Tuesday, December 31, 2019

Shear vs. Sheer How to Choose the Right Word

Shear and sheer are examples of homophones, words that sound alike but have different meanings. The first can be used as a noun or a verb, and the second can be used as a verb, adjective, or adverb. How to Use Shear As a verb, shear means to cut or to clip (as in shear the hedges). As a noun, the word refers to the act, process, or fact of cutting or clipping. The tool used to shear something is known as a pair of shears. In Britain, shear is sometimes used as a noun in reference to the process of shearing a sheep (as in an old sheep thats had many shearings). A less common meaning of shear is found in physics and materials science, where the word refers to the stress produced by certain forces that causes two layers in a substance to shift away from each other. In this context, scientists sometimes speak of shear stress and shearing forces. How to Use Sheer The verb sheer means to turn suddenly or deviate from a course (as in sheer away from oncoming traffic). As an adjective,  sheer means fine or transparent, pure or complete (as in a sheer silk dress). The adjective sheer can also mean very steep or almost straight up and down (as in a sheer drop). Sheer can also be used as an adverb, meaning completely or altogether. Examples Although sheer has several meanings, shear—whether its used as a noun or a verb—almost always refers to cutting, clipping, or trimming: He had to shear the bushes often to keep his lawn looking neat.The farmer trimmed the animals coat with shears. Sheer is often used as an adjective, typically in reference to something that is see-through or very steep: His chest hair was clearly visible through his sheer T-shirt.A barrier along the cliff kept tourists away from the sheer drop. Sheer can also be used as a synonym for utter or complete: It was sheer luck that I happened to be there at the right time.The child watched the fireworks with a look of sheer amazement. As a verb, sheer means to turn away from something: Ship captains use GPS technology to sheer away from obstacles.The plane sheered north to avoid the storm system in its path. How to Remember the Difference Like many homophones, sheer and shear are easy to mix up. The only difference between the two is the letter A. A almost resembles an open pair of scissors, which is a good way to remember that shear almost always refers to cutting. If youre not talking about cutting something (and youre not a scientist), you probably mean to use the word sheer instead. Shear vs. Shears Historically, the singular word shear was used to refer to a variety of tools for cutting. In The Canterbury Tales, for example, Chaucer describes the biblical Samson, who kept his hair long in accordance with the Nazarite vow: This Samson never liquor drank, nor wine. / Nor on his head came razor, nor a shear. In modern English, the word is usually used in the plural form shears, though the word shear is sometimes still used to refer to one blade of such a tool. Sources Downing, Angela.  English Grammar: a University Course. Routledge, 2015.Straus, Jane.  The Blue Book of Grammar and Punctuation: The Mysteries of Grammar and Punctuation Revealed. John Wiley Sons, 2006.

Sunday, December 22, 2019

The Bill Of Rights Of The United States - 1557 Words

The Bill of Rights lists certain freedoms and liberties that are guaranteed to the people of the United States of America. Because these rights are in the Constitution, they are federal laws that apply to everyone in America. To ensure there was no question as to who the Bill of Rights applied to, the Fourteenth Amendment was passed in 1868 giving anyone born in, or a citizen of, the United States the rights guaranteed by the Bill of Rights. The amendment left clauses giving some interpretation to the states and other local municipalities. The District of Columbia used one of these clauses to ban all handguns within city limits. The District of Columbia’s ban of handguns was a discrepancy in which the citizens of the city were not able to rightfully exercise their Second Amendment right to bear arms. After the law was looked at by the Supreme Court in DC vs. Heller, the court ruled the law was unconstitutional and citizens living in the District of Columbia were being un justly denied their constitutional rights. After hearing the Supreme Court’s decision in DC vs. Heller, a 76 year old Chicago resident named Otis McDonald looked to remove a City of Chicago ban on handguns which was similar to that in the District of Columbia. Joined by three other Chicago residents, Adam Orlov, and Colleen and David Lawson, McDonald and his colleges filed a suit against the citywide ban of handguns, and eventually became know as McDonald vs. City of Chicago. McDonald vs. City ofShow MoreRelatedThe United States Bill Of Rights882 Words   |  4 PagesThe United States Bill of Rights was created in September 25, 1789 and ratified December 15, 1791. The Bill of Rights are the first ten amendments to the Constitution that were established to defend our rights as individuals and as American citizens. The Bill of Rights describes the rights of its people. The first four articles of the amendments deal specifically with the balance of power between the federal g overnment and state government. There were some people who opposed to the ConstitutionRead MoreThe Bill Of Rights Of The United States999 Words   |  4 PagesIntroduction The Bill of Rights is easily one of the most important sections within constitution, and this is because of the way that it protects the citizens of the United States from the government. One of the items therein the Bill of Rights is the 4th Amendment which states that, â€Å"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supportedRead MoreThe Bill Of Rights Of The United States1665 Words   |  7 PagesThe Bill of Rights was passed because concepts such as freedom of religion, speech, equal treatment, and due process of law were deemed so important that, barring a Constitutional Amendment, not even a majority should be allowed to change them. Rule of law is a principle under which all persons, institutions, and entities are accountable to laws that are: publicly promulgated, equally enforced, independently adjudicated, and c onsistent with international human rights principles. The United StatesRead MoreThe Bill Of Rights Of The United States1270 Words   |  6 Pages Banks 1 From the time that the Bill of Rights was ratified in 1787, the definition of the second amendment had remained the same. In 1980, Ronald Reagan was elected into office and carried a gun rights enthusiast along with him. At the same time a Republican senator from Utah, Orrin Hatch, was handed the reigns of chairman of an important sub-committee. Senator hatch stated that he had discovered proof that individual citizens could rightfully own firearms underRead MoreBill Of Rights Of The United States1251 Words   |  6 PagesEvery know that U.S. is a country that civilize have right from â€Å"bill of rights†,Amendment II to keep a fire arms legal. This is what is Amendment II said: â€Å"A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed.† But it makes this country dangerous. First, there are too many guns in The America, the number of guns is more than US’s population, it means for average every person own a gun, include kids and oldRead MoreThe Bill Of Rights Of The United States Constitution914 Words   |  4 PagesWhat is a bill of rights? What is an amendment? How are the different? A bill of rights is a formality such as the Declaration of Independence and it is the outline of what the citizens feel their born rights are as people of a union. An amendment is the changing or altering of a legal or civil document. Specifically amendments in the United States Constitution include the changing or detailing of what the people need. These two phrases differ in what their purposes are. The bill of rights was setRead MoreThe Bill Of Rights Of The United States Constitution Essay1359 Words   |  6 PagesThe Bill of Rights contains the first ten amendments to the United States Constitution. These first ten amendments were ratified on December 15, 1 791. The Bill of Rights define and interpret constitutional rights and protections that are guaranteed under the US Constitution. The following text is a transcription of the first ten amendments to the Constitution in their original form. â€Å"Amendment I Congress shall make no law respecting an establishment of religion, or prohibiting the free exerciseRead MoreHouse Bill : The Rights Of The United States1545 Words   |  7 Pagesborn with certain rights that are guaranteed to us a citizen of the United States and as human beings. These rights include the fact that â€Å"All human beings are born free and equal in dignity and rights† (â€Å"Universal Declaration†). In the United States, we are also guaranteed the rights to not be discriminated against due to race, gender, age, sex, and sexual orientation, however, discrimination is all too common. Discriminatory laws and practices occur all over the United States daily and affect manyRead MoreThe Bill Of Rights Of The United States Constitution1501 Words   |  7 Pages Introduction. The Bill of Rights is a historical documents that has the first 10 amendments to the United States Constitution. The purpose of the Bill of Rights is for greater constitutional protection for our own individual liberties. It has a list of specific prohibitions on government power. There were only 12 amendments originally for the state legislatures and only picked 10 for all the states and those are known as the Bill of Rights, but there are 27 amendments in total. AmendmentsRead MoreThe Bill Of Rights Of The United States Constitution Essay1866 Words   |  8 PagesThe bill of rights is the ten amendments to the United States Constitution, approved on December 15, 1791, and written by James Madison as a response to calls from several States for greater constitutional protection for Individual freedoms, such as freedom of Speech. It creates many legal principles that have had a crucial effect on law and society. The bill of right was added to the Constitution of the United States to assurance the protection of the people from the government. It was served to

