid with her that was bored as hell and had to go to the bathroom but she wouldn’t take him†¦ You take somebody that cries their goddam eyes out over phony stuff in the movies, and nine times out of ten they’re mean bastards at heart.  I’m not kidding† (181). Holden thinks that the woman crying is a phony because she is emotional about a movie which is fake, yet she does not feel bad for the kid who is sitting next to her in real life, who has to go to the bathroom. A woman crying at a movie is what Holden observes and defines as phony behavior. Holden’s negative outlook on the world and the people in it just pushes Holden farther and farther away from people. He is isolating himself. In addition, Holden thinks some words or phrases are phony. When Holden is talking on the phone with a girl he knows, Sally, who says something that Holden thinks is phony. â€Å"I’d love to. Grand. † Grand. If there’s one word I hate, it’s grand. It’s so phony†(106). Holden thinks that the word grand is phony, which may be true to Holden; although the more energy he spends on pointing out â€Å"phonies† the more isolated and unhappy he becomes. Holden is a hypocrite because he is sometimes aware that he is being a phony himself. Holden thinks that he needs to hide his true self from people in order to â€Å"survive†. When Holden is out at Ernie’s and meets up with a girl he knows, Lillian, Holden says something to the Navy guy who was with Lillian that Holden considers phony. Holden addresses the reader, â€Å"I’m always saying â€Å"Glad to’ve met you† to somebody I’m not at all glad I met. If you want to stay alive, you have to say that stuff, though† (87). Holden lies to the navy guy, and also says that he lies to other people when saying this phrase. Although Holden is acting phony, and therefore hypocritical, he is aware of it. He acts phony because he is afraid that sharing his true self with others will interfere with him connecting with others; Holden thinks that he will turn people away because he is different. Holden is different because he is critical, and also eeply caring and emotional. Holden is trying to act like a regular guy so people will like him and be willing to talk with him. Holden is striving to make a connection with someone; anyone. He is just looking for anyone to talk to and make a connection with, but he is afraid to open up to them. Holden tries to fit in with others by being phony when in reality, he hates how most people act. Holden tries not to show his hatred of phonies because then, people would soon realize that Holden is a phony himself. At Ernie’s when Holden meets up with the navy guy, introduced to him by Lillian, Holden hares his true thoughts about the navy guy’s actions with the reader. Holden says, â€Å"He was one of those guys that think they’re being a pansy if they don’t break around forty of your fingers when they shake hands with you. God, I hate that stuff† (86-87). Holden doesn’t like the expectations put on men to act tough; this makes Holden feel insecure. Holden feels that he must hide that he is caring and emotional by being phony. In addition, Holden is sometimes unaware that he is being phony. For example, when he asks his taxi driver Horwitz a question, Holden is unaware that he is being phony. â€Å"Hey, Horwitz,† I said. â€Å"You ever pass by the lagoon in central park? Down by central park south? †Ã¢â‚¬ ¦ â€Å"Well, you know the ducks that swim around in it? In the springtime and all? Do you happen to know where they go in the wintertime, by any chance (81)? †Ã¢â‚¬â„¢ Holden asks Horwitz where the ducks go in the winter time because he is unknowingly comparing his situation to the ducks in the lagoon; Holden wants to know where he goes now that it is â€Å"winter time† and his lagoon, Pencey prep, has frozen. Throughout the book, Holden struggles to find a place where he belongs. He also strives to connect with people. Holden is reluctant to share his true self with people. Asking Horwitz where the ducks go is one of Holden’s â€Å"phony† attempts at making a connection with someone. When Holden acts phony, he shields his true self from people which keeps him from connecting with others. Holden dislikes phonies, and he often criticizes people for being phony, although Holden acts phony himself because he is insecure about himself, which leads to Holden acting phony. J. D. Salinger expresses through Holden that when trying to connect with others, one must act like themselves. Hypocrisy is often inevitable; all of us exhibit hypocrisy.

