Monday, September 30, 2019

Rebuilt Marketing Machine Essay

Per the article The Rebuilt Marketing Machine by Victoria L. Crittenden, the additional 4C’s of strategic marketing are customer centrality, competitive capabilities, company collaborations and cynical connections. Starting with customer centrality, studying what the customer needs and wants are. Creating solutions for all of the different customers wants instead of forcing the customer into a product. Consumers are all about the customer and the customer experience, ensuring the best service. Competitive capabilities open the door with worldwide web allowing most business to have an opportunity to portray themselves as worldwide leaders. Competition leads many businesses to strive for success and beyond. Therefore competitive capabilities allow business to think of ways to improve their businesses. The third C, company collaboration, is an advantage to companies where you can take superior business and combine business to provide customers the best of both worlds. Company collaboration allows marketing to interfere with other departments to ensure high quality of services. The last C in strategic marketing, cyclical connections are vital to the business world through its strategic planning, great marketing skills will be proved through the outcome of business. In order for a company to succeed, a strong formula must be implemented. Although the 4Ps still remain popular in marketing, the matrix needs to be rebuilt due to it no longer being successful for businesses. Business men all know the 4Ps marketing mix framework, due to its common sense there are no longer any advantages. In today’s world, marketing is the key to success and finding ways to better concepts for business success all around the world since marketing is always changing. The gist to marketing is impleme nting new ideas for business success, using the aged idea of the 4Ps is no longer comparative to the advancement of the business world today. Comparing the 4Cs to 3Cs, Porter’s 5 Forces, SWOT analysis, BCG Matrix is important since they all support different ideas. Starting with SWOT analysis, finding out what the strength and weaknesses for business allows better strategy for business growth. SWOT analysis defines the pros and cons of the business where as the 4Cs finds ways to improve the weaknesses. SWOT analysis bring consistency to a business, however if combined with 4Cs it would allow great marketing strategy. Porters 5 forces focus on competition and striving for the top name in leading business. This strategic plan uses the strength and weaknesses of other companies through their own annual reports, financial statements, and mysterious shoppers, etc, to find ways to better business. Whereas company collaboration in the 4Cs, focuses on marketing function in conjunction with other areas in the organization. This allows companies to make decisions on ideas as a whole and not just one team making a decision. The BCG Matrix only focuses on two items the SBU market growth rate and the SBU relative market share, this matrix is based on assumptions and is biased. Due to this the 4Cs implements greater ideas since the BCG focuses on profitability and market share and does not support other marketing ideas. The 3Cs is somewhat similar to the 4Cs however the 4Cs are more thorough in the idea of marketing. The 3Cs provides types of questions to ask yourself when opening a business which are common sense. However, the 4Cs are in depth details of important marketing strategies for building a successful business. In my opinion the marketing mix framework is consumers oriented and fits better in the movement for mass marketing to niche marketing. However, it is out dated and needs to be revised with careful consideration of what the customer wants and needs are. Adding new elements to the framework to ensure better marketing techniques, such as adding another â€Å"P† for customers (people) because without business from the customers, companies will not grow. Also, finding ways to better the customer experience so that customer will be a returning customer and not only focus on making money. The customer will be using social media to rate businesses, speak to family and friends about that customer service experience and are the key for business success.

Sunday, September 29, 2019

Andrew Jackson Campaign Speech of 1828 Essay

My fellow Americans, the upcoming national elections present a very important choice. We can forge a â€Å"true† representative democracy for the first time in history, and be led by our directly elected leaders. Or we can continue to live in an aristocratic republic run by over-educated elitists who are not beholden to the will of the people, but only to themselves. As you all know, three years ago I won the popular vote for President, but was denied the office because of a â€Å"corrupt bargain† between the dishonorable Henry Clay and President Adams. The people’s choice was disregarded by the elite in power. As a result, I immediately resigned from the Senate and returned to Tennessee, where the legislature immediately nominated me for President again. I have spent the last three years preparing to right this terrible wrong and take back the people’s power to choose their own leaders. My opponent Mr. Adams dismisses me as a â€Å"military chieftain. † I have fought two wars for this country, and I am proud of it. I think one of the most important qualifications a President should have is a military background. We were invaded by the British only 15 years ago. That enemy is still in the Canadas agitating Indians to attack us, and waiting for another chance to invade. We have foreign enemies at our every border. Don’t forget the Spanish forces just to the south in Florida, and Mexico to the west, and Indians constantly raiding settlements all along the frontiers. These foreign threats are many and dire, and we need a President who has the experience to defend our nation against them. There are threats to our nation from within as well. The Second National Bank is a threat to our economic well-being. President Adams and Vice-president Clay both support the bank claiming that it provides stability. I say it does great harm to the average American. It is a financial monopoly controlled by a few wealthy easterners. It controls the credit for the entire country, prints paper money of dubious worth, and it is just plain unconstitutional. Out west thousands of ordinary shop keepers, millers, farmers and other business owners cannot get the currency and the loans they need to run their concerns. How do you develop and grow the economy of a new state without currency, or worse yet, with paper currency of dubious worth? I say let us do away with all paper money, I do not trust it. Gold and Silver coin have intrinsic and eternal value, paper does not. We should also rely on our local and state banks, run by the people who live in and understand our communities, to control the currency needed for commerce, not some faceless, monopolistic national bank. Another threat from within are the abolitionists. They care about one issue only, and would tear the nation apart to get their way. Slavery is necessary to the economy of the south. If we outlaw it, we will make criminals of thousands of slave owners overnight, and collapse all of the southern states’ economies. How will southern families feed and clothe themselves without their labor force? I say let the people and their states decide this issue for themselves. Many northern states have already outlawed slavery, and one day the southern states may follow. You cannot force a cultural change like this on people; you must let them come to it in their own way and time. That is the nature of democracy. President Adams is afraid of internal threats as well. His biggest fear is YOU! The people of this nation, the ordinary citizens of the United States are the gravest threat he faces. Our President doesn’t trust us. To him, we are the unwashed, ignorant masses who, given the chance, would run the country into the ground. The president has stated many times that he believes his precious republic will soon â€Å"degenerate into democracy; that government of the people will become government by the people. † I say it’s about time. I say â€Å"we the people† built this nation. We have marched across the continent, scratching out a living, and burying our children along the way to do it. I say â€Å"we the people† understand better than anyone what it takes to make this nation grow and prosper. I trust the common people of this nation, because I am one of the common people. I am not yet another wealthy land owner from Virginia, nor am I an aristocratic lawyer from Massachusetts. I am a just an old Indian fighter from Tennessee. I believe â€Å"we the people† who have sacrificed the most for this great nation have earned the right to govern it. But I need your help to make this happen. Already, the new states are entering the union with few restrictions on the vote. This has caused many the old states to change their ways as well. Eighteen of our states now choose their electors by popular vote, while only six still allow the legislature to choose their representatives for them. I urge you all to go to the polls on Election Day. With this election we can finally take back power from the old aristocracy. We can establish the legitimacy of majority rule based upon direct voting for candidates by the electorate, and guarantee preservation of the Union, with states’ rights as the fundamental basis of American liberty. This is the dawn of a new day for democracy and modern American politics. Please vote on Election Day. Thank you.

