Wednesday, July 31, 2019

Theology essay

Lewis once said, â€Å"l believe In Charlatanry as I believe that the sun has risen not only because I see It, but because by It I see everything else. † I think this Is an extremely insightful quote to live by, especially if you are of the Catholic or Christian faith. I think what Lewis is trying to say is that we all know the sun exists because we see it rise every day, but because of the sun it is possible to see everything else on Earth. This relates back to Christianity because for Lewis he is saying that he can look t life in a different way than some people because he has the faith of God inside him.For example, I know someone who is completely immersed in their Catholic faith and to me they honestly seem to enjoy life every single day. Sure they have some bad days when some things don't go right, but even then they say that God has a reason for what has happened. When I think back to my friend and how they feel about life, and then compare that to my own faith and feel ings, there Is a complete difference. I am not proud to say this but I will: I have lost my faith throughout the years and moieties life Is Just a bleak thing I have to go through some days.After reading this quote I seriously considered how my life would be different if I had full faith in the Lord, and I think it would be more optimistic than how I feel now. There is a show on television called â€Å"19 kids and counting† and they are a very religious family who puts the Lord before anything else. One day while watching the show the older children were talking about a topic and then they proceeded to say how if you can't be happy even with God, how can you be happy without him? This is another statement I believe makes sense and goes along with Lewis' quote.For many, God is the one who lights the path for them to walk, and I really do believe being religious makes a person happier. Some may say that it Is the congregation of people and friends that gather In a church and sh are the same beliefs, but I think It Is the knowing and believing In a higher power always being there and never leaving your side that makes one happier than someone who does not believe in God. Christianity affects one's worldview significantly. A worldview is the framework from which we view reality and make sense of life and the world. [It's] any ideology, philosophy, theology, movement or religion that provides an overarching approach to understanding God, the world and man's relations to God and the world,† says David Nobel, author of Understanding the Times. For example, a 2-year-old is egocentric and believes they're the center of his or her own world, a secular humanist believes that the material world is all that exists, and a Buddhist believes he can be liberated from suffering by self-purification. Someone with a biblical worldview believes their primary reason for existence Is to love and serve God.Whether they know It or not, every person has some type of worldvi ew. A personal worldview Is a combination of all you believe to be true, and what you believe becomes the driving force behind every emotion, decision and action. Therefore, it affects your response to every area of life: from everything. A biblical worldview is based on the Word of God. When you believe the Bible is entirely true, then you allow it to be the foundation of everything you say and o. There is a problem though: nonpolitical worldview ideas bombard us constantly from television, film, music, newspapers, magazines, and books.For example, most Christians would agree with 1 Thessalonians 4:3 and other Scriptures that command us to avoid sexual impurity, but how often do Christians fall into lust or premarital sexual sin? If we don't really believe the truth of God and live it, then our witness will be confusing and misleading. Most of us go through life not recognizing that our personal worldviews have been deeply affected by the world. Through the media and other influenc es, the secularists American view of history, law, politics, science, God and man affects our thinking more than we realize.We then are taken â€Å"captive through hollow and deceptive philosophy, which depends on human tradition and the basic principles of this world rather than on Christ† (Colombians 2:8). However, by learning, applying and trusting God's truths in all area of our lives -? whether it's watching a movie, going to school, raising a family or working at the office -? we can egging to develop a deep comprehensive faith that will stand against the evil of our culture's nonpolitical ideas (Wordsmith. Mom). If we embrace more of God's worldview and trust it with unquestioning faith, then we begin to make the right decisions and form the appropriate responses to questions on abortion, same-sex marriage, cloning, stem-cell research and even media choices. Because, in the end, it is our decisions and actions that reveal what we really believe. â€Å"Do not conform a ny longer to the pattern of this world, but be transformed by the renewing of your mind.

Tuesday, July 30, 2019

Social Construction of Crime

Social Construction of Crime The obvious definition of crime is the legal definition of an act which breaks the law. It is a social construction as it varies across culture, time and law. Crime is defined by a society's own rules, norms and beliefs at any given time in history. Hazel Croall emphasizes pathological way and social construction of crime in the book. An analysis of reasons of crime reveals the fact that crime is a functional part of a society, constructed by society in political, economical and cultural aspects and affects the society as a loop back. Crime is created by the government by choosing to outlaw something. Government creates what crime is or not. For instance all non-violent drug offenses are crimes that would not be considered crimes if the government hadn't made drugs illegal. That is one form of how government constructs crime. Another is that it constructs crime for its own interests. Money tracking laws and tax evasion are in this category. In fact the best way to make money is to get the government to force people to give it to you. Such as in America the drugs of the rich and middle class are either legal, or not strongly enforced. Generally celebrities who use cocaine do not do serious jail time but the drugs of the poor and minorities are illegal because they cannot afford to pay commissions. Consequently as lawmakers consider crime as a creation of the citizens, in fact crime is a creation of lawmakers who decided to limit civil freedoms by their own moral standards. However crime could change across cultures and times. For example, polygamy is illegal in Turkey but acceptable in many African cultures. Cannabis tincture was permissible as a painkiller in Victorian times but today possession of cannabis is illegal in UK. Crime is present in every society through the history. Therefore Durkheim argues that it could be assumed to be normal and its function determined (14). Crime unifies the community, as it clarifies and strengthens moral sentiments, the collective conscience and the rules. On the other hand, Downes and Rock object this idea, claiming that crime may isolate people by making them stay in at night, lock their doors and avoid talking to strangers (15). But these are valid for too much crime. Excessive crime leads people to disintegration, while too little crime is the product of too strong social control. Hence crime rates must not be excessively high or excessively low in order to crime could be functional. According to Durkheim, the cohesion and solidarity of pre-industrial societies broke up with the growth of industry (16). People started to have fewer moral standards or constraints to guide them. People’s expectations increased with the economic growth. Materialism and wealth became universal goals. And he called anomie as the search for attainable goals. Anomie reflects in society as many ways such as conformists, innovators, retreatists. Frustration and hopelessness as a result of boundless aspirations direct people to crime as another chance to achieve their goals. That is the inevitable social construction of crime that arises with industrialization Furthermore crime can be related to economic conditions. Firstly unemployment is one of the important reasons to increase crime. Crow, consider increases in unemployment as a threat to law and order (34). With globalization, many traditional crafts and skills became redundant. Therefore unskilled workers could not find long-term jobs and opportunities for career progression. As Taylor says, economic cycles of growth and recession produce changes in employment and consumption (34). Unemployment is popularly linked to crime. But the employed people also commit crime and all the unemployed people are not criminals. Such as the retired, the idle rich or the redundant executive could commit crime. Because worklessness means having more time and opportunity to commit crime. Secondly another economic reason of crime is the market policies. Currie argue that market society promotes crime by increasing inequality and concentrated economic deprivation, weakening capacity of local communities, stressing and fragmenting the family and withdrawing public provision of basic services (40). These policies affect not only lower class but all kinds of crime. â€Å"The encouragement of individualism and the aggressive pursuit of profits can be associated with law breaking among managers and executives and with an increase in financial frauds. Economic and industrial changes have also affected organized crime which can become an alternative labour market† (Croall, 41). To sum up, economic reasons take a large part in social construction of crime. Most importantly, crime arises in certain places in which there is the blatant segregation of the rich and poor. Mostly people tend to live in the same areas with other people who earn the same amount of money. In low income areas, people see crime as a way to make a few extra dollars. Therefore poor people commit crime more than other people and that forms the ‘underclass’ notion. But it is government responsibility for the economic and social policies which produce these conditions. Government is supposed to do necessary regulations to protect poor people to commit crime. Taking into account all these factors mentioned above, we can safely arrive at the conclusion that crime is inevitable reality of humanity. Although there are a few exceptions, crime do not occur due to a criminal disease or a criminal gene. It’s constructed in society rather than individually. Society creates crime, then crime affects society. In conclusion crime is what a society chooses it to be, and the crime rate is what the society chooses it to be.