Thursday, November 14, 2019

What are some of the key ideas and messages presented in the novel, Ess

What are some of the key ideas and messages presented in the novel, Fahrenheit 451? Explain your answer with examples and quotations. What are some of the key messages and ideas presented in the novella, Fahrenheit 451? Explain your answer with detailed examples and quotations. Ray Bradbury’s Fahrenheit 451 is a dystopian, science fiction novel, which is written through the perspective of Bradbury’s protagonist, Guy Montag. Fahrenheit 451 was initially published in 1953; however it is set in the twenty fourth century in a conformist society, where literature is illegal. Throughout Fahrenheit 451, Bradbury conveys some very important messages and ideas. Among these are; censorship, the influence of technology, individual choice and the role of the individual in society, ruling by fear and totalitarianism, and the evolution of society. Ray Bradbury’s Fahrenheit 451 forces us to envision a world that has been so thoroughly censored that firemen, such as Guy Montag no longer exist to fight fires (for all buildings are fireproof) but rather to start them and take part in censorship. In this world individuality and individual choice are lost. Appropriately named, Guy appeared from the start to be just like any other firefighter. He found it â€Å"a pleasure to burn (p.3)†, and followed the dictations of his leaders. Eventually, however, Montag begins to realize that he lives in a society that takes away the power of an individual to make choices and to make a difference. Montag realizes that without being fully aware of it, that in two minutes he was essentially destroying something that took someone an entire lifetime to create. Censorship is a significant theme in Fahrenheit 451. Bradbury, through Beat... ...he loss of characters freedom to read and to think was not an act that was forced on the people, but rather one embraced by the people, either because they do not find the content of literature appropriate or because technology makes takes the place of literature. The terrifying resemblance that Bradbury’s vision of the twenty fourth century bears to the world today only further extends the possibility that some day our world might become no different from the world which Guy Montag lived in. Bradbury describes this world, â€Å"Every adjective that counted, every verb that moved, every metaphor that weighed more than a mosquito- out! Every simile that would have a sub-moron’s mouth twitch- gone! Any aside that explained the two- bit philosophy of a first rate writer- lost!....Every image that demanded so much as one instant’s attention- shot dead.(Afterward)†