Saturday, September 28, 2019

Humanities-Ancient Greece

Ancient Greece and Roman civilization comparison The first Olympic games were held in Olympia, Greece. These games were part of the â€Å"Panhellenic Festival, instituted in 776 B. C. E in honor of the Greek gods†. The Olympic games occur in an every â€Å"four-year periods beginning with the first games in 776 B. C. E. † The Greeks had many sports such as, â€Å"200-yard sprint, footrace, wrestling, long jump, and boxing. † Greek athletes competed nude. However, women were not allowed to compete in the Olympic games. The Greeks believed that a â€Å"true sport was that which gave athletes an opportunity to rival the divinity of the gods. In contrast to Greece, the Romans had a â€Å"variety of brutal blood sports. † Gladiator fights were â€Å"introduced in Rome in 264 B. C. E. † These games would symbolize the power of the emperors. In Rome, these events were held in the Coliseum. Gladiators fought wild animals. â€Å"Most Gladiators were crimin als, prisoners of war, or slaves. † They were trained in schools and were forced to take part in the events. The Olympic games and Gladiator fights are different because in Greece it was mostly sport festivals, while in Rome it was representation to honor the emperors.Greek architecture monuments were designed to serve the living. One of the many type of Greek architectural structures is the Parthenon. It is a temple dedicated to Athena, the goddess of war. Built in glittering Pentelic marble. The Parthenon represents the â€Å"apex of a long history of post-and-lintel temple building among the Greeks. † The functions of the Parthenon, was to â€Å"display statues of the gods, for the rulers to go and sacrifice and worship in as a recognition of the protection provided by the gods. In contrast, Roman architecture reflected the practical needs of the empire. The Romans are considered one of the greatest architects of ancient times. Also the Romans made good use of the à ¢â‚¬Å"aqueducts, arches, vaults and domes. † For example, the Pantheon is â€Å"a temple dedicated to the seven planetary deities. † Its exterior is covered with a â€Å"veneer of white marble and bronze. † The Pantheon has many features such as, â€Å"a portico with eight Corinthian columns originally elevated by a flight of stairs that now lie buried beneath the city street. Greek and Roman architecture are similar because Roman architecture was based on the knowledge of the Greeks. Although there’s a difference because Greeks used single row columns for actual structural support, while the Romans were progressing technologically and using rows of concrete columns for luxury purposes. The arts in Greek were based on Humanism, Realism, and Idealism. The Greeks used the abstract geometric methods in their paintings. For example, Greek artists painted their â€Å"ceramic wares with angular figures and complex geometric patterns arranged to enhance the sha pe of the vessel. Greeks painted mythology, literature, and everyday life in â€Å"waters jars, wine jugs, storage vessels, drinking cups and bowls. † In contrast, the Roman art was based in Pictorial Realism paintings. The Romans decorated their â€Å"meeting halls, baths, and country villas that were inspired by Greek murals. † Roman art was illustrated in mosaics. This is a technique by which â€Å"small pieces of stone or glass are embedded into wet cement surfaces or plaster surfaces. † Also Romans illustrated landscapes to show affection to their pleasure of nature.It’s clear that Greek art and Roman art are different because both civilizations used different techniques for their art and showed different interested in what they were trying to portray in their paintings. Roman art was based in Realism while Greek art was more Idealistic. Greek literature was based in the Classical Style in Poetry. This is a combination of the â€Å"arts prevailed in most forms of religious ritual and in public and private entertainment. † For example, Hellenic literature was filled with passion and tenderness written in lyric poetry. In contrast, Roman literature reveals a masterful use of Latin literature.Romans use literature for the purposes of â€Å"entertainment, instruction, and record keeping. † A Roman notable style of literature is the Roman Epic Poetry style. For example, â€Å"Rome’s foremost poet-publicist, Virgil wrote the semi legendary epic that immortalized Rome’s destiny as world ruler. † Virgil’s poems were not an oral tradition but a literacy epic. His work became the â€Å"monumental impact of Latin language. † Greek literature and Roman Literature are similar because they both include comedies, poetry and epics. Also Greek literature dealt with myths while Roman Literature was based on triumphs.

Friday, September 27, 2019

Arsenic Essay Example | Topics and Well Written Essays - 2000 words

Arsenic - Essay Example The methods utilized in preparations of ceria nanoparticles and its coating on nanotubes is also reviewed. History of arsenic in field of chemistry, medicine and technology has been completely overshadowed by its role as poison in various homicides. In today's world extension of its similar role has been widely discussed due to world wide ground water contamination and many times referred as 21st century calamity. High concentration of arsenic has been reported from almost 21 countries and among them Bangladesh and West bengal region of India are considered to be the most affected area and significant amount of population are at risk (1). Arsenic is the 20th most abundant material found in earth crust and its concentration in most of rocks ranges between 0.5 to 2.5 mg/kg. Mobilization of arsenic is contributed by various natural phenomenon which include natural weathering reaction, biochemical mobilization, geochemical and volcanic emission etc. but, at many places excessive mining also contributes for the same. Arsenic exist in various oxidation state in natural environment which includ es -3,,0.+3. and +5. Figure 1 indicates the Eh-pH diagram of arsenic at 25C. Long term exposure to arsenic contaminated drinking water have many medical manifestation which includes skin, lungs, bladder and kidney cancer, change in pigmentation, hyperkeratosis, neurological disorders, muscular weakness loss of appetite and nausea etc. As per the WHO guidelines the permissible arsenic concentration in ground water is 10ppb (0.01mg/l).World wide problem of ground water contamination with arsenic leads to extensive research in area of arsenic remediation in ground water. There are different methodologies developed arsenic removals, which are mainly classified as 1) Chemical processes, 2) Physical processes, 3) Biological processes, and 4) combination of all. Table 1 characterizes the various methodologies applied for arsenic remediation based on their principles. Arsenic pollution of water occurs due to various reasons like the natural leaching of rocks containing arsenic, mining, processing of mineral deposits and a discharge of industrial pollutants. Many techniques as shown in Table 1 are known for arsenic removal and adsorption is one of the main methods for its treatment. Many adsorbents like carbon, rare earth oxides, lanthanium and yttrium impregnated alumina, ion exchange fiber and lanthanium compounds are being known for the removal of arsenic from water(3). The development of nanotechnology and nanosciences has raised the expectation of its crucial role in environmental issues. A variety of nano-materials have been experimented in treatment of environment pollutants like Photocatalytic TiO2 and ZnS for removal of organics. Zerovalent iron (Fe (0)) and bimetallic Fe (0) as effective redox media for in-situ remediation of organics and inorganic pollutant. Among others Carbon nanotubes (CNTs) emerges as one of the most promising agent to be used with other nanomaterials due to its unique mechanical, electrical, optical and thermal properties which takes it one of the most ideal supporting material for nano coatings. Nano

Thursday, September 26, 2019

Public-Private Partnership Essay Example | Topics and Well Written Essays - 1250 words

Public-Private Partnership - Essay Example These societal problems, as well as the inherent conflict of interests between the public and the private sector, are typified by a great extent of wickedness. Wicked problems are those conflicting matters confronting the public sector that demand a consolidated partnership by public and private sectors. The civil society, industries, and governments are not capable of addressing these problems independently (Dewulf, Blanken, & Bult-Spiering 2012). A wicked problem is complex, rather than just complicated, it is often intractable, there is no unilinear solution, moreover, there is no ‘stopping’ point, it is novel, any apparent ‘solution’ often generates other ‘problems,’ and there is no ‘right’ or ‘wrong’ answer, but there are better or worse alternatives. Wicked problems within public-private partnership are characterized as recurrent or persistent problems, often defined by indecision and conflict over interests or purposes that could influence the process of decision-making (Hodge & Greve 2005). According to Grint (2005), there are no simple solutions to these wicked problems confronted by PPP. Remarkable progress can be achieved in mitigating them, but they will not be totally eradicated. But the question is, why are PPP problems considered wicked problems? First of all, organizing or forming PPP is complex due to the challenge of bringing together the objective and interests of the numerous stakeholders— the private sector is composed of lenders, investors and firms supplying operational and construction services; on the other hand, the private sector is made up of public officials developing and enforcing PPP guidelines, those acquiring the PPP, and the public or citizens who utilize the infrastructures that a PPP offers (Biggs & Helms 2007).

Truth-in-Sentencing Laws in the US Term Paper Example | Topics and Well Written Essays - 1000 words

Truth-in-Sentencing Laws in the US - Term Paper Example Truth in sentencing laws was enacted in the U.S. to reduce the chances of early release from incarceration. Schmallenger (2011) points out that the law requires criminals to serve a substantial portion of the prison sentence imposed by the court before they can be allowed to leave the prison peripheries. The question that many ask relate to whether this kind of law is capable of deterring crime or not? Proponents of the law argue that truth in sentencing can help deter crime in a big way. Firstly, it is argued that locking offenders in prisons for a substantial period of time enhances public safety by deterring crime (Owens, 2010). This is because it prevents the offenders from engaging in criminal acts through incapacitation as they are locked. The locking incapacitates them as they are denied the freedom to move out and engage in criminal activities. This helps in deterring crime a great deal. Incarceration of offenders also prevents inmates from coordinating criminal activities wi th others who have not put in prison. Research shows that one means that criminals use to organize their criminal activities is through communication. This implies that denying a criminal the freedom to communicate and organize criminal acts is one way of addressing the issue of crime. This element has been made possible since the enactment of the truth in sentencing by ensuring that criminals are kept in prison for quite some time until they reform, thereby deterring crime. Truth in sentencing is not only meant to keep inmates in prison but also acts as a rehabilitation measure where inmates are being educated and counseled so as to become good people once they complete their sentences. This helps a great deal in deterring crime. Similarly, truth in sentencing deters would-be-offenders from engaging in criminal activities. This is because, they are aware that engaging in criminal activities may land them in jail where they would spend a substantial portion of their lives in prison, which no one would want. This helps in deterring crime (Owens, 2010). Truth in sentencing also deters crime due to the fact that it creates certainty of the punishment that one receives as a result of being incarcerated.  

