Saturday, August 31, 2019

A Comparative Analysis of television channels FIVE and BBC Essay

Television is a powerful media source, bringing stories to billions across the globe. It has been called â€Å"the most awesome God-less force in the modern world† and it is now seen as a major part of everyday life. The average person spends 4 hours a day watching TV – becoming roughly 1/3 of a person’s typical waking hours. Television is a constructed view of reality, sometimes exaggerated extremely, solely to create entertainment. In the UK, there are five major terrestrial television channels, (four organisations) with some being vastly more successful than others. The BBC is the only organisation not to make money from advertising. Their money is generated from the TV Licence fee, and this type of broadcasting is known as Public Service Broadcasting. Channel 5 is perhaps seen as the least successful of the five TV channels, possibly due to the fact that it is the youngest. The channel began in 1995, but it was not able to broadcast nationally as many of the population’s televisions could not receive it. The company offered to retune every TV that couldn’t receive it, before the big launch in 1997. A long advertising campaign was launched, known as â€Å"Give Me Five† in an attempt to draw in viewers. On the 30th March, 1997, Channel 5 was launched at 6pm, attracting an audience of 2. 4 million people, a figure higher than the launch of Channel 4, fifteen years earlier. This new channel neither had the money or reputation to buy and broadcast potentially successful material. Perhaps getting off to a bad start, the main schedule consisted of home and cookery programmes, cheap US exports, and late night pornography. However, Channel 5 did receive praise for its news programming, and soon the ratings became consistently acceptable. The channel gained more money, and was soon able to buy better quality shows, such as Home & Away. In 2002, Channel 5 underwent a major image modification. The name changed from Channel 5 to simply, Five, and progressed itself as a serious rival to the other 4 channels. However, the channel has not been without its flaws. For example, Friends spin-off series, Joey, was bought by Five in 2005. Despite a high-profile launch and ad campaign, the program received poor ratings and was eventually cancelled. Similarly, other shows such as Robot Wars and CD:UK proved to be a flop for the channel. These unsuccessful shows have seemingly increased the channel’s poor reputation. In the channel’s first year of broadcasting, five receives its lowest audience shares of 2. 3%, but this can be expected from a debuting channel. Fifteen years earlier, Channel 4 received even lower audience shares on its opening night, although it could be argued that people watched less television in the 1980s. The audience shares increased, and peaked in 2004. The channel has the lowest audience share of the terrestrial channels, but, in its defence, Five is not received in all of the UK’s homes. Like all of the other terrestrial channels, Five now has â€Å"sister† channels, Five US and Five Life. These two channels are both somewhat successful, but other â€Å"sister† channels, such as ITV2, E4 and BBC Three are proving to be more viewed. Nowadays, Five is able to branch out and buy successful US shows such as Prison Break and House, as well as buying programmes from other channels – in 2008, Five bought Neighbours from the BBC. The BBC was established in the early 1920s, but it was not until 1936 that the channel began its regular television broadcasting as a public service TV channel. However, it was further suspended after WWII began, until 1946 when the permanent service was established. The BBC’s mission was to â€Å"inform, educate and entertain† and is still taken into account today. The BBC broadcasts a wide variety of programmes on both of its channels, BBC1 and BBC2. The BBC’s major programme is EastEnders, the popular primetime soap. On a weekly basis, the soap receives the highest rating of all terrestrial shows, with only the ITV1 soap, Coronation Street, (and occasionally reality shows such as The X Factor and Dancing On Ice) playing as its rival. Other BBC shows, such as Top Gear, Doctor Who and Little Britain have all been a success throughout the last decade, further improving the channels ratings and reputation. In an attempt to branch out and widen its audience, the BBC has recently made some unlikely purchases. In 2007, the channel brought the successful US show Heroes to BBC2. The show quickly became a phenomenon, and is different from what would usually be broadcast on BBC2. The BBC continues to dominate terrestrial TV, by finding ways to bring in more viewers. The programmes vary from food, to lifestyle, to documentary, to political. The BBC is now contending with ITV in the reality market, as it now features shows looking for new west-end stars, and the ever popular series, Strictly Come Dancing. BBC1 receives the highest audience share of the 5 channels, with an average of 26%. It is seen as the â€Å"main† channel, and regularly receives high ratings. This major organisation has the money to do whatever it pleases, and this has shown over the last decade. The BBC now has 8 channels – BBC1, BBC2, BBC Three, BBC Four, BBC News 24, BBC Parliament, CBBC and CBeebies. These 8 channels prove to cater for everyone. BBC Three is the most popular of the sister channels, frequently receiving new material such as Lily Allen and Friends and Gavin & Stacey. The channel is a â€Å"lighter† version of BBC1, with a more comedic element. The BBC now broadcasts internationally. A new channel, BBC America, was launched in 1998, and has carried programming from the BBC to the USA, such as Torchwood and The Graham Norton Show. BBC America is part of two international channels, the other being BBC World. A recent feature of the BBC, BBC iPlayer, has recently been introduced. It has become an on-demand online video player, with unlimited access to BBC shows. The iPlayer is proving extremely popular, with more than 3. 5 million programmes downloaded in its opening week. However, despite the BBC being a major empire, the company relies on the licence fee. It is the only channel not to rely on income through advertising. The core belief of public service television is that it is free from the pressures of commercial TV, and, as its income is guaranteed, public service TV is freer to explore. But this does not mean it can become complacent. High audience shares are still needed because, if they were to fall, the licence fee would be in serious jeopardy. For years, there has been a debate as to whether public service broadcasting should continue. Naturally, the BBC wishes for it to continue, whereas others disagree. The BBC has very little to do to secure its funding, whereas the commercial companies have to work to get their income. The opponents of public service television argue that it is simply another form of taxation. With the arrival and expansion of satellite and cable, some people have no interest in the public service channels. For the BBC, public service broadcasting means that certain pressures are put upon them, but their income is fixed. The BBC could be said to have better quality shows due to them receiving â€Å"easy† money, and it also means that their programmes can be longer, due to the fact that they don’t have to make time for advertising. However, for Channel 5, public service television means that there are no pressures. The channel can show what they want (within reason) but their income is variable. Unsurprisingly, the commercial channels are against the licence fee, as it seems unfair. It seems as if the media are in constant debate over whether the licence fee should continue, as many people pay considerable sums for services in which they have no interest in.