Library Management System Essay

Name of the Project Vision Online Library Online Library is a system, which maintains books in the server in any format. It allows storing books, documents, audio and video files. User can Search and open documents by giving a simple query. Online Library Management System is a system, which maintains books, documents, audio/video files. To use this system user must be a member in this. Then user allowed storing books, documents, A/V files. Then user can search by giving a simple query. It is very difficult search books manually. Online Library makes easy. Deliverables / Functional Specifications Online Library uses user internal feedback from user to improve search process in every searching. It also uses indexing to locate documents very fast in searching which relate to query. Main aim of online Library system is providing highly relevant documents in very short period after giving query. It is just like Search Engine. It uses Vector space Model and Probabilistic Model to find similarity coefficient, weights. User Interface Requirements Database Centralized ONLINE LIBRARY BY M.SATHISH KUMAR Page 2 Browser based DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Requirements Integration Requirements Preferred Technologies J2EE Technologies i.e. JSP, Servlets, jdbc Frontend: – Html, JavaScript, Java Server pages. Backend: – Oracle 10g. Hardware Requirement Pentium 4 processor with 256 MB RAM, 40 GB Hard disk Web based Interface ONLINE LIBRARY BY M.SATHISH KUMAR Page 3 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 INTRODUCTION ONLINE LIBRARY BY M.SATHISH KUMAR Page 4 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 INTRODUTION Online Library Management System is a system, which maintains books, documents, audio/video files. To use this system user must be a member in this. Then user allowed storing books, documents, A/V files. Then user can search by giving a simple query. It is very difficult search books manually. Online Library makes easy. Online Library uses user internal feedback from  user to improve search process in every searching. It also uses indexing to locate documents very fast in searching which relate to query. Main aim of online Library system is providing highly relevant documents in very short period after giving query. It is just like Search Engine. It uses Vector space Model and Probabilistic Model to find similarity coefficient, weights. Existing System Early days Libraries are managed manually. It required lot of time to record or to retrieve the details. The employees who have to record the details must perform their job very carefully. Even a small mistake would create many problems. Security of information is very less. Report generations of all the information is very tough task. Maintenance of Library catalogue and arrangement of the books to the catalogue is very complex task. In addition to its maintenance of member details, issue dates and return dates etc. manually is a complex task. All the operations must be performed in perfect manner for the maintenance of the library without any degradation, which may finally result in the failure of the entire system. Benefits of automation Automation is procedure of converting a traditional system in to a computer organization. To overcome the defects of the existing system automation was introduced by the computerization of organization we get many benefits. ONLINE LIBRARY BY M.SATHISH KUMAR Page 5 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 The main objectives of undertaking this project are: ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · The students will register them through Online Individually each member will have his account through which he can access the information he needs. Books, documents, A/V files are stored in server. User will enter simple  query in text box and click on the Search button. Server takes the request and processes it. Returns hyper links of documents with their names, ranks weights and description. If the user clicks on name of the document then it will open with respective program and rank of document will increase for that query.(for example .pdf files with Adobe Reader) User can upload documents, books and a/v files. Time consuming is low, gives accurate results, reliability can be improved with the help of security. Proposed System: To solve the inconveniences as mentioned above, an Online Library proposed. PROCESS LOGIC: 1. The user inputs data (e.g.: fills out an HTML form and clicks the submit button.) 2. The client (Browser) sends the data to the web server in a standard format (i.e., the GET method or the POST method). 3. The web server launches the program specified by the user and feeds it the input (form) data. 4. The program (e.g.: servlet) processes the form data and produces another HTML page. 5. The web server sends back the HTML page to the browser. The web browser then displays the response page. ONLINE LIBRARY BY M.SATHISH KUMAR Page 6 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ANALYSIS Analysis is the process of understanding the existing system by gathering and interpreting the facts, diagnosing the problems. It is not just to determining the how best to solve the manual system problems, it should also work for the system observes the feasibility of system then design, coding phases will be executed. Analysis phase delivers requirements specification .The system specification serves as an interface between the designer and  developer as well as between developers and users. This describes the external behavior of the software without bothering about the internal implementation. Specification must be carefully checked for suitability, omission, inconsistencies and ambiguities. Problem analysis is performed to getting a clear understanding of the needs of the clients and the users and what exactly desired form the software. Analysis leads to the actual specification. During the process of analysis, a massive amount of information is collected in the form of interviews, questionnaires, and information from documentation, and so forth. The major problem during analysis is resolving how to organize the information from documentation, and so forth. So the information can be effectively evaluated for completeness and consistency. ONLINE LIBRARY BY M.SATHISH KUMAR Page 7 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 REQUIREMENT SPECIFICATION FUNCTIONAL MODEL / USE CASE MODEL IDENTIFYING ACTOR: 1. Administrator: He should register new Users, Delete Users etc. He can upload new documents, Documents, and A/V files. 2. User: He should register in site in order to access books. He can search for books. He can upload new books, documents, and A/V files into server. IDENTIFYING SCENARIOS: A Scenario is a scene, which explains a particular situation in more visualized model. A scenario consists of actors, scenes, and flow of events. In our project, we have the following scenarios: Scenario for Searching of EBooks, Document or A/V file: Scene Name Actors Flow of events Searching for books. User/Administrator User Opens home page of site. It will display text box and Search button. User simply enter query into text box, clicks on Search button. Browser sends request to the server. Server search documents for query and sends hyperlinks to documents (with weight, ranks, and a small description about document) in order of relevance to the query. ONLINE LIBRARY BY M.SATHISH KUMAR Page 8 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Scenario a for Opening EBook, Document or A/V file: Scene Name Actors Flow of events Opening Book, Document, or A/V file. User / Administrator User clicks on hyperlink of Document by reading description about document that had displayed below hyperlink. Then browser sends a request to the server again. The request contains name of document which user wants to open. The server will increase rank for document with respect to query into order to increase the relevance. Then server sends the document file in the form of response to browser. Now browser will open the document by using related application program on client system. (For example if server sent .mp3 file then browser opens it by using audio player, which installed on client‟s computer. Of course, Browser needs permeation of System Administrator to access application program.) ONLINE LIBRARY BY M.SATHISH KUMAR Page 9 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Scenario for Uploading a EBook, Document or A/V file into Server: Scene Name Actors Flow of events Uploading Administrator / User First User clicks on hyperlink of â€Å"Upload document†. Then browser sends request to upload file. Server return a webpage to browser it contains text box and browse button. By clicking on browse button a file window is displayed which allows to user to select a document from clients computer. After selecting document users click on upload button. Server checks for its extension. If document is.exe file server will not allow uploading file for the purpose of security. Then server insert name of document into documents table with unique document id. Then server creates index for document and insert into indexes table. Server returns a webpage, which contains confirmation and document id. ONLINE LIBRARY BY M.SATHISH KUMAR Page 10 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Scenario for Modifying Users: Scene Name Actors Flow of events Modifying Users Administrator If login user is admin then homepage contains a special Hyperlink that â€Å"modify user.† If admin clicks on that hyperlink he will navigate to another webpage which contains details of users. In that admin can modify user details admin can delete users who violated terms of site. IDENTIFYING USE CASES: A use case is a description of systems behaviour from a user‟s standpoint. It is a tried and true technique for gathering systems requirement from a user‟s point of view. ONLINE LIBRARY BY M.SATHISH KUMAR Page 11 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 USE CASE DIAGRAMS Use case diagram for entire Online Library System: ONLINE LIBRARY BY M.SATHISH KUMAR Page 12 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Use Case Diagram for Searching: Use case Diagram for Uploading file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 13 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 SEQUENCE DIAGRAMS Sequence Diagram for Searching: ONLINE LIBRARY BY M.SATHISH KUMAR Page 14 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Sequence Diagram for uploading file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 15 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Sequence Diagram for Opening file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 16 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 COLLABORATION DIAGRAMS Collaboration Diagram for Searching: ONLINE LIBRARY BY M.SATHISH KUMAR Page 17 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Collaboration Diagram for uploading file: Collaboration Diagram for Opening file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 18 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ACTIVITY DIAGRAMS Activity Diagram for Searching: ONLINE LIBRARY BY M.SATHISH KUMAR Page 19 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Activity Diagram for Uploading file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 20 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Activity Diagram for Opening file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 21 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 CLASS DIAGRAMS DBHandler Class: DBHandler is respnosible for performing all operations which are need interaction with Database. It perform all operation in database like inserting document, creating index, inserting query, mating database consistency , creating tables, recovering database when database crashed. It highly simplifies maintains of database. Adminstrator need not worry about database at any time. ONLINE LIBRARY BY M.SATHISH KUMAR Page 22 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 VectroSpaceModel Class: VectorSpaceModel is class it responsible for calculating similarity coefficients of documents with respect to query. After calculating similarity coefficient it passes documents with similarity coefficients to probabilistic model class, which will finds weights using similarity coefficients. ProbabilisticModel Class: Probabilisticmodel class responsible for calculating weights for documents using similarity coefficients. After calculating weights, it will get ranks for documents from rank table. And return documents to Search class. ONLINE LIBRARY BY M.SATHISH KUMAR Page 23 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Read Class: Read class for responsible for reading text from text files. It will read text from different format of text files. For example .doc, .pdf, .xls, .txt, .html etc. It read reads text and clean text and returns as string. If the file is not text file then it will return name and extension of file as string. Search Class: Search Class acts as driver class. It does not perform any tasks. It makes all class working together. ONLINE LIBRARY BY M.SATHISH KUMAR Page 24 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 DEPLOYMENT DIAGRAM ONLINE LIBRARY BY M.SATHISH KUMAR Page 25 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 DESIGN SOFTWARE STRUCTURE: Software is fundamental characteristic of computer software. Software structure is to decompose the complex groups of module into sub modules i.e., Process, Menus, Inputs and Reports. The most general form of the software structure is the network. The structure is the network. The structure inside a complex processing node might consist of concurrent processes executing in parallel and communication through some combination of shared variables. DATABASE DESIGN: Planning the Database: The most important consideration in designing the database is how the information will be used. ïÆ'Ëœ Business activities that will use the database to perform. ïÆ'Ëœ Business rules that apply to these activities ïÆ'Ëœ Data wanted to maintain in the database The main objectives of designing a database are ïÆ'Ëœ ïÆ'Ëœ ïÆ'Ëœ Data integration Data integrity Data independence DATA INTEGRATION: In a database, information from several files is co-ordinate, accessed and operand upon as though it is single file. ONLINE LIBRARY BY M.SATHISH KUMAR Page 26 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Logically, the information is centralized, physical, the data may be located facilities. Design Methodology: Design is concerned with identifying software components, specifying relationships among component, specifying software structure and providing a blue print for the implementation phase. Design consists of three types: 1. Architectural Design 2. Detail Design 3. External Design Architectural Design: Architectural Design involves identifying the software components, decoupling and decomposing them into processing modules and conceptual data structure and specifying relationships among the components. Detailed Design: Detailed design is concerned with the details of how to package the processing modules and how to implement the processing algorithms, data structure and interconnection among modules and data structure. GUI based design: In order to have a better understanding over the system design, it is appropriate to know the actual designing in terms of the development platform and the way in which the GUI are designed to satisfy the requirements of the user. The analysis of the design aspects of this package is proposed External design. External design of software involves conceiving, planning and specifying the external observable characteristics in different devices connected though data communication ONLINE LIBRARY BY M.SATHISH KUMAR Page 27 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 of a software product. This includes reports and display formats. External design begins analysis phase it continues into the design phase. DATA INTEGRITY: Data integrity means storing all the data in single place and allow each application to access it. This approach results in more consistent, on update being sufficient to achieve a new record status for all the applications, which use it. This leads to less data redundancy, data items need not be duplicated, requirement. DATA INDEPENDENCE: Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the content and organization of physical data without reprogramming of applications and to allow modifications to application programs without the reorganizing the physical data. Normalization: Data structuring is refined through a process called normalization. Normalization is a formal process of developing data structures in a manner that eliminates decomposition redundancy and promotes integrity. of complex records into simple It is a step-by-step records to reduce a reduction in the direct access storage  redundancy, inconsistencies and remove anomalies. There are several normal forms to be followed in normalization process. The most important and widely used are: ï‚ · ï‚ · ï‚ · ï‚ · ONLINE LIBRARY BY M.SATHISH KUMAR Page 28 First Normal Form Second Normal Form Third Normal Form DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 First Normal Form: A table is said to be in first normal form if the intersection of any column and row contains only value. Method: This is identifying a suitable identifier from the pool of normalized data. Remove any item that repeat within a single value of this key to another relation bringing with them the identifier key to form part of new composite key in the relation. Second Normal Form: For a table to be in the second normal form it should also be in the first normal form and the values in every column are functionally dependent on the complete primary key. Method: Examine every column and section whether its value depend on the whole of  the compound key or just some parts of it. Remove key. Third Normal Form: For a table to be in the third normal form transitively dependent on the primary key. Method: Examine every non-key column with every other non-key column. If the value of the non-key column depends on the other non-key column then remove the columns to separate table. it should be in the those that depend only on part of the key to a new table with that part as the primary second normal form and the values in every non-key column are not ONLINE LIBRARY BY M.SATHISH KUMAR Page 29 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 De Normalization: The normalization process helps in reducing to a great extent but sometimes when information is required from more than one table, at a fast rate , it is desirable to have some degree of redundancy in table . Their deliberate introduction of redundancy for a highly improved performance is referred to as † De Normalization† . DATABASE TABLES: 1. QUARRIES: The QUARRES table can store quarries entered by user with unique ID (QID). It is stores unique quarries irrespective order of words and case of letters. 2. DOCUMENTS: The DOCUMENTS table can hold name of documents, which are in server with unique ID for every document. 3. WORDS: The WORDS table can store words, which are in documents. This table plays key role in creating index for documents. This table contains a unique ID and words column. Unique words can be stored in this table irrespective of case of letters. 