Wednesday, September 25, 2019

Mackie Essay Example | Topics and Well Written Essays - 500 words

Mackie - Essay Example The analogy of a stone created by the divine that is too heavy for even God to lift suggests limitations to God and, therefore, refutes his omnipotence. When suggesting that the God is incapable of creating a stone too heavy for himself to lift, then he was never omnipotent to begin with. In so many ways, using the Paradox of Omnipotence to suggest that God maintains limitations is a scientific or secular attempt to refute the possibility of God’s existence. Mackie argues that whether or not men are the creator of evil by their own consciousness, the paradox of omnipotence is still valid, thus it cannot be avoided. It would seem to suggest that Mackie believes that God would be incapable of removing evil from the world or from the hearts of men, thus he should be considered without omnipotence for it proposes a limitation. If God is said to be inherently good, then a failure to remove evil deeds from the word suggests he has created a situation out of his absolute control. I disagree strongly with Mackie’s position, perhaps with some level of personal bias, in suggesting that there are limitations to God’s omnipotence. Not all actions performed by God can be rationalized, and it is commonly cited in society that God works in mysterious ways. Since none in modern society have met God to discuss his motivations and opinions, it would be impossible to suggest that God is unable to provide contradictions. His testaments speak of considerable love and forgiveness, but at the same time there appear to be no actions undertaken to remove evil. It would be illogical to assume that God is not without complicated and complex reasoning, thus he could be standing idle allowing evil to exist for a specific purpose. Perhaps the evil occurring today is a means toward an end, which does not by any practical lens suggest that

Tuesday, September 24, 2019

The background, profile of the study & statement of the problem. Based Research Proposal

The background, profile of the study & statement of the problem. Based on my last project which was - Research Proposal Example The interventions come as a way of enforcing tobacco control strategy and when implemented they either lower or raise sales revenue for tobacco products marketing companies (Bump at al. 5). They come in form of increased tax rates on cigarette, increased competition, local or federal regulations on advertisements and sales, economic restrains, and technology standards (Suttle, 1). Others like increased tax on tobacco products work to raise revenue, correct externalities as well as regulate use of tobacco products (Who, 55). However, the intervention does not make the company less ambitious to increase sales revenue. It makes the company work harder to overcome all the handles in the most efficient way possible. The Company has increased its advertisement strategies, which has increased the company’s income level and foreign exchange in the Kenyan economy (Laikwan, 111). This makes the above-identified factors to require a research on how they affect sales revenue in cigarette marketing companies with BAT as the case study. According to Chacha (1), BAT is one of the greatest contributors to national economy through increases employment rates, income levels and earning the country foreign exchange. This has been made possible due to the different factors that BAT has had to put in place despite the many challenges it has had to pass. Among the factors are increased advertisements, maintaining the brand name and abiding by set regulations to ensure they remain in the market. These together with some of the intervention factors mentioned above affects BAT’s sales revenue in the country either positively or negatively. There is therefore a great need for an investigation on how each identified factor affects BAT’s sales revenue as a cigarette marketing company. BAT like any other cigarette marketing company has been faced with so many huddles and yet it has managed to maintain high-income

Monday, September 23, 2019

Consulting Sanario Research Paper Example | Topics and Well Written Essays - 250 words

Consulting Sanario - Research Paper Example Being a person that pays attention to detail, I would see myself as a note taker and organizer. As others propose ideas, I can then assimilate tasks to individual team members based on their ascribed strengths and weaknesses (Miller, 2008, p. 19). Working with a timeline, I can then strive to propose set deadlines that each task should be completed under in order that we are successful. In addition, I will work to allow enough flexibility to account for any last minute emergencies that may arise. The key component in a consulting firm is to deliver a quality product to customers, on time, every time (Larbi and Springfield, 2004, p. 102). That should be our primary focus as a team moving forward. During this program of study, I have learned the importance of follow-through in the business world. As such, it would be my aim to be a part of a consulting firm who only accepts projects that they know fits into their area of expertise and they are confident they can perform an excellent an d effective job. If we do that, then we should be well on our way to

Sunday, September 22, 2019

A Brief Summary of 5 Disorders Essay Example for Free

A Brief Summary of 5 Disorders Essay Bipolar I Disorder is defined by the DSM-5 as manic or mixed episodes that last at least seven days, or by manic symptoms that are so severe that the person needs immediate hospital care. During this manic episode, people typically experience an expansive mood, excessive optimism, grandiosity, and poor judgment. Usually, the person also has depressive episodes, typically lasting at least two weeks. During the depressive episode, people may become hostile and physically threatening to other and also, when delusional, may be physically assaultive or suicidal. The symptoms of mania or depression must be a major change from the persons normal behavior. Hypomanic episodes also exist in which a person experiences at least 4 consecutive days of increased energy and activity and elevated mood. Social Anxiety Disorder (Social Phobia) 300.23 (F40.10) The diagnostic criteria for Social Anxiety Disorder (SAD) includes an anxiety associated with social situations in which a person feels pressure or scrutiny by others. Such social situations almost always provoke fear in the individual typically lasting for 6 months of more. There is a specific branch of this disorder in which the individual only fears public performance: such as singing, communicating a speech, an athletic event, and often affects work and school activities. Typically those individuals with Social Anxiety Disorder have a fear or anxiety that is judged to be out of proportion to the actual risk of being negatively evaluated or to the consequences of such negative evaluation. Nightmare Disorder307.47 (F51.5) Nightmare Disorder is a repeated occurrence of dysphoric and well-remembered dreams that involve threats to survival and personal security. Typically, the dream occurs in the second half of the major sleep episode. Other criteria involves the individual experiencing distress affecting social interactions at work or other important areas of function.  These nightmares are not caused by the substance consumption of alcohol, drugs, or medication. The DSM-5 defines a nightmare as a long and detailed, story-like sequence of dream imagery that appears real and causes anxiety, stress, or fear. In several instances, nightmares may be comorbid with several medical conditions, including coronary heart disease, cancer, Parkinsonism, and pain, and can accompany medical treatments. Paranoid Personality Disorder301.0 (F60.0) Paranoid Personality Disorder falls under the broad category of personality disorders. The criterion for paranoid personality disorder includes a pervasive distrust and suspiciousness of others such that their motives are interpreted as malevolent. Typically the individual suspects without evidence that other people are out to harm or exploit him or her, determines that friends and associates are not to be trusted, is reluctant to confide in others because of unwarranted fears, reads into hidden meanings about people or events, has unforgiving attitude and grudges towards people, counterattacks angrily when feeling that character or reputation is being attacked, and has recurrent suspicions without justification regarding fidelity of spouse or sexual partner. The pattern of this disorder is obviously one of distrust and suspiciousness. Generally these individuals are difficult to get along with and often do not participate in close relationships with others. Pedophilic Disorder302.2 (F65.4) Pedophilic Disorder is defined when an individual has recurrent, intense sexual arousing fantasies, urges, or behavior with a child 13 years or younger over a period of 6 months. Either the individual has acted on the urges or these urges have caused serious distress and interpersonal difficulty. The individual must be at least 16 years old and at least 5 years older than the child or children. If individuals complain that their sexual attractions or preferences for children are causing psychosocial difficulties, they may be diagnosed with pedophilic disorder. The presence of multiple victims is sufficient but not necessary for diagnosis of pedophilia. Pedophilia per se appears to be a lifelong condition. Pedophilic disorder contains elements that may change over time with or without treatment: subjective distress, psychosocial impairment, or the decision to  act upon desires. References American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders (5th ed.). Arlington, VA: American Psychiatric Publishing.

