Monday, December 30, 2019

The Creation Of A Surveillance State - 1449 Words

The Creation of a Surveillance State Total surveillance. Complete obedience. Absolute authority. The world of 1984 scared me when I first read the book last year. Never before had a book made me think so deeply about individuality, society, and government. 1984, a manifestation of my nightmares, described a totalitarian police state of resolute submission. The horror came when I looked upon our own society, and Big Brother glared back at me. We live in a world where every phone call, every text, every search, and every email can be monitored and recorded by our own government. The National Security Agency, or the NSA, was originally proposed to monitor threats outside of the United States, but the NSA began domestic surveillance shortly†¦show more content†¦Technology presents a double edged sword; it has created a fight between individual privacy and social connectivity. As children, we are taught to guard our identity online, as to remain safe from predators. In spite of this, as many people become adults, th ey feel nonchalant about sharing their entire lives on social media sites. As people invest more of their real self into their online identity, they make it easier for the government to connect everything they do online. The NSA collects data through a kind of internet â€Å"dragnet† that covers as much area as possible in order to collect as much data as possible. The more data someone puts online, the more data the NSA collects about them. While many people are comfortable with their online profiles, this â€Å"dragnet† also collects information about their search history, their websites visited, and their private messages sent. With all of this data, the NSA can create a near complete profile of any citizen that uses the web. A problem with government monitoring is that the data they collect can be skewed. Government monitoring removes context of the data that is collected meaning something that may have been innocently said can be perceived as guilty when viewed fr om a different perspective. Unfortunately, it is not only our government that wants its citizens’ data. Hackers can cause leaks of information from NSA collection centers, exposing personal data to identity thieves and