Monday, November 11, 2019

Short Notes About Some Point

SIM: A subscriber identity module (SIM) on a removable SIM card securely stores the service-subscriber key (IMSI) used to identify a subscriber on mobile telephony devices (such as mobile phones and computers). A SIM card contains its unique serial number, internationally unique number of the mobile user (IMSI), security authentication and ciphering information, temporary information related to the local network (also temporary local id that has been issued to the user), a list of the services the user has access to and two passwords (PIN for usual use and PUK for unlocking). SIM cards are available in two standard sizes. The first is the size of a credit card (85. 60 mm ? 53. 98 mm x 0. 76 mm). GSM: GSM is stands for Global System for Mobile communication. It is a digital mobile telephony system that is widely used in Asia and other parts of the world. GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the three digital wireless telephony technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band. Mobile services based on GSM technology were first launched in Finland in 1991. Today, more than 690 mobile networks provide GSM services across 213 countries and GSM represents 82. 4% of all global mobile connections. According to GSM World, there are now more than 2 billion GSM mobile phone users worldwide. Since many GSM network operators have roaming agreements with foreign operators, users can often continue to use their mobile phones when they travel to other countries. GSM, together with other technologies, is part of the evolution of wireless mobile telecommunications that includes High-Speed Circuit-Switched Data (HCSD), General Packet Radio System (GPRS), Enhanced Data GSM Environment (EDGE), and Universal Mobile Telecommunications Service (UMTS). GPRS: GPRS (General packet radio service) is a packet oriented mobile data service available to users of the 2G cellular communication systems global system for mobile communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides data rates of 56-114 kbit/s. GPRS data transfer is typically charged per MB of traffic transferred, while data communication via traditional circuit switching is billed per minute of connection time, independent of whether the user actually is using the capacity or is in an idle state. GPRS is a best-effort packet switched service, as opposed to circuit switching, where a certain quality of service (QoS) is guaranteed during the connection for non-mobile users. 2G cellular systems combined with GPRS are often described as 2. 5G, that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, GSM is the only kind of network where GPRS is in use. GPRS is integrated into GSM Release 97 and newer releases. It was originally standardized by European Telecommunications Standards Institute (ETSI), but now by the 3rd Generation Partnership Project (3GPP). GPRS was developed as a GSM response to the earlier CDPD and i-mode packet switched cellular technologies. W-Lan: A wireless local area network (WLAN) links devices via a wireless distribution method (typically spread-spectrum or OFDM) and usually provides a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Wireless LANs have become popular in the home due to ease of installation and the increasing popularity of laptop computers. Wi-Fi: Wi-Fi (short for â€Å"wireless fidelity†) is a term for certain types of wireless local area network (WLAN) that use specifications in the 802. 11 family. The term Wi-Fi was created by an organization called the Wi-Fi Alliance, which oversees tests that certify product interoperability. A product that passes the alliance tests is given the label â€Å"Wi-Fi certified† (a registered trademark). Originally, Wi-Fi certification was applicable only to products using the 802. 11b standard. Today, Wi-Fi can apply to products that use any 802. 11 standard. The 802. 11 specifications are part of an evolving set of wireless network standards known as the 802. 11 family. The particular specification under which a Wi-Fi network operates is called the â€Å"flavor† of the network. Any entity that has a wireless LAN should use security safeguards such as the Wired Equivalent Privacy (WEP) encryption standard, the more recent Wi-Fi Protected Access (WPA), Internet Protocol Security (IPsec), or a virtual private network (VPN). ALU: An (ALU) Arithmetic Logic Unit is a digital circuit that performs arithmetic and logical operations. The ALU is a fundamental building block of the central processing unit (CPU) of a computer, and even the simplest microprocessors contain one for purposes such as maintaining timers. The processors found inside modern CPUs and graphics processing units (GPUs) accommodate very powerful and very complex ALUs; a single component may contain a number of ALUs. Mathematician John von Neumann proposed the ALU concept in 1945, when he wrote a report on the foundations for a new computer called the EDVAC. REFRESH RATE: The refresh rate (most commonly the â€Å"vertical refresh rate†, â€Å"vertical scan rate† for CRTs) is the number of times in a second that display hardware draws the data. This is distinct from the measure of frame rate in that the refresh rate includes the repeated drawing of identical frames, On CRT displays, increasing the refresh rate decreases flickering, thereby reducing eye strain. However, if a refresh rate is specified that is beyond what is recommended for the display, damage to the display can occur. For computer programs or telemetry, the term is also applied to how frequently a datum is updated with a new external value from another source. RESULATION: The display resolution of a digital television or display device is the number of distinct pixels in each dimension that can be displayed. It can be an ambiguous term especially as the displayed resolution is controlled by all different factors in cathode ray tube (CRT) and flat panel or projection displays using fixed picture-element (pixel) arrays. One use of the term â€Å"display resolution† applies to fixed-pixel-array displays such as plasma display panels (PDPs), liquid crystal displays (LCDs), Digital Light Processing (DLP) projectors, or similar technologies, and is simply the physical number of columns and rows of pixels creating the display (e. g. , 1920? 1200). A consequence of having a fixed grid display is that, for multi-format video inputs, all displays need a â€Å"scaling engine† (a digital video processor that includes a memory array) to match the incoming picture format to the display. PIXEL: A pixel (or picture element) is a single point in a raster image. The pixel is the smallest addressable screen element, it is the smallest unit of picture which can be controlled. Each pixel has its own address. The address of a pixel corresponds to its coordinates. Pixels are normally arranged in a 2-dimensional grid, and are often represented using dots or squares. Each pixel is a sample of an original image, where more samples typically provide more-accurate representations of the original. The intensity of each pixel is variable. In color image systems, a color is typically represented by three or four component intensities such as red, green, and blue, or black. In some contexts (such as descriptions of camera sensors), the term pixel is used to refer to a single scalar element of a multi-component representation (more precisely called a photo site in the camera sensor context, although the neologism sensel is also sometimes used to describe the elements of a digital camera's sensor),[2] while in others the term may refer to the entire set of such component intensities for a spatial position. In color systems that use chrome sub sampling, the multi-component concept of a pixel can become difficult to apply, since the intensity measures for the different color components correspond to different spatial areas in such a representation. The word pixel is based on a contraction of pix (â€Å"pictures†) and el (for â€Å"element†); similar formations with el for â€Å"element† include the words: voxel and texel. SCAN-PORT: A port scanner is a software application designed to probe a network host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. To portscan a host is to scan for listening ports on a single target host. To port sweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service, for example, an SQL-based computer worm may port sweep looking for hosts listening on TCP port 1433. HTTP : Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encryption and secure (website security testing) identification of the server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. HTTP