Saturday, September 21, 2019

A Biography Of Booker T Washington History Essay

A Biography Of Booker T Washington History Essay Birth, Parents and Family Life The well known clichà ©, bad beginnings have good endings, resonates in ones mind when this name is mentioned. Booker T. Washingtons life, undoubtedly encapsulate this well-known phrase as throughout his life evidence proves how he grew and became very successful. Booker Taliaferro Washingtons life began on April 5th, 1856 where he was born into slavery on the Burroughs Plantation in the rural, Hales Ford, Virginia. He had three siblings, one of whom was adopted. His mother Jane was an enslaved African American woman who worked as a cook on the plantation. His father was a white man, whom he knew very little about. His mother later married another slave, Washington Ferguson, who left to for West Virginia. Early Life Washingtons early life was that of a slave where he lived in a small cabin and slept on a dirt floor with only a pallet that was put on the ground for his comfort. Survival was a struggle as his mother Jane from time to time would take a chicken or an egg from her masters and cook them during the night just to feed her children. From an early age, Booker knew what labour entailed and began working quite young. One of his duties was to carry sacks of corn to the mill on the back of a horse. Sometimes when a sack fell on the ground he had to wait for hours for someone to come and replace it on the horses back. Washingtons discomfort of his living arrangement and hard labour as a child was mingled with the discomfort of his clothes and shoes. Until his shirt was worn for six weeks, Washington had to bear the pain from his flax material shirt which pricked his skin. The discomfort was so great that once his brother offered to wear his shirt until it got a bit softer. His shoes also were uncomfortable as his first pair of shoes had wood as its sole and coarse leather tops. Education Although he went to school while he was a slave, Booker T. Washingtons education only began when his family was freed of slavery. In Washingtons time, it was illegal for slaves to go to school and be educated. However, Washington went to school with James Burroughs daughter in Franklin County, not as a student but to carry her books. It was only when the Emancipation Proclamation in April, 1865, Washington now nine, was read to the jubilant slaves that Booker was able to spread his wings a bit. Washington, his siblings and mother soon left the plantation with a wagon that his stepfather sent for them to join with him in Malden, West Virginia. Because of the state of poverty that the family was faced with, Washington could not have had a normal schooling experience. Instead, at the tender age of nine, Washington was thrust into the world of work. His stepfather, who worked in the salt mines, found work for him and his brother at a salt mine that began at four in the morning and ended at nine. Sometimes they even worked at coal mines. One Mr. William Davis opened a school for coloured children. Bookers parents allowed him to go but on the condition that he maintain his job. As Booker worked in the morning period, he was now able to attend school later in the day but returned to the mine after school. After a few years, Booker had to leave the school in order to work fulltime in the coal mine; but his mother found him another job. He was taken in as a houseboy by a wealthy family, General Lewis Ruffner. The wife was very strict on him but very encouraging. He proved his trustworthiness to her while he stayed with her for four years and saw her as one of his best friends. It was at this point that Booker learned about a school, Hampton Institute, where black students can get an education, paying their way by working. He saved up some money from his labour at the mines and in 1872, at sixteen, when he had just about saved enough money, Booker left for Hampton. The road to Hampton was not an easy one. He walked the way but stopped for a few days, sleeping under a plank sidewalk during the night and loading a ship with food items during the day to raise more money to buy food. When Booker finally arrived at Hampton; he was first denied entrance into the school because of his appearance, but soon impressed the head teacher with his janitorial skills and continued doing these services to pay for his school expenses. It was during one summer of his studies that his mother died while he was on his summer vacation. He still went on to spend three years there, graduating in 1875 at age nineteen. Life as an Adult: His Marriages and Family Booker was married three times. The first of the three came just after moving to Tuskegee in 1882, when he married his childhood sweetheart Fannie Smith. From this marriage one daughter, Portia, came in 1883. Unfortunately, one year following the birth of their daughter, Fannie died unexpectedly. Washington remarried in 1985 to Olivia Davidson who was also working at the Tuskegee Institute as an assistant principal. The new couple had two boys, Booker Jr. and Earnest; however, Olivia only remained with him for four years before she also died. Washington soon got married again for the third time to Margaret Murray, a teacher at Tuskegee, in 1893 but the couple had no children however she helped with her stepchildren. Margaret died ten years after Washington in 1925. Washington credited each of his wives for their contribution to the Tuskegee Institute. Where he lived and worked By now, Booker T. Washington was developing into an adult, being able to sustain himself. Washington was a strong advocate of education and believed that through education, the quality of his people could be improved. Due to the strong belief that he maintained, when he graduated, Booker moved back to his hometown, Malden, to teach, but spent only a short time there teaching eighty to ninety children in the day, adults in the night and two Sunday schools. However, during the short time at the school, Washington encouraged students to attend the Hampton Institute and sent his two brothers, John and James, to school. Washingtons time at this school was soon up when he was hired by General Armstrong, the principal of Hampton, as a member of the faculty and a postgraduate student. Washingtons now taught classes at nights for students who could not attend classes in the day, teaching also a group of seventy five Indian boys. His Accomplishments Now at twenty five, in 1881, Washington was recommended by General Armstrong to a prominent white man in Tuskegee who wanted to establish a school for black children in that town. Mr. Armstrong recommended Washington for the position to spearhead the establishment however when he arrived in Alabama Washington found out that no provisions were made for acquiring lands or buildings. He also found that the only funding for the school was two thousand five hundred for teachers salary which was given by the state legislature as a favour to the black people who had supported a politician. Although throughout the early years, the institute was able to survive on gifts of individuals, Washington was still faced with the challenges maintaining the school even at the beginning where he had to locate an appropriate location for the school and building of the campus. However, Washington was soon able to purchase farmland that amounted to two thousand acres where he established the school. Two sm all buildings were converted; there were no equipment and hardly any money. All the students had to work in addition to their academic studies. Some of the activities the students engaged in were chopping of trees, making bricks, building furniture, clearing lands and constructing buildings. Classes were opened with thirty students and what was taught developed the students, teaching them both trades and professions. Ten years later in 1891, now 35, the institution had matured into a campus which boasted of over five hundred and forty acres of land, many well equipped buildings, thousands of students, over two hundred faculty members teaching thirty eight trades and professions. Booker T. Washington was taught the skill of public speaking by one of his teachers during his years at Hampton. The lessons Ms. Nathalie Lord taught him made him a very eloquent speaker and he used this to propel his efforts bringing many benefits to the Tuskegee Institution. To add to Booker T. Washingtons accomplishment, in 1895, Washington was asked to speak at the opening of the Cotton State Exposition in Atlanta, Georgia which was a major accomplishment for an African American. In his speech, later referred to as the Atlanta Compromise, Washington encouraged blacks and whites to work together and explained his idea that African Americans can secure their place in the society through their own economic and moral development and not by legal and political changes. Washingtons belief was not accepted by all African Americans as some feared that some may fight against them for their want of equal rights. However, the whites approved of his views and helped to bring the programs he envisioned to fruit. He was later given an honorary degree by the Harvard University in 1896. One year after his speech, in 1896, Washington was able to acquire funding for an extension of his institution. He opened an agriculture school with the help of the Slater Fund for Negro Education. At this extension school, George Washington Carver was entrusted to lead the school, many other people who were interested in the education of the blacks helped and the school flourished. Contributions to Society The Tuskegee Institute still educate people today, and in addition to this, Booker T. Washington also instituted a variety of programs for rural extension work. He also helped to set up the National Negro Business League. Although Booker was selected to be named to a cabinet post, he refused, stating that he preferred not to be involved in politics. It was not until 1901 that Booker T. Washington published his autobiography, Up from Slavery of which the profits were given towards strengthening the economic stability of the Tuskegee Institute. It was in this same year that Washington was invited to the White House by the president at the time, Theodore Roosevelt, the first African American to be recognized in this magnitude. He was also privileged to have tea with Queen Victoria during a visit to Europe. By1904 Washington was now forty eight and became very influential in many political decisions, becoming the advocate and key advisor to the African American community. Through the use of the black newspapers and other publications Washington was able to create good public relations for his causes. Washington however refused to be a part of a race relations conference that was the driving force for the founding of the National Association for the Advancement of Coloured People (NAACP). Washington was sceptical of the motives behind the conference fearing that it may be of a combative nature; however, the elections of Woodrow Wilson in 1912 caused Washington to change the way he spoke. After assuring in his campaign that he will fight for equal rights of the African Americans, Wilson never follow through on his promises. This caused Washington to surprise everyone when he published an article whose tone was similar to the militant black leaders of the time. Even with this change, many still believed that Booker had done more than he was credited for or that was recognized by others. How he was Renowned The key contributing factor that distinguishes Booker T. Washington from all other African American advocates was his approach. Although he believed in equality, the method in which he used to achieve it was quite different from any other. Washingtons approach was not confrontational, as was the approach of many at the time. He realized that being confrontational would only be to his disadvantage, and worked in a way to develop and maintain the support of the white people who were instrumental in fulfilling many of his ideas. He believed that success for blacks can only come through economic stability using mainly vocational training. Washington was unlike his critics such as Fredrick Douglass and W.E.B Du Bois who protested, challenged the political system and spoke up about the lack of equality. Instead he saw these militant actions as distractions to economic success and encouraged blacks to concentrate on developing industrial skills. Booker was also known for his capability to raise funds for the Institution, which when coupled with his ability to speak made many individuals give generously to Tuskegee because of his clarity of expression for how the school can help blacks make a better life for themselves. Through education, Washington, more than any other, helped to elevate his people. He is therefore best remembered for freeing African Americans from the economic slavery that kept them bondage even after they were physically and legally freed from slavery. His Death Even at the gates of his death, Washington remained a fighter as he continued to principal the Tuskegee Institute. Washingtons body was deteriorating. He collapsed in New York where he was sent back to Tuskegee. On November 14th 1915 his body could bear no more and he passed on. Although at first it was assumed that he died of heart failure due to exhaustion, it was later confirmed when in March 2006, with the permission of the descendants, the examination of his medical records showed that he died of hypertension with a blood pressure more than twice the normal range. Washington was finally laid to rest on the grounds of the Tuskegee Institute near to the chapel. Reason for my Choice In a society where there is s thirst for good male role models, I found it a pleasure reading about Booker T. Washington and making him my choice for my biography. Washington was an individual whose life I can emulate and imbibe. First of all he was a black man who started life by measly means; however, he did not allow him to hinder his determination. Washington pressed forward and at his death he was financially secure, had a family and was well renowned. He was very intelligent and used this ability for good causes. The exceptional qualities that surrounded Washington are those that I would like to portray in my life; hence my ultimate reason for my choice or Mr. Booker T. Washington. How he has affected my Life The life of Booker T. Washington has greatly affected me in many positive ways. I now look at life differently since his life is truly a testimony that it is not about how your life begins but how you decide to end it. I am also encouraged to face any challenges that are put before me. Washington faced a number of challenges, but although at times he may have been disappointed, he did not allow that to keep him down but instead rose from the challenge to become an even greater person. From his life I was also encouraged to look out for others and to show more humanitarianism to my fellowmen. For me it can begin at home, just as it began at home for Washington. When he started working, he was able to send his two brothers to school which to me if very commendable. Booker T. Washington has therefore proven to be a person worth emulating, and once this is done success would come my way.