Sunday, December 22, 2019

The Cold War Of 1945-1991 - 1660 Words

So be it Will the United States or the Soviet Union continue propaganda or resort to an attack? Many democracies across the world like North America, Western Europe, Japan grew in prosperity after World War II ended. The United States became the world’s wealthiest and most powerful country. These democracies rivaled the United States economically. The United States and the Soviet Union had many differences that didn’t cause a full fled war, but a quiet, propaganda and secretive filled war that pushed both to the edge. This was known as the Cold War of 1945-1991. The main causes of the war were sphere of influence, Ideology, and military factors. The contradiction of who threw the first punch still occurs today; in this case, the Soviets were most responsible for the Cold War because of the, â€Å"Iron Curtain† speech, fears of the West, and the spread of communism. In conclusion, despite the evidence that supports the United States, the Soviet Union was most responsible for the Cold War. In the â€Å"Iron Curtain† Speech given by Winston Churchill gave in Fulton that describes his perspective of how the Soviets were no longer trusted. Churchill said that Stalin hadn’t fulfilled his promise to have free elections in Poland. Stalin also made the situation worse when there were fixed elections to elect communist governments that affected many people because of his dishonesty and selfishness when he could’ve listened to the people and keep his promises intact. In addition, ChurchillShow MoreRelatedThe Cold War Period ( 1945-1991 )1359 Words   |  6 PagesSince the Cold War period (1945-1991) the international community has faced a plethora of challenges, none greater than the current, and rapidly growing threat of climate change. In this essay, climate change will be acknowledged as a legitimate phenomenon, which is presently faced by the global population. Described as a shift in the Earth’s weather patterns over a time s cale spanning longer than a decade, climate change is directly related to the variation in quantities of extreme weather eventsRead MoreSignificance Of The Manhattan Project And Nuclear Threat On Australia And The War1636 Words   |  7 PagesAustralia and the War Sub-questions – - What was the Cold War? - Who were the inventers of the bomb? And what did they do after? - What was the significance of the bomb to the war and Australia? - The Expectation of the first Nuclear War - Nuclear Threat having impact on Australia? Word Count = 1191 What was the Cold War? The Cold War was the name of the relationship between the United States of America, and Post-1977 Russia after the end of World War II. The Cuban Missile crisis, Hungarian War, VietnamRead MoreTaking a Look at the Cold War786 Words   |  3 PagesThe Cold War The Cold War was a time after World War II, so from 1945 to 1991, where the USA (United States of America) and the USSR (Union of Soviet Socialist Republics) had very different views on what the new world should be like. The Cold War drew international interest for decades. Many major conflicts occurred. The conflicts consisted of the Vietnam War, the Korean War and many others. For most people though, the Cold War was about the creation and the use of weapons of mass destruction,Read MoreEffects Of The Cold War On The World1572 Words   |  7 PagesNguyen The Cold War was a time of conflict that occurred somewhere around 1945 and 1990 although some International scholars held the thought that the Cold War began in 1917 Russian disclosure in any case, it was between the USA and its allies mostly the Western nations and the Eastern coalition led by the USSR however, the two forces did not battle or utilized weapons against one another, it was battled through Nuclear Arms race, intermediary wars, ideological impact and propaganda war and in thisRead MoreCold War Policies743 Words   |  3 PagesFollowing the end of the Second World War the western powers were not certain what system of defense they wanted to adopt. The European nations were in the process of recovering from the effects of the War but they knew that they wanted to keep the Soviet Union from dominating the entire continent. The United States shared this desire but did not want to get embroiled too heavily in what many considered a European problem. Nevertheless, the Unite d States and their allies in Europe recognized thatRead MoreThe Atomic Bomb Of Hiroshima And Nagasaki981 Words   |  4 PagesIn August of 1945, The United States successfully used the Atomic bomb for the first time in the Japanese cities of Hiroshima and Nagasaki, while over 100,000 people died the greater importance of this moment would be played out in history for decades to come. (Lecture) The importance that the creation of the Atomic bomb gave the world was enough to end mankind if the wrong people were capable of finding out how to use it. It would take only a short amount of time for other countries to gain accessRead MoreTo What Extent was the Cold war Caused by Ideological Differences?1709 Words   |  7 PagesThe Cold War, a period of sustained political and military tension between the USA and the USSR, resulted in various viewpoints concerning the cause of the tension emerging. Until today the question remains unresolved, even after the 1991 release of Soviet archives . The main point of disagreement relates to the roles that ideology played in the events between 1945 and 1949. Was it the strongly opposing ideologies, capitalism and communism, or power and material interest that drove both superpowersRead More The Cold War Essay947 Words   |  4 PagesFollowing World War Two, two distant political governments emerged to dictate the direction the world would take. These two governments consisted of Communism and Democracy which stared untrustingly at each other and staunched economic growth with their excessive military budgets. In the end though, Democracy would prove to be the preferred government archetype for the general population of the world. During World War Two, the United States and the Soviet Union along with their alliesRead MoreThe United Nations On A Team With Other Nations1156 Words   |  5 Pageseastern Europe during the cold war †¢ USSR: The Union of Soviet Socialist Republics abbreviated to USSR or shortened to the Soviet Union, was a collective state on the Eurasian continent that existed between 1922 and 1991 Cold war: the cold war was a nervous relationship between the United States and the Soviet Union. The two super powers never clashed directly in battle but were always trying to outdo the other in some way or another. This period happened between 1945 and 1991. Deterrence: DeterrenceRead MoreEssay on The Cold War from 1950-19801739 Words   |  7 PagesThe Cold War from 1950-1980 The period of 1950 to 1980 saw the Cold War spread from the traditional playing field of Europe to other parts of the world. However it is quite clear that the USA and the Soviet Union played only a marginal role in originating these conflicts-at the most setting up the basic framework for it to occur. Furthermore, when they did get involved they each did so to varying degrees. The USA seemed to be much more motivated and interested