is a request-response standard typical of client-server computing. In HTTP, web browsers or spiders typically act as clients, while an application running on the computer hosting the web site acts as a server. The client, which submits HTTP requests, is also referred to as the user agent. The responding server, which stores or creates resources such as HTML files and images, may be called the origin server. In between the user agent and origin server may be several intermediaries, such as proxies, gateways, and tunnels. SEARCH ENGINE : A program that searches documents for specified keywords and returns a list of the documents where the keywords were found. Although earch engine is really a general class of programs, the term is often used to specifically describe systems like Google, Alta Vista and Excite that enable users to search for documents on the World Wide Web and USENET newsgroups. Typically, a search engine works by sending out a spider to fetch as many documents as possible. Another program, called an indexer, then reads these documents and creates an index based on the words contained in each document. Each search engine uses a proprietary algorithm to create its indices such that, ideally, only meaningful results are returned for each query. RTAP : Short for Real Time Streaming Protocol, a standard for controlling streaming data over the World Wide Web. Like H. 323, RTSP uses RTP (Real-Time Transport Protocol) to format packets of multimedia content. But whereas H. 323 is designed for videoconferencing of moderately-sized groups, RTSP is designed to efficiently broadcast audio-visual data to large groups. RTSP grew out of work done by Columbia University, Netscape and Real Networks. RSVP : R. S. V. P. stands for a French phrase, â€Å"repondez, s'il vous plait,† which means â€Å"please reply. The person sending the invitation would like you to tell him or her whether you accept or decline the invitation. That is, will you be coming to the event or not? Etiquette rules followed in most Western cultures require that if you receive a formal, written invitation, you should reply promptly, perhaps that same day. For hosts who are planning a dinner party, a wedding or a reception, this is important from a practical po int of view, because they need to know how many people to count on and how much food and drink to buy. More important, though, is the simple courtesy of responding to someone who was nice enough to invite you, even if it is to say that you regret that you will not be able to attend. APPLICATION SERVER : Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www. example. com might translate to 198. 105. 232. 4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. MAIL-SERVER : A mail server is a computer that serves as an electronic post office for email. Mail exchanged across networks is passed between mail servers that run specially designed software. This software is built around agreed-upon, standardized protocols for handling mail messages, the graphics they might contain, and attachment files. Internet Service Providers (ISPs) each have a mail server for handling their clients’ mail messages, sometimes referred to as private mail servers. Some websites also offer public email services, utilizing their own mail servers. DNS: The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. An often-used analogy to explain the Domain Name System is that it serves as the â€Å"phone book† for the Internet by translating human-friendly computer hostnames into IP addresses. For example, www. example. com translates to 192. . 32. 10. The Domain Name System makes it possible to assign domain names to groups of Internet users in a meaningful way, independent of each user's physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 2 08. 77. 188. 166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8 (IPv6). The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated. In general, the Domain Name System also tores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet. Other identifiers such as RFID tags, UPC codes, International characters in email addresses and host names, and a variety of other identifiers could all potentially utilize D NS. The Domain Name System also defines the technical underpinnings of the functionality of this database service. For this purpose it defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite (TCP/IP). Symbian OS: Symbian OS is an operating system (OS) designed for mobile devices and smart phones, with associated libraries, user interface, frameworks and reference implementations of common tools, originally developed by Symbian Ltd. It was a descendant of Psion's EPOC and runs exclusively on ARM processors, although an unreleased x86 port existed. In 2008, the former Symbian Software Limited was acquired by Nokia and a new independent non-profit organisation called the Symbian Foundation was established. Symbian OS and its associated user interfaces S60, UIQ and MOAP(S) were contributed by their owners to the foundation with the objective of creating the Symbian platform as a royalty-free, open source software. The platform has been designated as the successor to Symbian OS, following the official launch of the Symbian Foundation in April 2009. The Symbian platform was officially made available as open source code in February 2010. Devices based on Symbian OS account for 46. 9% of smartphone sales, making it the world's most popular mobile operating system. DE-MORGAN: The law is named after Augustus De Morgan (1806–1871)[3] who introduced a formal version of the laws to classical propositional logic. De Morgan's formulation was influenced by algebraization of logic undertaken by George Boole, which later cemented De Morgan's claim to the find. In formal logic, De Morgan's laws are rules relating the logical operators â€Å"and† and â€Å"or† in terms of each other via negation, namely: NOT (P OR Q) = (NOT P) AND (NOT Q) NOT (P AND Q) = (NOT P) OR (NOT Q) EBCDIC: Extended Binary Coded Decimal Interchange Code (EBCDIC) is an 8-bit character encoding (code page) used on IBM mainframe operating systems such as z/OS, OS/390, VM and VSE, as well as IBM midrange computer operating systems such as OS/400 and i5/OS (see also Binary Coded Decimal). It is also employed on various non-IBM platforms such as Fujitsu-Siemens' BS2000/OSD, HP MPE/iX, and Unisys MCP. EBCDIC descended from the code used with punched cards and the corresponding six bit binary-coded decimal code used with most of IBM's computer peripherals of the late 1950s and early 1960s. ASCII: Acronym for the American Standard Code for Information Interchange. Pronounced ask-ee, ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another. UNICODE: Unicode is a computing industry standard for the consistent representation and manipulation of text expressed in most of the world's writing systems. Developed in conjunction with the Universal Character Set standard and published in book form as The Unicode Standard, the latest version of Unicode consists of a repertoire of more than 107,000 characters covering 90 scripts, a set of code charts for visual reference, an encoding methodology and set of standard character encodings, an enumeration of character properties such as upper and lower case, a set of reference data computer files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and bidirectional display order (for the correct display of text containing both right-to-left scripts, such as Arabic or Hebrew, and left-to-right scripts). The Unicode Consortium, the nonprofit organization that coordinates Unicode's development, has the ambitious goal of eventually replacing existing character encoding schemes with Unicode and its standard Unicode Transformation Format (UTF) schemes, as many of the existing schemes are limited in size and scope and are incompatible with multilingual environments. Unicode's success at unifying character sets has led to its widespread and predominant use in the internationalization and localization of computer software. The standard has been implemented in many recent technologies, including XML, the Java programming language, the Microsoft . NET Framework, and modern operating systems. Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8 (which uses one byte for any ASCII characters, which have the same code values in both UTF-8 and ASCII encoding, and up to four bytes for other characters), the now-obsolete UCS-2 (which uses two bytes for each character but cannot encode every character in the current Unicode standard), and UTF-16 (which extends UCS-2 to handle code points beyond the scope of UCS-2).