Saturday, December 14, 2019

Online Courses the Pros and Cons Free Essays

Online Courses: The Pros and Cons By Melody More and more students are taking online classes. They are advertised on the radio, television, and billboards, promising convenience and opportunities. Even traditional universities are now offering online classes in conjunction with their normal â€Å"brick and mortor† classes. We will write a custom essay sample on Online Courses: the Pros and Cons or any similar topic only for you Order Now In actuality, online classes only appear to be easier and more convenient. Online course are more difficult and time-consuming than traditional classroom courses although they have afforded many bright and industrious students unprecedented opportunities to further their education. The stigma behind online classes has led them to be less respected than traditional classes. In an effort to increase enrollment, many universities advertise that they offer online courses in which a student can quickly and conveniently earn their degree. This has two potentially negative consequences. First, employers who have never experienced a classroom setting in an online environment assume that these degrees are not as reputable as those from schools that exclusively offer traditional courses. Secondly, students enroll in these online courses with the mistaken belief that they are going to be quick and easy. Unfortunately, this could not be further from the truth. Online classes are more time consuming than in-classroom courses. In almost all courses, participation makes up a portion of everyone’s grade. Most professors count participation points as 10% of a student’s total grade. This 10% can easily be obtained in a classroom environment where a student can speak to peers and professor about a particular topic. However, online courses use a discussion board for communication, where the students and professor post responses to a discussion. The continuous posting by the students and professor makes spelling, grammar, and punctuation an unprecedented factor in a student’s participation points. Although online professors typically overlook spelling and grammatical errors when responding to students’ posts, they are liable to take away points. Most of the time they deduct participation points if the grammar and spelling is so bad that they cannot understand the point the student is attempting to make. Students whom normally struggle with spelling and grammar are forced to improve their writing skills. In turn, the necessity of grammar, spelling, and punctuation benefits a student’s overall education experience. Moreover, the increased writing in a classroom environment can be a double-edged sword. The replacement of writing rather than speaking in a classroom can yield a negative effect on a person’s life. Online environments inadvertently encourage social isolation. A student who may have had social challenges or anxiety about speaking in front of a group of people in the past can easily continue isolating themselves from others rather than facing their fears. When the student graduates, finding employment can be increasingly difficult without these necessary interpersonal skills. The socially awkward alumnus of a particular university negatively represents their university and discredits other alumni that could be applying for the same position. Despite this potentially disastrous effect, there are opportunities online courses have presented to so many people around the world. Online courses open doors to people who would otherwise have to give up on their dreams of higher education. An example is a single mother who barely survives by working two jobs to provide for her children. She does not have the money to hire a babysitter while she attends night classes. However, with online classes, she can work on a college degree while her young children sleep. Online classes are more convenient for the worker that works until 3:00 am and has little time before and after work to study. Driven, disciplined, non-traditional students can derive great benefit from the ability to attend class when they can, wherever they have internet access. Furthermore, potential students should not shun the idea of online classes if it can help them further their education. Students who may be considering online classes should think carefully about what it is they need from a course. If they want to speak to a professor directly to get their questions answered, have the availability at the same time each week to attend a course, and prefer not to perform additional writing assignments each week, then an online course may not be for them. On the other hand, if a potential student works for a company that is not willing to work around a school schedule, childcare is not available, or they simply do not want to drive to class in the evening, an online course may be the perfect solution. There are many pros and cons that are part of the decision-making process on whether or not to take an online course. Taking an online course should not be a decision that a student jumps into without carefully considering all the factors involved. How to cite Online Courses: the Pros and Cons, Papers

Friday, December 6, 2019

Ethical Student of Networking Technology- MyAssignmenthelp.com

Question: Discuss about theEthical Student of Networking Technology. Answer: Introduction In the contemporary era, the usage of technology has been growing at an alarming rate. Today, in every field the technology is being used such as in the sectors of construction, manufacturing, medical, management, as well as education. The use of technology in the education sector is becoming a new as well as an innovative trend. However, with the increase in the use of technology, the risk also increases which may be concerned with security, privacy as well as unauthorized access to the confidential and private information by a third party. In such scenarios, ethics plays a vital role(Business Dictionary 2017). For a student, the ethics in the networking technology is an essential so as to safeguard their interest as well private information and also to ensure that no objectionable content is being taught as well as displayed in the schools and classrooms. To ensure that the technology is being ethically emerged with education, the teachers, and other members of the education commit tee plays an important role as they have the control over the content to be taught as well as influence the students understanding level. From the students perspective, the cyber ethics must be a part of their syllabus, in order to provide them the knowledge regarding ethical issues which are related to safety and privacy of the students, unauthorized access at the schools, as well as objectionable content being showed up and taught at the school (Vallor 2010). Identification Ethics are considered to be an essential, in order to ensure a continuous environment of learning as well as creativity. The increased availability of technology has been invited various issues as well as challenges related to the ethical issues. Out of all the ethical issues such as unauthorized access of a third party over the students personal and confidential information, and also displaying of some objectionable content in the school, the most important ethical issue faced by the student in networking technology is no security and privacy against the personal data(Henderson, Auld and Johnson 2014). For such ethical issues, the teachers and other members of the education committee are held responsible. According to the Childrens Internet Protection Act, in order to protect the students from the ethical issue of safety and privacy, the schools are required to develop an Internet safety plan that shall be able to design and develop such plans that shall be addressing the ethical is sues which are faced by the students such as unauthorized disclosure and access, usage as well as diffusion of confidential and personal information. The students are at an age where they adopt the new technologies easily but do not have the exact knowledge, skills, and ability to use such technologies, correctly. This proves to be a great risk for such students (Mattison 2017). Analysis The researchers have found that the younger adults who are the students have been facing the problem of risk to their security and privacy of the confidential and private information. The researchers have researched and analyzed that in the current times, there are a large proportion of students of colleges as well as schools who are very much inclined towards the social media. Due to this inclination, a large proportion of the students has an account on social media sites such as Facebook, Whatsapp, Instagram, and Twitter (Wen 2015). The major population of these young adults has their accounts on these social media sites which they access for multiple times in a single day. Also with the new trend of mobile phones which are now known as the smart phones, due to the services that they offer, the inclination of the students towards this internet based social media sites have increased even more. Such social media sites have an access to the personal information of the students and al so tracks all the internet activities that the students are involved in (Hurt, et al. 2012). Through this, the hackers get an unauthorized access to the personal information of the students. However, the education when mixed up with technology has emerged out to be an innovative measure to get the students educated(Lawson 2010). Through this, they have an access to the latest syllabus, can communicate to each other, and also have the access to communicate with the students from the countries and exchange the information of the different techniques used for education along with the difference in the culture and traditions followed in different countries. But what information is being exchanged, how this information is being exchanged and also with whom it is been exchanged is a major point of concern. In order to be sure regarding this matter, more than the parents, it is the duty of the teachers and the members of the education committee to make sure that the students have an access to non-objectionable material of study (Bicen, Sadikoglu and Sadikoglu 2015). Also the other party with whom they are interacting and exchanging such information must be an authorized person. The impact of networking technology is mainly adverse from the students point of view, as a large proportion of the students are largely engaged in the usage of these social networking sites, due to which they experience an adverse impact on the concentration level, as their concentration level is reduced. Such reduced concentration level results in obtaining low marks for the students, which impacts their academic performance and final results (Al-Rahmi and Othman 2013). Also, excessive usage of the networking technology has other adverse impacts as well. Like, it makes the students more engaged, aggressive as well as cause problems in the sleeping pattern and also health related problems such as stomach ache. Apart from these adverse impacts, the major ethical issue faced by the students is the risk to the privacy in exchanging the personal information over the usage of internet. For this purpose, instead of teaching and training the students regarding the usage of the technologies in education, the schools and colleges must focus more on the content as well as the part with whom the students are interacting. And also the schools and colleges are responsible if an unauthorized third party has an access over the vital and confidential information of the students (IANS 2011). Vital information of the students can be any piece of information related to their personal contact number, address, bank account details or their accounts on certain networking sites over the internet. Justification With the recent advancement in the technology, the education has got merged with the technology, as well. More and more teachers, as well as educators, are encouraging the use of technology in education to make education pervasive as well as practical in understanding (Hung and Yuen 2010). The educators along with the students are aggressively using these technologies for the purpose of education and have also succeeded in building the skills, abilities, and knowledge of the students. But certain ethics has to be followed when education is merged with technology. Ethics are the measures through which an individual gets the path to differentiate between the right and wrong action plans (BBC 2017). Such ethical issues are related to access to electronic information as well as data, issues related to the matter of copyright, use of the internet and the associated censorship, cyber bullying and also the use of the social networking sites, as discussed above. The major threat that the stu dents have from the use of networking technology is no protection against the risk of the personal information getting exposed or accessed by an unauthorized third party. This occurs because the educational institutes have no idea regarding the individuals who uses such technology, who implements such information and also the individuals who have such access. Conclusion The essay highlights the ethical issues which are being faced by the students of colleges and schools because of the networking technology. Such ethical issues are the access to the electronic information, use of the internet, issues related to the matter of copyright, cyber bullying and excessive usage of social networking sites. Among all these ethical issues, the major threatening issue is the risk to the privacy of the information to get the personal and vital information leaked. More than the parents, the teachers and the members of the education committee are responsible for such ethical issues faced by the students. However, in order to safeguard the students from such major technological threats, the educators and the parents must collectively teach the student regarding the online etiquette. Teachers and parents must warn the students regarding the internet usage, as well as the amount and type of information to be shared over the internet. Merely, implementation of such pol icies wont work so the teachers and the parents are required to have a regular review and monitor the internet activities of the students in order to ensure that the students are implementing a proper online etiquette to safeguard themselves from the risk of the access from an unauthorized third party. References Al-Rahmi, W., and M. Othman. 2013. "The impact of social media use on academic performance among university students: A pilot study." Journal of information systems research and innovation 4 (12): 1-10. BBC. 2017. "Ethics: A General Introduction." British Broadcasting Corporation. https://www.bbc.co.uk/ethics/introduction/intro_1.shtml. Bicen, Huseyin, Saide Sadikoglu, and Gunay Sadikoglu. 2015. "The Impact of Social Networks on Undergraduate Students Learning Foreign Language." Procedia-Social and Behavioral Sciences 186: 1045-1049. Business Dictionary. 2017. "Ethics." https://www.businessdictionary.com/definition/ethics.html. Henderson, Michael, Glenn Auld, and Nicola F. Johnson. 2014. "Ethics of Teaching with Social Media." Australian Computers in Education Conference. Adelaide, SA. 1-7. Hung, H. T., and S. C. Y. Yuen. 2010. "Educational use of social networking technology in higher education." Teaching in higher education 15 (6): 703-714. Hurt, N. E., G. S. Moss, C. L. Bradley, L. R. Larson, M. Lovelace, L. B. Prevost, and M. S. Camus. 2012. "The Facebook'effect: college students' perceptions of online discussions in the age of social networking." International Journal for the Scholarship of Teaching and Learning 6 (2). IANS. 2011. "Students' concentration adversely affected by social networking sites." The Hindu. August 11. https://www.thehindu.com/sci-tech/technology/internet/students-concentration-adversely-affected-by-social-networking-sites/article2346038.ece. Lawson, Fleury. 2010. "Ethics and Technology Use in Education." December 6. https://ethicsandtechnologyuseineducation.blogspot.in/. Mattison, Lindsay. 2017. "Ethical Issues with Using Technology in the Classroom." study.com. january. https://study.com/blog/ethical-issues-with-using-technology-in-the-classroom.html. Vallor, S. 2010. "Social networking technology and the virtues. ." Ethics and Information Technology 157-170. Wen, Huachuan. 2015. Use of Social Networking Technologies: Effects on College Students' Academic Writing. Huachuan Wen.