Saturday, December 14, 2019

Agriculture in Jesus’ Time Free Essays

The land of Jesus, the Promised Land (one name amongst many) is very well known by our people. During the time of Jesus, we were accustomed to walk from city to city because the area was so small, stretching from the Mediterranean Sea to the eastern border. We farmers took care of the land and made it blossom into the beautiful land it is today. We will write a custom essay sample on Agriculture in Jesus’ Time or any similar topic only for you Order Now Palestine holds amazing beauty that astonishes everyone who sees it. Our hills stretch across the plains with gracious lush sides. In comparison, our lakes, deserts, and forests are also astonishing. As beautiful as our land is, our climate can be frightening. One hot day and a freezing night to follow is what you might expect in our land. Today, temperatures during the day may reach seventy-two degrees, but don’t be fooled. Try visiting the barren of the Dead Sea; don’t be surprised at the 122 degree weather. With such temperatures, our water source is scarce. We treasure the Jordan River and the Sea of Galilee, for its beauty of course, but also because of or lack of water. Bread and wine is extremely important in Palestine. We value the bread and hold it sacred to our people. Jesus revealed himself when identifying a relationship between him and the bread. The wine is made from the fruit of the vine, grapes. Again, Jesus declared himself as the true vine, forming another close and sacred relationship between him and the wine. Our animals ware great. Animals such as the donkey are very important to our people because of their capability to withstand our everyday chores. A donkey, with its high value, is never to be eaten or offer up in sacrifice. We have many beautiful animals, both domestic and wild, that roam our lands, such as lions and porcupines. As a farmer, our jobs are to take care of the crops for the making of the bread because it is very important. We harvest the grain between the months of March and May. The rest of the year we make the bread for the people of our village. How to cite Agriculture in Jesus’ Time, Essay examples

Friday, December 6, 2019

Language Arts Lesson Plan Essay Summary Example For Students

Language Arts Lesson Plan Essay Summary Social Studies and Self- Esteem Lesson Length: Ongoing throughout the school year Topic: The Melting Pot Of America Content: Students are unaware Of the many cultures that make up the Melting Pot of America. Our classes forget to put a focus on the different cultures that make up our communities and country. This activity was designed to put a focus on that and to help students embrace their differences and their assets that the bring to their very own classroom. SHOP Points Displayed: Hands- on activities Reported definitions aloud Class discussions with visuals (realize, bulletin boards) Vocabulary: Nationality: Membership in a particular nation; a people having a common origin, tradition, and language. Culture: The set of shared attitudes, values, goals, and practices that characterizes an institution or organization. Heritage: Tradition Learning Outcomes: This activity allows students to become more aware of the many rich cultures that make up the country that we live in today. This activity is also used to build self esteem Objectives (standards addressed): 1. Become aware of the rich cultures that contribute to our nation today 2. Becoming aware of their own traditions and culture . Become confident of their own cultures while learning the different assets of other cultures Materials Needed: 1. Videos and books with focus on different heritage and cultures and their different traditions. 2. Music from different cultures to learn songs and cultural dances a. Compact Discs Cassette Tapes c. Instruments Amps . Posters made by the students to show their cultures and different traditions they Withhold in their families. A. Poster board b. Markers, Crayons, Colored pencils c. Printed Pictures d. Ribbons e. Stickers f. Scissors g. Glue h. Other Miscellaneous Arts and Crafts tools 4. Items from students who are willing to share their traditions and cultures thru dress, dances, artifacts, displays, and pictures. 5. A number of different food dishes from different cultures made by the class. Procedure or Method of Instruction: l. Opening school year activity- Start out the school year introducing ourselves, as a teacher will start out first picking out three things that make me proud of my own culture, Explaining my families roots, the national flag, my favorite cultural dish, etc. 2. Allowing the students to introduce themselves and point out 3 positive traditions of their cultures. 3. Activities that can take place throughout the year: a. Story/ Polk tales- Each month guest speakers can come in to give an insight on each culture to the students b. Dress up- Students to make different fun clothing pieces from different cultures. This activity is not to be confused as being stereotypical of disrespectful in any type of manner. C. Dancing- Students can be introduced to the different dances Of each culture mentioned in class such as Salsa, Backchat, Square-Dancing, The Waltz, and River-Dancing; to name a few. D. Songs- Students Will learn different songs and national anthems Of different countries and cultures. Foods- students will make popular cultural dishes in class. Evaluation or Assessment: 1. After each activity, students will record what they enjoyed most about the activity in a personal journal. In this journal the students will also record the different things that they learned about each culture. These journals can be kept forever by the children.