Friday, August 30, 2019

Database Solutions

DATABASE SOLUTIONS (2nd Edition) THOMAS M CONNOLLY & CAROLYN E BEGG SOLUTIONS TO REVIEW QUESTIONS Chapter 1 Introduction- Review questions 1. 1List four examples of database systems other than those listed in Section 1. 1. Some examples could be: †¢A system that maintains component part details for a car manufacturer; †¢An advertising company keeping details of all clients and adverts placed with them; †¢A training company keeping course information and participants’ details; †¢An organization maintaining all sales order information. 1. 2Discuss the meaning of each of the following terms: (a)dataFor end users, this constitutes all the different values connected with the various objects/entities that are of concern to them. (b)database A shared collection of logically related data (and a description of this data), designed to meet the information needs of an organization. (c)database management system A software system that: enables users to define, create, and maintain the database and provides controlled access to this database. (d)application program A computer program that interacts with the database by issuing an appropriate request (typically an SQL statement) to the DBMS. (e)data independenceThis is essentially the separation of underlying file structures from the programs that operate on them, also called program-data independence. (f)views. A virtual table that does not necessarily exist in the database but is generated by the DBMS from the underlying base tables whenever it’s accessed. These present only a subset of the database that is of particular interest to a user. Views can be customized, for example, field names may change, and they also provide a level of security preventing users from seeing certain data. 1. 3Describe the main characteristics of the database approach.Focus is now on the data first, and then the applications. The structure of the data is now kept separate from the programs that operate on the d ata. This is held in the system catalog or data dictionary. Programs can now share data, which is no longer fragmented. There is also a reduction in redundancy, and achievement of program-data independence. 1. 4Describe the five components of the DBMS environment and discuss how they relate to each other. (1)Hardware:The computer system(s) that the DBMS and the application programs run on. This can range from a single PC, to a single mainframe, to a network of computers. 2)Software:The DBMS software and the application programs, together with the operating system, including network software if the DBMS is being used over a network. (3)Data:The data acts as a bridge between the hardware and software components and the human components. As we’ve already said, the database contains both the operational data and the meta-data (the ‘data about data’). (4)Procedures:The instructions and rules that govern the design and use of the database. This may include instructions on how to log on to the DBMS, make backup copies of the database, and how to handle hardware or software failures. 5)People:This includes the database designers, database administrators (DBAs), application programmers, and the end-users. 1. 5Describe the problems with the traditional two-tier client-server architecture and discuss how these problems were overcome with the three-tier client-server architecture. In the mid-1990s, as applications became more complex and potentially could be deployed to hundreds or thousands of end-users, the client side of this architecture gave rise to two problems: †¢A ‘fat’ client, requiring considerable resources on the client’s computer to run effectively (resources include disk space, RAM, and CPU power). A significant client side administration overhead. By 1995, a new variation of the traditional two-tier client-server model appeared to solve these problems called the three-tier client-server architecture. This new arc hitecture proposed three layers, each potentially running on a different platform: (1)The user interface layer, which runs on the end-user’s computer (the client). (2)The business logic and data processing layer. This middle tier runs on a server and is often called the application server. One application server is designed to serve multiple clients. (3)A DBMS, which stores the data required by the middle tier.This tier may run on a separate server called the database server. The three-tier design has many advantages over the traditional two-tier design, such as: †¢A ‘thin’ client, which requires less expensive hardware. †¢Simplified application maintenance, as a result of centralizing the business logic for many end-users into a single application server. This eliminates the concerns of software distribution that are problematic in the traditional two-tier client-server architecture. †¢Added modularity, which makes it easier to modify or replace o ne tier without affecting the other tiers. Easier load balancing, again as a result of separating the core business logic from the database functions. For example, a Transaction Processing Monitor (TPM) can be used to reduce the number of connections to the database server. (A TPM is a program that controls data transfer between clients and servers in order to provide a consistent environment for Online Transaction Processing (OLTP). ) An additional advantage is that the three-tier architecture maps quite naturally to the Web environment, with a Web browser acting as the ‘thin’ client, and a Web server acting as the application server.The three-tier client server architecture is illustrated in Figure 1. 4. 1. 6Describe the functions that should be provided by a modern full-scale multi-user DBMS. Data Storage, Retrieval and UpdateAuthorization Services A User-Accessible CatalogSupport for Data Communication Transaction SupportIntegrity Services Concurrency Control Servic esServices to Promote Data Independence Recovery ServicesUtility Services 1. 7Of the functions described in your answer to Question 1. 6, which ones do you think would not be needed in a standalone PC DBMS? Provide justification for your answer.Concurrency Control Services – only single user. Authorization Services – only single user, but may be needed if different individuals are to use the DBMS at different times. Utility Services – limited in scope. Support for Data Communication – only standalone system. 1. 8Discuss the advantages and disadvantages of DBMSs. Some advantages of the database approach include control of data redundancy, data consistency, sharing of data, and improved security and integrity. Some disadvantages include complexity, cost, reduced performance, and higher impact of a failure.Chapter 2 The Relational Model – Review questions 2. 1Discuss each of the following concepts in the context of the relational data model: (a)relati on A table with columns and rows. (b)attribute A named column of a relation. (c)domain The set of allowable values for one or more attributes. (d)tuple A record of a relation. (e)relational database. A collection of normalized tables. 2. 2Discuss the properties of a relational table. A relational table has the following properties: †¢The table has a name that is distinct from all other tables in the database. †¢Each cell of the table contains exactly one value. For example, it would be wrong to store several telephone numbers for a single branch in a single cell. In other words, tables don’t contain repeating groups of data. A relational table that satisfies this property is said to be normalized or in first normal form. ) †¢Each column has a distinct name. †¢The values of a column are all from the same domain. †¢The order of columns has no significance. In other words, provided a column name is moved along with the column values, we can interchange c olumns. †¢Each record is distinct; there are no duplicate records. The order of records has no significance, theoretically. 2. 3Discuss the differences between the candidate keys and the primary key of a table. Explain what is meant by a foreign key. How do foreign keys of tables relate to candidate keys? Give examples to illustrate your answer. The primary key is the candidate key that is selected to identify tuples uniquely within a relation. A foreign key is an attribute or set of attributes within one relation that matches the candidate key of some (possibly the same) relation. 2. 4What does a null represent?Represents a value for a column that is currently unknown or is not applicable for this record. 2. 5Define the two principal integrity rules for the relational model. Discuss why it is desirable to enforce these rules. Entity integrityIn a base table, no column of a primary key can be null. Referential integrityIf a foreign key exists in a table, either the foreign key value must match a candidate key value of some record in its home table or the foreign key value must be wholly null. Chapter 3 SQL and QBE – Review questions 3. 1What are the two major components of SQL and what function do they serve?A data definition language (DDL) for defining the database structure. A data manipulation language (DML) for retrieving and updating data. 3. 2Explain the function of each of the clauses in the SELECT statement. What restrictions are imposed on these clauses? FROMspecifies the table or tables to be used; WHEREfilters the rows subject to some condition; GROUP BYforms groups of rows with the same column value; HAVINGfilters the groups subject to some condition; SELECTspecifies which columns are to appear in the output; ORDER BYspecifies the order of the output. 3. What restrictions apply to the use of the aggregate functions within the SELECT statement? How do nulls affect the aggregate functions? An aggregate function can be used only in the SEL ECT list and in the HAVING clause. Apart from COUNT(*), each function eliminates nulls first and operates only on the remaining non-null values. COUNT(*) counts all the rows of a table, regardless of whether nulls or duplicate values occur. 3. 4Explain how the GROUP BY clause works. What is the difference between the WHERE and HAVING clauses? SQL first applies the WHERE clause. Then it conceptually arranges he table based on the grouping column(s). Next, applies the HAVING clause and finally orders the result according to the ORDER BY clause. WHERE filters rows subject to some condition; HAVING filters groups subject to some condition. 3. 5What is the difference between a subquery and a join? Under what circumstances would you not be able to use a subquery? With a subquery, the columns specified in the SELECT list are restricted to one table. Thus, cannot use a subquery if the SELECT list contains columns from more than one table. 3. 6What is QBE and what is the relationship between QBE and SQL?QBE is an alternative, graphical-based, ‘point-and-click’ way of querying the database, which is particularly suited for queries that are not too complex, and can be expressed in terms of a few tables. QBE has acquired the reputation of being one of the easiest ways for non-technical users to obtain information from the database. QBE queries are converted into their equivalent SQL statements before transmission to the DBMS server. Chapter 4 Database Systems Development Lifecycle – Review questions 4. 1Describe what is meant by the term ‘software crisis’.The past few decades has witnessed the dramatic rise in the number of software applications. Many of these applications proved to be demanding, requiring constant maintenance. This maintenance involved correcting faults, implementing new user requirements, and modifying the software to run on new or upgraded platforms. With so much software around to support, the effort spent on maintenan ce began to absorb resources at an alarming rate. As a result, many major software projects were late, over budget, and the software produced was unreliable, difficult to maintain, and performed poorly.This led to what has become known as the ‘software crisis’. Although this term was first used in the late 1960s, more than 30 years later, the crisis is still with us. As a result, some people now refer to the software crisis as the ‘software depression’. 4. 2Discuss the relationship between the information systems lifecycle and the database system development lifecycle. An information system is the resources that enable the collection, management, control, and dissemination of data/information throughout a company. The database is a fundamental component of an information system.The lifecycle of an information system is inherently linked to the lifecycle of the database that supports it. Typically, the stages of the information systems lifecycle include: pla nning, requirements collection and analysis, design (including database design), prototyping, implementation, testing, conversion, and operational maintenance. As a database is a fundamental component of the larger company-wide information system, the database system development lifecycle is inherently linked with the information systems lifecycle. 4. 3Briefly describe the stages of the database system development lifecycle. See Figure 4. Stages of the database system development lifecycle. Database planning is the management activities that allow the stages of the database system development lifecycle to be realized as efficiently and effectively as possible. System definition involves identifying the scope and boundaries of the database system including its major user views. A user view can represent a job role or business application area. Requirements collection and analysis is the process of collecting and analyzing information about the company that is to be supported by the d atabase system, and using this information to identify the requirements for the new system.There are three approaches to dealing with multiple user views, namely the centralized approach, the view integration approach, and a combination of both. The centralized approach involves collating the users’ requirements for different user views into a single list of requirements. A data model representing all the user views is created during the database design stage. The view integration approach involves leaving the users’ requirements for each user view as separate lists of requirements. Data models representing each user view are created and then merged at a later stage of database design.Database design is the process of creating a design that will support the company’s mission statement and mission objectives for the required database. This stage includes the logical and physical design of the database. The aim of DBMS selection is to select a system that meets th e current and future requirements of the company, balanced against costs that include the purchase of the DBMS product and any additional software/hardware, and the costs associated with changeover and training. Application design involves designing the user interface and the application programs that use and process the database.This stage involves two main activities: transaction design and user interface design. Prototyping involves building a working model of the database system, which allows the designers or users to visualize and evaluate the system. Implementation is the physical realization of the database and application designs. Data conversion and loading involves transferring any existing data into the new database and converting any existing applications to run on the new database. Testing is the process of running the database system with the intent of finding errors.Operational maintenance is the process of monitoring and maintaining the system following installation. 