4. RANKS: The RANKS table can hold rank and weight for each document with respect to query. This table contains four columns. QID and DID are refer QID of QUERRIES and DID of DOCUMENTS table respectively. 5.  INDEX: The INDEX table helps to search engine while searching for documents, which are relate to query given by user. Simply it makes fast Searching. It contains two columns WID, DID refer WID of WORDS, DID of DOCUMENTS tables. 6. USERDETAILS: The USERDETAILS can hold details of users. Username, user-id, password etc. ONLINE LIBRARY BY M.SATHISH KUMAR Page 30 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ENTITY RELATIONSHIP DIAGRAMS ONLINE LIBRARY BY M.SATHISH KUMAR Page 31 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ABOUT THE SOFTWARE INTRODUCTION: HTML stands for hyper text makeup language. It is a language used to create hypertext documents that have hyperlinks embedded in them. You can build web pages. It is only a formatting language and not a programming language. Hyperlinks are underlined or emphasized words or locations in a screen that leads to other documents, W W W is a global, Interactive, dynamic, cross Platform, graphical hypertext information system. The idea behind hypertext is that instead of reading text in rigid linear structure you can easily jump from one point to another. You can Navigate through the information based on your interest and preferences. HYPERMEDIA HTML pages with audio and video files linked to them are called Hypermedia. HTML is platform independent. HTML IS PLATFORM INDEPENDENT: If you can access internet, you can access WWW, Irrespective of your operating system and the operating system to the web server. All you require to view and unload the HTML files, which are on the WWW, are a browser and internet connection. WEB IS DISTRIBUTED: The information on the WWW is distributed through out the world. You can access it with a few mouse clicks. You do not have to store it on your machine. Information on the Web is dynamically updateable. As the information is at the site where it is published, the people who publish it can change it any time. HTML is a language for describing structured documents, HTML describes the structures of documents – lists, headings, paragraphs Etc. Elements of web documents are labeled through the usage of HTML tags, It is the tags that describe the documents. Anything that is not a tag part of the Document itself. ONLINE LIBRARY BY M.SATHISH KUMAR Page 32 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 The Static Web When the World Wide Web was born, it consisted of static Web sites. Web sites consisted of static documents (mostly HTML pages) that were accessible through Web servers. Users used Web browsers to access these Web sites. A Web browser communicated with a Web server over the Hyper Text Transfer Protocol (HTTP). Using an HTTP request, the browser communicated with the Web server and asked to get access to a certain document. The Web server managed a set of documents stored on a file system. When asked for a document, it would retrieve it and return it within an HTTP response: HTML DOES NOT DESCRIBE PAGE LAYOUT: World for windows or lotus improve for example, have different styles for Headings, font, Size, and identification. HTML does not have all these. Based on the plat form , exact placement or appearance of any element will change. There may be or may not be fonts installed. By separating the structure of the document and its appearance, a program, that reads and understands HTML can make formatting decisions based on capabilities of the individual platform . In addition to providing the networking functions to retrieve documents, Web browsers are also HTML formatters. ONLINE LIBRARY BY M.SATHISH KUMAR Page 33 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 They parse and format documents and display them on the screen. Different rowsers show data differently. ADVANTAGES : A HTML document is small and hence easy to send over the net. It is small because it does not include format information. HTML documents are cross platform compatible and device independent. You only need a HTML reliable browser to view them. Font names, locations Etc.. are required. Currently the standard fully supported is HTML 2.0 & HTML 3.0 is in use. It supports. Centered and right aligned text. Tables . Math equations Text and image alignment JAVA INTRODUCTION Java is an intercepted language. Though it bears a close resemblance to C++ , it is different from it in many ways. It is a smaller,  portable, purely object oriented Language that eliminates many of the sources of bugs and complexities that are common with C Or C++ . JAVA FEATURES: Java is simple, Object Oriented, Intercepted, Robust, Secure Architecture neutral, Portable, has high performance, multi threaded and dynamics. It is easier To use Java because it’s syntax is similar to C and C++, more so when it eliminates components of C that causes bugs and memory leaks and hence a lot less debugging, Java provides a powerful Set of pre-tested libraries that give us the ability to use advanced features even with few lines of Code. OBJECT ORIENTED Java is an Object oriented programming Language that uses software objects called CLASESS and it is based on reusable, extensible code. This implies we can use Java’s classes, which are sets of variables and method s, as ONLINE LIBRARY BY M.SATHISH KUMAR Page 34 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 templates to create other Classes with added functionality without the need to write the code from Scratch. The Application can be made small and easy to develop if we plan the class hierarchy well. Robust: Java is Robust because, the language removes the use of pointers and The Java Runtime System manages the memory for us. Java gives us automatic bounds checking for arrays, so that they cannot reside in an address space which is not allocated for them. Automatic memory management is taken care of by the Garbage Collector. Interpreted: Java is interpreted; hence the development cycle is much faster. Java needs to compile for a single, virtual machine and then the code can run on any machine that has JVM ported to it. Secure: Java is secure, so user can download Java programs from anywhere. Java provides extensible compile time checking followed by a multi layered level of runtime Checking. Architecture Neutral: Java is architecture neutral, so user applications are portable across multiple platforms. Java’s Applications are written and compiled into Byte Code for JVM, Which emulates an actual hardware chip. The Java Interpreter installed at the client, so applications need not be written for various platforms separately converts byte Code to machine code. Java further ensures that the applications are the same on every platform by strictly defining the sizes of the basic data types and their behaviour. Dynamic: Java is Dynamic., so the applications are adapted to changing environments, Java’s architecture allows the user to dynamically load classes at runtime from any where on the network, which means that the user can add functionality to applications by simply linking in new classes. ONLINE LIBRARY BY M.SATHISH KUMAR Page 35 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 JDBC OVERVIEW What is JDBC? JDBC is a Java TM API for executing SQL statements. It consists of a set of classes and interfaces written in the JAVA programming language that makes it easy to send SQL statements to virtually any relational database. In other words, with the JDBC API, it isn’t necessary to write one program to access a Sybase database, another program to access an Oracle database, another program to access an Informix database, and so on. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. And, with a program written in the JAVA programming language, one doesn’t have to worry about writing different programs to run on different platforms. The combination of JAVA and JDBC lets a programmer write it once and run it anywhere. JAVA, being robust, secures, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language basis for database applications. What i s needed is a way for JAVA applications to talk to  variety of different databases. JDBC is the mechanism for doing this. JDBC extends what you can do in JAVA. For example, with JAVA and the JDBC API, it is possible to publish a web page containing an applet that uses information obtained from a remote database. Or an enterprise can use JDBC to connect all its employees (Even if they are using a conglomeration of Windows, Macintosh and Unix machines) to one or more internal databases via. An Internet. With more and more programmers using the JAVA programming language, the need for easy database access from JAVA is continuing to grow. MIS managers like the combination of JAVA and JDBC because it makes disseminating information easy and economical. Business can continue to use their installed databases and access information easily even if it is stored on different database management systems. Development time for new applications is short. Installation and version controls are greatly simplified. A programmer can write an application or an update once, put it on the server and everybody has access to the latest version and for business selli ng information services, JAVA and JDBC offers better way of getting out information updates to ONLINE LIBRARY BY M.SATHISH KUMAR Page 36 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 external customers. Various ways to use JDBC are discussed in. What Does JDBC Do? Simply put, JDBC makes it possible to do three things: Establishes connection to databases. Send SQL statements. Process the results. JDBC is a Low-level API and a base for Higher-Level API. JDBC is a â€Å"Low-level† interface, which means that it is used to invoke SQL commands directly. It works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed also to be a base upon which to build higher-level interfaces and tools. A higher-level interface is â€Å"User-friendly†, using a more understandable or more convenient API that is  translated behind the scenes into a Low level interface such as JDBC. So why not just use ODBC from Java? The answer is that you can use ODBC from JA V A, but this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge. The question now becomes â€Å"Why do you need JDBCT’ There are several answers to this question: 1. ODBC is not appropriate for direct use from Java because is uses a C interface. 2. Calls from Java to native C code have a number of drawbacks in the security, 1. implementation, robustness, and automatic probability of applications. A literal translation of the ODBC API into a Java API world not desirable. For example, Java has no pointers, and ODBC makes copious use from, including the notoriously error-prone generic pointer â€Å"void *†. You can think as JDBC as ODBC translated into an object-oriented interface that is natural for Java programmers. 2. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the other ONLINE LIBRARY BY M.SATHISH KUMAR Page 37 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 hand, was designed for a wide range of programmers and keeps simple things simple. 3. A Java API like JDBC is needed in order to enable an â€Å"all-Java† solution. When ODBC is used, the driver manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in JAVA, however, JDBC code is automatically installed, portable, and secure on all Java platforms from network computers to mainframes. In summary, the JDBC API is natural JAVA interface is to the basic SQL abstractions and concepts. It builds an odbc rather than starting from search, so programmers familiar with odbc will find it very easy to learn JDBC. JDBC retains the basic design features of ODBC; infarct, both interfaces are based on the x/Open SQL CU( call level interface). The big difference is that JDBC builds on and reinforces the style and virtues of  Java, and of course, it is easy to use. ADVANTAGES. Until now, the middle tier has typically been written in languages such as C or C++, which offer fast performance. However, with introduction of optimizing compilers, translating Java byte code into efficient machinespecific code, it is becoming practical to implement the middle tier in Java. This is a big plus, making it possible to take advantage of Java’s robustness, multi-threading and security features. SOL Conformance Structured Query Language(SQL) is the standard language for accessing relational databases. One area of difficulty is that almost most DBMSs(Database Management Systems) gives a standard form of SQL for basic functionality, they do not conform to the more recently defined standard SQL syntax or semantics for more advanced functionality. For example, not all databases support stored procedures or outer joins, and those that do are not consistent with each other. It is hoped that the portion of SQL that is truly standard will expand to include more functionality. In the mean time, however, the JDBC API must support SQL as it is. One way the JDBC API deals with the problem is to allow any query string to be passed through to an underlying DBMS driver. This means that an application is iTee to use as much SQL functionality is desired, but it runs the risk of receiving an error on some DBMS. In fact an application query need not even be an SQL, or it may be a specialized derivation of SQL designed for specific DBMS(for document or image queries). For example, a second way JDBC deals with the problems of SQL conformance is to provide ODBC style escape clauses. Which are discussed in SQL Escape Syntax in Statement objects. This escape syntax allows a programmer to use SQL ONLINE LIBRARY BY M.SATHISH KUMAR Page 38 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 functionality item within a JDBC program. The ODBC API is a natural choice for Java developers because it offers easy database access for Java  applications and applets. Because JDBC brings together Java and databases, the remainder of the topic gives a brief overview of each. JDBC DRIVERS The JDBC drivers that we are aware of at this time fit into one of four categories. 1. JDBC-ODBC bridge plus ODBC Driver: The JavaSoft bridge product provides JDBC access via ODBC drivers. Note that ODBC binary code and in many cases database client code must be loaded on each client machine that uses this driver. As a result, this kind of driver is more appropriate on a corporate network where client installations are not a major problem, or for applications server code written in Java in a three-tier architecture. 2. Native-Api partly – JAVA Driver: This kind of driver converts JDBC calls into calls on the client api for Oracle, sybase, Informix, DB2, or other DBMS. Note that, like the bridge driver this style of driver requires that some binary code be loaded on each client machine. 3. JDBC-Net all– JAVA Driver: This driver translates JDBC calls into a DBMS independent net protocol, which is then translated to a DBMS protocol by a server. This net server middleware is able to connect its all-Java clients to many different databases. The specific protocol used depends on the vendor. In general, this is the most flexible JDBC alternative. It is likely that all vendors of this solution will provide products suitable for internet use. In order for these products to also support internet access, they must handle the additional requirements for security, access through fire walls, etc., that the web imposes. Several vendors are adding JDBC drivers to their existing database middleware products. 4. Native – Protocol all-Java Driver: This kind of driver converts JDBC calls into the network protocol used b: dbms’s directly. This allows a direct call from the client machine to the dbms server and is a practical solution for internet access. Since many of ONLINE LIBRARY BY M.SATHISH KUMAR Page 39 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 these protocols are proprietary, the database vendors themselves will be the  primary source. Several database vendors have these in progress. Eventually, we expect that categories 3 and 4 will be the preferred way to access databases from JDBc. Driver categories 1 and 2 are in term solutions where direct all-Java drivers are not yet available. Category 4 is in some sense the ideal; however, there are many cases where category 3 may be preferable: e.g., where a thin dbms in dependent client is desired, or if a dbms-independent protocol is standardized and implemented directly by many dbms vendors. SERVLETS Introduction: The Java web server is JavaSoft’s own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the browser. About Servlets: Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and incomplete interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the client-side – object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable helper byte code objects on ONLINE LIBRARY BY M.SATHISH KUMAR Page 40 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 the server side that can be used to dynamically extend server-side  functionality. For example, an HTTP Servlets can be used to generate dynamic HTML content. When you use Servlets to do dynamic content you get the following advantages: ïÆ'Ëœ They‟re faster and cleaner than CGI scripts ïÆ'Ëœ They use a standard API (the Servlets API) ïÆ'Ëœ They provide all the advantages of Java (run on a variety of servers without needing to be rewritten). Attractiveness of Servlets: There are many features of Servlets that make them easy and attractive to use. These include: ïÆ'Ëœ Easily configured using the GUI-based Admin tool ïÆ'Ëœ Can be loaded and invoked from a local disk or remotely across the network. ïÆ'Ëœ Can be linked together, or chained, so that one Servlets can call another Servlets, or several Servlets in sequence. ïÆ'Ëœ Can be called dynamically from within HTML pages, using server-side include tags. ïÆ'Ëœ Are secure – even when downloading across the network, the Servlets  security model and Servlets sandbox protect your system from unfriendly behavior. Advantages of Servlet API One of the great advantages of the Servlet API is protocol independence. It assumes nothing about: ïÆ'Ëœ The protocol being used to transmit on the net ONLINE LIBRARY BY M.SATHISH KUMAR Page 41 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ïÆ'Ëœ How it is loaded ïÆ'Ëœ The server environment it will be running in ïÆ'Ëœ These qualities are important, because it allows the Servlet API to be  embedded in many different kinds of servers. There are other advantages to the Servlet API as well. These include: ïÆ'Ëœ It‟s extensible – you can inherit all your functionality from the base classes made available to you. ïÆ'Ëœ it’s simple, small, and easy to use. Features of Servlets: ïÆ'Ëœ Servlets are persistent. Servlet are loaded only by the web server and can maintain services between requests. ïÆ'Ëœ Servlets are fast. Since Servlets only need to be loaded once, they offer much better performance over their CGI counterparts. ïÆ'Ëœ Servlets are platform independent. ïÆ'Ëœ Servlets are extensible. Java is a robust, object-oriented programming language, which easily can be extended to suit your needs ïÆ'Ëœ Servlets are secure. ïÆ'Ëœ Servlets can be used with a variety of clients. Loading Servlets: Servlets can be loaded from three places From a directory that is on the CLASSPATH. The CLASSPATH of classes reside. From the