Friday, November 29, 2019

The Economist

Introduction The Economist is a weekly publication that has been in production since 1843. Though its editors refer to it as a newspaper, it is produced in a magazine format and type of paper. It is based in London and is owned by The Economist Group, which is owned by the Financial Times, a subsidiary of Pearson PLC.Advertising We will write a custom coursework sample on The Economist specifically for you for only $16.05 $11/page Learn More It mainly gives information on issues relating to business sectors such as finance and economics, international business, politics, culture, science and technology among other fields. In recent years it has grown outside its traditional base in London where it is printed, so much that in 2009, it is said to have sold more than 1.6 million copies per issue all over the world. Most of these were sold in English speaking countries and even more predominantly Britain and North America. In its initial stages in the proces s of setting it up, back in the 1800s it was termed as a ‘chronicle of economics’ by outsiders, it defines itself in its core mission as a source of progress by fighting ignorance with intelligence. The Economist’s major strengths include Strong Brand The Economist is a strong brand name by itself and this is due to its rich and long history. It has maintained a steady growth over the years as other publications that could not withstand the numerous challenges collapsed along the way. It has not been challenged to execute major changes in their management structures by hard financial times ever since it was started in 1843. In fact, the only times it had to change its strategy was in periods such as the recession of 2008 when, unlike their competitors in the market, they were experiencing a substantial amount of growth. Their strong brand has also been associated with other successful magazines that are owned by the group behind The Economists. This is because as a flagship brand that has survived through time it has led to the establishment of a strong company that is a force to reckon with, in the similar publications industry. The strength of the publication as a brand is also complemented by the strength of the brands that make up its mother companies. With brands such as Pearson PLC and Financial Times, this publication enjoys some form of immunity. This can, however, be dangerous as some stronger brands have been crushed by the fall of their mother companies.Advertising Looking for coursework on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Experienced management The managers at The Economist have somehow always come up with a strategy that keeps them profitable even when other publications are suffering the brunt of financial meltdowns. They have always been able to identify the demands of their customers in time and satisfy those demands. They have also been able to i dentify new markets and fields of interests that have the potential to not only increase their market share, but also boost their customers’ loyalty. Such abilities can only be acquired through experience where managers have had a long time to examine consumer preferences and their changes. They can then deduce informed decisions such as the restructuring of their market structures. Their rich history also serves to build onto this experience as the managers can refer to more than a century of business practices that have served to keep the company afloat. This is because they have adopted internal training systems that ensure that the knowledge of those that leave the publication is transferred to those left. This continuity of knowledge has ensured that they always have a steady supply of credible managers who have the adequate know-how of running such a business as well as those who have already acquired a portfolio of experienced sources for their stories. The fact that t heir employees also own part of the business ensures that they maintain the highest levels of professionalism or else run into losses if the publication looses its market domination. Financial and Marketing excellence This has seen their capacity increase due to the availability of resources which is a result of increased profits. This has meant that they are able to adopt marketing campaigns without having to limit themselves to low budgetary allocations. They have had an increased magazine circulation as new markets grow as well as brand loyalty. This has seen them survive through recessions while still making profits while other publications were incurring loses.Advertising We will write a custom coursework sample on The Economist specifically for you for only $16.05 $11/page Learn More Variety The publication offers information on a variety of topics which include business, politics, science, and arts. It also gives information on different countrie s strewn all over the world which makes it richer in content than its competitors. This has worked to diversify its customer base to not only those interested in business news, as is the case with their competitors, but other professionals as well as travelers in general. The best thing about the variety that they have adopted is that it doesn’t dilute the detailed analysis that they have as is the case in other publications that chose to go with this as a business strategy. They have ensured that they have invested in writers and auditors who have rich backgrounds in all these fields and who are highly recommended. They, however, do not always give the identity of their writers, but it still remains authoritative and rich in content. Market domination due to Market positioning It has been identified that The Economist enjoys a considerable advantage over its competitors as far as their share of the weekly publications market is concerned. This has seen them enjoy stable prof its as their market has not been affected by any of the natural or financial forces that have affected their rival publications. This has been promoted by their wide market penetration as the publication enjoys loyal customers from many countries in the world. These loyal customers are due to the general perception that The Economist signifies intelligence. It specifically dominates the major markets which are composed of the world’s economic hubs which ensure that they maximize on revenues where demand is highest. This has, however, been as a result of hard work over many years, which has led to more people associating themselves with it since they started reading it at a very young age and for long it has been considered a source of intelligence. Long-term strengths Strong Brand due to Market positioning This is a long-term strength since it takes some time before people can adjust to any other brand that may come up to compete with The Economist. It is often realized that the strength of a brand is directly related to the loyalty of its customers.Advertising Looking for coursework on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More This means that the strong brand that is The Economist has been building up a portfolio of clients over time as its brand strengthens and these clients have slowly grown fond of the brand to a point where they always buy each copy released. These are the loyal customers are as a result of the fact that The Economist is associated with intelligence. This means that any of the rival publications will have to work hard to win over these customers so as to weaken the strength of the brand, which still would be impossible considering perceptions take long to break. This makes the strong brand long-term strength and The Economist is the brand to reckon with. Superior Content and Style with Emphasis on Commentary and Analysis The publication places more emphasis on giving the readers not only the news as it is reported, but an in-depth analysis of the news which serves to provide the reader with a deeper understanding. The managers have realized that it is not just enough for them to break news or give information on events, they also give background information that helps the reader come up with a better understanding of not only the situation as it is, but also the previous prevailing condition. This has been advantageous in attracting customers who seek to understand other countries in terms of economy, politics and culture. It is reported that their sales have in recent times increased especially in airports where most of their buyers seek to gain in-depth information about the country they are travelling to. This prevailed even during the recession, which goes ahead to prove just how good a tool, emphasis on analysis and commentary, can be in determining the success of a weekly publication. This may be the reason behind its increased sales during tough financial times since it does not only report of the financial crisis, but also on the causes and the possible remedies as provided by their huge team of experienced analysts. The Economists also goes ahead to giv e information on how different parts of the world are affected by the same phenomenon, as well as the different remedies they adopt. This serves to capture readers with a global approach to issues whom they target as they adapt to a new age of Mass Intelligence. Major marketing strategies that managers at The Economist they should consider to strengthen their position in the marketplace Market segmentation The Economist has currently been able to curve out part of the market for itself as far as weekly publications are concerned. It, however, needs to come up with better market segmentation structures for it to stay relevant as there are a lot of renewed interests in the same market, as other publications are now recovering from the effects of the financial recession of 2008. There are also some new entrants into the market with very aggressive market specific strategies. This may lead to The Economist loosing some of its undefined markets, as over the years it has taken a general a pproach to markets. It is worrying to see a publication that has so many loyal customers having very little representation in the young information hungry youth. This may result in the loss of their market domination in the near future if they do not go ahead to service the needs of this young market. Perhaps what will be challenging are the differences in preferences between their traditional customers and the more hip and technology savvy youth. The introduction of an online publication is a step in the right direction, but there is still more to be done (Wang, 2003). This young market has often proven to be tricky to dominate due to its specific needs and it would be of great importance if The Economist identified a young team that can serve this market since they are in a position to understand it better. This will of course be with the guidance of the old experienced staff so as to maintain the same consistency that has kept The Economist on top for many years. An example would be to launch an application that will allow people to access content on their phones without having to surf through the bulky websites that may be heavy for some of the phones used by the young. This is because this generation prefers gadgets rather than paper and it is evident that that the future of media is paperless. Product differentiation With the increasing competition, it has been noted that most of the traditional competitors as well as new market entrants are borrowing a lot from The Economist. This may in future dilute the uniqueness that the managers and the editors have for a long time struggled to create. It is, therefore, advised that the managers employ creative and innovative techniques such as patenting their unique adoptions to ensure that the publication maintains its uniqueness, since this is the reason for its survival where others struggle or even fail. This is meant to reduce competition and also to maintain their loyal customers as well as new customers who may lose touch with their products when given similar alternatives (Books Llc. 2010). They may choose to implement any of the following aspects of differentiating their products: different functional features or the design of The Economist; advertising to increase awareness; differences in availability in terms of the timing of their publication or the location of their markets and differences in quality by increasing the quality of their products. Strategy The Economist Should Adopt I would advise The Economist to adopt product differentiation as this allows them to incorporate any other strategic changes they may want. It is also important to realize that the risk of losing their market is evident and it is closer than any other risk they may be facing because their competitors seem to be gaining on them especially after the effects of the recession receded. The differentiation strategy will be accepted since it will ensure consistency in the performance of The Economist in the l ong run. The resources to implement this strategy are available especially considering the fact that they have been enjoying relatively stable profits for some time. Differentiation will allow them to target more customers especially the smart and curious ones who are mostly the young, who believe that the publication is a source of intelligence (Ranchhod, Gauzente and Tinson, 2004). This will also give them an edge over their competitors as they will be able to maintain their customers by gaining a pioneering status with no competition, which then strengthens the position of reader, hence proving to be effective. With the unique competitive advantage and the superior publication styles, content will be further fortified and utilized to strengthen the brand even further. This ensures sustainability as the strong brand has been identified as one of their long term strengths and also due to the fact that the younger customers will remain loyal for a long time. The emergence of Mass In telligence Effects on The Economist The emergence of mass intelligence was previously viewed as challenging by many weekly publications and most of them went ahead to ignore the phenomenon, and continued with providing headlines supported by shallow explanations. The marketers at The Economists, however, saw this as an opportunity to differentiate themselves from the rest of the industry players by providing their readers with more definitive explanations, as well as background information on their articles. This worked to their advantage as they boosted their sales. The main characteristic of their success is the widespread acceptance by readers who were obviously thirsty for a publication that placed more emphasis on giving the readers not only the news as it is reported, but an in-depth commentary and analysis of the news (Hill, Jones, 2009). This is because the readers that came with the emergence of mass intelligence required a source of deeper understanding on the issues that are happening in the world. This obviously meant that they had to hire a different group of writers, who were not only reporters of the news as it were, but also analysts and professionals in the same fields. They also realized that this group also, had no interest with being confined to only one topic and needed a variety of topics that they could relate together. This is the group that could combine business with travel and holidays, and so they diversified the contents of the publication to include other bodies of knowledge besides economics. Conclusion The Economist enjoys a relatively comfortable position in the publications market due to its varied strengths that its competitors lack. This, however, doesn’t mean that the managers and editors should rest easy, since their competitors seem to be gaining from on them. This means that they have to secure their markets by ensuring that they maintain their uniqueness, which has made them get to where they are now. This is to ensure the sustainability of the brand as well as its leadership in the market. Reference List Books Llc. 2010. News Magazines: The Economist, Life, Newsweek, Harper’s Magazine, Publishers Weekly, Insight on the News, the Pen. London: General Books LLC. Hill, C. and Jones, G. 2009. Strategic Management Theory: An Integrated Approach. Upper Saddle River: Cengage Learning. Ranchhod, A., Gauzente, C. and Tinson, J. 2004. Marketing strategies: a twenty-first century approach. New York: Prentice Hall. Wang, W. 2003. Steal this computer book 3: what they won’t tell you about the Internet. New York: No Starch Press. This coursework on The Economist was written and submitted by user Alia K. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essays

Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essays Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essay Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essay Research Proposal Why GSM Tech is more preferred than CDMA Tech in Yemen Prepared by: Khaled Al-Gahuri Prepared for: Dr. Murad Al-Nashmy Acknowledgement I am honored to prepare this research paper which titled â€Å"Why GSM Tech is more preferred than CDMA Tech in Yemen†. And I would like to pay my special thanks to Dr. Murad Abstract The cellular industry is in Yemen dominated by two technologies Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA). This paper will provide an overview of the two different technologies and will focus on why people in Yemen preferred to use the GSM technology rather than CDM technology A even though CDMA technology introduced after GSM with a more privileges. 1 Table of Content ? ? Acknowledgement †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 ? Chapter 1: Introduction ? ? ? ? ? Background †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 Objectives†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Significance of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Scope of study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 ? Chapter 2: Literature Review ? ? ? ? ? Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 Consumer Choice†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 Perceived Service Quality†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 Choice of Handset†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 Hypothesis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 ? Chapter 3: Methodology ? ? ? ? ? ? ? ? Research Deign †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Framework†¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Population An d Sampling†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Data Collection†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Data Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 10 Time Schedule†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 Conclusion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 2 Chapter 1 Background Introduction The mobile industry in Yemen is divided between the two technologies GSM and CDMA. While the earlier service providers had adopted the GSM technology, the new players have been using CDMA technology has notched up a significant share of the Yemen market. The number of subscriber’s mobile industry has increased significantly since 2001. The first company lunched in Yemen introduced the GSM technology which was the only choose for Yemenis people to grant, but in 2005 other company has been lunched by the government introduced the CDMA technology which provide a better services for the clients with privileges to overcome the GSM technology. After around five years a big number of people have subscribed with CDMA, but GSM was still demonstrated the market with a bigger number of subscribers until nowadays. It is necessary for us to understand the basic differentiation of the two technologies as they may have an impact on the subscribers. GSM stand for Global System for Mobile Communications, one of the leading digital cellular systems. It uses narrow band TDMA, which allows eight simultaneous calls on the same radio frequency. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band. GSM was first introduced in 1991. As of the end of 1997, GSM service was available in more than 100 countries and has become the de facto standard in Europe and Asia. CDMA stand for Code-Division Multiple Access, a digital cellular technology that uses spread-spectrum techniques. Unlike competing systems, such as GSM, that use TDMA, CDMA does not assign a specific frequency to each user. Instead, every channel uses the full available spectrum. Individual conversations are encoded with a pseudo-random digital sequence. CDMA consistently provides better capacity for voice and data communications than other commercial mobile technologies, allowing more subscribers to connect at any given time, and it is the common platform on which 3G technologies are built. 3 Problem Statement The tendency of choosing The GSM technology over the CDMA in Yemen is very obvious. Thus, there is a need to identify the factors that can influence the choice patterns of either GSM technology or CDMA technology as well as why consumers prefer to choose GSM rather than CDMA even though CDMA is has more privileges and uses advanced techniques. Objectives Our main objectives of this study are as following: To identify and analyze the factors that can influence the choice patterns of either GSM technology or CDMA technology. To investigate the relationship between those factors. To find out why GSM is more preferred than CDMA. Significance of the Study This research will help to recognize the factors that lead to the lack of use CDMA technology in Yemen as well as this study can contribute to the body of knowledge by examining the different variables and implement them. Scope of study The scope of this study is basically limited to the consumers o the mobile industry in Yemen. 4 Chapter 2 Introduction Literature Review This chapter will bring a clear idea about the factors that can influence consumer choice such as perceived services quality, choice of handset as well as international roaming and their relationship. In addition some previous researches will be included. Consumer Choice The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA was established earlier and thus has a bit more coverage than GSM. However GSM networks continue to make inroads in Yemen. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other, Richard (2009) stated that there is no clear winner in the CDMA and GSM it all depends on your needs. There are many factors that could influence on consumer choice patterns, different factors have different influence on consumer, and these factors should be taken into consideration in order to formulate consumer choice patterns. Mobile sector must focus on customer satisfaction as serious marketing strategies (Lim, and Widdows, 2006). Nadine (2001) examined that attitude of the respondents using cell phones was not influenced by either education or occupation and income. Haque (2007) suggested that coverage, service quality, data transfer speed, and choice of handset play a main role during the time to choose either GSM or CDMA technology. Chris (2006) noted that in recent years the telecommunications market has witnessed major developments, with rapid expansion in access to telecommunications networks and a surge in the number of available services and applications. While many factors have contributed to the transformation of the telecommunications industry, competition has played a key role in driving telecom industry to develop new techniques, to innovate and to offer new services. 5 With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, Simon (2007) Stated that speed in data transfer is important to those who use the phone for more than making calls. Other thing advertisement can take a place when choosing technology Kalpana (2006) found that advertisement play a dominant role in influencing the customers. Perceived Service Quality Perceived service quality defined as a global judgment or attitude relating to the superiority of the service and it’s the rank to which the technology provides key customer requirement and how reliable those requirement are delivered(NQRC,2001). Basically consumers are adapted to the services that either GSM or CDMA could provide Kumar (2005), in his study analyzed that, services plays a major role in the telecom industry are the most active and attractive. In addition the quality of service is a driving of choice Seth et al (2006), in his study analyzed that there is relative importance of service quality attributes and showed that responsiveness is the most importance dimension followed by reliability, customer perceived network quality, assurance, convenience. The development of a reliable and valid instrument for assessing customer perceived service quality for cellular mobile services. (Backlund and Holmqvist, 2006) pointed that customer choice is achieved through good qualitative and quantitative services. Customer choice normally can indicate to customer response to the state of satisfaction and customer opinion of satisfied condition (Oliver, 2003). Palkar (2004) proposed that perceived services is an important factor that has greater influence on costumer choice. (Serkan 2005) determined that the balance of power between service quality and customer satisfaction with an emphasis on these two constructs is the concept that is different from the view of customer. Zeithaml and Bitner, 2002, indicated that both service quality and customer satisfaction have some things in common. Furthermore, Fornell et. al. ,(1998) reported that satisfaction is a consequence of service quality. 6 Choice of handset Liu (2002) found that the choice of a cellular phone is characterized by two attitudes: attitude towards the mobile phone brand on one hand and attitude towards the network on the other. Samuvel (2002) observed that most of the respondents consider coverage area, quality of services are an important factors for selecting the either GSM or CDMA while majority of the respondents are considered that choice if handset is the most important factor. Kalus stated that If you travel a lot to foreign countries, then GSM phone is better for you. Also santos(2006) indicated that GSM phones work more widely across the world than do CDMA models. International Roaming This is when you connect to an overseas network and calls are routed via that network provider instead of your home provider. Johson(2002) defined roaming as extension of connectivity service in a location that is different from the home location where the service was registered. Roaming ensures that the wireless device is kept connected to the network, without losing the connection. Roaming allows mobile wireless customers to automatically make and receive voice calls, send and receive data, or access other services, including home data services when they are outside of the area covered by their providers network regardless of their location. Forneil(2004) stated that roaming plays a major role in the quality of GSM/CDMA technology, Susan J. Campbell (2007) stated that there are number of different technology trends, but most significant is the rise of mobile roaming. Hypotheses The Hypotheses are developed based on Literature Review mentioned earlier to describe the relationship among these variables that influence on consumer choice. H1: There is positive/significant relationship between perceived services quality and consumer choice. H2: There is positive/significant relationship between international roaming and consumer choice. H3: There is positive/significant relationship between the choice of handset and consumer choice. 7 Chapter 3 Methodology - Source of Data The study undertaken to be mainly based on the primary data and secondary data. The primary data is collected directly from the target respondents through tructured questionnaire and personal interview. The secondary data for the study is collected from different sources such as technical and trade journals, articles, newspapers, magazines, internet, books, reports. RESEARCH DESIGN First and the most important phase in determining method of this research is designing phase. This phase should be given serious attention to make sure that the research can be done without mistakes. Designing includes choosing the best method for collecting, measuring, analyzing data. Quantitative method such as survey method has been used for collection data. Research Framework Perceive service quality Choice of Handset Choice of Technology International Roaming 8 Population and Sampling Research The population of this study is all the consumers who has cellular phone which a huge amount of number, in this case we use Exploratory and Random sampling to analyze data. ? Data Collection The data is collected randomly irrespective of the category of the people in the form of questionnaire and the sample size is 100 respondents. Because it is a pilot study and due to time constraint the sample size is small. ? Data Analysis From the questionnaires we have distributed we got the following results: Q1) which technology do you use? Technology GSM CDMA No. of respondents 78 22 90 80 70 60 50 40 30 20 10 0 GSM CDMA 9 Interpretation: Above data analysis shows that majority of the consumers that is approximately 78% are covered by GSM technology. Based on this result we trying to know why GSM is more preferred. Q2) Overall, how would you rate you both technologies? GSM CDMA EXCELLENT GOOD 40 25 18 22 AVERAGE 13 20 FAIR 10 20 40 35 30 25 20 15 10 5 0 excellent Good Avg Fair GSM CDMA Interpretation: From the graphic it depict that GSM is the most excellent technology. 10 Q3) Rank the following factors which influenced you the most: Roaming QoS Choice of handset 92 8 DATA SPEED 32 68 Range of coverage 41 59 GSM CDMA 67 22 62 38 100 90 80 70 60 50 40 30 20 10 0 roaming Service handset coverage GSM CDMA Interpretation: Above data analysis shows that GSM is being preferred because of its services, the choice of handset and the strength of roaming. Where CDMA is preferred because of its good range of coverage. 11 Q4) Rank the following Service which attracted you the most for tour choice either GSM or CDMA Brand GSM CDMA SMS Pack 60 40 Call rate 45 65 Internet 70 30 Other 67 33 70 60 50 40 GSM 30 20 10 0 SMS call rate Internet other CDMA Interpretation: from chart above it shows that GSM is more preferred from because of its aspects of the services. Where CDMA is preferred because of its call rate. 12 Q5) How satisfied are you with your choice of GSM/CDMA technology? Brand GSM CDMA Very satisfied 35 20 satisfied 60 30 Neutral 0 15 issatisfied 0 0 60 50 40 30 20 10 0 very satisfied satisfied Neutral dissatisfied GSM CDMA Interpretation: Above data analysis shows that the satisfaction rate of technology is leaded by GSM as not a single user of service is neutral or dissatisfy. In other hand CDMA seems to be good satisfied with zero dissatisfies but there are around 15 respondents who are neutral. 13 Conclusion As per my analysis I noti ced that the main factors that makes GSM technology more preferred are the mobile choice of handset and the quality of service regardless the range of coverage and the price rate. Other thing I noticed that are the mobile choice of handset and the value of service has a strong relationship Conclusion of the topic is that maturity of customers is using GSM technology because of its good network roaming availability and quality of services and the wide choice of handset. Mostly customers have considered GSM is one of the best services provided in Yemen because other factors and efficient services. ? Time Schedule 15th February, 2012 Data Collection Problem Statement Objectives Literature Review Methodology Whole report 30th February , 2012 13th March, 20th March, 2012 2012 1 April, 2012 ? ? ? ? 14 ? References 1. Jallet, Frederic, intelecommunications†,( emeraldinsight. com/Insight/viewContentItem. do; jsessionid=236E2B6B45CF101465D540FD4401AEB9? 2. Debnath, Roma Mitra, â€Å"Benchmarking telecommunication service in India†, 2008( emeraldinsight. com/Insight/viewContentItem. do;jsessionid=236E2 B6B45CF101465D540FD4401AEB 3 Robins, Fread, â€Å"The marketing of 3G†, vol 21, no 6, 2008 emeraldinsight. com/Insight/viewContentItem. do;jsessionid=236E2B6B45 CF101465D540FD4401AEB9? 4. Kalwani, Banumathy, â€Å"Consumer’s Attitude towards Cell phone Services†, 2006 . Fernandez, Fronnie, Understanding Dynamics in an Evolving 2007( emeraldinsight. com/Insight/viewContentItem. do;jsessionid=208652 7F0757A565F9A6CBAC8800F658? 6. Seth et, Etal, â€Å"Managing the Customer Perceived Service Quality for Cellular MobileTelephone: an Empirical Investigation†, 2008( emeraldinsight. com/Insight/viewContentItem. do;jsessionid=208652 7F0757A565F9A6CBAC8800F658? 7. Tecor, Jha, Understanding Mobile Phone Usage Pattern among CollegeGoers†,2008( emeraldinsight. com/Insight/viewContentItem. do;jsessionid= 2086527F0757A565F9A6CBAC8800F658? 15