4. 4Describe the purpose of creating a mission statement and mission objectives for the required database during the database planning stage. The mission statement defines the major aims of the database system, while each mission objective identifies a particular task that the database must support. 4. 5Discuss what a user view represents when designing a database system. A user view defines what is required of a database system from the perspective of a particular job (such as Manager orSupervisor) or business application area (such as marketing, personnel, or stock control). 4. 6Compare and contrast the centralized approach and view integration approach to managing the design of a database system with multiple user views. An important activity of the requirements collection and analysis stage is deciding how to deal with the situation where there is more than one user view. There are three approaches to dealing with multiple user views: †¢the centralized approach, †¢the view integration approach, and †¢a combination of both approaches.Centralized approach Requirements for each user view are merged into a single list of requirements for the new database system. A logical data model representing all user views is created during the database design stage. The centralized approach involves collating the requirements for different user views into a single list of requirements. A data model representing all user views is created in the database design stage. A diagram representing the management of user views 1 to 3 using the centralized approach is shown in Figure 4. 4.Generally, this approach is preferred when there is a significant overlap in requirements for each user view and the database system is not overly complex. See Figure 4. 4 The centralized approach to managing multiple user views 1 to 3. View integration approach Requirements for each user view remain as separate lists. Data models representing each user view are created and then mer ged later during the database design stage. The view integration approach involves leaving the requirements for each user view as separate lists of requirements.We create data models representing each user view. A data model that represents a single user view is called a local logical data model. We then merge the local data models to create a global logical data model representing all user views of the company. A diagram representing the management of user views 1 to 3 using the view integration approach is shown in Figure 4. 5. Generally, this approach is preferred when there are significant differences between user views and the database system is sufficiently complex to justify dividing the work into more manageable parts.See Figure 4. 5 The view integration approach to managing multiple user views 1 to 3. For some complex database systems it may be appropriate to use a combination of both the centralized and view integration approaches to managing multiple user views. For examp le, the requirements for two or more users views may be first merged using the centralized approach and then used to create a local logical data model. (Therefore in this situation the local data model represents not just a single user view but the number of user views merged using the centralized approach).The local data models representing one or more user views are then merged using the view integration approach to form the global logical data model representing all user views. 4. 7Explain why it is necessary to select the target DBMS before beginning the physical database design phase. Database design is made up of two main phases called logical and physical design. During logical database design, we identify the important objects that need to be represented in the database and the relationships between these objects.During physical database design, we decide how the logical design is to be physically implemented (as tables) in the target DBMS. Therefore it is necessary to have selected the target DBMS before we are able to proceed to physical database design. See Figure 4. 1 Stages of the database system development lifecycle. 4. 8Discuss the two main activities associated with application design. The database and application design stages are parallel activities of the database system development lifecycle. In most cases, we cannot complete the application design until the design of the database itself has taken place.On the other hand, the database exists to support the applications, and so there must be a flow of information between application design and database design. The two main activities associated with the application design stage is the design of the user interface and the application programs that use and process the database. We must ensure that all the functionality stated in the requirements specifications is present in the application design for the database system. This involves designing the interaction between the user and the data, w hich we call transaction design.In addition to designing how the required functionality is to be achieved, we have to design an appropriate user interface to the database system. 4. 9Describe the potential benefits of developing a prototype database system. The purpose of developing a prototype database system is to allow users to use the prototype to identify the features of the system that work well, or are inadequate, and if possible to suggest improvements or even new features for the database system. In this way, we can greatly clarify the requirements and evaluate the feasibility of a particular system design.Prototypes should have the major advantage of being relatively inexpensive and quick to build. 4. 10Discuss the main activities associated with the implementation stage. The database implementation is achieved using the Data Definition Language (DDL) of the selected DBMS or a graphical user interface (GUI), which provides the same functionality while hiding the low-level DDL statements. The DDL statements are used to create the database structures and empty database files. Any specified user views are also implemented at this stage.The application programs are implemented using the preferred third or fourth generation language (3GL or 4GL). Parts of these application programs are the database transactions, which we implement using the Data Manipulation Language (DML) of the target DBMS, possibly embedded within a host programming language, such as Visual Basic (VB), VB. net, Python, Delphi, C, C++, C#, Java, COBOL, Fortran, Ada, or Pascal. We also implement the other components of the application design such as menu screens, data entry forms, and reports.Again, the target DBMS may have its own fourth generation tools that allow rapid development of applications through the provision of non-procedural query languages, reports generators, forms generators, and application generators. Security and integrity controls for the application are also impleme nted. Some of these controls are implemented using the DDL, but others may need to be defined outside the DDL using, for example, the supplied DBMS utilities or operating system controls. 4. 11Describe the purpose of the data conversion and loading stage.This stage is required only when a new database system is replacing an old system. Nowadays, it’s common for a DBMS to have a utility that loads existing files into the new database. The utility usually requires the specification of the source file and the target database, and then automatically converts the data to the required format of the new database files. Where applicable, it may be possible for the developer to convert and use application programs from the old system for use by the new system. 4. 2Explain the purpose of testing the database system. Before going live, the newly developed database system should be thoroughly tested. This is achieved using carefully planned test strategies and realistic data so that the entire testing process is methodically and rigorously carried out. Note that in our definition of testing we have not used the commonly held view that testing is the process of demonstrating that faults are not present. In fact, testing cannot show the absence of faults; it can show only that software faults are present.If testing is conducted successfully, it will uncover errors in the application programs and possibly the database structure. As a secondary benefit, testing demonstrates that the database and the application programs appear to be working according to their specification and that performance requirements appear to be satisfied. In addition, metrics collected from the testing stage provides a measure of software reliability and software quality. As with database design, the users of the new system should be involved in the testing process.The ideal situation for system testing is to have a test database on a separate hardware system, but often this is not available. I f real data is to be used, it is essential to have backups taken in case of error. Testing should also cover usability of the database system. Ideally, an evaluation should be conducted against a usability specification. Examples of criteria that can be used to conduct the evaluation include (Sommerville, 2000): †¢Learnability – How long does it take a new user to become productive with the system? Performance – How well does the system response match the user’s work practice? †¢Robustness – How tolerant is the system of user error? †¢Recoverability – How good is the system at recovering from user errors? †¢Adapatability – How closely is the system tied to a single model of work? Some of these criteria may be evaluated in other stages of the lifecycle. After testing is complete, the database system is ready to be ‘signed off’ and handed over to the users. 4. 13What are the main activities associated with oper ational maintenance stage.In this stage, the database system now moves into a maintenance stage, which involves the following activities: †¢Monitoring the performance of the database system. If the performance falls below an acceptable level, the database may need to be tuned or reorganized. †¢Maintaining and upgrading the database system (when required). New requirements are incorporated into the database system through the preceding stages of the lifecycle. Chapter 5 Database Administration and Security – Review questions 5. 1Define the purpose and tasks associated with data administration and database administration.Data administration is the management and control of the corporate data, including database planning, development and maintenance of standards, policies and procedures, and logical database design. Database administration is the management and control of the physical realization of the corporate database system, including physical database design and implementation, setting security and integrity controls, monitoring system performance, and reorganizing the database as necessary. 5. 2Compare and contrast the main tasks carried out by the DA and DBA.The Data Administrator (DA) and Database Administrator (DBA) are responsible for managing and controlling the activities associated with the corporate data and the corporate database, respectively. The DA is more concerned with the early stages of the lifecycle, from planning through to logical database design. In contrast, the DBA is more concerned with the later stages, from application/physical database design to operational maintenance. Depending on the size and complexity of the organization and/or database system the DA and DBA can be the responsibility of one or more people. . 3Explain the purpose and scope of database security. Security considerations do not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database. Consequently, database security encompasses hardware, software, people, and data. To effectively implement security requires appropriate controls, which are defined in specific mission objectives for the system. This need for security, while often having been neglected or overlooked in the past, is now increasingly recognized by organizations.The reason for this turn-around is due to the increasing amounts of crucial corporate data being stored on computer and the acceptance that any loss or unavailability of this data could be potentially disastrous. 5. 4List the main types of threat that could affect a database system, and for each, describe the possible outcomes for an organization. Figure 5. 1 A summary of the potential threats to computer systems. 5. 5Explain the following in terms of providing security for a database: authorization; views; backup and recovery; integrity; encryption; RAID. AuthorizationAuthorization is the granting of a right or privilege t hat enables a subject to have legitimate access to a system or a system’s object. Authorization controls can be built into the software, and govern not only what database system or object a specified user can access, but also what the user may do with it. The process of authorization involves authentication of a subject requesting access to an object, where ‘subject’ represents a user or program and ‘object’ represents a database table, view, procedure, trigger, or any other object that can be created within the database system. ViewsA view is a virtual table that does not necessarily exist in the database but can be produced upon request by a particular user, at the time of request. The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users. The user is not aware of the existence of any columns or rows that are missing from the view. A view can be defined over several tables with a user being granted the appropriate privilege to use it, but not to use the base tables. In this way, using a view is more restrictive than simply having certain privileges granted to a user on the base table(s).Backup and recovery Backup is the process of periodically taking a copy of the database and log file (and possibly programs) onto offline storage media. A DBMS should provide backup facilities to assist with the recovery of a database following failure. To keep track of database transactions, the DBMS maintains a special file called a log file (or journal) that contains information about all updates to the database. It is always advisable to make backup copies of the database and log file at regular intervals and to ensure that the copies are in a secure location.In the event of a failure that renders the database unusable, the backup copy and the details captured in the log file are used to restore the database to the latest possible consistent state. Journaling is the process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure. Integrity constraints Contribute to maintaining a secure database system by preventing data from becoming invalid, and hence giving misleading or incorrect results. EncryptionIs the encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. If a database system holds particularly