Friday, September 20, 2019

The Great Depression And The Bay Area.... :: essays research papers

The Great Depression progressively got worse and then progressively got better. Coming in and out of the depression was not an over night thing, It included lots of planning and action. There were a few major causes of the Great Depression,. The United states had three consecutive conservative presidents in the 1920's Harding, Coolidge, and Hoover. They all believed in mechanization which in turn put thousands of people out of work, and the trickle down theory where the money that the rich spent was supposed to somehow make it’s way though the system to the poor. The money never made it so the poor had to find some way to get money and that was through loans from the banks. The poor had no way of making money which made it close to impossible to pay back the loans plus the interest thus, beginning the ban and loan crisis. Banks were closing rapidly because of the money loss. This led to the concentration of wealth the top two percent of the US owned sixty percent of the money and the rest of the people were poor. Mechanization caused massive over production which put the US in a strain because of it’s lack of consumers. So they cut production and raised prices which was still ineffective. With food being too expensive work, and housing was scarce the poor were forced to make housing.   Ã‚  Ã‚  Ã‚  Ã‚  With a combination of mechanization, conservative presidents, concentration of the wealth because of the trickle down theory, and higher taxes on the poor, the poor worked harder and steadily got poorer. Mexican Americans got deported during the depression because they felt that they were taking all the jobs. Hoover’s response to the Depression was shaped his conservative Republican ideas. He thought that the poor were lazy and that the rich became rich because they worked hard. The believed in â€Å"Big Business†, and that the money would â€Å"trickle down† if the poor worked harder. He thought that the Depression would solve itself. He thought that big business would end the depression. So that’s why he didn’t take actions sooner in the Depression. Hoover waited too long to take action thus, resulting in him getting blamed for the Depression Roosevelt, unlike the presidents before him took action in an attempt to end the depression. When Roosevelt took office in 1933, the country was in the middle of the Great Depression.

Thursday, September 19, 2019

The Failure and Rebirth of Burmese Nationalism Essay -- International

All people in the world strive to find a sense of belonging. This sense is coupled with ethnic identities, cultural customs, and social implications. The groups that inhabit the corner of the world, now known as Myanmar, have had great struggles and upheavals through the last century. They have been stricken with World War, independence struggles, as well as military dictatorship. The Burmese groups have tried with diligence to establish their own states, but in the end all has fallen upon them and their tale is one of grief and sadness. The failure of Burmese nationalist movement is through the conflicting interests of the world, the clashes between Burmese ideology, and the differences of ethnic acceptance. However badly the movement failed, a new movement has taken form and is a blossoming root of hope for the millions of Burmese living in poverty today. The area in Southeast Asia that contains Burma today has been a place of human life for millennium. Leaders came and went, and the usual cycle of empires, kings, and regimes passed over the people of Burma. The scene of nationalistic fervor, however, starts after the takeover of Burma by the British through the entirety of the nineteenth century (Badertscher). Like always, â€Å"the British began to permeate the ancient Burmese culture with foreign elements†, thus starting the colonial period of Burma’s history and of struggles to resist such control (â€Å"Burma†). Using a divide and conquer strategy, British command authorized minorities like the Karen group of Burmese to be â€Å"in the military and in local rural administrations† (â€Å"Burma†). This way they built resentment that is still apparent in many cases today. The nationalist movements present globally in the nineteenth and twent... ...artin, Patricia. "Aung San Suu Kyi." Aung San Suu Kyi (2011): 1. MAS Ultra - School Edition. Web. 10 Apr. 2012. "Nothing New But the Name." The Economist 20 Oct. 1990. Student Research Center. Web. 3 Apr. 2012. . Pittman, Todd, and Aye Aye Win. "Myanmar Elections: Aung San Suu Kyi, Opposition Leader, Wins Parliament Seat." The Huffington Post. TheHuffingtonPost.com, 01 Apr. 2012. Web. 3 Apr. 2012. . Steinberg, David I. Burma, the State of Myanmar. Washington, D.C.: Georgetown UP, 2001. Print. "The History of Burma." Canadian Friends of Burma. Web. 10 Apr. 2012. .

Wednesday, September 18, 2019

Health Promotion Essay -- Healthy Lifestyle Essay

Health by definition is the complete physical, mental and social well-being (Burch, 2001). In the past health has been defined as the absence of disease. Health promotion enables people the ability and resources to improve and control their overall health. Being able to adjust and adapt to various social and physical environments in day-to-day activities is a trait of a healthy individual. Health promotion is not just the responsibility of those individuals in the health field. An individual?s well-being reflects whether or not that person has a healthy lifestyle. Therefore health promotion becomes an issue for employers, retailers, sports and policy makers among others because issues such as safety and environmental factors will have an influence on the well-being of an individual (Ottawa Charter, 1986). Collaborative and coordinated efforts to provide safer goods and services, and a cleaner, more enjoyable environment should be the goal for all. The goal of all involved sho uld be to provide a healthier environment that will provide a better well-being for the population. Promoting health requires the detection of any barriers that would hinder the health promotion process and removal of them. Promoting health is, also, educating the public to current health issues. There are various aspects of health promotion. Health promotion can be applied to any group or environment. A few of the more popular places and populations we see health promotion being addressed more often are the workplace, community, among adolescent, and the elderly. However, I believe the most effective and important place to begin health promotion is within our school systems. Promoting a healthy lifestyle, bettering quality of life, and prev... ...r 1, 2001 from Expanded Academic Index ASAP database. Manson, S. M., (1997). One small step for Science, one giant lead for prevention. American Journal of Community Psychology, 25, 2, 215. Retrieved October 1, 2001 from Expanded Academic Index ASAP database. 1Center for Disease Control, (2001). Healthy Aging: Preventing Disease and Improving Quality of Life Among Older Americans. Retrieved October 1, 2001 from http://www.cdc.gov/nccdphp/aag-aging.htm 2Center for Disease Control (2001). School Health Programs: An investment in Our Nation?s Future. Retrieved October 1, 2001 from http://www.cdc.gov/nccdphp/dash/ataglanc.htm Healthy People, (2001). http://www.health.gov/healthypeople/ Ottawa Charter for Health Promotion (1986). First International Conference of Health Promotion. Retrieved October 1, 2001 from http://www.who.dk/policy/ottawa.htm