Monday, July 29, 2019

Introduction Essay Example | Topics and Well Written Essays - 250 words - 4

Introduction - Essay Example Quite successfully, the team came up with a barge design with Styrofoam, covered by wood. Many parameters like water resistance, speed and other stress load factors are considered to develop the design successfully. However, there will be a factor of uncertainty in the real world design (Ullman 314). A barge with rails, rope, claw and a hole-saw drill is the basic mechanical design for the floating Styrofoam salvage to transport the material. The claw is designed to catch the object under the water upon a trigger that is a simple electrical design. The hole saw drill has a threaded rod which again works on an electrical trigger. The movement of barge is made possible with a rope and rail mechanism. The prototype design was developed considering a water tank as the surrounding and limited environmental factors. The output that we obtained based on the design calculation was near to perfection, under the provided limited information. Considering the QFD process, the design planning process, the overall project performance taking into account the various parameters, gave a satisfactory results. Though the team was not working under a result-oriented platform, the conclusions that we could make on the design process turned out to be

Sunday, July 28, 2019

Paper 3 Essay Example | Topics and Well Written Essays - 250 words - 2

Paper 3 - Essay Example Therefore according to the engineering code of conduct, such a scenario falls under the technical coordination, the behavioral responses and drawing up conclusions based on the cultural knowledge. Therefore, the actions that I will most likely take are based on placing at heart the issue of quality control and in accordance to the context of the engineer’s code of conduct. In accordance to the above engineering case study, the applicability of the code of ethics and consideration of engineering as a social experiment comes out clearly. For instance, according to the ASCE code of standards, engineers are supposed to take actions based on the social and ethical responsibility and within the context of divergent cultures. Therefore the actions that were likely taken and also that were least likely to be taken were based on the fact that engineers have a moral responsibility to ensure improved safety and societal conditions and also take actions regardless of the diversity of the engineering setting case presented. Therefore in accordance to the responses and the case study presented, it is clear that the issues of ethical, social responsibility and regulations difference

Saturday, July 27, 2019

Technology is Bad for Us Essay Example | Topics and Well Written Essays - 1500 words