Thursday, November 28, 2019

Kristin Christoffersen Essays (224 words) - Igbo People, Ethnicity

Kristin Christoffersen Honors English pd 1 9/27/14 Ethnocentrism paper Ethnocentrism is based on the on the belief that your culture is the best; therefore it causes one group to stereotype another group. Ken Barger , an anthropologist with Indiana University, explains that it is "Judging other groups as inferiors to one's own," ( Barger 1). As a result, a person will often judge someone based on their background or ethnicity without actually knowing the individual. People are ethnocentric and do not realize it. Barger goes on to insist, "Everyone is ethnocentric, and there is no way not to be ethnocentric it cannot be avoided" Barger 1). Since we can't avoid it, we most be aware of it. Our beliefs an ethnocentrism comes from what we experience everyday, and what we learn growing up. Being ethnocentric can affect the way you think of a person. Chimamanda Adichie shares her story of being a victim of ethnocentrism and also being a culprit of ethnocentrism, "All I had heard of them was how poor they were, so that it had become impossible for me to see them as anything else but poor," ( Adichie 1). With only hearing one side of a story all Adicihie knew was what she thought to be true and she judged them based on her beliefs.

Monday, November 25, 2019

Customer Relationship Management Systems The WritePass Journal

Customer Relationship Management Systems Abstract: Customer Relationship Management Systems Available at: http://doblegroup.com/dell-case-study/ Fan, Y. W., Ku, E. (2010). â€Å"Customer focus, service process fit and customer relationship management profitability: the effect of knowledge sharing.†Ã‚  The Service Industries Journal. Vol.  30(2) pp. 203-223. Jayachandran, S., Sharma, S., Kaufman, P., Raman, P. (2005). â€Å"The role of relational information processes and technology use in customer relationship management.†Ã‚  Journal of Marketing. Vol.  69(4), pp.177-192. Lin, R. J., Chen, R. H., Chiu, K. K. S. (2010). â€Å"Customer relationship management and innovation capability: an empirical study.†Ã‚  Industrial Management Data Systems. Vol.110(1) pp.111-133. Ãâ€"ztaysi, B., Sezgin, S., Ãâ€"zok, A. F. (2011). â€Å"A measurement tool for customer relationship management processes.†Ã‚  Industrial Management Data Systems. Vol.  111(6) pp. 943-960. Payne, A., Frow, P. (2005). â€Å"A strategic framework for customer relationship management.†Ã‚  Journal of Marketing. Vol.  69(4) pp.167-176. Reinartz, W., Krafft, M., Hoyer, W. D. (2004). â€Å"The customer relationship management process: its measurement and impact on performance.†Ã‚  Journal of Marketing Research. Vol. 41(3) pp.293-305.

Thursday, November 21, 2019

Recruitment Thesis Example | Topics and Well Written Essays - 7500 words

Recruitment - Thesis Example The current project highlights the problem faced by Zuko, a Chinese software company, in the process of recruitment and selection of candidates. The China-based company through efficient software services has served millions of customers successfully over last ten years. The company was one of the most profit-making organizations in the country until it faced a downfall due to the faculty recruitment and selection process. Zuko was the leader in the IT industry, but a number of companies had surpassed this status owing to sound HR policy. The company had a large customer base and is trying to increase the same after the short hiatus due to problems associated with the recruitment and selection procedure. Zuko had failed to achieve its goals as intended. The management of the Chinese company is giving the effort to boost the organizational competence with increasing rivalry in the market. The HR managers of Zuko want to overcome the problem through external recruitment and selection o f candidates. The research topic will primarily focus on problems present in the process of recruitment and selection. The current paper intends to explore problems associated with the process of recruitment and selection in Zuko. The issue related to the selection of the employees from external sources is identified as a crucial aspect of facilitating long-term organizational success and growth. The company eventually witnessed a fall in the profit margins and realized the necessity of hiring more employees from outside sources.