Tuesday, September 17, 2019

Ap World Syllabus

Advanced Placement World History Course Syllabus 2012-2013 Ms. Rebecca Layton Friendly High School Fort Washington, MD 20744 301-449-4900 Rebecca. [email  protected] org Course Description: The Advanced Placement World History (APWH) course is an intensive, year long, examination of global history from the period of 8000 B. C. E. to the present. The purpose of APWH is to develop a greater understanding of the evolution of global processes and contacts, in interaction with different types of human societies.The course highlights the nature of changes in international frameworks and their causes and consequences, as well as comparisons among major societies. This course also builds an understanding of cultural, institutional and technological precedents that, along with geography, set the human stage. The course is broken down into five major periods of study. They are: ? Foundations: 8000 B. C. E. to 600 C. E. ? 600 C. E. to 1450 ? 1450 to 1750 ? 1750 to 1914 ? 1914 to the present A PWH Course Themes: The APWH course is guided by six themes which will receive equal attention throughout the course: . The dynamics of change and continuity across the world history periods covered in this course, and the causes and processes involved in major changes of these dynamics. 2. Patterns and effects of interaction among societies and regions: trade, war, diplomacy and international organizations. 3. The effects of technology, economics and demography on people and the environment (population growth and decline, disease, labor systems, manufacturing, migrations agriculture and weaponry. ) 4. Systems of social structure and gender structure (comparing major features ithin and among societies, and assessing change and continuity). 5. Cultural, intellectual and religious developments, including interactions among and within societies. 6. Changes in functions and structures of states and attitudes towards states and political identities (political culture), including the emerg ence of nation-state (types of political organization). APWH Habits of Mind or Skills: The APWH course addresses habits of mind or skills in two categories: (1) those addressed by any rigorous history course, and (2) those addressed by a world history course.Four habits of mind are in the first category: ? Constructing and evaluating arguments: using evidence to make plausible arguments. ? Using documents and other primary data: developing the skills necessary to analyze point of view, context and bias and to understand and interpret information. ? Assessing issues of change and continuity over time, including the capacity to deal with changes as a process and with questions of causation. ? Understanding diversity of interpretations through analysis of context, point of view and frame of reference.Three habits of mind belong in the second category: ? Seeing global patterns and processes over time and space while also connecting local developments to global ones and moving through le vels of generalization from the global to the particular. ? Comparing within and among societies, including comparing societies’ reactions to global process. ? Being aware of human commonalities and differences while assessing claims of universal standards, and understanding culturally diverse ideas and values in historical context. Required Materials: ? Bentley, J. and Ziegler, H. 2003). Traditions and Encounters: A Global Perspective on the Past. (3rd Ed. ). Boston: McGraw-Hill. ? Andrea, A. and Overfield, J. (2005). The Human Record: Sources of Global History, Volume I: to 1700. (5th Ed. ). Boston: Houghton Mifflin Company. ? Andrea, A. and Overfield, J. (2005). The Human Record: Sources of Global History, Volume II: Since 1500. (5th Ed. ). Boston: Houghton Mifflin Company. ? Laden, J. and Whelan, P. (2009). Kaplan AP World History . Kaplan Publishing Grading Criteria: Quarter grades will be computed according to the following factors: ?Tests/Quizzes/Essays/Projects50% ? H omework25% ? Classwork/Participation25% Conduct: Students are expected to follow all rules in this class that correspond to those stated in the Prince George’s County Code of Student Conduct. Punctuality is a necessity and tardiness to class will result in loss of participation points. Work missed because of an unexcused absence may not be made up. Work missed because of an excused absence must be made up within the week the student returns to school. It is the responsibility of the student to arrange for make up work.All assignments must be handed in on time; late work will not be accepted. Methodology: This course is conducted using a variety of methods: lecture/discussion, simulations, cooperative learning activities, presentations and independent study/research. All students are responsible for reading the assignments before coming to class so that they may actively participate. A variety of film clips and videos are also used throughout the course. Unit I: Foundations 80 00 B. C. E. to 600 C. E. Week One Topics: Agricultural Revolution World Geography Geographic Determinism- Jared Diamond Discussion/DebateReadings: Course Introductions/Overview, Chapter 1 (Bentley) Major Assignments: Comparative Graphic Organizer: Early Civilization Assessments: Quiz: Chapter 1 Timed Writing: Comparative Essays on Early Civilizations Jared Diamond Take-Home Essay Weeks Two and Three Topics: Civilization Discussion/Debate Early Civilizations (Complex Societies) Economic Specialization/Trade Bantu/Aryan Migration Religion Readings: Chapter 2 (Bentley) Chapter 3 (Bentley) Chapter 4 (Bentley) Chapter 5 (Bentley) Chapter 6 (Bentley) Major Assignments: Annotated Timeline/Companion Essay Vocabulary Building Exercises (Ancient Civilizations)Assessments: Quiz: Chapters 2-5 Foundation Exam, Part 1: Chapters 1-6 Weeks Four and Five Topics: Classical Societies/Empires Economic Specialization/Development of Long Distance Trade Belief Systems (Religions of Salvation) Readings: Ch apter 7 (Bentley) Chapter 8 (Bentley) Chapter 9 (Bentley) Chapter 10 (Bentley) Chapter 11 (Bentley) Major Assignments: Annotated Map: Greek/Roman Mediterranean Comparative Graphic Organizer: Classical Societies/Empires Comparative Graphic Organizer: Belief Systems Assessments: Quiz Chapters 7-11 Timed Writing: Document Based Question: Buddhism Weeks Six and SevenTopics: Cross-Cultural Interactions/Migrations Long Distance Trade Spread/Diffusion of Religion Spread/Diffusion of Disease Collapse of the Classical Societies/Empires Readings : Chapter 12 (Bentley) 1. 1-1. 15 (Andrea/Overfield, Vol. I) 1. 46-1. 54 (Andrea/Overfield, Vol. I) 1. 