Technology is Bad for Us - Essay Example Advancements in technology have made many changes in life. It has made the life of people much easier than before. The benefits of these technological advancements are not limited to a single field of life but these changes have brought a complete alteration in lives of people. This paper discusses the useful and harmful effects of some of these technological advancements on our lives. The most common blessing of continuously developing technology is computer; computers have made the life of individuals easier than before. They are used not only in businesses but also in other fields of life. Computers are used in education and made it easier for the students to carry out information about any topic easily. The use of computer and internet has made it easier for businesses and to gather data and information. People are now also free to transfer useful information to each other using this advancement of technology. Hospitals, railway stations, schools, colleges, airports, businesses a re all kind of depended on computers these days. I. Drawbacks of Common technologies like Computers A. I believe that the drawbacks associated with computers include the time that students and young generation waste playing games, chatting, listening to music and net surfing. B. In addition, the continuously changing software has made it impossible for older employees to continue working with the new technological advancements at their work places. This factor has led to an increase in unemployment. However, there is a technique available to solve this issue which involves the participation of employees in training programs but it would lead to higher costs for the businesses. The security issues that are link to the data stored in computers are also counted as a drawback of computers (Fisher & Lezion 2009). II. Benefits of Common Technologies like Cell phones A. Cell phones are one of the fastest ways of communication today. They have brought a great change in the communication mea ns. People are now able to communicate each other from any part of the world. The benefit of the cell phones is that it is faster than other communication mediums and is available for the users all the time regardless of the days. B. My point accompanied by various researches, however, cannot be ignored. People often misuse cell phones. Younger generation wastes hours talking with friends mostly on useless topics. This does not only waste their time but also cost them in monetary terms. People also use it to send messages which include some disgracing jokes about religions, races and cultures. This fact is creating distances among the people and is posing a threat to the overall peace among the people belonging to different backgrounds (Castells 2007). III. Technology, People and the Environment A. Automobiles are an effective mode of transport in the world today. These automobiles have really made journeys and transportation easy. Because of it the distances previously travelled in weeks are reduced to a single day or even hours. Not only this, automobiles also have a proper setup the individuals travelling in it. This setup consists of seats and air-conditioning systems. Because of these factors automobiles also provide a comfortable environment. Thus, they are really effective for transportation and travelling purposes. B. However, on the other hand, I argue that automobiles also have their bad effects. Firstly, most of the automobiles designed in the world consume fuel so that they can work. The fuel which is used by it is scarce and thus the usage of fuel is causing scarcity of important resources of this world. Moreover, automobiles also release different harmful gases in this world which can cause global warming to increase. For example it releases Carbon Dioxide. This gas constitutes an important part of the global warming. Not only this, the gases also have a toxic effect on the body of a human being. Thus automobiles have their own share of bad effec ts too (Alters 1999 p 837). IV. Technology Helps in Building and

Friday, July 26, 2019

BlackBoard Assignment Example | Topics and Well Written Essays - 250 words

BlackBoard - Assignment Example Such tools include chat rooms, wikis, blogs, peer assessment, groups, and discussion boards. Therefore, the core aim of the research is to dig out into the significance of the virtual blackboard in modern learning. In achieving the objectives, various scholarly sources will be analyzed. Moreover, various case analysis will be conducted on various institutions that have shown adoption to the program, counterchecking the advantages, shortcomings, effectiveness, and the diverse features facilitating its use. The discussion board does enhance communication. All the students can engage in discussions, a tool that leads to creativity and innovation. Forums are different discussion topics students can engage in at a time. Some discussion features enables the instructor to follow up on what the student has done over time, hence perfect evaluation tools. Additionally they empower students, promote exploratory learning, and enhance reflection. Chat rooms lead to generation of ideas arising during and after classwork. Blackboards groups are the foundation of collaborative learning. They contribute to diversity, interpersonal growth, active learning, and opportunity to feedback provision. They come along with other features such as members’ enrolment key, groups’ creation, personalization, and disabling vs. enabling protocol. The peers’ assessment tool promotes the listening, analysis and critique aspects among students and their work. The assessment aids in fairness maintenance during assessments, judgment skills development, and workload reduction for instructors and acts as a learning opportunity. Blogs are online platforms whose role is to facilitate interaction via leaving the comments on the materials provided. Students who may fail to be active in class may divert their attention to blogs. As collaborative tools, they enhance consistent

Thursday, July 25, 2019

Internet and social media Article Example | Topics and Well Written Essays - 500 words

Internet and social media - Article Example I know a friend of mine, since childhood who used to remain very quiet in the classroom until few years ago. His name is John. He used to speak very rarely, and did not participate in group discussions. He remained silent and kept observing others. I seldom saw him speak in gatherings. I always found him more defensive than expressive in his speech. He could not bear someone contradicting his points of view or pass an indecent comment as friends normally do. This is perhaps the reason John did not participate in group discussions. But this John is completely different from the one I have in my friends list on facebook. John is too expressive in the virtual world. One day, I asked John the reason behind the disparity between his real world social interaction and that in the virtual world. He told me that he felt more protected while interacting in the virtual world. One reason why he thinks so is that he does not have to come up with prompt answers to the nasty comments made by his fr iends. When someone sends him a message on facebook and criticizes him in anyway, he has more time to select the most rational answer from a variety of choices. I have personally noticed that his responses to others’ comments on facebook are much more objective, well synthesized and well reasoned than what he normally makes in the real world conversation.

Denial of service (dos) attacks Essay Example | Topics and Well Written Essays - 1250 words

Denial of service (dos) attacks - Essay Example In other words DOS attack is described, as an attack in which the memory clogged up so much that a target will unable serve its legitimate users. Or data packets are sent to the target system so much so that it cannot handle it and thus making it to either crash, reboot or more commonly deny services to legitimate users. "A denial of service attack involves preventing you from accessing data or service by confusing or overloading the computers or networking equipment" (Cyganski and Orr, 2002, p. 279). This vulnerability is commonly used to hang remote systems and sometimes force them to reboot which ultimately results in denial of service, means denying the valid services by Networks to the legitimate and authenticated users. This attack no longer works as most of the system administrators upgraded their systems making them safe from such type of serious attacks. The trick in this attack is to ping a target system with excess data packets that exceeds the maximum bytes allowed by TCP/IP protocols suite. The memory of the target system would be clogged up and forces it to hang, reboot or crash. Since the data gram is so huge that it would be difficult for the target system to handle. The data sent over the Internet is broken down into small fragments at the source and reassembled at the destination system. Teardrop attack uses the vulnerability present in the reassembling of data packets at the destination system. ... Teardrop The data sent over the Internet is broken down into small fragments at the source and reassembled at the destination system. Teardrop attack uses the vulnerability present in the reassembling of data packets at the destination system. Lets see how teardrop attack works. Suppose 4000 bytes of data have to be sent over Internet from one system to the other, this data is not sent to the destination system at one go. This data is fragmented into small parts and divided into a number of packets. Each data packet has a specified range. For example, 4000 bytes are divided three data packets. The first data packet will be from 1 byte to 1500 bytes; second from 1501 bytes to 3000 bytes and third and final data packet will carry from 3001 bytes to 4000 bytes. These data packets will be having an OFFSET field in their TCP header part. The offset field specifies the range of data that is being carried or specifies to which data packet the bytes are to be sent. A sequence of numbers is sent alon g with the packets so that the destination system could easily able to reassemble.In this attack data packets with overlapping offset field values are sent to the target system in a series. This makes it difficult for the target system to reassemble the data correctly and forces it to crash, hang or reboot. The following scenario explains the teardrop attack clearly. A system receives data in the following manner: (1 to 1500 bytes) (1501 to 3000 bytes) (3001 to 4000 bytes) In teardrop attack the data is sent in the following manner: (1 to 1500 bytes) (1500 to 3000 bytes) (1001 to 3600 bytes) When this type of overlapping data is received by the target system, it simply cannot

Wednesday, July 24, 2019

Obesity Essay Example | Topics and Well Written Essays - 1500 words - 1

Obesity - Essay Example The carbohydrate limitations in the diet programme stimulate early loss of weight through reductions in the amount of body fluid and micronutrients. The loss of micronutrients (e.g. calcium), as well as essential antioxidants, is possibly the most risky aspect of the New Atkins Diet. Dr. Atkins himself identified this risk and prescribed mega-supplements, particularly those he produced (Westman et al. 2010, 66). This essay analyses the various aspects of the New Atkins Diet, specifically, (1) the plan, (2) calorific intake, (3) reasons why this plan may be successful or unsuccessful, and (4) whether the plan is safe, nutritionally balanced suitable for steady long-term weight loss. The Plan The New Atkins Diet has four stages, namely, (1) induction, (2) ongoing weight loss, (3) pre-maintenance, and (4) lifetime maintenance (Murray, Pizzorno, & Pizzorno 2006, 10). The first stage is the initial, and most prohibitive. Intake of carbohydrate is restricted to 20 net grams daily, and a hi gh portion of it should be obtained from vegetables (Westman, Phinney, & Volek 2010, 82). The prescribed foods are vegetable oils and butter, low-carb vegetables, hard cheese, eggs, poultry, seafood (e.g. shellfish), and meats. Alcoholic drinks are prohibited throughout this stage. It is advised to take daily multivitamin minerals (Murray et al. 2006, 10-11). Nevertheless, merely monitoring a dieter’s weight is effective. Loss of weight will differ by individual. The second stage, the Ongoing Weight Loss (OWL), involves additional intake of carbohydrate, but only at quantities where loss of weight takes place. The target in OWL is to hit upon the ‘critical carbohydrate level for losing’ (Bowden 2004, 70) and to accurately identify in a regulated manner how high-carb foods influence a dieter’s control over craving. At the early phase of OWL, one should increase daily consumption of induction recommended vegetables. At the later phase of OWL, one should stic k to the carbohydrate structure Dr. Atkins formulated for this stage and include fresh dairy. The structure has nine levels and must be followed sequentially. The levels are like this (MobileReference 2007, 6): Induction acceptable vegetables. Fresh dairy Nuts Berries Alcohol Legumes Other fruits Starchy vegetables Grains In the pre-maintenance stage the intake of carbohydrate is raised once more, and the primary objective in this stage is to uncover the ‘critical carbohydrate level for maintenance, (Atkins 2002, 170)’ which is the highest amount of carbohydrates a dieter can consume daily without adding pounds. The lifetime maintenance stage, which is the last one, is designed to continue the routines attained in the earlier stages, and put off the usual habit of going back to earlier routines and earlier weight (Atkins 2002, 170). Organic, unrefined food consumptions are stressed, with the opportunity to return to a previous stage if one starts to gain weight. Calorif ic Intake Dissimilar from the conventional food pyramid, the New Atkins Diet focuses on foods rich in protein rather than unprocessed grain foods (Insel, Turner, & Ross 2009, 298). Furthermore, this new diet programme does not restrict the quantity of food a dieter consumes. It merely restricts the kind of food a dieter consumes. Moreover, this diet plan is distinct from many other diets in the sense that a dieter does not have to monitor his/her calorific intake. Actually, numerous individuals on Atkins get much

Tuesday, July 23, 2019

Leadership and Action Article Example | Topics and Well Written Essays - 500 words

Leadership and Action - Article Example Leaders may play many roles and therefore are required to perform diverse actions to fulfill the requirements for the development of the organization. It is manifested that actions performed by the leader depends on the functions that leader is performing at that particular time (Krench, 1962). The following actions are performed by the leader: Purveyor of rewards and punishment: Leader is the one who can act as an encouragement for his subordinates by rewarding them and also encourage them to do the best and up to desired expectations by punishing them. Punishment is also an encouragement and brings the best within the individual. Father figure: A leader is required to act as a focused and have positive emotional feelings for the fellows for the identification of the problem and also for transference. It is desired for the transparency and to build trust among the fellows towards their leader. 1. Chemers, M. M. (2002). Cognitive, social, and emotional intelligence of transformational leadership: Efficacy and Effectiveness. In R. E. Riggio, S. E. Murphy, F. J. Pirozzolo (Eds.), Multiple Intelligences and Leadership.