Thursday, November 21, 2019

Amount of life insurance to purchase Research Paper

Amount of life insurance to purchase - Research Paper Example 4. Estimate future income needs. 5. Anticipate special needs. This review follows these steps to a life insurance value. I am a 30-year-old man with a wife, same age, and two children, ages 2 and 4. I enjoy a good job paying $50,000 per year, and my wife earns $30,000. Our net take home pay is about $40,000 after all deductions. If I should die early, I want my wife to be able to stay at home and parent the children full time. We have managed to save $25,000 cash in checking and savings accounts. We have a portfolio of mutual funds, $48,000, securities, $10,000, IRAs, $6,000, and a 401K with $6,000. Our total liquid assets are $95,000. Currently, I have three times earnings as a life insurance benefit at work and a $10,000 pension death benefit for a total in force life insurance of $160,000. Upon my death, my wife would have liquid assets of $255,000. My death would cost $7,500 in funeral expenses, $5,000 deductible for medical insurance, $22,000 to clear our installment debts and a bout $3,000 in probate costs. These costs total $37,500; so the liquid assets decrease to $217,500. Insurance must replace all of our income for my wife to stay home. An after death adjustment period of two years costs about 150% of normal earnings for a total of $120,000. The children will be dependent for another 20 years.

Wednesday, November 20, 2019

Week 4 Discussion Questions Essay Example | Topics and Well Written Essays - 750 words

Week 4 Discussion Questions - Essay Example , an investment banker would prove to be of great support as he/she will guide the organization through the process and will recommend whether going public is in interest of the organization or not. The investment banker will be involved in investigating the organization in order to know its strengths, risks involved and overall business procedures in order to assist for going public. This research will accommodate with enough knowledge about whether going public will be advantageous for the organization or not. Financial leverage is there when the organization obtains loans or borrowings on the basis of its assets and intends that a greater rate of return will be there as compared to the interest rate. As far as operating leverage is concerned, it is the consideration of the degree of the fixed and variable costs involved in a business. Operating leverage is the measure of the rate of fixed operating costs of the organization while financial leverage is the measure of the rate of loan that an organization takes against its rate of assets. The risks involved in having an excessive amount of financial leverage in an organization are that the profitability of the organization and the return on equity of the organization lessen. This situation arises when the organization’s return on assets (ROA) is unable to enhance as compared to the interest that is inserted on loan taken for the organization. EBIT-EPS analysis can be defined as a pragmatic instrument with the help of which, a financial manager is able to investigate various substituted financial plans in terms of their effect on EPS (Earnings per Share) over a range of EBIT (Earnings before Interests and Taxes) levels. EBIT-EPS analysis is simply an analysis to calculate earnings per share at various levels of sales of earnings before interest and taxes. Into the EBIT-EPS analysis, the risk is handled quite ignored. With this analysis, the basic motive is to enhance the earnings per share; due to this fact,

Monday, November 18, 2019

Diversified Workforce and Leadership Power Assignment

Diversified Workforce and Leadership Power - Assignment Example Employers are also creating an inclusive environment where diverse employees work together, and feel that they are valued by an organization Dunbar & Burgoon, 2005). Unlike the past, employers today have recognized the benefit of seeking a mixed workforce that portrays composition of the operating environment. Diversifying the workforce has a lot of benefits to employers, especially those who seek to compete effectively in the global market. Diversified workforce gives them the opportunity to increase their cultural understanding, and they are exposed to more opportunities in new markets thus placing them in a better position to exploit new opportunities. A diversified workforce in a marketplace will be highly engaged and productive. Employers have found that fostering diversity in their workforce clearly shows a need for everybody’s talent within the organization, and assists to make them feel highly valued. Employers are being trained on the value of fostering diversity in their workforce, especially as a means of promoting equality and inclusivity in their organizations (McGurre & Mammed, 2010). Power is seen as the capacity that one possesses to produce certain effects, more so, being able to influence the behaviour of others (Burgoon & Dunbar, 2005). Contextually, this definition has been extended to describe the power of leaders in their workplaces. Leaders have been characterized by their capacity to make various decisions in an organization, and their ability to influence their juniors or fellow employees’ actions and perceptions. Power is an important tool for leaders who know the relationship between the use of power, subordinates’ satisfaction, and organizational commitment. This power is based on a manager’s position in the organization and is validated by the members of the involved organization (Rahim, Kim & Kim, 2014). The structure of an organization stipulates the framework to enact legitimate power since it not only outlines the rights and responsibilities of the organization but also establishes the hierarchy in the organization.  Ã‚  

Saturday, November 16, 2019

Anticoagulants as Prophylaxis for DVT and NSAIDs Analgesic

Anticoagulants as Prophylaxis for DVT and NSAIDs Analgesic INTRODUCTION The process of healing in a fractured bone depends on several factors related to the patient, fracture site, and treatment (Muller et al., 2004). In contrast to healing in other soft tissue, bone fracture healing is a very remarkable process, because rather than leading to scar tissue formation, normal bone healing leads to the regeneration of the anatomy of the bone and complete return to function (Sfeir et al., 2005). Administrations of different pharmacological agents have been known to have an effect on the fracture healing process. Such agents include corticosteroids, non-steroidal anti-inflammatory drugs (NSAIDS), antibiotics and anticoagulants (lppokratis et al., 2007). Among these drugs, NSAIDS and anticoagulants are commonly used in the management of fracture cases. Not only are they prescribed in daily practise, they are frequently administered concomitantly (Ellen, 2003). NSAIDs are often used because of their analgesic effects. They carry out their pharmacologic effect by inhibition of cyclooxygenase. Diclofenac sodium, a commonly used NSAID derived from phenylacetic acid, is indicated for the management of acute and chronic conditions. Anticoagulants on the other hand are commonly used for the prevention and treatment of deep vein thrombosis (DVT). Major orthopedic trauma is a compelling risk factor for the development of DVT. This condition has been observed to occur in 50-70% of patients submitted to acute fixation of proximal femoral fracture, multiple fracture patients, and those presenting with spinal cord trauma when no prophylactic measure is performed. The most commonly used anticoagulants are low molecular weight heparin (LMWH) and warfarin (Guyton and Hall, 2006). One study has reported no difference in quantitative amount of direct or radiographically measured callus formed during NSAIDs use. (Herbenick et al., 2008). In another study, Muller et al., 2004 reported that diclofenac sodium when given orally affected the mechanical properties of bone, reduced body weight gain and reduced the coefficient of non-fractured bone. A significant delay in fracture healing following administration of enoxaparin was reported by Street et al. (2000). Their study found fewer proliferating cells and fewer transforming pericytes in the medullary cavity