sensitive data, it may be deemed necessary to encode it as a precaution against possible external threats or attempts to access it. Some DBMSs provide an encryption facility for this purpose. The DBMS can access the data (after decoding it), although there is degradation in performance because of the time taken to decode it. Encryption also protects data transmitted over communication lines.There are a number of techniques for encoding data to conceal the information; some are termed irreve rsible and others reversible. Irreversible techniques, as the name implies, do not permit the original data to be known. However, the data can be used to obtain valid statistical information. Reversible techniques are more commonly used. To transmit data securely over insecure networks requires the use of a cryptosystem, which includes: †¢an encryption key to encrypt the data (plaintext); †¢an encryption algorithm that, with the encryption key, transforms the plain text into ciphertext; †¢a decryption key to decrypt the ciphertext; a decryption algorithm that, with the decryption key, transforms the ciphertext back into plain text. Redundant Array of Independent Disks (RAID) RAID works by having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. The hardware that the DBMS is running on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails. This suggests having redundant components that can be seamlessly integrated into the working system whenever there is one or more component failures.The main hardware components that should be fault-tolerant include disk drives, disk controllers, CPU, power supplies, and cooling fans. Disk drives are the most vulnerable components with the shortest times between failures of any of the hardware components. One solution is the use of Redundant Array of Independent Disks (RAID) technology. RAID works by having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. Chapter 6 Fact-Finding – Review questions 6. Briefly describe what the process of fact-finding attempts to achieve for a database developer. Fact-finding is the formal process of using techniques such as interviews and questionnaires to collect facts about systems, requiremen ts, and preferences. The database developer uses fact-finding techniques at various stages throughout the database systems lifecycle to capture the necessary facts to build the required database system. The necessary facts cover the business and the users of the database system, including the terminology, problems, opportunities, constraints, requirements, and priorities.These facts are captured using fact-finding techniques. 6. 2Describe how fact-finding is used throughout the stages of the database system development lifecycle. There are many occasions for fact-finding during the database system development lifecycle. However, fact-finding is particularly crucial to the early stages of the lifecycle, including the database planning, system definition, and requirements collection and analysis stages. It’s during these early stages that the database developer learns about the terminology, problems, opportunities, constraints, requirements, and priorities of the business and t he users of the system.Fact-finding is also used during database design and the later stages of the lifecycle, but to a lesser extent. For example, during physical database design, fact-finding becomes technical as the developer attempts to learn more about the DBMS selected for the database system. Also, during the final stage, operational maintenance, fact-finding is used to determine whether a system requires tuning to improve performance or further developed to include new requirements. 6. 3For each stage of the database system development lifecycle identify examples of the facts captured and the documentation produced. . 4A database developer normally uses several fact-finding techniques during a single database project. The five most commonly used techniques are examining documentation, interviewing, observing the business in operation, conducting research, and using questionnaires. Describe each fact-finding technique and identify the advantages and disadvantages of each. Exa mining documentation can be useful when you’re trying to gain some insight as to how the need for a database arose.You may also find that documentation can be helpful to provide information on the business (or part of the business) associated with the problem. If the problem relates to the current system there should be documentation associated with that system. Examining documents, forms, reports, and files associated with the current system, is a good way to quickly gain some understanding of the system. Interviewing is the most commonly used, and normally most useful, fact-finding technique. You can interview to collect information from individuals face-to-face.There can be several objectives to using interviewing such as finding out facts, checking facts, generating user interest and feelings of involvement, identifying requirements, and gathering ideas and opinions. Observation is one of the most effective fact-finding techniques you can use to understand a system. With this technique, you can either par ¬ticipate in, or watch a person perform activities to learn about the system. This technique is particularly useful when the validity of data collected through other methods is in question or when the complexity of certain aspects of the system prevents a clear explanation by the end-users.A useful fact-finding technique is to research the application and prob ¬lem. Computer trade journals, reference books, and the Internet are good sources of information. They can provide you with information on how others have solved similar prob ¬lems, plus you can learn whether or not software packages exist to solve your problem. Another fact-finding technique is to conduct surveys through questionnaires. Questionnaires are special-purpose documents that allow you to gather facts from a large number of people while maintaining some control over their responses.When dealing with a large audience, no other fact-finding technique can tabulate the same facts as efficiently. 6. 5Describe the purpose of defining a mission statement and mission objectives for a database system. The mission statement defines the major aims of the database system. Those driving the database project within the business (such as the Director and/or owner) normally define the mission statement. A mission statement helps to clarify the purpose of the database project and provides a clearer path towards the efficient and effective creation of the required database system.Once the mission statement is defined, the next activity involves identifying the mission objectives. Each mission objective should identify a particular task that the database must support. The assumption is that if the database supports the mission objectives then the mission statement should be met. The mission statement and objectives may be accompanied with additional information that specifies, in general terms, the work to be done, the resources with which to do it, and the money to pay f or it all. 6. 6What is the purpose of the systems definition stage?The purpose of the system definition stage is to identify the scope and boundary of the database system and its major user views. Defining the scope and boundary of the database system helps to identify the main types of data mentioned in the interviews and a rough guide as to how this data is related. A user view represents the requirements that should be supported by a database system as defined by a particular job role (such as Manager or Assistant) or business application area (such as video rentals or stock control). 6. How do the contents of a users’ requirements specification differ from a systems specification? There are two main documents created during the requirements collection and analysis stage, namely the users’ requirements specification and the systems specification. The users’ requirements specification describes in detail the data to be held in the database and how the data is to be used. The systems specification describes any features to be included in the database system such as the required performance and the levels of security. 6. Describe one approach to deciding whether to use centralized, view integration, or a combination of both when developing a database system for multiple user views. One way to help you make a decision whether to use the centralized, view integration, or a combination of both approaches to manage multiple user views is to examine the overlap in terms of the data used between the user views identified during the system definition stage. It’s difficult to give precise rules as to when it’s appropriate to use the centralized or view integration approaches.As the database developer, you should base your decision on an assessment of the complexity of the database system and the degree of overlap between the various user views. However, whether you use the centralized or view integration approach or a mixture of both to build the underlying database, ultimately you need to create the original user views for the working database system. Chapter 7 Entity-Relationship Modeling – Review questions 7. 1Describe what entities represent in an ER model and provide examples of entities with a physical or conceptual existence.Entity is a set of objects with the same properties, which are identified by a user or company as having an independent existence. Each object, which should be uniquely identifiable within the set, is called an entity occurrence. An entity has an independent existence and can represent objects with a physical (or ‘real’) existence or objects with a conceptual (or ‘abstract’) existence. 7. 2Describe what relationships represent in an ER model and provide examples of unary, binary, and ternary relationships.Relationship is a set of meaningful associations among entities. As with entities, each association should be uniquely identifiable within the set. A uniquely identifiable association is called a relationship occurrence. Each relationship is given a name that describes its function. For example, the Actor entity is associated with the Role entity through a relationship called Plays, and the Role entity is associated with the Video entity through a relationship called Features. The entities involved in a particular relationship are referred to as participants.The number of participants in a relationship is called the degree and indicates the number of entities involved in a relationship. A relationship of degree one is called unary, which is commonly referred to as a recursive relationship. A unary relationship describes a relationship where the same entity participates more than once in different roles. An example of a unary relationship is Supervises, which represents an association of staff with a supervisor where the supervisor is also a member of staff.In other words, the Staff entity participates twice in the Supervises re lationship; the first participation as a supervisor, and the second participation as a member of staff who is supervised (supervisee). See Figure 7. 5 for a diagrammatic representation of the Supervises relationship. A relationship of degree two is called binary. A relationship of a degree higher than binary is called a complex relationship. A relationship of degree three is called ternary. An example of a ternary relationship is Registers with three participating entities, namely Branch, Staff, and Member.The purpose of this relationship is to represent the situation where a member of staff registers a member at a particular branch, allowing for members to register at more than one branch, and members of staff to move between branches. Figure 7. 4 Example of a ternary relationship called Registers. 7. 3Describe what attributes represent in an ER model and provide examples of simple, composite, single-value, multi-value, and derived attributes. An attribute is a property of an entit y or a relationship. Attributes represent what we want to know about entities.For example, a Video entity may be described by the catalogNo, title, category, dailyRental, and price attributes. These attributes hold values that describe each video occurrence, and represent the main source of data stored in the database. Simple attribute is an attribute composed of a single component. Simple attributes cannot be further subdivided. Examples of simple attributes include the category and price attributes for a video. Composite attribute is an attribute composed of multiple components. Composite attributes can be further divided to yield smaller components with an independent existence.For example, the name attribute of the Member entity with the value ‘Don Nelson’ can be subdivided into fName (‘Don’) and lName (‘Nelson’). Single-valued attribute is an attribute that holds a single value for an entity occurrence. The majority of attributes are singl e-valued for a particular entity. For example, each occurrence of the Video entity has a single-value for the catalogNo attribute (for example, 207132), and therefore the catalogNo attribute is referred to as being single-valued. Multi-valued attribute is an attribute that holds multiple values for an entity occurrence.Some attributes have multiple values for a particular entity. For example, each occurrence of the Video entity may have multiple values for the category attribute (for example, ‘Children’ and ‘Comedy’), and therefore the category attribute in this case would be multi-valued. A multi-valued attribute may have a set of values with specified lower and upper limits. For example, the category attribute may have between one and three values. Derived attribute is an attribute that represents a value that is derivable from the value of a related attribute, or set of attributes, not necessarily in the same entity.Some attributes may be related for a p articular entity. For example, the age of a member of staff (age) is derivable from the date of birth (DOB) attribute, and therefore the age and DOB attributes are related. We refer to the age attribute as a derived attribute, the value of which is derived from the DOB attribute. 7. 4Describe what multiplicity represents for a relationship. Multiplicity is the number of occurrences of one entity that may relate to a single occurrence of an associated entity. 7. 5What are business rules and how does multiplicity model these constraints?Multiplicity constrains the number of entity occurrences that relate to other entity occurrences through a particular relationship. Multiplicity is a representation of the policies established by the user or company, and is referred to as a business rule. Ensuring that all appropriate business rules are identified and represented is an important part of modeling a company. The multiplicity for a binary relationship is generally referred to as one-to-on e (1:1), one-to-many (1:*), or many-to-many (*:*). Examples of three types of relationships include: †¢A member of staff manages a branch. A branch has members of staff. †¢Actors play in videos. 7. 