Monday, July 22, 2019

Eagle Boys Pizza Report Essay Example for Free

Eagle Boys Pizza Report Essay Founded by a young baker in his mum’s garage in 1987, Eagle Boys now operates more than 335 stores throughout all states of Australia. It is one hundred per cent Australian owned and operated and delivers pizzas to hungry families across Australia from metropolitan inner city areas to small remote towns. With over 8,000 team members nationally, Eagle Boys makes just under 18 million pizzas a year and generates an annual turnover of more than $200 million. Focused on delivering real taste, real size and real value to pizza lovers across Australia, Eagle Boys is customer-focused and continually examines ways to improve its customer satisfaction and service. Eagle Boys ensures pizza lovers across Australia receive tasty meals and exceptional service every time by training its franchises to commit 110% to customers’ satisfaction. Explanation of its legal structure Eagle Boys pizza is a Proprietary company, meaning that it is private. The shareholders of Eagle Boys Pizza Pty Ltd, have limited liability protection, which means that the most money they can lose is the amount they paid for their shares. Eagle Boys began as a family business, as it was founded by Tom Potter and his mum in 1989. It is an incorporated business, meaning that the business is a separate legal entity from the owners. This allowed the business to be sold and still be operated, in 2007 to Todd Clayton who is now the CEO and managing director of Eagle Boys Pizza. The fact that it is a separate legal entity, allows the company to sue, be sued, buy or sell property and also have perpetual succession. Identification of the current stage of the business life cycle the business is currently in and give reasons for your views Eagle Boys pizza is currently at the maturity stage of the business cycle. Its goal is to maintain profits at pre-existing levels. Recently, in February 2011, Eagle Boys responded to the growing sophistication of Australians’ pizza palate by unveiling its new Gourmet Pizza Range featuring ingredients such as, Roasted Potato, Salmon Steaks and Tandoori Chicken. Eagle Boys is also the only Australian pizza maker to offer Ready 2 Go! â„ ¢, which allows customers to get their hands on some of their favourite pizzas without phoning beforehand or waiting between 5. 30pm and 8pm daily. Since Eagle Boys was purchased by private equity firm NBC Capital and the current executive team in 2007, Network store numbers have grown by 63% which is the highest period of growth in the company’s 24-year history. Eagle Boys saw sales grow 15. 4% during the 12 months up to June 2010, bringing total sales growth during the past three years to 43. 2%. The company expects the strong double digit growth to continue with the opening of additional stores and the launch of new products. Identification of one business law and one regulatory body in relation to this business – explain how this business complies An example of a business law of the Eagle Boys pizza is a privacy law. Eagle Boys is subject to Privacy Legislation, including the National Privacy Principles (NPPs) under the Privacy Act 1988, The Privacy and Personal Information Protection Act (1988) and contractual requirements relating to Privacy pursuant to a number of State and Territory Government Licence Agreements. Eagle Boys Pizza complies with this law by collecting information by either specifying or letting the reason be apparent at the time the information is collected. It is not Eagle Boys’ general practice to collect sensitive information and they will only collect sensitive information with the persons consent. A regulatory body that Eagle Boys Pizza complies with is the Australian Competition and Consumer Commission. Eagle Boys applied for notification of conduct whereby it would grant franchises on condition that franchisees acquire goods and services from specified suppliers. That notification was lodged on 13 August 2009 and allowed to stand on 21 September 2009. Eagle Boys complies by ensuring product safety and liability and does not provide any false or misleading advertising. Identification of two significant challenges for management in the business life cycle – one challenge management has faced prior to 2011 and one they will face in the future (ensure you state which stage of the life cycle the business experienced /will experience this challenge) A significant challenge that Eagle Boys pizza management has faced prior to 2011 is responding to the growing amount of different pizza businesses, in competition with Eagle Boys, and the need to introduce new ranges and varieties of products to satisfy the needs of consumers. They had been challenged to introduce new products such as gourmet pizzas, desserts, and sides such as pastas, chicken wings, garlic bread etc. This challenge was experienced during the growth stage of the business cycle. A significant challenge that Eagle Boys pizza management will face in the future is decline, in the Recession stage of the business life cycle. As the business would have been running for a while now, it will have become a high-risk business. Products may become obsolete, leaving the business with unsold stock. Another factor influencing decline is well qualified employees beginning to leave and seek better job opportunities. Due to the ongoing introduction of new businesses in the same field, Eagle Boys will be affected by consumers no longer buying the businesses products, resulting in a large dent in the cash flow. Consequently, profits will also decline. Identification of the business environmental influences, both internal and external, that have impacted upon this business Internal environmental influences that have impacted Eagle Boys Pizza include product influences such as the range of menus that it provides as well as services provided. E. g. Delivery services. Location influences also have a large effect on the business. The location of franchises is vital as a prime location means the business will attract higher numbers of customers as it is convenient and visible. The proximity to customers, suppliers and support services is also essential in determining the location of the business. Another internal influence is resources. Employees, being the main asset to the business are an extremely important resource. Other important resources include cooking and servicing equipment and machinery as well as raw materials that allow the business to create and sell their products. Management influences control the workers and help to provide a more organised structure and easy way of communication and co-operation. External environmental influences that have impacted Eagle Boys Pizza include Legal influences such as increasing legal obligations and business requirements. Political and institutional influences include taxation, employee superannuation, approval of new development and alteration applications. These influences have a strong impact on how and where the business is run. Another external influence is financial influences. Financial influences create changes in the financial market which can cause risk for the business. Geographical influences heavily impact the opportunities for the business. Demographic factors such as population, age, and income control the popularity of the business. Explanation and critical analyses of how management has responded to the above range of challenges and influences The first Eagle Boys Pizza opened in Albury, New South Wales. Eagle Boys advertised their products as semi-gourmet pizzas that quite unique to the larger chains, yet cheaper due to the high production output. This successful idea caught on, and the first store in Albury was quickly creating a generous profit. Within less than a year, Eagle Boys opened up two more stores in the neighbouring cities of Wagga Wagga and Dubbo. As the company sustained its growth, it put a lot of energy into researching ways to meet consumer demands in different regions. With stores opening up in rural, suburban and urban areas throughout Australia, the company became very popular due to operating in areas that other large fast food businesses would often ignore. One particularly successful store model was the development of a drive-thru pizza store in 1999, a concept which was unheard of at the time. Australia’s first drive-thru pizza store demonstrated to be immensely popular, as it was easy and convenient. Expanding on this quick pizza delivery system, the company launched the Eagle Boys Pizza Express Store shortly after, which was designed to provide quick service pizza out of a small location in highly populated foot traffic areas. This express system proved to be very popular, and new locations started to spring up at airports, shopping malls and pedestrian malls around the country. Many locations were now generating up to forty precent of their sales. As the company started to experience increased competition, it had to do something to differentiate its express pizza service from other companies offering similar products. Eagle Boys eventually developed a popular offshoot menu for Eagle Express stores: â€Å"Ready, Fresh Go! † in 2008. This idea meant that while it is an express delivery system, the pizzas are made fresh and held in specially-designed slow-cook ovens that ensure their freshness. The company’s dedication to research and response to consumer trends and the development of new, quality products quality concluded in the largest reformation of the Eagle Boys menu in its history. Launched in early 2010, the new menu featured a variety of new items. Apart from new pizzas, new items such as a chocolate fudge mousse dessert, pasta dishes, additional side dishes and drinks were introduced. Customers have responded with a resounding satisfaction, and throughout 2010 Eagle Boys enjoyed one of its biggest increases in sales in company history. Eagle Boys continues to develop new and accessible ways to respond to challenges and internal and external influences. Creating innovative and unique products is what has propelled the company to success, and it continues to be a mainstay of Eagle Boys’ activities today.