at day 7 and 14 and weaker mechanical properties at day 21 compared to the control animals. Hak et al., (2006), however reported no deleterious effect of LMWH on fracture healing mechanical properties. Regardless of the frequent use of anticoagulants as prophylaxis for DVT and NSAIDs as analgesic in the management of trauma cases, few studies have shown their combined effect during fracture healing. The present study was thus designed to evaluate the effect of combine use of these drugs on the histology and histomorphometry of bone tissues in experimental rat model of bone fractures. Materials and Method Animal management: Thirty six male Wistar rats weighing between 150g to 200g were used. Animals were housed in clean plastic cages and provided with food and water ad libitum throughout the experimental period. All animals were handled in accordance with the guidelines for animal research as detailed in the NIH Guidelines for the care and use of laboratory Animals (NIH Publication, 2011) and experimental protocol were approved by local institutional research and ethics committee. Fracture Procedures: Animals were randomly divided into 3 groups (A, B and C) of 12 animals. All animas were submitted to diaphyseal fracture of right tibia after being anesthetized with chloroform via inhalation under aseptic conditions. Animals were then allowed to move freely without any immobilization (Muller et al 2004). Drug administration: Following fracture, animals in group B were administered with diclofenac and heparin, while group C were administered with diclofenac and warfarin. Group A animals served as control. Diclofenac was administered intramuscularly on alternate thigh muscle at 5mg/kg/day. Heparin was administered subcutaneously at 0.5mg/kg/day and warfarin was administered orally at 0.005mg/kg/day. Drug administration commenced12 hours following fracture was continued for daily for a period of 21 days. Four animals were selected from each group for radiographic, histologic and histomorphometric analysis at day 7, 14 and 21 days interval following treatment. Radiologic evaluation: Standardized radiographs (Faxitron, Wheeling, IL USA) were performed at the time of sacrifice, using constant settings with the animal anesthetized and positioned prone with both hind limbs fully abducted. Fracture union was evaluated by two, blinded, independent observers. Fracture union was defined as the presence of bridging callus along opposite cortices. (Hak et al., 2006) Histological and Histomorphometric analysis: Following radiographic evaluation, animals were sacrificed, and right tibia dissected out. Tibia bones were immediately fixed in 10% formal saline for at least 24 hours. Fixed tibia tissues were then subjected to decalcification using 10% EDTA (pH 7.4) for 7 days. Following decalcification, tibia tissues were processed for routine paraffin wax embedding. Sections of 5 um thick were cut and stained using routine Haematoxylin and Eosin (HE) procedure for general tissue histology and Van Geison staining procedure for collagen fibres. Stained sections were observed under Leica DM750 digital research microscope. Photomicrographs were taken via attached ICC50 digital camera from 3 non-overlapping areas of stained sections. These were then imported onto Image J software (NIH sponsored public domain image analysis software) for histomorphometric analysis which included osteocytes cell count and cortical width measurement. Statistical analysis: Data obtained from histomorphometric count and measurement were analysed using One-way ANOVA followed by Students-Newman-Keuls (SNK) tests for multiple comparison. GraphPadPrsim 5 (GraphPad Inc., USA) software was package use for statistical analysis. Significant difference was set at p Results Radiographic analysis: X-Ray photos of rat tibia after 7days of treatment showed fracture lines that were clearly visible with no sign of callus formation. After 14 days however minimal deposition of callus formation in all groups was observed. Bridging callus was more in control and group B rats as compared with group C and group D. After 21 days of Treatment more deposits of callus with fracture line no longer visible was observed in control and group B as compared with group C and D (Figure 1). Histological analysis: HE staining showed intact osteocytes within lacunae, empty lacunae, and resorption cavities in all groups (Figure 2).Van Gieson staining technique differentiates between mature and immature collagen fibres (callus). Mature collagen fibres stains deep red while immature fibres stains pale orange. The colour intensity of the deep red was observed in the control group through the 21 days of treatment. However groups B and C had more immature collagen fibres all through the 21 days of treatment when compared to the control (Figure 3). Histomorphometric measurements: Data analysis shows that administration of diclofenac plus heparin and diclofenac plus warfarin in groups B and C respectively, significantly increased (p Discussion In the current study, we found that administration of heparin and diclofenac as well as warfarin and diclofenac resulted in increased number of osteocytes count at week 1, 2 and 3when compared with the control. Though at day 14 the osteocyte count of diclofenac heparin animals was significantly higher than diclofenac warfarin group. Increased osteocytes number is associated with increase in activity of osteoclast, subsequently increasing bone resorption (Lynda 2011). The use of anticoagulant is associated with surgical site heamatoma formation. The early use of LMWH in patients with fractures may lead to larger fracture site hematoma. It is generally accepted that fracture site hematoma could be beneficial in fracture healing. Studies by Grundnes and Reikera in 1993 have shown that evacuation of this hematoma could be deleterious on fracture healing. However Street et al 2000 showed that though hematoma could be beneficial, high concentration of potassium in fracture site hematoma is cytotoxic to endothelial cells and osteoblasts. Therefore increased fracture site heamatoma volume may have deleterious effect on fracture healing. Hak et al 2006 reported the presence of heamatoma formation in short term administered LMWH in animals. In this study, we observed no hematoma formation at fracture site in diclofenac heparin administered animals. However, the presence of hematoma was observed in animals receiving diclofenac and warfarin which persisted f or the period of 3 weeks. Studies by Avioli et al 1975 and Matzsch et al 1990 identified long term use of heparin to be a risk factor for the development of osteoporosis in humans. Their finding was supported by Chowdhury et al., 1992, they concluded that low doses of standard heparin directly stimulates bone resorption by increasing the number of differentiated osteoclasts and by enhancing the activity of individual osteoclast. One study by Nishiyama et al., (1997) comparing the effects of heparin and LMWH (dalteparin) after 8 days of injection, observed that rats treated with standard heparin showed a significant reduction in osteoid surface and mineral apposition rates and seven of eight rats suffered spontaneous femoral fracture. When compared with the rats treated with LMWH, they observed minimal decrease in bone indices and no fractures. These finding is supported by this study were we observe decrease cortical thickness in animals treated with diclofenac and anticoagulants when compared with the contro l. However this decrease was more marked in diclofenac warfarin group than in diclofenac heparin group. Decrease in cortical width has been said to lead to cortical porosity resulting in increased fragility of bone. (Bouvaed et al., 2012; Evangelos and Meletios 2014). In this study radiographic evidence showed reduced callus formation in anticoagulants and diclofenac treated animals at the end of the 3rd week. However no reduction in callus formation was obsereved in control group. This is consistent with studies done by Hak et al., 2006. Conclusion In conclusion the combined use of diclofenac and anticoagulants could affect the quality of fracture healing, hence the study recommends that concomitant use of diclofenac and anticoagulants should be applied with caution.