Wednesday, November 20, 2019

English as a Second Language Course Essay Example | Topics and Well Written Essays - 1000 words

English as a Second Language Course - Essay Example Reading activities are aimed at increasing reading comprehension, developing vocabulary and research skills. Writing activities are aimed at developing accuracy in written information through simple compositions and accomplishing forms. The course consists of 12 modules. According to Chamut (1995), cognitive language learning fosters school achievement of students who are learning through the medium of a second language. Non-native English speakers face problems in learning academic subjects which use English as the medium of instruction. Due to the widespread use of English worldwide, language courses in English have become part of the academic curriculum in most countries. However, the English course in these situations take on the nature of a foreign language course and fails to really develop language proficiency skills in terms of comprehension, vocabulary and research skills due to limited usage of the language in everyday life. The instructional problem that arises therefore, is how to build on the existing language knowledge of English and implement a training strategy that hones English literacy skills allowing the participants to develop the ability to use oral and written English for daily needs, develop basic conversation skills and voca bulary, and use simple sentence patterns. The training is base... The instructional problem relates to a cognitive domain performance issues that can be solved by training. The goal of instructional programs is to build knowledge and skills that can be re-used for later learning or in various life situations, such as career. ESL training to help improve academic performance specifically addresses the problem of cognitive domain performance, maximizing the student's cognitive processes that will result in learning and minimizing those that disrupt learning (Clark & Harrelson 2002). Training in English as a second language is suitable for computer and web-based training because the learner can think, respond and give feedback on the subject, a stimulating environment can be presented where the learner can learn at his own pace, the learner can take the course at his convenience without any expense of time or travel, it can be made accessible to a wide audience, it can be conveniently used by the physically challenged, and content can be easily updated (seo 2007). The tutorial method of teaching present situations and questions, suggest ideas that coincide with the topic being studied, and force students to come up with their own solutions. The instructor's in the tutorial atmosphere is to pose constructive questions that will lead the students in the right direction. Such a scenario can easily be implemented in ESL W/CBT because the computer or instruction software can untiringly assume the role of the tutorial instructor. In face-to-face teacher-student interactions, the tutorial method may pose problems because it is time consuming and may require multiple instructors for different levels of learners (Angiono

Monday, November 18, 2019

The Art of English - Everyday Creativity Essay Example | Topics and Well Written Essays - 2000 words

The Art of English - Everyday Creativity - Essay Example During an ordinary day, a person engages in activities which might appear mundane and petty but if looked into with an open mind and with a thorough eye, one is bound to stumble across the element of creativity in it at one point or another. People interact with texts in their own special ways and no two people can have identical views and perception of the same text. Many aspects of a man’s environment and his self can influence his texts and the nature of his interaction with them. According to Barton and Hamilton (2002), these literacy practices hold different meaning for different people. They tend to be personal and are influenced by every aspect of his life. A person’s culture, society, personality and his environment in general determine the manner in which the meaning of any text is comprehended. For that matter, it can be expected that two persons, dealing with the same scenario would indulge in textual interplay of the situation in manners entirely or partiall y varying from each other. This is also a slightly unorthodox form of creativity experienced by people. The influence of culture in texts of a person cannot be denied. There is a strong link between one’s culture and the way his writings or texts are formulated. This has also been ascertained by Maybin and Swann (2007). Moving onwards, Calo (2011) suggests that human beings are social entities and that there exists a strong correlation between social environment, creativity and texts of any person. In all aspects of daily life, one comes across incidences that are associated with textual practices such as keeping a diary, making a note, writing a receipt and others which do not follow a set guideline. It is in these instances that a human mind is allowed to roam free and create something on its own. It need not be a masterpiece to be deemed creative. A single sentence or a group of words is sufficient to justify that the text is specific for the person in question and that it is to be associated specifically with him, the creator of the text. The art and science of literacy practices begins even before a child begins school and continues throughout his life. These activities take many forms from writing, coloring, all the way to singing and others. In all these activities, it is important to visualize and find the concept of ubiquitous creativity as proposed by Banaji and Burn (2007). It is the same concept elucidated by Pahl (2007) and labels creativity as an inherent characteristic of every person. In order to detect the element of creativity in any text or literacy practice, it is worth noting that the aim is to look beyond the visible text that meets the eye of the observer. One has to look in depth at the idea behind a text or the way in which a person has perceived a text. This is done by first setting a definition of creativity in one’s mind. Anything that did not exist beforehand or something that was introduced for the very first time by a person can be labeled as creative because it is the person’s own genius in action. In the same context every single act of human literacy practice is a depiction of his genius and creative abilities. This can be elaborated by taking into