6How does multiplicity represent both the cardinality and the participation constraints on a relationship? Multiplicity actually consists of two separate constraints known as cardinality and participation. Cardinality describes the number of possible relationships for each participating entity. Participation determines whether all or only some entity occurrences participate in a relationship. The cardinality of a binary relationship is what we have been referring to as one-to-one, one-to-many, and many-to-many.A participation constraint represents whether all entity occurrences are involved in a particular relationship (mandatory participation) or only some (optional participation). The cardinality and participation constraints for the Staff Manages Branch relationship are shown in Figure 7. 11. 7. 7Provide an example of a relationship with attributes. An example of a relationship with an attribute is the relationship called PlaysIn, which associates the Actor and Video entities. We may wish to record the character played by an actor in a given video.This information is associated with the PlaysIn relationship rather than the Actor or Video entities. We create an attribute called character to store this information and assign it to the PlaysIn relationship, as illustrated in Figure 7. 12. Note, in this figure the character attribute is shown using the symbol for an entity; however, to distinguish between a relationship with an attribute and an entity, the rectangle representing the attribute is associated with the relationship using a dashed line. Figure 7. 12 A relationship called PlaysIn with an attribute called character. . 8Describe how strong and weak entities differ and provide an example of each. We can classify entities as being either strong or we ak. A strong entity is not dependent on the existence of another entity for its primary key. A weak entity is partially or wholly dependent on the existence of another entity, or entities, for its primary key. For example, as we can distinguish one actor from all other actors and one video from all other videos without the existence of any other entity, Actor and Video are referred to as being strong entities.In other words, the Actor and Video entities are strong because they have their own primary keys. An example of a weak entity called Role, which represents characters played by actors in videos. If we are unable to uniquely identify one Role entity occurrence from another without the existence of the Actor and Video entities, then Role is referred to as being a weak entity. In other words, the Role entity is weak because it has no primary key of its own. Figure 7. 6 Diagrammatic representation of attributes for the Video, Role, and Actor entities.Strong entities are sometimes r eferred to as parent, owner, or dominant entities and weak entities as child, dependent, or subordinate entities. 7. 9Describe how fan and chasm traps can occur in an ER model and how they can be resolved. Fan and chasm traps are two types of connection traps that can occur in ER models. The traps normally occur due to a misinterpretation of the meaning of certain relationships. In general, to identify connection traps we must ensure that the meaning of a relationship (and the business rule that it represents) is fully understood and clearly defined.If we don’t understand the relationships we may create a model that is not a true representation of the ‘real world’. A fan trap may occur when two entities have a 1:* relationship that fan out from a third entity, but the two entities should have a direct relationship between them to provide the necessary information. A fan trap may be resolved through the addition of a direct relationship between the two entities th at were originally separated by the third entity. A chasm trap may occur when an ER model suggests the existence of a relationship between entities, but the pathway does not exist between certain entity occurrences.More specifically, a chasm trap may occur where there is a relationship with optional participation that forms part of the pathway between the entities that are related. Again, a chasm trap may be resolved by the addition of a direct relationship between the two entities that were originally related through a pathway that included optional participation. Chapter 8 Normalization – Review questions 8. 1Discuss how normalization may be used in database design. Normalization can be used in database design in two ways: the first is to use ormalization as a bottom-up approach to database design; the second is to use normalization in conjunction with ER modeling. Using normalization as a bottom-up approach involves analyzing the associations between attributes and, based on this analysis, grouping the attributes together to form tables that represent entities and relationships. However, this approach becomes difficult with a large number of attributes, where it’s difficult to establish all the important associations between the attributes. Alternatively, you can use a top-down approach to database design.In this approach, we use ER modeling to create a data model that represents the main entities and relationships. We then translate the ER model into a set of tables that represents this data. It’s at this point that we use normalization to check whether the tables are well designed. 8. 2Describe the types of update anomalies that may occur on a table that has redundant data. Tables that have redundant data may have problems called update anomalies, which are classified as insertion, deletion, or modification anomalies. See Figure 8. 2 for an example of a table with redundant data called StaffBranch.There are two main types of insertion anomalies, which we illustrate using this table. Insertion anomalies (1)To insert the details of a new member of staff located at a given branch into the StaffBranch table, we must also enter the correct details for that branch. For example, to insert the details of a new member of staff at branch B002, we must enter the correct details of branch B002 so that the branch details are consistent with values for branch B002 in other records of the StaffBranch table. The data shown in the StaffBranch table is also shown in the Staff and Branch tables shown in Figure 8. 1.These tables do have redundant data and do not suffer from this potential inconsistency, because for each staff member we only enter the appropriate branch number into the Staff table. In addition, the details of branch B002 are recorded only once in the database as a single record in the Branch table. (2)To insert details of a new branch that currently has no members of staff into the StaffBranch table, it’s nec essary to enter nulls into the staff-related columns, such as staffNo. However, as staffNo is the primary key for the StaffBranch table, attempting to enter nulls for staffNo violates entity integrity, and is not allowed.The design of the tables shown in Figure 8. 1 avoids this problem because new branch details are entered into the Branch table separately from the staff details. The details of staff ultimately located at a new branch can be entered into the Staff table at a later date. Deletion anomalies If we delete a record from the StaffBranch table that represents the last member of staff located at a branch, the details about that branch are also lost from the database. For example, if we delete the record for staff Art Peters (S0415) from the StaffBranch table, the details relating to branch B003 are lost from the database.The design of the tables in Figure 8. 1 avoids this problem because branch records are stored separately from staff records and only the column branchNo re lates the two tables. If we delete the record for staff Art Peters (S0415) from the Staff table, the details on branch B003 in the Branch table remain unaffected. Modification anomalies If we want to change the value of one of the columns of a particular branch in the StaffBranch table, for example the telephone number for branch B001, we must update the records of all staff located at that branch.If this modification is not carried out on all the appropriate records of the StaffBranch table, the database will become inconsistent. In this example, branch B001 would have different telephone numbers in different staff records. The above examples illustrate that the Staff and Branch tables of Figure 8. 1 have more desirable properties than the StaffBranch table of Figure 8. 2. In the following sections, we examine how normal forms can be used to formalize the identification of tables that have desirable properties from those that may potentially suffer from update anomalies. . 3Describ e the characteristics of a table that violates first normal form (1NF) and then describe how such a table is converted to 1NF. The rule for first normal form (1NF) is a table in which the intersection of every column and record contains only one value. In other words a table that contains more than one atomic value in the intersection of one or more column for one or more records is not in 1NF. The non 1NF table can be converted to 1NF by restructuring original table by removing the column with the multi-values along with a copy of the primary key to create a new table.See Figure 8. 4 for an example of this approach. The advantage of this approach is that the resultant tables may be in normal forms later that 1NF. 8. 4What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form. Only first normal form (1NF) is critical in creating appropriate tables for relational databases. All the subsequent normal forms are optional. However, to avoid th e update anomalies discussed in Section 8. 2, it’s normally recommended that you proceed to third normal form (3NF).First normal form (1NF) is a table in which the intersection of every column and record contains only one value. 8. 5Describe an approach to converting a first normal form (1NF) table to second normal form (2NF) table(s). Second normal form applies only to tables with composite primary keys, that is, tables with a primary key composed of two or more columns. A 1NF table with a single column primary key is automatically in at least 2NF. A second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can be worked out from the values in all the columns that makes up the primary key.A table in 1NF can be converted into 2NF by removing the columns that can be worked out from only part of the primary key. These columns are placed in a new table along with a copy of the part of the primary key that they can be worked out from. 8. 6Describe the characteristics of a table in second normal form (2NF). Second normal form (2NF) is a table that is already in 1NF and in which the values in each non-primary-key column can only be worked out from the values in all the columns that make up the primary key. 8. Describe what is meant by full functional dependency and describe how this type of dependency relates to 2NF. Provide an example to illustrate your answer. The formal definition of second normal form (2NF) is a table that is in first normal form and every non-primary-key column is fully functionally dependent on the primary key. Full functional dependency indicates that if A and B are columns of a table, B is fully functionally dependent on A, if B is not dependent on any subset of A. If B is dependent on a subset of A, this is referred to as a partial dependency.If a partial dependency exists on the primary key, the table is not in 2NF. The partial dependency must be removed for a table to achieve 2NF. See Section 8. 4 for an example. 8. 8Describe the characteristics of a table in third normal form (3NF). Third normal form (3NF) is a table that is already in 1NF and 2NF, and in which the values in all non-primary-key columns can be worked out from only the primary key (or candidate key) column(s) and no other columns. 8. 9Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.The formal definition for third normal form (3NF) is a table that is in first and second normal forms and in which no non-primary-key column is transitively dependent on the primary key. Transitive dependency is a type of functional dependency that occurs when a particular type of relationship holds between columns of a table. For example, consider a table with columns A, B, and C. If B is functionally dependent on A (A ? B) and C is functionally dependent on B (B ? C), then C is transitively dependent on A via B (provided that A is not functionally dependent on B or C).If a transitive dependency exists on the primary key, the table is not in 3NF. The transitive dependency must be removed for a table to achieve 3NF. See Section 8. 5 for an example. Chapter 9 Logical Database Design – Step 1- Review questions 9. 1Describe the purpose of a design methodology. A design methodology is a structured approach that uses procedures, techniques, tools, and documentation aids to support and facilitate the process of design. 9. 2Describe the main phases involved in database design. Database design is made up of two main phases: logical and physical database design.Logical database design is the process of constructing a model of the data used in a company based on a specific data model, but independent of a particular DBMS and other physical considerations. In the logical database design phase we build the logical representation of the database, which includes identification of the important e ntities and relationships, and then translate this representation to a set of tables. The logical data model is a source of information for the physical design phase, providing the physical database designer with a vehicle for making tradeoffs that are very important to the design of an efficient database.Physical database design is the process of producing a description of the implementation of the database on secondary storage; it describes the base tables, file organizations, and indexes used to achieve efficient access to the data, and any associated integrity constraints and security restrictions. In the physical database design phase we decide how the logical design is to be physically implemented in the target relational DBMS. This phase allows the designer to make decisions on how the database is to be implemented. Therefore, physical design is tailored to a specific DBMS. . 3Identify important factors in the success of database design. The following are important factors to the success of database design: †¢Work interactively with the users as much as possible. †¢Follow a structured methodology throughout the data modeling process. †¢Employ a data-driven approach. †¢Incorporate structural and integrity considerations into the data models. †¢Use normalization and transaction validation techniques in the methodology. †¢Use diagrams to represent as much of the data models as possible. †¢Use a database design language (DBDL). Build a data dictionary to supplement the data model diagrams. †¢Be willing to repeat steps. 9. 4Discuss the important role played by users in the process of database design. Users play an essential role in confirming that the logical database design is meeting their requirements. Logical database design is made up of two steps and at the end of each step (Steps 1. 9 and 2. 5) users are required to review the design and provide feedback to the designer. Once the logical database design has been ‘signed off’ by the users the designer can continue to the physical d