Sunday, July 21, 2019

Using Suitable Models Identify The Customer Perceived Value Marketing Essay

Using Suitable Models Identify The Customer Perceived Value Marketing Essay Tesco is the largest food retailer in UK and it is amongst worlds top 5 largest retailers by  annual sales  behind  Wal-Mart  and  Carrefour. It started in 1919 and now it operates more than 3000 stores in UK and it also has stores in rest of Europe, North America and Asia. This company is multi category that also runs telecom and banking services apart from food retailing but for the purpose of this paper the focus will be will be on customer perceived values for the customers of TESCO. Tesco is based on trust and respect. They have learnt over the years that if customers like their offers, then there is higher rate of possibility that they will come back and shop with them again. So they will do every possible thing to retain their valued customers. 1.2 Vision of TESCO Tescos vision is to be most highly valued by the customers they serve, the communities in which they operate, their loyal and committed staff and their shareholders, to be a growing company, a modern and innovative company and winning locally and applying their skills globally. 1.3 Customer Perceived Value The Customer Perceived value of a product is the customers evaluation of all the benefits gained against all the cost of a product or service. Zeithaml defines customer perceived value as consumers overall assessment of the utility of a product based on perceptions of what is received and what is given. Though what is received varies customer to customer because some people want only quantity other may want quality in the specific product, similarly what is given also varies customer to customer like some people are only concerned with the price of the product others may be concerned with the time and efforts they are putting in to buy the product. (Source: Zeithaml, V. A., 1998 Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence Journal of Marketing 52 (July): 2-22) In simple words customer perceived value is the benefits you get after your sacrifices. It is often expressed as the equation: Customer perceived value = Perceived Benefits Perceived Sacrifice Benefits = attributes of core product/service and supporting services, perceived quality and price Sacrifice = customer costs involved in purchasing, such as time, travel, repairing faulty work, etc. NOT just price. Perceived Benefit Perceived Sacrifice Price Money Quality Time Status Effort Convenience Psychic cost Talking about TESCO, benefits associated with perceived value are: †¢ Price: Customers get great saving offers when purchasing their favourite products in Tesco. †¢ Quality: At Tesco, quality and freshness has always meant handpicked groceries carefully packed so customer knows every item is carefully checked before it reaches them. †¢ Status: Being UKs biggest retailer Tesco has a very high status amongst the customers and it has great goodwill in the market so customers are aware of the prestige of the company. †¢ Convenience: Tesco has got many facilities for its customers like online shopping, home delivery, self-billing counters and wide range of products to choose from plus now it is introducing free Wi-Fi in the stores for its customers so that they can keep connected to internet always. Sacrifices associated with perceived value are: †¢ Money: if consumer find the cost of product higher than expected, they need to decide if it is worth taking or not. †¢ Time: it is the amount of time consumer has to spend on finding and purchasing the product in Tesco. †¢ Effort: involves the physical energy devoted by people to find products that suits their needs in the store so it takes efforts to do shopping also. †¢ Psychic Cost: shopping is stressful and frustrating experience and Perceived risk is considered for the performance of the product (will it do the job), physical (may be bodily harm done by the product), financial (danger of economic loss from the purchase). 1.4 Holbrooks typology of consumer perceived value Extrinsic Intrinsic Active Efficiency (O/l, Convenience) Play (Fun) Self-Oriented Reactive Excellence (Quality) Aesthetics (Beauty) Active Status (Success, Impression Management) Ethics (Virtue, Justice, Morality) Other-Oriented Reactive Esteem (Reputation, Materialism, Possessions) Spirituality (Faith, Ecstasy, Sacredness, Magic) Source: Holbrook, M. B., 1999 Consumer Value: A framework for analysis and research. If we first consider extrinsic versus intrinsic, there will be higher extrinsic value for the customers of Tesco because they emphasise on the end result of their purchase. Talking about self-oriented and other-oriented it is seen that here focus is on self-oriented more while shopping in Tesco because the customer is doing it for his or her own purpose or objective. When we come to the final part of Holbrooks framework, active versus reactive, it is seen that customers of Tesco are from different cultures and societies so they prefer different type of food material like Chinese would prefer Chinese food and Indian will prefer Indian food so it is difficult to keep all the customers happy at once but for customers reactive is more important. What Holbrooks framework does enable is the ability to identify the key values of customers, and in the case of Tesco, whilst it can be stated that the customer perceived value is multidimensional, the application of the typology of consumer value identifies two key values, efficiency and excellence. 02) Critically evaluate the existing value proposition for the one you have chosen. Compare and contrast the value proposition with that of the leading competitor in its sector. 2.1 Value Proposition It is defined as an analysis or statement of the combination of goods and services offered by a company to its customers in exchange for payment (Investopedia, n.d.). It is actually a promise of value of the company to deliver the services that the customers expect to experience in the future. Tescos Market strategy: Tesco  focused  to  develop  the UK market as it is their  biggest  business  in the group. As for the worldwide  market, Tescos  objective is  to be a  spectacular  retail  store  in the world as well as online. Tesco  kept  its  customers  through  numerous  ways. One of it is through the Tesco Club-card program.  Tesco has been very inventive in the Customer Loyalty field. The loyalty programs they have  developed  have kept  customers attached  to their brand. Tesco had the  dreams  to  know its customers and  their  need and it  was the key to  customer loyalty  and satisfaction. This  Club-card  has  changed  Tescos  connection with its  customers  and the  data  from the database tour guides  all the key  decisions to be taken for company. The loyalty club-card design permits for  numerous  advantages  one of which is  aimed at  communication. There are more than 4 million variations of its quarterly  customer  mailing to  double-check  that its offers and discounts  are according  to their individual customer. Hence, this  scheme  assists  to keep its present buyer and bring a feel of  commitment  to the organization. The  advantages  of this loyalty scheme  will  apply  to new  customers  and  assist  Tesco to gain  larger  market share.