Saturday, November 9, 2019

Mediquip Case

1) The major strength that Thaldorf possesses is that the model of the CT scanner is the latest one. It is two years in advance, so that, there would be no risk of obsolescence for a long time. Moreover, they enjoy the word-of-mouth from their current consumers, i. e. other hospitals in the similar size of LUH. However, unlike their competitors, they do not understand the market situation and decision-makers well. There are more than one person involving in the decision making process but they do not know which one possesses the most of the power. Also, their price is not competitive enough.The price range of a CT scanner is wide and Mediquip charges at the upper end which could not meet expectation of price-sensitive buyers. 2) There are altogether 3 people in the decision making process. Professor Steinborn: a nationally-known radiologist. He is the one who use the scanner so he cares the quality and functions the most. Though he shows his favor to Mediquip, Mediquip still lost the order, so it seems he does not own a great power. Dr. Rufer: a physicist. His primary concern is the patients’ safety if the scanner could meet the technical specifications that he raised. Mr.Hartman: the general director of LUH. He put price as the top priority and also the durability of machines and delivery. It seems like he possesses the greatest power in the whole decision making process since price is the very major reason of the loss of order. 3) Generally speaking, Thaldorf could have effective and positive interaction with the above-mentioned persons. Though Professor Steinborn was once shocked that the price could not be discussed, he was soon pacified and even talked about his vacation. And he even told the Sigma’s price to Thaldorf, it shows his favor to Mediquip. ) September 3 Firstly, it was told by the secretary that there were a lot of heated discussions. It implies that there might be even arguments between Hartman who concerns price and Steinborn who favors Mediquip. And obviously, Steinborn lost from the discussions. And so, Hartman just like put-off Thaldorff asking him to give a final offer but the decision was made actually unless Mediquipp could really offer a competitive low price. 5) From this case, we should understand that, sometimes, possessing the newest model may mean nothing and we have to understand our customers better.You may encounter a lot of people during the process, but the important thing is to get the most powerful decision-maker pleased and favor to your product. Only that could bring you the order. Cause sometimes even your product is the best among the competitors, your customer may not know it. Therefore, the best practice is to formulate different strategies according to different customers, like if he is price-sensitive and do not know much about the product, different models with different prices could be introduced. And the customer could just choose whatever within his budget.