Book Report †Fault in Our Stars Essay

Meaning of the title: â€Å"The fault, dear Brutus is not in our stars, / But in ourselves, that we are underlings.† was said in Shakespeare’s play ‘Julius Caesar’. Saying that it is not fate that decides our future, but instead our own failings. That you are to blame for the bad thing that happen in your life. But the title ‘The Fault in our Stars’ says that sometimes it’s not our fault; things happen in life, sometimes we can’t control it; there will be problems along the way, and we just have to deal with it. Brief summary: Hazel, an average teenager who thinks she is going to die. She was diagnosed with cancer when she was young, and has trouble with her lungs. She then met a boy called Augustus in the Support Group. Augustus only had one leg because he had had osteosarcoma (A type of bone cancer). Hazel also made another friend called Issac who eventually went blind. Augustus and her shared common interests like the book called‘An Imperial Affliction’. They went on adventures to Amsterdam to visit an author that Hazel idolizes. On their trip, they had some physical relations. However meeting the author wasn’t exactly what Hazel and Augustus had expected. Later on Issac dies, then Augustus’s cancer later returns†¦ Style of Writing: The story is written in Hazel’s point of view – who is the narrator of the story. The writing in this book is easy to follow because it’s written in a conversational way. As if the reader was the protagonist. The book uses a lot of fascinating sentences and phrases to express the feelings and thoughts of Hazel Grace. The author likes using dialogues to tell the story. Character: The characters are quite believable because they are like any type of average teenager. However they have to deal with a small problem in their health affecting a big part of their life. The characters are very realistically portrayed and I think the author did a great job in describing the different characters. Plot: The plot is quite believable as it is not fiction. As readers, we can sometimes relate to the situations or even feel what the characters are feeling throughout the book. There are a lot of plot twists in the novel, so the reader would not know what is about to happen. This gives the story line more suspense and builds tension throughout the scenario. Recommendation: I would recommend this book to young adults, because there is an incredible plot twist in the book which mesmerizes the reader and gives them grief. Making them want to be the protagonist of the story. The characters are about our age, and sometimes us teenagers or young adults can connect to what the characters in the book are going through. This book has a powerful story line which emphasize the life of how two teenagers are fighting cancer, which has inspired and touch the teens heart.

Thursday, August 29, 2019

Reflecting journal Essay Example | Topics and Well Written Essays - 500 words

Reflecting journal - Essay Example This particular health services promotion and education philosophy is likely doomed to failure as it relates to achieving its intended outcomes, due to human behavioural characteristics inherent in some who are addicted to drugs, such as genetic factors in some addicted groups and psycho-social mechanisms related to those with addictive personalities. The informational portion of the study indicates potential effectiveness associated with informing the IDU population about the risks of heroin overdose and how to curb its cravings through halving methods. The campaign is, in many ways, modelled after a respected model in psychological reprogramming referred to as cognitive behavioural therapy (CBT). In this treatment philosophy, the addicted patient receives knowledge and interventions between patient and counsellor as a means of altering maladjusted ways of thinking and acting. CBT focuses on retraining the patient to develop better thought processes, remove self-defeating behaviours and better cognition through rational adjustment (Rachman, 1997). The promotional literature developed for use in this campaign provides similar rationalization and cognition changes, but does not address psychosomatic responses that lead to drug use (i.e. past trauma, relationship histories leading to stress, etc.). There are too many variables involved with why an individual seeks heroin use to discount complex emotionally-based catalysts to expect this particular campaign to be successful. Furthermore, this study does not identify a particular target audience, thus does not appeal to individualized program opportunities. Up until the age of 24, the frontal cortex of the brain used for judgment has not fully matured for more rationalized decision-making (National Institutes of Health, n.d.). What this potentially leaves is a vast segment of the population under age 24 that may not respond to these risk

Wednesday, August 28, 2019

Fawlty towers hotel group Essay Example | Topics and Well Written Essays - 2000 words

Fawlty towers hotel group - Essay Example If all the three other than basil are on one side then it will be the majority. If Basil gets support of any on of the remaining three, then these two can be termed as majority according to the shares they hold. Element 1: Now let us discuss about the possibilities of the transactions Basil want to do. He was holding 40% of the share in the company and wishes to retain as much capital as possible from it with out disturbing its financial structure and security. This implies that he was not willing to retain his investment from the cash reserves of the company or by disposing the assets held by the company. Moreover he needs another person to support his decision of selling his shares. As his wife Sybil is holding 20% shares and was in support of his decision he gets majority of 60% share holding for the proposed disinvestment. Now the question lies in the manner the deal to be followed. There is no obstacle for the disinvestment of 15% of the shares as his wife is willing to buy them by paying half of the amount from her own savings and other by taking loan from the company or from the bank. Here also the practicality and legality lies between these two persons only. The company is a privat e owned firm, the buying of shares in that company involves the inquiry of encumbrances by the buyer. As the buyer is a partner of the company she must be aware of the financial status of the company. Despite being like that, still if there is a need to advice on that we have to consider, then it is the financial status of the company. It was mentioned that Sybil was planning to take loan from the company or from bank on the company guarantee. This proves that the company is having strong fundamentals, which involve sufficient cash reserves along with fixed and current assets dominating short term and long term liabilities. So the hurdles regarding financial matters were cleared. Sybil can acquire 15% of the shares from Basil with one half by her own savings and the other half by a loan from the company or from the Bank. The decision needs approval of share holders holding at least 51% of the company's shares. As both Basil and Sybil are together holding 60% of the shares it can be approved with no objections. (If objections are there from the other two partners, they cannot be considered as these two constitute the majority of the share holdings). Element 2: This element seems to face some obstacles in completing. Rose Mary wants to buy further 5% of the shares from Basil on a condition that in two years the company should buy all of her shares, which may amount to 25% of the total shares. This needs the approval of all the share holders of the company or a majority of them. Here again, Basil and Rosemary constitute majority share holding to take a decision. But Basil is keen on not disturbing the financial structure of the company. Within two years if the company is not having enough cash reserves ( as Rose Mary wants) to buy the Rose Mary's share, which constitutes 25% of the total value of the company (the holding of her if she buys further 5% from Basil's shares), the financial structure of the company will be disturbed and that was against the wish of Basil in case of his disinvestment. This may not be possible because after distributing the profits to the partners there may not be enough cash to buy the 25% of the