Wednesday, November 13, 2019

Free Hamlet Essays: Interpretation of Hamlet :: The Tragedy of Hamlet Essays

Keys to Interpretation of Hamlet William Shakespeare's Hamlet is, at heart, a play about suicide. Though it is surrounded by a fairly standard revenge plot, the play's core is an intense psychodrama about a prince gone mad from the pressures of his station and his unrequited love for Ophelia. He longs for the ultimate release of killing himself - but why? In this respect, Hamlet is equivocal - he gives several different motives depending on the situation. But we learn to trust his soliloquies - his thoughts - more than his actions. In Hamlet's own speeches lie the indications for the methods we should use for its interpretation. Hamlet's reason for suicide is the death of his father, the late King Hamlet - or at least this is what he tells the world. He claims his father's death as the reason in his first soliloquy (1.2.133-164), but we are led towards other reasons by the evidence he gives. In the famous "to be or not to be" soliloquy, he says: "For who would bear... the pangs of despised love... when he himself might his quietus make/with a bare bodkin?" (3.1.78-84). The word "despised" is glossed as "unrequited" - and thus we are led to speculation that Ophelia, not the late King, is the true cause of his suicidal urges. The claim that he is mourning his father seems to me to be at best an excuse - in the public eye as he is, Hamlet cannot sink so low as to be moved to kill himself by a woman. This is an example of a phenomenon that we note throughout Hamlet - the separation of what is stated on the surface from the implications a few layers beneath. The play works on two levels - the revenge drama works as a backdrop for Hamlet's internal psychodrama. It is clear that Shakespeare intends for Hamlet's thoughts to be superior to his outward actions in interpretation of the play. After listing all the outward signs of his depression, he tells his mother that he would prefer to be considered on the basis of his thoughts: "These indeed 'seem'/For they are actions that a man might play;/But I have that within which passes show/These but the trappings and the suits of woe" (1.2.86-89). Yet Hamlet, for all the disdain for played action that he shows here, also appreciates its power, in his remarks on the player's soliloquy on Hecuba (2.

Monday, November 11, 2019

Choosing Among Two Aspirant in an Office Essay

During the work hunting days of the newly graduates and other professionals, there are lots of pressure and competition among the applicants in different offices or jobs that they are applying for. Let us take a closer look between these two candidates in an office, Obama and Hiliary.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Assuming that they are competing for a job in an office of personnel and communication of a corporation, Obama and Hiliary should meet the qualifications identified by the office as requisites before they could be accepted as staff. The office of personnel and communication is also commonly known as human resource department of a company. However, it scopes further networking and creation of press releases and other researches. It is very necessary for a person who is working in that particular department of the corporation to be socialized with different people, first and foremost, her co-workers. It is because in this job, staff will be meeting people from different walks of life. They are to deal and communicate with different networks. And since there could be loads of works in daily basis, one should be efficient enough to finish a one day job of paper works. Obama, is a graduate of a business related course three years ago in a one of the top universities in California. She graduated with honors and a very good scholastic background and affiliations. She has already three years experience from previous work in a non-government organization as training officer. She is very young at an age 23 going to 24. Hiliary, on the other hand, is of the same age of Obama. However, Hiliary graduated without any special commends but also from one of the top universities Los Angeles. She studied there also a business related course and took several extra short courses in psychology. After her graduation she works in a private company as personnel staff, and eventually, after consistent eight months of excellent work, she seats as the assistant head of human resource department of her previous company. And now, these two young ladies are candidates in an office as head of the personnel and communication of the corporation. There have been qualifications that are being specified a while ago. To choose among these two candidates, their educational background, credentials, and their personality could be tested and compared so as to choose the right person to fit the job. Obama, has a better scholastic standing and background as it shows by her honors and awards during her college education, than Hiliary, who graduated with her diploma only, taken into considerations that they both come from top universities in the world. However, Hiliary, as checked in her working experience and from the company where worked, it was found out that she had a very good social skills and was able to deal with top position people in the corporate world down to the most ordinary worker. She was promoted at the very early eight months of her work period as the assistant head of the human resource department. But Obama, was also found a very persevere and dedicated employee. In terms of their personality, both of the two could socialize and work well with different kind s of people. Since they are candidate in work of a head of the personnel and communication of a corporation, the one who deserves the position, must be acquainted enough and familiar enough with the nature of work. In case of Obama, she worked as training officer in her previous company. Meaning, that she could communicate and lead and guide other people in the company and outside the company. Both of the two have already endured the pressure of professional works. However, Hiliary has already her experience of working as assistant head of human resource department, which is very similar to the work that she is applying now.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In selecting for the right position holder in the corporation, these comparisons and contrast could be one of the bases that could be used. Works Cited â€Å"Ethical Office Politics.† Lifehack.org. (No Date). November 19, 2007