18-142 (Andrea/Overfield, Vol. II) Major Assignments: ASPIRE Chart Annotated Timeline (AP Themes) Assessments: Foundations Exam, Part II: Chapters 7-12 Unit II: 600 C. E. to 1450 Week 8 Topics: Byzantium: A Survivor Society Islam: Rise and Expansion Economy and Society: Urbanization, Hemispheric Trade Readings: Chapter 13 (Bentley)Chapter 14 (Bentley ) Major Assignments: Map Activity: Dar al Islam Vocabulary Building Exercises: Byzantine and Islam Assessments: Quiz: Chapter 13-14 Week 9 Topics: Restoration of Imperial Rule in China Islamic and Hindu Kingdoms Economic Development and Trade Culture and Society Readings: Chapter 15 (Bentley) Chapter 16 (Bentley) Major Assignments: Continuity-Change Over Time Graphic Organizer: Chinese Dynasties Assessments: Quiz: Chapters 15-16 Timed Writing: DBQ-The Silk Roads Week 10 Topics: Political Stability Economy and Society The Papacy Regional States and Expansion The CrusadesReadings: Chapter 17 (Bentley) Chapter 20 (Bentley) Major Assignments: Comparative Graphic Organizer: European and Japanese Feudalism Mini-DBQ: The Crusades Assessments: Quiz: Chapter 17 and 20 Unit II Exam, Part I: Chapters 13-17 and 20 Week 11 Topics: Turkish Migrations and Expansion Mongol Expansion and Empire Building Readings: Chapter 18 (Bentley) Major Assignments: Annotated Timeline (AP Themes) Vocabulary Build ing Exercises: Asia/Middle East Map Building Exercise: Turkish/Mongol Assessments: Quiz: Chapter 18 Timed Writing: CCOT Essay: The Mongols Weeks 12 and 13 Topics: West African Kingdoms/EmpiresIslamic Kingdoms/Empires Long Distance Trade: Trans-Saharan Trade/ Indian Ocean Trade Culture and Society Mesoamerican Empires Readings: Chapter 19 (Bentley) Chapter 21 (Bentley) Major Assignments: Persuasive Essay: Why/ Why Not Build Long Distance Trade Routes? Presentation: Empire Building Assessments: Quiz: Chapter 19 and Chapter 21 Quiz: Vocabulary/Map Week 14 Topics: Cross-Cultural Interactions Long-Distance Trade Crisis and Recovery Exploration and Colonization Readings: Chapter 22 (Bentley) 1. 55-1. 113 (Andrea/Overfield, Vol. I) Major Assignments: ASPIRE Chart Annotated Timeline (AP Themes)Assessments: Quiz: Chapter 22 Unit II Exam, Part II: Chapters 18-22 (Excluding Chapter 20) Unit III: 1450 to 1750 Week 15 Topics: Exploration: Navigation and Motivation Colonization: Europeans to the Americas/South Asia Exchange: Transoceanic Trade Readings: Chapter 23 (Bentley) Major Assignments: Map Activity Vocabulary Building Exercises Annotated Timeline/Corresponding Essay (AP Themes) Assessments: Quiz: Chapter 23 Quiz: Vocabulary/Map Skills (Renaissance Europe) Week 16 Topics: Reformation/Counter Reformation Revival of Empire Capitalism-Expansion of Trade-Labor SystemsReadings: Chapter 24 (Bentley) Major Assignments: Vocabulary Building Exercises (Reformation) Essay: Transformation of Europe Assessments: Quiz: Chapter 24 Timed Writing: DBQ-Christian and Muslim Attitudes Towards Trade Week 17 Topics: The Spanish in the Americas Colonial Society European Expansion into the Pacific Readings: Chapter 25 (Bentley) Major Assignments: Annotated Timeline Colonization Map Assessments: Quiz: Chapter 25 Timed Writing: Comparative Essay on Labor Systems Week 18 Topics: Labor Systems in the New World-Triangular Trade African Diaspora (Demographic Impact) Abolition of SlaveryReadings: C hapter 26 (Bentley) Major Assignments: Essay: The Growth of Plantations Assessments: Quiz: Chapter 26 Timed Writing: DBQ on the Abolition of Slavery Week 19 Topics: Political Stability in China (Post Mongols) Economic and Social Changes â€Å"New† Cultural Influences/Traditions Unification of Japan Readings: Chapter 28 (Bentley) Major Assignments: Comparison Graphic Organizer: Japanese and Chinese Social/Political Changes Vocabulary Building Exercises: East Asia Map Activity: East Asia Assessments: Quiz: Chapter 27 Quiz: Vocabulary/Map: East Asia Week 20 Topics: Islamic Empires Islamic SocietyEmpires in Transition Readings: Chapter 28 (Bentley) 2. 3-2. 58 (Andrea/Overfield, Vol. II) Major Assignments: ASPIRE Chart Annotated Timeline Middle East Map Activity Assessments: Quiz: Chapter 28 Unit III Exam, Chapters 23-26 Unit IV: 1750 to 1914 Week 21 Topics: Enlightenment and Revolution (American/French) Impact of Revolution – Latin America – Abolitionism – Wo men’s Rights Nationalism and the Formation of National States (Italy/Germany) Readings: Chapter 29 (Bentley) Major Assignments: Vocabulary Building Exercises: Political Upheaval Comparative Graphic Organizer: American/French RevolutionsComparative Graphic Organizer: Italian/German Nation Building Assessments: Quiz: Chapter 29 Quiz: Vocabulary Week 22 Topics: Industrialization Changing Industrial Society-Urbanization and Migration Global Impact Readings: Chapter 30 (Bentley) Major Assignments: Annotated Timeline Assessments: Quiz: Chapter 30 Timed Writing: CCOT Essay on the Roles of Women in East Asia, Latina America, Sub-Saharan Africa and Western Europe, 1750-1914 Week 23 Topics: The Americas State Building Economic Development Society and Culture Readings: Chapter 31 (Bentley) Major Assignments: Annotated Timeline Map Activity: U. S. GrowthAssessments: Quiz: Chapter 31 Essay: Immigration and Change in the Americas Week 24 Topics: Declining Empires Ottoman’s -Russian- China Readings: Chapter 32 (Bentley) Major Assignments: Map Activity: Russia Annotated Timeline/Companion Essay: Growth and Change of Russia Assessments: Quiz: Chapter 32 Weeks 25-26 Topics: Imperialism: Building of Global Empires Motives for Empire The Scramble (Africa and Asia) New Imperial Powers Impact of Imperialism Readings: Chapter 33 (Bentley) Major Assignments: Map Activity: Imperialism Comparison Graphic Organizer: European Imperialism Assessments: Quiz: Chapter 33Week 27 Topics: Review/Reflect/Recover Readings: 2. 40-2. 80 (Andrea/Overfield, Vol. II) Major Assignments: ASPIRE Chart Vocabulary Building Exercises: Imperialism Assessments: Timed Writing: DBQ- Asian Indentured Labor in the 19th Century Unit IV Exam, Chapters 29-33 Unit V: 1914 to Present Week 28 Topics: World War I Global War Total War Impact of Versailles Readings: Chapter 34 (Bentley) Major Assignments: Map Activity: Europe WWI Annotated Timeline/Companion Essay: Causes, Impact and Fall Out of WWI Assessmen ts: Quiz: Chapter 34 Weeks 29 and 30 Topics: Global Depression and Political ChallengesRise of Totalitarian Movements (Fascism, Communism, National Socialism Nationalism and Political Identity –Asian Autonomy –Colonial Africa Latin America Readings: Chapter 35 (Bentley) Chapter 36 (Bentley) Major Assignments: Comparative Graphic Organizer: Totalitarian Movements Comparative Graphic Organizer: Asia/Africa/Latin America Vocabulary Building Exercises: Political Systems Assessments: Quiz: Chapters 35-36 Timed Writing: CCOT Essay on Attitudes Towards Political Structures Week 31 Topics: World War II Causes and Consequences Total War Holocaust Atomic Bomb Readings: Chapter 37 (Bentley)Major Assignments: Annotated Timeline/Companion Essay: Causes, Impact and Fall Out of WWII Map Activity: Europe WWII/Asia Holocaust Writing Perspective Assessments: Quiz: Chapter 37 Week 32 Topics: The Cold War Emergence of Super Powers Hot Spots: Korea/Cuba/Vietnam End of Cold War Readings: Ch apter 38 (Bentley) Major Assignments: Comparative Graphic Organizers: Hot Spots Annotated Timeline: Cold War Vocabulary Building Exercises: Post War Map Activity: South East Asia Assessments: Quiz: Chapter 38 Quiz: Vocabulary/Map Week 33 Topics: De-Colonization Asia-Africa-Latin America Readings: Chapter 39 (Bentley)Major Assignments: Map Activity: Africa Map Activity: Latin America Comparison Graphic Organizer: Independence Africa/Asia/Latin America Assessments: Quiz: Chapter 39 Timed Writing: DBQ-Nationalism Among Muslim Leaders Week 34 Topics: The Global Economy Cross-Cultural Exchanges and Communication Global Problems-Demography and Environment Readings: Chapter 40 (Bentley) 2. 100-2. 123, 2. 87-2. 98 (Andrea/Overfield, Vol. II) Major Assignments: ASPIRE Chart Presentation: Global Economy, Cultural Interactions, Global Threats, Rights of Women or Migration Assessments: Quiz: Chapter 40 Unit V Exam, Chapters 34-40