Friday, November 15, 2019

Functional And Non Functional Requirements In Software Computer Science Essay

Functional And Non Functional Requirements In Software Computer Science Essay A functional requirement defines a function of a software system or its component. A function is described as a set of inputs, the behavior and outputs. Functional requirements may be calculations, technical details, data manipulation and processing, and other specific functionality that define what a system is supposed to accomplish[15]. R1: Module Enrolment Students will be able to enroll in a particular module. R2: The application will be able to retrieve questions from the server The system will provide a client and server connection. Students can retrieve the questions from the server using the WAP technology. R3: The system will provide a password system The system will require registration to obtain username and password of students for them to access the system. R4: Get module assessment correction feedback The system will provide a client and server connection. Students can get and view a feedback about the module for which they have been assessed. R5: The system will provide a GUI interface menu for the student The students can freely choose the required menu for navigating along the system. 3.1.2: Non-Functional Requirements A Non-Functional requirement specifies criteria that can be used to judge the operation of a system, rather than specific behaviors. This should be contrasted with functional requirements that define specific behavior or functions. In general, Non-Functional requirements define how a system is supposed to be. Non-Functional requirements are often called qualities of a system[16]. The Non-Functional requirements of the system to be developed are listed below: The application that will be developed should have a nice graphical user interface. The mobile devices should be able to cope with exceptions that arise. Invalid inputs must not cause the system to crash. 3.2: ALTERNATIVE WAYS OF SOLVING THE PROBLEM Now, there is a need to find a way about how to develop this application and use it through a mobile device. However, there is no alternative way to solve this problem. To illustrate this fact, if we develop the mobile assessment application to be used on a PC or laptop, HTML would have been used for web development where students can access the application through their pc or laptop. But, it would not be accessible via a mobile phone as specific existing markup languages have been designed to be used for mobile web development such as WML. 3.3: PROPOSED SOLUTION The most suitable and best way to develop the application is by using the existing markup language which is used for mobile web development such as WML. Justification for proposed solution: At the present time, every student own a mobile phone and students can access the system anywhere and at anytime through their mobile phone that supports WML pages. 3.4: DETAILED DESCRIPTION OF THE SYSTEM The system that will be designed is concerned with the development of a WAP mobile assessment system for students to access specific questions for a module and then correctly answer these questions to test their knowledge from their mobile phone. The system will be developed by using WAP technology such as Wireless Markup Language (WML). WML is a markup language that has been designed for devices that implement the Wireless Application Protocol (WAP) specification. Moreover, it is the first markup language for wireless devices. The role of WML in mobile internet applications is the same as that of HTML in web applications. But, WAP sites are written in WML while web sites are written in HTML. The system will allow students to: Enroll for a particular module View the questions for a specific module on their mobile phone Retrieve questions and assess themselves by answering these questions which will be in various formats. One of the format includes Multiple Choice Questions (MCQ). Get feedback about the assessment of that particular module on their mobile phone. However, students will have to register themselves where they will be required to write a username and password. Then, they will use this username and password to gain access to the mobile module assessment system. 3.4.1: The WAP Programming Model The WAP Programming Model is similar to the Web programming model with matching extensions but it accommodates the characteristics of the wireless environment. The WAP programming model is based largely on the Web programming model. But how does the WAP gateway work with HTML? In some situations, the data services or content located on the web server is HTML-based. Some WAP gateways could be made to convert HTML pages in to a format that can be displayed on wireless devices, But as HTML was not really designed for small screens, the WAP protocol defines its own markup language, the Wireless Markup Language(WML), which adheres to the XML standard and is designed to enable powerful applications within the constraints of handheld devices. In HTML, there are no functions to check the validity of user input or to generate messages and dialog boxes locally. To overcome this limitation , JavaScript was developed. Similarly, to overcome the same restrictions in WML, a new scripting language known as WMLScript has been developed. 