What Is Street Art Cultural Studies Essay

What Is Street Art Cultural Studies Essay Over the last decade, there has been an increasing interest in a transient form of art that is marking urban settings around the world and has developed a thriving culture. Street art is becoming a formless creature embracing art which is found and inspired by the urban environment. Some people consider this kind of art as controversial and offensive, although on the other hand others find it appealing and attractive. By nature, humans are expressive; they have been drawing on walls since the beginning of humanity. Street art is an ancient art form in a more complex society which requires no formal artistic training or schooling and that in itself makes it so globally appealing for any person regardless of their background to express themselves in ultimate freedom. The use of media has evolved but the message has always remained the same which always translates into freedom. Some people consider this very disturbing, while others find it beautiful. Whether it is interpreted as vandal ism or public art, it attracts interest around the world. Street art today and what it has evolved into is part of our pop culture whether people understand it or not. Clothes, shoes, toys, and more are influenced by street art on a daily basis. To some people, this is beautiful as long as is not being seen on their buildings and walls. As soon as they see it on a wall, they consider it as vandalism. This essay explores this long issue by researching the world of street art. Hopefully by the end of this essay a general conclusion will be extracted about how people react, feel and think about this way of expression but also what the society and the authorities could possibly do about it. The research for this project included an online survey that was answered by ninety six persons of different ages and nationalities. Chapter 1 What is street art and who are the artists that represented it? Street art is any type of art created outside in public view and is usually connected with social and political meaning. There are many different types of street art such as graffiti, sticker art, stencil, wheat pasting-street poster art, falsification of a street sign or an advertisement. Toward the end of the 1960s and in the beginning of the 1970s, children started writing their nicknames on walls, mailboxes and even in tubes and this came to be known as tagging. As hip hop culture spread from America, street art became a worldwide phenomenon growing in the 1980s as the symbolic language of the young population. It was then that street art became legally restricted and a conflict started between artists and the authorities. Even though this divergence arose, street art was widely spreading around the world during this decade and artists were adding more colours, different styles, creating or drawing comic heroes and imaginary faces. In addition, it attracted the attention of media, thus movies and magazines about street art begun to publish. Although street art is being used by many people, not all of them do it for the same reasons. There are artists that use street art as a mean to express themselves while others use it to communicate or raise awareness for social and political issues. Simply put, people see the empty spaces of the city as a blank canvas and want to be creative with the use of humour while others are more willing to take the risk of creating some sort of an illegal art. In some cases street art is being used as a mean of a memorial to a fellow man or a great artist that passed away. Through their work, artists aim to communicate with everyday people without the intent to offend or create a conflict but rather to create a connection with the general public through their artwork. There are many ways in which the types of street art can be graded, while some are considered as simple drawings on a wall, others are classified as actual works of art, depending on whether the artist was given permission to create it. The techniques used remain the same but having permission to express it changes the whole meaning since without any permission it is simply considered as vandalism. Vandalism is described as an inexcusable destruction of property, showing to have negative effects on its setting. Criminologists have also observed that vandalism has a snowball effect on causing negative effects in its surrounding environment. Dr. George Kelling and Dr. James Q. Wilson have studied the effects of a broken window case, a disorder in an urban setting and concluded that even one instance of neglect can lead to the possibility of more incidences like that one to appear. Furthermore, an increase in actual violent crimes led researchers to the conclusion of a direct link between street violence, vandalism and the decline of the society (Broken window theory) (Art Radar Asia, 2010). Whichever way is referred as, vandalism or art, this way of expression has been a worldwide phenomenon as well as the artists that represent it. There are hundreds of street artists whose work and projects made this type of art one of the most debated issue in the world of art. With their own unique way, they have managed to spread this phenomenon all over the world and put themselves on the map just by doing what they like. Using their skills and imagination they have found a way to express themselves and offer some people the chance to embrace something really beautiful and not to see it as something that others consider vandalism. Nevertheless, these refined artists have attracted the interest of the world. Keith Haring was one of the first street artists and consequently, responsible for the spread of this kind of art. Haring was studying to be a commercial graphic artist but after two semesters in the Ivy School of Professional Art in Pittsburgh he realized that he only had little to no interest in that, so he dropped out. He kept working and studying on his own, but choosing to move to New York and enrol in the School of Visual Arts, came as an inspiration to work on an alternative outside landscape of creativity. He was first inspired by an empty black panel that was used for advertising. Haring thought that it was a perfect place to draw on so he went after to buy a box of white chalk from a card shop and he started to do so. The white chalk was perfect on the black paper and thats why following that, he kept drawing on all of the black spaces that came to his attention. People seemed to show respect for what they saw and surprisingly did not try to mess it up. The subway pictures evolved into a new medium of communication as the images created travelled the world through magazines and television. He was immediately actively involved in the city of New York and the hip hop scene including rap music, break dancing and graffiti. This kept on going for the following five years showing that it was reaching all kinds of viewers from various social and ethical backgrounds (David Sheff, 1989). Banksy is another well-known street artist whose work is responsible for the popularity of street art as it is now. Despite the fact that he is from Easton, his artistic home is the streets of London. He began his career as a graffiti writer and later on he progressed to the use of stencils because it was quicker to apply and on effect it created a harder impact, which has always been essential for his work. In his mind he cannot accept the fact that this kind of art could work indoors as he likens it with the domestication of an animal- turning a wild creature into a sterile and languid pet. He believes that this is an outdoor art and should remain as it is even though some people get a lot of comfort from being indoors. It is very different to paint in the street having to capture a burst of adrenaline enhanced by the thought of being arrested rather than to do it in a cosy studio while drinking coffee (Ossian Ward, 2010). It seems like for some people the search for inspiration goes beyond their limits. Maybe the people who steal graffiti off walls are on to something the edge is still there. But those people are funny they ask me for a letter of authentication saying I painted a certain piece, but thats basically a signed confession on headed notepaper. (Ossian Ward, 2010) C215 is a French artist who started drawing as a teenager in the city of Orleans in France and now he paints portraits worldwide. He has a special technique in which he makes the stencils by hand without the use of computer. His work can be seen around the world in many cities such as Rome, Barcelona, London, and Berlin. C215 uses stencil because as he says the stencil allows him to combine his two passions, drawing and graffiti. He mostly paints people who experience the life of being in the street such as refugees, tramps and street kids. The great philosopher Heraclitus said: No man ever steps in the same river twice. Similarly C215 believes that no one can compare every life event and every period to anything else because they are unique (Vincent Morgan, 2009). Jerome G Demuth is a street artist from Paris. G is the nickname he uses for his activities in the streets. He was a photographer and now he found a way to show his work in the streets using large scale technical print like a photo placed on a billboard. Pasting a photo on a billboard was actually the first thing he did nine years ago. He tries to illustrate the way he sees life and society. Through his work he wants to raise peoples awareness about respect and love for earth and other humans instead of caring only about money and success. In general, he tries to show them that they could have an alternative way of life. One of his most well-known projects is the installation of swings in many cities and calls them Swing Cities. Another street artist is Ink 187 or also known as Oiler, coming from Los Angeles, California. The nickname Oiler as he says is due to the fact that he is too slick. He is a tattoo lover and thats why he is called Ink. 187 is in a memorial for a friend of him. Oiler is a graffiti artist and through his work, expresses his feelings and emotions. After being expelled from the state of California due to graffiti presence, Oiler became a mentor for young artists in North Portland and tries to help them practise their art legally. Putting his past behind him, he hopes for a better life and future. He tries to keep his graffiti on t-shirts and paper hoping to start a career in fashion. He has on his mind that if artists use their talents legally, street art could become profitable. It does not matter where they are from and what techniques they use. Street artist just want to share their thoughts and believes. Others do it for their social concern and others for their own personal satisfaction. Nevertheless, they do not want to offend anyone with their work, rather than to raise their attention towards its prosperity. No matter what happens there will always be a conflict between people concerning street art. Most importantly, there will always be people against this type of art. Chapter 2 How do people and society perceive street art? Todays youth uses street art to portray their social and political views. In order to make their mark, artists choose high traffic areas to express themselves in order to spread their messages broadly. The reason is that by displaying a unique artistic creation people cannot miss it as they walk by, thus it serves their cause efficiently. They could easily use a social network to express an idea but unquestionably that is not as effective as street art. Over the recent years, it came to be as a form of communication. Since young people are not as interested in the news, the modern urban feel of street art combined with its awareness of political and social changes makes it perfect for almost everyone. Some people even though they enjoy street art, they do not agree with it when it expresses political views. They prefer to see something entertaining and humorous instead of a message containing political views. In some neighbourhoods, sometimes gangs use street art in order to mark their territory or their crews power and status. They mark their territorial boundaries as a warning to other gangs as well as to the police. Sometimes a gangs graffiti sign or symbol may also be a memorial to a fellow fallen gang member. Because of the connection between gangs and street art, it has stereotyped the art and influenced society to relate it particularly with street violence and crime. However, the last couple of years, people have been accepting this type of art and the majority enjoys seeing it. They believe that living in a neighbourhood where street art is being displayed shows the uniqueness of every place, its identity. Grey bowing buildings are transformed into something alive and admirable. Even when a person sees street art outside his window, it has an effect on his mood. It can create a warmer atmosphere which at the same time can create a feeling of being somewhere different, a better, m ore desirable place. On the other hand, some people say that they do not like it in their neighbourhood. According to their views, it states a sense of anarchy, violence and moreover destroys the appearance of buildings, parks and streets. This of course depends on what the artist creates. (see appendix 4) It makes sense when the members of the community get angry when vandals deface their properties, homes and public spaces making it clear that an effective approach to manage street art should incorporate the removal of unwanted or even offensive wall paintings. Nevertheless, the zero tolerance policy is self-contradictory. Many young artists experience frustration and disappointment towards the criminalisation of their art and as a result they rebel against the local authorities, perpetuating more illegal creations (Moo, E. Wardle, F. Lyons, S. Heim, J. Wodds Alum, E. 2009). Paintings expressed on walls are not equivalent to the paintings hung on the walls and this is apparent by how street art is perceived by the general population. The act of taking the street art from the outside of a building and placing it inside of a building completely changes the work from anarchy to artistry and consequently vandalism gains value. There is a substantial increase in people who believe that street art should be displayed in indoor places. Some though may argue that by doing this, the meaning of this particular art changes completely. Nowadays the number of people visiting galleries is decreasing and even less of them have the funds to organise a gallery exhibition. This is one of the reasons why these artists have turned public walls into their canvases in order to express themselves and even evolve their skills, which could not be done on an average piece of canvas. It could be seen as a privilege to the society that so many people are given the opportunity to vi ew such works of art free of charge. Some people find it as a nice vibrant change after seeing hundreds of generic bland advertisements on a daily basis. As soon as street art crossed over from criminal to commercial, it stopped being an expression and became an industry of its own. The street art has started receiving international approval in the latest years with artists, such as the mysterious Bansky, selling their creations at Sothebys for huge amounts of money. Nowadays, prestigious galleries exhibit street art and collectives have been formed in many cities all over the world. Several books have published the colourful displays of public art which has reached critical mass around the world, even though it is still considered illegal as a form of expression and a street crime (Lonely Planet, 2010). There is a correlation between the artistic approach of the artists and the cities concerns as it helps the culture programming for attracting the tourists, aids in the institutional communication of social action in poor neighbourhoods and informs about the local economy. Huge events attracting impressive crowds are developing street art and contribute to the European Capitals of Culture success. More than 100 000 people from Porto, Graz, Brussels and Copenhagen are drawn to these events as Lille has recorder approximately 600 000. They are mostly happening in the city centres while other areas and rural zones also have a social and spatial integration call on street art. These artists usually work in abandoned districts or problematic places such as former factories, participating in linking territories and developing their projects in areas with little access to cultural events and products (Fitzcarraldo, 2007). An artist can paint the Mona Lisa on the front of a house and even though it can be considered as art by most people, according to the law its vandalism. Thus, reform comes into play and various actions can be taken to help legitimise street art. In order for this to happen, the government would need to cooperate with the general public and create a non-profit organisation which works to protect specific public spaces as well as graphic festivals could be organised and designated areas for artists to express themselves could be given. In contrast with the societal views regarding street art, many benefits were raised that are usually ignored. As any kind of art, similarly, street art is an expression of the artists feelings and emotions. There are no legal opportunities for these young artists to create, develop and exhibit their work which is clearly and fundamentally a kind of art and not vandalism in action. Society should accept this form of art and protect it before the situation becomes worse. Street artists want to be considered, recognised and respected as artists (Rae Ferris, 2008). Chapter 3 Survey findings and analysis For the needs of this essay a survey was completed by the public. In the survey there were questions asking peoples opinion about street art in relation to their educational level, age, gender and the place they grew up. Due to the fact that each country deals with this issue differently, people may respond differently as well. Also their age and level of education is important since, it is possible to affect their opinion. The results obtained from the survey were analysed by SPSS. Interestingly, the results show that most of the respondents find this way of expression entertaining, beautiful and appealing to the eye rather than offensive and violent. (See appendix 1) On a question about whether street art should be displayed in streets most of the answers were positive. Nevertheless, it can be seen on appendix 2 that less people think it should be displayed in indoor places. They believe that street art should be displayed in its original environment. The age group thirty to thirty-nine, answered that they do not have a strong opinion about this kind of art being displayed in streets, but they strongly disagree with the idea of being displayed in indoor places. Furthermore, results showed that people between the ages of thirties-thirty nine disagree with street art that expresses political views but they agree with it when it expresses the artists him/herself. According to the findings displayed in appendix 3 younger people and people between the ages of forty to forty nine agree with street art displaying political messages. In the question whether people agree or disagree with graphic festivals being organized and designated areas for artists to express themselves being created, most people agree. By giving the artists a place to do whatever they feel, will reduce the unwanted. (see appendix 5) Overall, the feedback that was extracted from the survey was really positive and in most cases it can suggest that no matter what their age, gender, level of education or nationality people feel the same way about street art. Conclusion Art or vandalism; street art can be considered as both, due to the fact that is done on a public property which is more likely to offend anyone out there. However, there is no doubt that these people both influence and express the feelings of many other people in the society. This is the reason that there is great centralisation in each event they organise and the support they get from all over the world (Bret McNee, 2009). The definition of what is considered as art can be argued to no end but the government cannot define what that is yet, therefore street art requires social acceptance through legitimacy to be accepted as art. These street artists do not aspire to change the definition of their artwork but rather question the existing environment around them in their own language. Through their works, they aim to communicate with everyday people about socially relevant issues without any intention to offend or to create a conflict but rather make a connection with the general public through their artwork. People can argue for or against street art over and over again without coming up with a worldwide acceptable decision. There will always be disagreements. That is what makes street art interesting. It cannot be held, but it can be seen everywhere. It cannot be bought but it is often used to sell everything. Art is created to be seen and enjoyed, debated and discussed. Appendices Appendix 1 Appendix 2 Appendix 3 Appendix 4 Appendix 5 References