Tuesday, August 27, 2019

Technical Definitions Coursework Example | Topics and Well Written Essays - 250 words

Technical Definitions - Coursework Example The attack is considered to be a deliberate action whereby the terrorists release the viruses, bacteria and the germs in order to come with an effect into the environment which will affect any living creature around. The germs, bacteria and viruses are said to be natural and they can be accelerated by use of the biological chemicals and tactics in order to be used negatively into the society. The effects spread into the whole society affecting the living creatures. One of the major reasons for the use of the biological agents is because they have the ability to spread through air, water and food ("Bioterrorism: Learn the Definition and Agents Used." 14). All the three modes of the agent’s flow can affect the environment very greatly. One of the major question over Bioterrorism is, How can it be stopped or be regulated? In the prevention of the attacks there are certain ways that can be used in order to prevent the attack. As a resident of Texas, one must report any suspicious attack that can be realised by reporting the matter to the Department of state of the health services. This is because the staff in the Department depend on the interactive and information of the citizens. Another second way on how to prevent such actions is to elect officials in the offices of the health services in Texas who will be concerned with the health and well being of the living creatures in the city of Texas. However those may not be the only prevention methods for the attacks but with the two key points, the state of Texas can be well prevented from the biological effects and enable a solid prevention over the threats by the bioterrorists. "Biodefense and Bioterrorism: MedlinePlus." U.S National Library of Medicine. U.S. National Library of Medicine, n.d. Web. 24 June 2014.

Monday, August 26, 2019

The effect of advertisement on consumer behaviour Research Paper

The effect of advertisement on consumer behaviour - Research Paper Example Literature Review The review of literature of the effects of consumer behavior on advertisements have been done with the review of the several factors that guides the consumer behavior and the influence of advertisements in catalyzing those factor that stimulate consumer behavior and decision making for purchase of products and services. The aspect of consumer behavior encompasses the response of the customers from the point of viewing the product to the point of making decision for purchasing it and then going beyond to value the experience after purchase to decide on the acceptability of the product in the long term. The decision making aspect is the most important part of consumer behavior which is influenced by the advertisers through their attempt for promotion of the product and service in the market (Hutt and  Speh 67). The first step that the consumers go through after seeing the product and the service is the recognition of need of the product for use in future. Once the c onsumer has recognized the need of the product, it is considered by them for the purpose of evaluation. In this stage the consumer studies the various options available and the substitutes of the product in the market. In order to judge the aspect of the value for money, the consumer behavior takes into account the relative cost and benefits of the purchase. By comparing the competitor products and the substitutes, the consumers decide to purchase the product based on the several characteristic features which are unique to different age groups of the consumers. These features of the products that influence the consumer behavior and the decision making for purchase are the quality, price, durability, guarantee, discounts, post-sale service... This "The effect of advertisement on consumer behavior" essay outlines how advertisements have influenced the consumer behavior of the young population of Qatar. The consumer behavior of the age group of 18-26 years in Qatar and the effects of advertisements on the consumer behavior of the said age group has been analyzed as follows. Qatar has attracted international investments in the various sectors of the economy and the top retail chains in Qatar have identified this opportunity to set up establishments and expand their business in Qatar. The big names that have tapped the potential consumer demands in Qatar are Carrefour, Marks and Spencer, etc. In this highly competitive market, advertisements by these companies have played a crucial role in influencing the consumer behavior in Qatar. The analysis of the consumers of Qatar in the age group of 18-26 years reveal that this target customer segment is young and energetic which follows the latest changes in the technological advance ments and is aware of the value for money spent for purchase of products. The analysis of the sample questionnaires reveal that the consumers of the age group of 18-26 years in Qatar closely follow the advertisements of the products that they use. These consumers in the Qatari market prefer to socialize with the products by identifying as the best possible option that would satisfy their needs. These consumers are updated with the happenings of the market and even follow the advertisements of the products that they do not use (Kozami 94).

Sunday, August 25, 2019

Report Essay Example | Topics and Well Written Essays - 2500 words - 16

Report - Essay Example Given that human labor is the main driving force towards attaining the core objectives of an institution, it is mandatory to ensure that they are acquainted with the skills and expertise needed to deliver quality services that meet the divergent needs of the international market. Recent research as documented by theorist Bassnet (2010) in his book: Statistical Data Analysis has sufficiently demonstrated that only about 25% of corporate business organization undertake regular capacity building through on-job training, workshops, international conferences and seminars that are geared towards instilling new insight and relevant skills within the labor force (Bassnet, 2010). The HR Director has been on the run to diagnose the cause of underperformance among a section of its employees and it has become eminent that the majority of them lack the required skills to match the current needs of consumers and meet the internationally set standards in the industry, demonstrating the scope of the study. The best practice relating to employee performance lies in the ability of the human resource department to diagnose the problem and identify the specific areas that are lacking; and require reinforcement and empowerment to meet the needs of the organization. This ensures that there is a holistic growth in the organization and that all departments work cohesively together to realize high productivity and remain competitive in the industry. When one department lags behind, the whole system’s performance is essentially affected hence the need to ensure that all the sectors work optimally without one derailing the activities of the other due to incompetence and lack of capacity to deliver. According to McGeorge (2010, p. 121), capacity building fundamentally entails equipping the labor force with the technical know-how in as far as their duties and responsibilities

Saturday, August 24, 2019

The History and Politics of Charter Schools in Indiana Research Paper

The History and Politics of Charter Schools in Indiana - Research Paper Example According to different policymakers and reformers, charters schools would help in improving the overall standard and structure of education in the state. These charter schools allow enrollments without the element of any discrimination. The main purpose behind these charter schools is to provide an ease in education with excellence and effectiveness (Cheung, 1998). Undoubtedly, the numbers of charter schools are increasing rapidly. It has been estimated that there are nearly 4900 charter schools in the United States with an average of 400 charter schools opening on yearly basis (Lake, 2010). On an account, it has been estimated that till 2011, there are total of 36 charter schools that have been authorized in Indiana with 22 schools already functioning while 10 schools were set to start their operations in future. Two schools were shut downed even before opening of their academic operations due to lack of resources while just one school had been shut down officially due to inadequate and unsatisfactory results and governance. These charter schools have increased in number throughout in the state of Indiana with the highest number of charter schools operating in the main city of Indianapolis, where they account for 11 charter schools out of the overall 22 charter schools in the state (Plucker et.al, 2004). History of Charter Schools Movement in United States:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The concept of charter schools was coined in late 1980s. Ever since this concept has come into force, it raised a thought that charter schools would help in increasing the quality of education. The historical movement for charter schools began in 1991. This movement was aimed to achieve a new milestone in offering high-quality education through the establishment of wee-defined public schools for both children and their parents (Source: Mayor Sponsored Charter Schools: 2010). Charter school funding is complex to understand and has gone through many phases of development. Many pol itical camps have appreciated the implementation of charter schools as it would influence the process for improving the standard of education all around the United States (Butryomowicyz, 2011). The History of Charter Schools Movement in Indiana: The state of Indiana has played a key role in the national charter school movement. This law was signed in May 2001 by the Governor Frank O’ Bannon. The law signed extended the right and permission to the concerned groups to play a positive role in the establishment of such charter schools in Indiana. The purpose behind the creation of Indiana’s charter school legislation is to recommend the various innovative but diverse options in public education to not just to students but also to cater the academic need of their families and the educators. This legislation is focused to target and serve in delivering the quality education to diverse populations of students hailing from different backgrounds (Source: Mayor Sponsored Charter Schools: 2010). In Indiana, the policy for charter schools was well-appreciated and positive work began when Indianapolis strategizes its own charter school after the acceptance of the law that passed in the state in year 2011. Since then this policy has remained in a continuous cycle of change (Plucker et.al, 2005).