3.5: EVALUATION OF TOOLS 3.5.1: WML Emulators 3.5.1.1: WAP PROOF 2008 Professional version 4.2.0327 Brief description WAP PROOF is an emulator of a WAP browser for Microsoft Windows, a universal WML and xHTML intended for designers of mobile content. It is designed for the preview and debugging of mobile websites. Strengths: It works over HTTP as an ordinary HTML browser. It has the most of its features, such as using bookmarks, changing the document encoding, offline working. Several mobile devices (Alcatel, Motorola, Nokia, Sagem, Samsung, Siemens, Sony Ericson) are emulated, do the mobile site can be tested. The emulator supports WML, Xhtml, html and Chtml documents. It is similar to a real mobile browser request, so WAP PROOF can be used for the development of resources being sensitive to the user-agent. Support of non-latin encodings (Hebrew, Cyrillic, Arabic, Greek). Low price compared to similar commercial WAP emulators. GET and POST methods access to server. Weaknesses: Problems with à ¢Ã¢â€š ¬Ã‹Å"accesskeyà ¢Ã¢â€š ¬Ã¢â€ž ¢ attribute and with keyboard events are fixed, but the latest version overcome this problem. Some problems faced with fonts in Windows Vista. 3.5.1.2: Klondike WAP Browser Brief description Klondike looks like a Web Browser and is therefore very easy to use for beginners. Local WML files can be accessed easily. Strengths: Surf through sites and local pages that utilize the WAP (Wireless Application Protocol) which is used by Internet-enabled mobile phones. Include use of functions such as character entities, text input and validation, single and multiple selection boxes, variable substitution, deck-card task and event shadowing, desk access control, GET and POST methods, variable escaping, times and BMPs and BMP anchors. Weaknesses: The engine is specifically designed for operating systems running on small devices with very limited memory. Memory allocation requirements during runtime. 3.5.1.3: Yospace Brief description It is a mobile application innovator and platform provider allowing digital publishers, mobile application developers and mobile operators to rapidly and affordably deliver mobile video services[12]. Strengths: It supports basic markup language such as WML and xHTML MP to server generated code. Widsets, SMS, gateway and server set up are also covered. Weaknesses: It is expensive to buy the full version. 3.5.1.4: WinWap Brief description WinWap is a WML browser that works on any computer with a 32-bit windows installed. WinWap Technologies is specialized in software technologies for mobile internet browsing and multimedia messaging (MMS). Strengths: It allows you to use WAP services on your windows PC. The browser is a mobile internet browser that emulates the way you would use the mobile internet services on built-in browser of a smartphone. Installation is easy. You will not encounter so much difficulties with the emulator as it is easy to use and understand. Weaknesses: Windows mobile versions are available separately. Some telecom operators require that you connect your mobile phone to your computer/PDA and use it to get access to the telecom operator specific services. 3.5.2: Web Server Services Software 3.5.2.1: EasyPHP version 5.3.2 Strengths: It is a complete software package that allows you to use all the power and the flexibility that dynamic languages like PHP offer. Easy to install and run apache. Efficient use of databases (MySql). An easy development tool for your website or applications. Weaknesses: It may be prompted to change some variables in the apache configuration file. 3.5.2.2: CERN Server Strengths: It is a generic public domain full-featured hypertext server. Weaknesses: The server runs on mostly Unix platforms. It requires caching of documents that results in faster response times. 3.6: CHOICE OF FINAL TOOLS 3.6.1: WML Emulator After analyzing the strengths and weaknesses of the different WML emulators to develop the application, I have come to a conclusion that WAP PROOF 2008 professional version 4.2.0327 will be the most appropriate. Justification for choosing WAP PROOF 2008 professional version 4.2.0327 WAP PROOF is an emulator of a WAP browser for Microsoft Windows which is designed for the preview and debugging of mobile websites. Through the use of the WAP emulator, mobile-oriented (WML, XHTML, Chtml, and HTML) pages can be viewed exactly as if they have been opened by a real mobile phone and switch between various mobile devices by few mouse clicks. Furthermore, the HTTP request sent by this WAP emulator is similar to a real mobile browser request, thus WAP PROOF can be used to develop resources that are sensitive to the user-agent. WAP PROOF can even be used to validate the syntax of WML or Xhtml documents, debug the interactive WAP pages, and check the HTTP traffic between the browser and the server. The error diagnostics is descriptive and all the debugging information is accessible. 3.6.2: Web Server Services Software After a thorough investigation on the web services software, EasyPHP has been chosen as it has many advantages than that of CERN server. Justification for choosing EasyPHP(version 5.3.2) This web server software has been chosen on the basis that I have some previous knowledge on EasyPHP software as I have used it for the development of a website in the à ¢Ã¢â€š ¬Ã‹Å"Web Technologiesà ¢Ã¢â€š ¬Ã‚  module. With prospect to that, I have decided to use this software for server in order to test the WML pages on localhost. 3.7: FUNCTIONAL MODELING OF THE SYSTEM System models are graphical representations that describe the problem to be solved and the system which is to be developed. To view the system from different perspectives, four models have been put forward: Use Case diagrams to show how the student and the administrator are interacting with the system. Data Flow diagrams to show the flow of data about how the student will interact with the mobile assessment system.