Thursday, November 7, 2019

One, 2, III Using Numbers in Academic Writing - Proofread My Paper

One, 2, III Using Numbers in Academic Writing - Proofread My Paper One, 2, III: Using Numbers in Academic Writing No matter what you’re studying, at some point in your academic career you’ll find yourself using numbers in your written work. This might not seem too problematic, but there are important differences between using numbers in formal academic writing and in everyday life. Numerals or Words? The biggest question when it comes to numbers in academic writing is whether to use numerals (1, 2, 3, 4, etc.) or words (one, two, three, four, etc.). The general guideline is to write smaller numbers up to ten as words, with numerals saved for larger numbers. Annoyingly, there is no consensus on this. For instance, the APA Style Guide recommends using numerals for ten and up (or â€Å"10 and up,† if we’re doing this the APA way). But the Chicago Manual of Style suggests spelling out all numbers up to one hundred. The important thing is to check your school’s style guide and use a consistent system throughout each paper you write. Roman Numerals You may also need to understand Roman numerals. These aren’t so common these days, but you do see them in things like copyright dates (MCMLXXXVI = 1986) and the names of monarchs (Queen Elizabeth II). Big Numbers Despite the above rule, some bigger numbers are expressed either as words or as a combination of words and figures. For example, it is to say: The Earth is 4.542 billion years old. But writing this out in numerals is a bit confusing, as there are many zeroes: The Earth is 4,542,000,000 years old. Commas and Hyphens Punctuating numbers correctly is also important. When expressing a number over one thousand, for example, it’s common to separate the thousands with a comma: One thousand = 1,000 One hundred thousand = 100,000 One million = 1,000,000 Hyphens, meanwhile, should be used either when expressing a number with more than one word (e.g., twenty-two) or when as part of an adjectival phrase modifying a noun (e.g., â€Å"I’m holding a seven-year-old grudge†). Dates, Years and Centuries Dates (e.g., 06/12/2013 or 6 December 2013) and years (e.g., 1948, 300-250 BCE) are usually written using numerals. Centuries, however, should be written out in full (i.e., â€Å"eighteenth century† rather than â€Å"18th century†). Technical Numbers In technical writing, such as in the sciences and math, it’s more common to use numerals than words. This is especially true when a number is followed by a unit of measurement. So, for instance, the weight â€Å"four grams† could be expressed as â€Å"4 g† or â€Å"4 grams.†

Monday, November 4, 2019

Business Essay Example | Topics and Well Written Essays - 500 words - 29

Business - Essay Example The aspect of King Arthur to be fully owned by employees implies that all its operations are done in accordance with the decisions of the employees. This model implies that employees are provided with ownership interest. The firm provides the employees with aspects like stock ownership, which may hardly have any up-front cost to such employees. In such a case, the employees take a key role in running the business organization including making informed decisions. Again, unlike other models where employees are completely kept out of issues concerning the business management, employees would have a feeling of accountability and would be pressurized by not only motivational factors but also factors associated with business ownership (Lewis,11). Working at the King Arthur Flour has a number of benefits. Unlike working in other business organizations where employees are kept in the dark as far as decision-making processes are initiated, working in this business organization would provide an employee with the advantage of being in a position to contribute to the business success. In cases where employees have no ownership to the firms they work in, it follows that the only motivational factor is the compensation. In the case of King Arthur Flour, employees understand that their efforts would yield some personal benefits. To the firm, benefits such as retaining good employees are achieved. This kind of ownership attracts and retains good employees. Small businesses or some business organizations that are perceived to have less attractive working environments have difficulties to attract or retain good employees (Lewis pg9). This happens as every good employee strives to get a bright chance in a good organization. Another benef it would be the aspect of buying out ownership. This happens when the original owners intends to leave

Saturday, November 2, 2019

Coffee And The Environment Essay Example | Topics and Well Written Essays - 500 words

Coffee And The Environment - Essay Example Pros of Coffee To the farmers, large-scale production of coffee resulted to fear trade. In Brazil, investments in coffee production began in 1970.Coffee production dramatically changed the lives of the thousands of small-scale farmers in Brazil. Production of coffee leads to deregulation, privatization and liberalization of agricultural production process in growing of coffee. Therefore, it leads to high production of coffee in the country (Cleland, P. 11). Value of Pros According to Masood Sadiq, and Tauseef Sultan coffee is one of the greatest sources of antioxidant. The Authors have also stated that black coffee, without milk or cream, has a low-calorie count (364).The calorie count of black coffee is two calories. However, only two cups of black coffee would be beneficial and taking more than two would be introducing a high level of caffeine in the body. In addition, other health benefits that are associated with drinking coffee are it protects against type II diabetes, liver cancer, and Parkinson disease. Cons of Coffee Coffee farming has several cons to the environment. The first problem associated with coffee farming is soil erosion. According to the author, countries like in Brazil have faced a significant challenge in coffee farming because of soil erosion. Most of the farms in Brazil and the crops were grown along the slope. It maximizes soil erosion has the water quickly moves down the slope carrying way the top soil. The soiled water also pollutes the available water bodies.