Friday, August 23, 2019

Explain how and why industrialization changed Northern society Research Paper

Explain how and why industrialization changed Northern society - Research Paper Example The period saw the massive replacement of the labor force by machines and production capacities of the industries involved increased phenomenally. Logistic challenges experienced before the industrial revolution in the area were quickly solved by the development of a system of railway lines1. It had a major impact on human lives of the Northern Society. People migrated in large numbers to urban areas, which led to mushrooming of cities in industrialized areas. Income disparity between the rich and poor stirred up expansive discontent. This paper discusses how industrialization changed the Northern society in early U.S.A. Largely, the Northern Society changed socially in a diverse manner. Industrialization saw the formation of new classes, which included the new rich and the working middle class. The wealthy mainly comprised of factory owners whereas the middle class were usually workers who had moved from the rural areas into the cities in pursuit of a better life. The middle class w ere those who offered labor to factories and were often better off, financially than the people back in the rural areas were. Most of them were residents to congested houses, which created a perfect breeding ground for maladies. The areas they lived in were famed for unsanitary conditions of living and below par hygiene standards. They were paid unfairly for their labor services and treated badly. Women probably benefited the most due to their improvement in their roles2. Besides being able to work in factories, they were granted many rights they previously did not have. From an economic standpoint, people from the Northern Societ

Thursday, August 22, 2019

Learning contracts Essay Example | Topics and Well Written Essays - 500 words

Learning contracts - Essay Example mises are, so as to understand both the customers and staff and I understand the varying personalities of the different types of customers, for example, regular and non regulars, students and non students, young and old, fat and not fat and many more. Thus, I know how to creatively use my position in gearing the company to analyse and understand its customers. My social skills are above average as I have learned social psychology and given the level of my work experience which cuts across varied socio economic backgrounds, I have been able to blend this with my education background in this field to equip myself to be a professional. My goal is to run my own pizza company. To demonstrate that I have met the outcome, I keep records and analyse the customer turnover and customer staff relation, which show the level of impact I have on my subordinates in steering and motivating them and equipping them with the skills to deliver good pizzas and service. I do this by personally going through contents in the suggestion box and questionnaires among others. P1. Reflect on your performance during the work placement and on what you have learned, applying appropriate theories of learning and reflective techniques, and providing evidence to support your conclusions My performance has been regarded by my superiors as impressive, since I have helped them to significantly promote their brand name, while the junior staffs see me as a sociable and likable person due to my ease in relating with them and the customers. Carrying out my duties, I have applied my knowledge of Maslow hierarchy of needs to critically analyse and understand the company. I have been voted employee of the month 5 times in a row. T1. Operate effectively in the work situation, exercising behaviours, attitudes and work skills (e.g. communication, team-working, problem solving, motivation and self-management) appropriate to your job/role and work

Community Nursing Hat 1 Essay Example for Free

Community Nursing Hat 1 Essay I chose as my community El Dorado County in the foothills of Northern California. I live in this community. We are a very healthy and active community with a large retirement group. I will go through the four assessments next. The Population Economic Status Assessment shows our population to be around 181,000. We are made up of 80% white Christian, with the next largest ethnic group being about 15% Mexican. The average household income is around $70,000 with 7.9% of people being at or below the poverty level. The Mexican population makes up the biggest percentage of the poor. El Dorado County’s median household income has been higher than the state average since 2000, indicating that its residents have more spending power than the average Californian (El Dorado Co). The unemployment rate is 11.8%. El Dorado County’s unemployment rate has been consistently lower than the California average since 1990. At any given time, there are 600+ homeless people in this community. Around 9000 people receive food stamps another 3000 receive cash aid. On an average, we have much fewer people on public assistance than the national average. According to the information I gathered in the Cultural Assessment Tool, the population in this community has slightly more females than males which is very typical in these rural areas. There are 80% white people living here with about a 15% Mexican population (El Dorado Co). 27% of the populous are affiliated with a church, mostly Catholic Christian, compared to the 50% in the USA (Religions). About 85% of the people are covered by health insurance, which is very high compared to the rest of California. Cancer is the leading cause of death, with heart disease being second. The birth rate is 10.1 per 1000. County birth rates are consistently below average compared to the state, which is attributed to the higher senior population of the county (El Dorado Co). There is a high prevalence of drug and alcohol abuse in this community, related to poor or ineffective coping skills in the populous. There is a  real powerful stigma against the homeless community here, which really could benefit from some community teaching and outreach. The Neighborhood Community Safety Assessment shows that the air and water quality is very good in this community. Carbon monoxide levels are below the US average. They do usually have a few bad air days a year due to fires. There is some residual mercury left over from the mining days, but in low levels (El Dorado Co). During the winter snow, flooding and the cold pose health hazards. During the summer, fires are a hazard to public safety. However, there is excellent fire and police response here in this community. Many rivers and lakes in this community pose a risk for drowning; however, there are very few documented drowning’s here per year. There is quite a bit of poison oak ivy here, and grass and hay fever irritants. Last, I will discuss the Disaster Assessment Planning in this community. Through my research, I found that this community does follow federal guidelines for disaster management (OES). There is a County Operational Area Emergency Operations Plan that was adopted in 2007 (City of Placerville). This plan has four parts that cover administrative, an emergency operations center plan, a recovery plan, plans specific to a type of emergency (terrorism, multi-casualty incidents, hazard mitigation plan, etc.). This plan meets needs for rescue, medical care, food, shelter, clothing, temporary housing, and employment should an emergency arise. This community also uses the CDC’s Public Health Emergency Response Guide for emergency preparedness response. I found all this information on line, but it took considerable research and was not easy. In my research, I found that most residents in this community are not aware of any disaster preparedness plan, nor do they know where to find one. There needs to some community wide teaching on disaster preparedness, and where to find information regarding this. The following is my community genogram and diagnosis. Community Diagnosis Within the parameters assessed above, El Dorado County California is a healthy community. The areas that need improvements are discovering a way to help people respond in healthy ways to painful life events other than drugs alcohol, to create implement a plan to help the homeless community, to educate the public regarding the causes and preventative  measures for Cancer Coronary Artery Disease, and to educate the public regarding emergency disaster preparedness through community outreach programs. Community Diagnosis Within the parameters assessed above, El Dorado County California is a healthy community. The areas that need improvements are discovering a way to help people respond in healthy ways to painful life events other than drugs alcohol, to create implement a plan to help the homeless community, to educate the public regarding the causes and preventative measures for Cancer Coronary Artery Disease, and to educate the public regarding emergency disaster preparedness through community outreach programs. El Dorado County, California hhhh El Dorado County, California hhhh Population Economic Status Located in Northern California Population 181,058 Mostly white Next largest ethnic group Mexican Median household income 70,000 7.9% households at or below poverty level 11.8% unemployment rate 600+ homeless 9,000 receive food stamps 3,000 families receive cash aid Population Economic Status Located in Northern California Population 181,058 Mostly white Next largest ethnic group Mexican Median household income 70,000 7.9% households at or below poverty level 11.8% unemployment rate 600+ homeless 9,000 receive food stamps 3,000 families receive cash aid Cultural Assessment Slightly more females than males Mostly white Christians Subcultures small Mexican Asian Many know how to achieve good health-60% put forth effort 85% have health coverage Most know how where to obtain medical care High prevalence of alcohol drug abuse due to a variety of stressors Stigmas of homelessness Vast variety of outdoor recreational activities Cultural Assessment Slightly more females than males Mostly white Christians Subcultures small Mexican Asian Many know how to achieve good health-60% put forth effort 85% have health coverage Most know how where to obtain medical care High prevalence of alcohol drug abuse due to a variety of stressors Stigmas of homelessness Vast variety of outdoor recreational activities Neighborhood/ Community Safety Health dept very involved in providing health services, education information Very good air quality Very good water quality Potential for wildlife disease Vast amounts of rivers lakes potential for drowning Severe weather events potential Potential for fires due to vast forestry Excellent fire police response Domestic violence calls 10.5 per 1000 Neighborhood/ Community Safety Health dept very involved in providing health services, education information Very good air quality Very good water quality Potential for wildlife disease Vast amounts of rivers lakes potential for drowning Severe weather events potential Potential for fires due to vast forestry Excellent fire police response Domestic violence calls 10.5 per 1000 Disaster Assessment/Planning El Dorado County Operational Area Emergency Operations Plan California Emergency Management Agency Federal Emergency Management Agency preparedness plan Following federal guidelines Rescue, medical care, food, shelter, clothing Temporary housing, food stamps, employment Public Health Emergency Response Guide by CDC for emergency preparedness and response Most residents unaware of any plan Disaster plan not readily available or easily found Disaster Assessment/Planning El Dorado County Operational Area Emergency Operations Plan California Emergency Management Agency Federal Emergency Management Agency preparedness plan Following federal guidelines Rescue, medical care, food, shelter, clothing Temporary housing, food stamps, employment Public Health Emergency Response Guide by CDC for emergency preparedness and response Most residents unaware of any plan Disaster plan not readily available or easily found The community genogram shows a relatively healthy mostly white community. As a whole, the people here make a good living, with unemployment below the national average. A small percentage receives food stamps and public cash benefits, also below the national average. Most people have health coverage, and about 60% of the population is proactive with their health. The leading causes of death are cancer and then cardiac disease occurring in the high 80’s of age, due to the large retirement population. The public health department is very involved in providing health services here (CDHP). The air and water quality is good here, with pollution below the national average. There is some potential for bad weather and fires, however, our fire and police response are excellent here. There is a good disaster preparedness plan, however, it is difficult to find, and few know about it. There is a high incidence of alcohol and drug use here, with poor and inadequate coping skills to handle d ifficult life events. The homeless population is really looked down upon here. Within the parameters assessed above, El Dorado County is a healthy community. The areas that need improvement are discovering a way to help people respond in healthy ways to painful life events other than drugs alcohol, to create implement a plan to help the homeless community, to educate the public regarding the causes and preventative measures for Cancer Coronary Artery Disease, and to educate the public regarding emergency disaster preparedness through community outreach programs. Bibliography CDHP. Retrieved from http://www.cdph.ca.gov/programs/Pages/HealthyCommunityIndicators.aspx City of Placerville. Retrieved from http://www.cityofplacerville.org/ El Dorado County Economic and Demographic Profile. Retrieved from http://www.eldoradocounty.org/ Office of Emergency Services (OES). Retrieved from http://www.edcgov.us/Government/Sheriff/Divisions/Support/Office_of_Emergency_Services_