Friday, November 8, 2019

Assessing Leadership Skills Essay Essays

Assessing Leadership Skills Essay Essays Assessing Leadership Skills Essay Essay Assessing Leadership Skills Essay Essay This paper will supply information about the theoretical attacks that I will utilize to heighten my leading effectivity. it will discourse my leading manner and the ground I choose the manner. This paper will besides explicate the leading accomplishments and qualities I already possess. with the accomplishments and qualities that need betterment. along with how to implement the leadership/follower interaction to better the organisation where I would wish to work. and eventually depict one point of action that I’ve learned from my Self Insight documents. that will include a description of how each point will be implemented. Let’s Begin by specifying leading ; leading is the influence relationship among leaders and followings who intend existent alterations and results that reflect their shared intents. ( Draft. 2011. p. 5 ) Leadership is a people activity and is different from administrative paper work or planning activities. Leadership happens wi th people. it is non something done to people. ( Draft. 2011. p. 6 ) The theoretical attacks that I will utilize to heighten my leading effectivity will be to integrate the democratic leading manner ; along with the Fiedler’s Contingency Model. The democratic manner of leading delegate’s authorization to others encourages engagement. relies on subordinates’ cognition for completion of undertakings and depends on subsidiaries respect for others. ( Draft. 2011. p. 44 ) Democratic leading manner is similar to Theory Y Democratic leaders treat subsidiaries as to the full capable of making the work on their ain. Democratic leaders work with subsidiaries they encourage. they treat each one reasonably. They don’t set anyone down. they see themselves as ushers. They give suggestions. instead than seeking to alter them. Democratic leaders provide information. in their rating they give nonsubjective congratulations and unfavorable judgment. ( Northouse. 2009 ) Although a Democratic leader will do the concluding determination. he/she encourage other members of the squad to hold a say in the determination devising procedure. This non merely hike occupation satisfaction by linking employees or squad members in what’s traveling on. but it besides help to develop people’s accomplishments. Employees and squad members feel in control of their ain fate. such as the publicity they deserve and so are motivated to work hard by more than merely a fiscal wages. As engagement takes clip. this attack can take to things go oning more easy but frequently the terminal consequence is better. The attack can be most suited where squad work is indispensable and quality is more of import than velocity to market productiveness. ( Bhatti. N. et. Al. 2012 ) The results of democratic leaders are largely positive. first it consequences in greater group member satisfaction. committedness. and coherence. Second. there is more friendliness. common prattles. and group mindedness. The teams members interact with each other in a positive mode. and the end is has the group in head with doing we statements opposed to I stat ements. Last. democratic leaders result in stronger worker motive and greater creativeness. and under a democratic leader group members participate more and are more committed to group determinations Fiedler’s Contingency Model ; this theoretical account was designed to enable leaders to name both leading manner and organisational state of affairs. ( Draft. 2011. p. 68 ) This theoretical account was besides designed to name whether or non the leader is task oriented or relationship oriented and fit the leader manner to the state of affairs. The Tasks oriented people are end oriented. They want to accomplish. Their work in meaningful. they are actors. Then we have Relationship oriented people they find intending in being instead than making. Like the democratic manner. relationship oriented people they want to be connected to people. There is besides Task leading and Relationship leading. Task relationship behaviours facilitate ends achievements ; they are behaviours that aid group mem bers to accomplish their aims. while relationship leading behaviour aid subordinates experience comfy with themselves. with each other. and with the state of affairs which they find themselves. The ground why I choose these theoretical accounts is because they best fit my leading manner. and I think it’s a productive manner of leading. In using this accomplishment I‘m ale to listen to other position. and welcome an mixture of declarations. My best leading qualities are in the class of a transformational leader. Transformational leaders are a leader that influences. inspire. move and literally transform followings to accomplish organisational ends beyond their opportunisms therefore originating about positive alteration. They besides introduce new concern theoretical accounts. merchandises and services because of their ability to make new organisational visions. schemes. civilizations. and structures through committed followings. Transformational leaders positively change follower’s lives. raising liquors and even the committedness to moralss and morality ( Weiss. J. ( 2011 ) My penchant would be a transformational leader because they deal more with the individual instead than the undertaking. They build relationships with their squad members. they encourage and motivate. and I think that their followings will acquire more work done because of the resonance that is made with the squad. Another quality that I posses is â€Å"Stewardship† stewardship involves the support and belief that leaders are profoundly accountable to others every bit good as to the organisation. without seeking to command others. specify significance and intent for others. or take attention of others. I’m in favour of this type of leading because it allows the people to make the work without being micro managed. There are four constituents to this manner of leading. reorient towards partnership premises. place determinations and power to those closest to the work and the client. acknowledge and honor the value of labour. and anticipate nucleus work squads to construct t he organisation. ( Draft. 2011. p. 176 ) By utilizing these methods the leader is to take the organisation taking control of the follower. They are able to work together in harmoniousness with squad members. By utilizing the stewardship method you are able to handle team members as spouses. by sharing power. and keeping control over their ain work. This theoretical account besides allows relationships to organize between leaders and followings that will lend to the organisations success. Independent believing refers to believing. oppugning premises. and construing informations and events. harmonizing to one’s ain beliefs. thoughts. non harmonizing to prestablished regulations. modus operandis or classs defined by others. ( Draft. 2011. p. 138 ) I’ve ever been an independent mind. I’m non the type of individual that agrees with people for credence. or merely to travel along with the most popular reply. I’m really opinionated. and I’m able to acquire my positions across without being rude or mean. In my current place. I have to ever be watchful. and able to believe critically because systems are ever altering Although I fell that I’m a good overall leader my weakest accomplishments falls under disposal accomplishments. disposal accomplishments. Administrative accomplishments are those competences a leader needs to run an organisation in order to transport out the organisations purpose and ends. Administrative accomplishments are divided into three classs: managing people. pull offing resources. and demoing proficient competency. ( Northouse. 2009 ) I work good with people but covering with administrative undertaking has ever been an issue for me. I’m non the best typist. nor am I good organized. Since going a pupil at AU I’ve go more organized. Another quality in demand of betterment trades with system believing. System believing means the ability to see the synergism of the whole instead than merely the separate elements of a system and larn to reenforce or alter whole system forms. ( Draft. 2011. p. 142 ) The leadership/follower interaction that I would implement to better the organisation where I would wish to work is leader follower coaction. In the leader follower coaction leaders and followings have more in common than they think. In my ideal work topographic point I would utilize this theoretical account as the design for my company. Get downing phases of a undertaking or assignment. The leader and follower functions differ significantly in the initial phases of a undertaking. The leader should supply way in the signifier of range. nonsubjective. outlooks. restrictions and guidelines while the follower should inquire inquiries to guarantee understanding and should lend to the undertaking or assignment definition as appropriate. Middle phases of a undertaking or assignment. The leader and follower functions exhibit greater similarities during the in-between phases of a undertaking. This is where the majority of work occurs. Leadership should switch. based upon who possesses the appropriate cognition or expertness. With self-importances in cheque. leaders should allow. and even promote. followings to originate thoughts and sentiments. With cowardliness in cheque. followings should exercise leading by offering thoughts and sentiments. If leader and follower can carry through these new functions. a high grade of coaction will happen and project success will increase. Concluding phases of a undertaking or assignment In this phase. leader and follower functions once more differ. It is up to the leader to specify the terminal of one undertaking and the beginning of the following. For optimum acquisition. leader and follower might collaboratively prosecute in a â€Å"lessons learned† duologue. ( Don Grayson A ; Ryan Speckhart ) What I’ve learned from my Self Insight Papers is that I might be a spot timid in my leading ability. I thought that I was a good leader but it seems as though that I still have some work to make. Prior to taking this class I thought that I was a really good leader. but it seems as though I have a batch to work to make to better my leading accomplishments. In making an appraisal of my strengths and failings. I realized that in order to go a more effectual leader I will hold to go much more confident in certain countries. The countries that betterment is needed is in my motive techniques. I thought that I encouraged my squad in a positive mode. but what I realized is that I’m making the majority of the work while promoting. what sense does that do? I have to put lineations and let my squad members to do errors. and learn from them. Because we get paid by public presentation is likely why I do that. As a leader. you can develop anchor to accept personal duty for accomplishing the desired results. traveling against the position quo. and standing up for what you believe. You can larn to force beyond your comfort zone and interruption through the frights that bound you. ( Draft. 2011. p. 182 ) That statement amounts it up for me. If a leader can populate by that statement everyone will profit in the terminal. In decision this paper has defined leading. identified the accomplishments and qualities I possess. in add-on to the qualities that need betterment. every bit good as how to implement the leadership/follower interaction to better the organisation where I would wish to work. and eventually depict one point of action that I’ve learned from my Self Insight documents. that will include a description of how each point will be implemented. MentionsBhatti. N. . Maitlo. G. M. . Shaikh. N. . Hashmi. M. A. . A ; Shaikh. F. M. ( 2012 ) . The impact of bossy and democratic leading manner on occupation satisfaction. International Business Research. 5 ( 2 ) . 192-201. Retrieved from hypertext transfer protocol: //search. proquest. com/docview/963357720? accountid=32521 Daft. R. L. ( 2011. 2008 ) . The leading experience ( 5/e ) . Mason. Ohio: South-Western Cengage Learning. Northouse. P. G. ( 2009 ) . Introduction to Leadership: Concepts and Practice. Thousand Oaks. CA: Sage Publications Weiss. J. ( 2011 ) An Introduction to Leadership. Bridgepoint Education. Inc. World Wide Web. trustee. edu/acad/global/publications/†¦/grayson_speckhar