Wednesday, November 13, 2019

The L Word Versus the I Word :: Essays Papers

The L Word Versus the I Word Of the 49 ALA-accredited library science programs in the United States, only one - the School of Library Science at Clarion University - omits the word "information" from its name. The "L" word doesn't fare so well. Twenty-eight percent of accredited library science programs have dropped the word "library" from their name. Other "I" word schools don't bother to seek accreditation because they no longer see their mission as training librarians. The "L" word camp needs to accept the political realities facing LIS programs. Librarians condemn the loss of their beloved "L" word and have even demanded the ALA refuse to accredit schools that drop it. Names are important. By its name, we recognize the character and purpose of an organization. A library science school has a clear, focused mission - to educate and train students to become librarians. By contrast, the mission of an information school is broader and may (or may not) include the basic training of librarians. Being precise by nature, librarians prefer a name that is descriptive. More importantly, the "L" word signifies the rich cultural heritage that is librarianship. Happily, the majority of ALA-accredited schools use both the "L" and the "I" words to describe themselves. This is as it should be. The motivation for dropping the "L" word is fueled by a perceived lack of prestige and a belief that the word "library" limits the scope of education. While universities do look down upon library science as a discipline lacking academic depth, a name change alone will not cure that opinion. There is a more serious issue at stake - that of theory versus skills. Here, I depart from the "L" word camp and inch closer to the side of information. The scope of an LIS education must be broader than the traditional library science core. As Childers points out, "†¦it's clear that information handling is bigger than one institution - bigger than the library institution but including it..." The science of information is a compelling and dynamic field not limited to librarians. Webmasters, programmers, information brokers, and, yes, librarians can all be taught under the same theoretical umbrella. The interactions of students on different career tracks can be a positive and energizing force within an LIS program. Librarians lament the lack of skills training, but theory is, and must remain, central to LIS. According to Fallis and Fricke, a librarian requires a theoretical graduate-level education, in addition to specific skills.