Monday, September 16, 2019

Coconut- Tree of Life Essay

The Coconut Tree (Cocos Nucifera L.) is called â€Å"The Tree of Life† because of the endless list of products and by-products derived from its various parts. Food, shelter, fuel – name it, the coconut has it. The coconut industry is considered a major dollar earner that provides livelihood to one-third of the country’s population. Coconut Meat From coco meat can be obtained coco flour, desiccated coconut, coconut milk, coconut chips, candies, bukayo or local sweetened shredded coconut meat, latik copra and animal feeds. Coco chips, which are curved and wrinkled coconut meat, is crisply toasted and salted. It is very popular in Hawaii. Coconut flour can be used as a wheat extender in baking certain products without affecting their appearance or acceptability. The coconut milk is a good protein source. Whole coco milk contains about 22% oil, which accounts for its laxative property. Coconut Oil Copra is dried coconut meat that has a high oil content, as much as 64%. Coconut oil is the most readily digested of all the fats of general use in the world. The oil furnishes about 9,500 calories of energy per kilogram. Its chief competitors are soya bean oil, palm oil and palm kernel oil. Coconut oil retards aging. It counteracts heart, colon, pancreatic and liver tumor inducers. And it is easy to digest. In the detergent industry, coconut oil is very important. Its most outstanding characteristic is its high saponification value in view of the molecular weight of most of the fatty acid glycerides it contains. An advantageous utilization of the coconut oil as a detergent was discovered in a May 1951 study wherein a formulation using coconut oil was found to be an effective sanitizer. Other products from coco oil are soap, lard, coco chemicals, crude oil, pomade, shampoo, margarine, butter and cooking oil. Coconut Leaves Cocnut leaves produce good quality paper pulp, midrib brooms, hats and mats, fruit trays, waste baskets, fans, beautiful midrib decors, lamp shades, placemats, bags and utility roof materials. Coconut Fruit The coconut fruit produces buko, often used for salads, halo-halo( crushed ice with sweetened fruit), sweets and pastries. Buko is of three kinds: mala-kanin, or having the consistency of boiled rice; mala-uhog, mucus-like consistency and ready for eating; and mala-katad, or like leather. The last kind is the one used for making sweets. A mature coconut, or niyog is used in making sweets and special Filipino dishes. The â€Å"sport fruit† of the coconut is the makapuno. Considered a delightful delicacy and largely used for making preserves and ice-cream, it cannot be kept in storage and will not germinate. It has three layers: semi-acid, soft and hard meat. Coconut Water Coconut water is also called liquid endosperm. It is thrown away during copra making and becomes a great waste. Uses of coconut water include: coconut water vinegar; coconut wine; production of the chewy, fiber-rich nata good as a dessert and as alaxative; as a growth factor; and as a substitute for dextrose. Another breakthrough use is in coconut water theraphy to cure renal disorders. â€Å"Bukolysis†, as it is also called, is the medical process of reducing or dissolving urinary stones of the urinary tract systems using buko water from 7 to 9 months old coconuts. Bukolysis is the brainchild of Dr. Eufemio Macalalag Jr., a urologist. For preventive medication, water from one mature coconut consumed daily, could almost guarantee that the formation of stones in the urinary tract will be avoided. To those already afflicted, the coconut water theraphy has been proven to be an inexpensive and effective cure. Coconut water is commonly promoted as an economical thirst quencher, hunger satisfier and medical cure for renal disorders all in one. Using coconut water, a nata de coco-like growth produced after 14 days which, when cooked in syrup, is apopular dessert. When mixed with other ingredients, like the making of fruit salad, it will enhance the flavor of the dish. And whoever said that nata de coco is just for food was wrong. This nata-like growth is dextran and can be made to comply with the specifications for clinical dextran, then we have in the coconut water an important contribution in the atomic defense against radiation sickness. Coconut Husk Coconut husks are made of bristle fiber (10%), mattress fiber (20%) and coir dust and shorts or wastes (70%). The abundance of fiber nakes it good, stable supply for cottage industries that make brushes, doormats, carpets, bags, ropes, yarn fishing nets, and mattresses, etc. Coir fiber can also be used as substitute for jute in making rice, copra, sugar, coffee, bags and sandbags. It is also suitable for making pulp and paper, etc. For the first time, the Philippines can export coir fiber to Japan, Germany and the United States with the proper assistance extended by the government, the industry being new. The well board is manufactured from coir dust and short fibers. No binding materials are needed as lignin is inherent in the coconut husk. Also it is termite-proof because creosote is present in the new material. The board produced is as good as narra, plywood or masonite. Coir yarn, coir rope, bags, rugs, husk decor, husk polishes, mannequin wig, brush, coirflex, and fishnets are other products that can be obtained from coco husk. Out of coir dust can be obtined coco gas, lye insulator, insoflex and plastic materials. Coconut Pith Out of its pith can be produced coco pickles, guinatan and lumpia. Its guinit can produce helmets, caps, wooden shoe straps, handbags, fans, picture and house decor like lamp shades and guinit flowers for the table. Ever heard of the â€Å"Millionaire’s Salad†? It’s fit for any ordinary man though, it is made up of â€Å"palmetto cabbage† which, when translated properly, is simply the local ubod or the â€Å"heart† of the coconut. Actually, ubod is considered one of the finest vegetables in the Philippines. It can be served in many appetizing ways. Cubed in fairly large bits, it makes wonderful addition to Spanish rice, or in their long strips, to Arroz a la Cubana. As a salad, it is mixed with mayonnaise or thousand island dressing and heaped onto lettuce leaves, red pepper, chopped spring onions, paprika, or a combination of some of those may be used to garnish this all-white salad. Crab meat with ubod in lumpia can prove to be very delicious. Infloresence Out of the bud of the coconut tree’s infloresence is a juice called coconut toddy or tuba. The fermented juice is the common alcoholic drink in the coconut region. The fermented tuba would be a good drink even to those who enjoy the finer things. The principal uses of the toddy are: as fresh beverage; for producing alcoholic beverages; for producing vinegar; for making sugar; and as a source of yeast for making bread. Coconut toddy, after being left for five days then distilled, produces an alcoholic spirit known locally as lambanog which is more or less 98% proof. In its taste, sweet toddy is a liquid containing essentially 12 to 18% sugar (sucrose). Other products from the coconut tree’s infloresence are gin, vinegar, candy trays, Christmas and wall decor. Coconut Shell Coconut shell produces the core of the most saleable household products and fashion accessories that can be turned into lucrative, wide-selling cottage industries. Among them are shell necklaces, shell bags, cigarette boxes, shell ladles, buttons, lamp shades, fruit and ash trays, guitars, placemats, coffee pots, cups, wind chimes, â€Å"coco banks†, briquetted charcoal and activated carbon. The most important use of coconut shell is activated carbon produced from its charcoal. It is utilized in air purification systems such as cooker hoods, air conditioning, industrial gas purification systems, and industrial and gas masks. Coconut Trunk & Roots Out of the coconut trunk, hardy and durable wood is obtained to make benches, tables, carvings, picture frames, tables, tool boxes, and construction materials, among many others. Paper pulp can also be extracted from the coconut trunk and other woody parts of the tree. Among the woody parts of the tree, the trunk gives the highest pulp yield of 43%; the midribs, 41%, and the petiole or the slender stop that support the leaf, 32%. Tests also show that coconut coir (80%) and abaca bleached sulfate pulp (40%) are a good combination in the production of offset bookpaper. Medicine, beverages and dyestuff are obtained from the coconut roots.

Sunday, September 15, 2019

Computer Hardware Essay

I. LECTURE OVERVIEW Foundation Concepts: Computer Hardware, reviews trends and developments in microcomputer, midrange, and mainframe computer systems; basic computer system concepts; and the major types of technologies used in peripheral devices for computer input, output, and storage. Computer Systems – Major types of computer systems are summarized in Figure 13.2. A computer is a system of information processing components that perform input, processing, output, storage, and control functions. Its hardware components include input and output devices, a central processing unit (CPU), and primary and secondary storage devices. The major functions and hardware in a computer system are summarized in Figure 13.9 Microcomputer Systems – Microcomputers are used as personal computers, network computers, personal digital assistants, technical workstations, and information appliances. Like most computer systems today, microcomputers are interconnected in a variety of telecommunications networks. This typically includes local area networks, client/server networks, intranets and extranets, and the Internet. Other Computer Systems – Midrange computers are increasingly used as powerful network servers, and for many multiuser business data processing and scientific applications. Mainframe computers are larger and more powerful than most midsize computers. They are usually faster, have more memory capacity, and can support more network users and peripheral devices. They are designed to handle the information processing needs of large organizations with high volumes of transaction processing, or with complex computational problems. Supercomputers are a special category of extremely powerfu l mainframe computer systems designed for massive computational assignments. II. LEARNING OBJECTIVES Learning Objective †¢ Identify the major types, trends, and uses of microcomputer, midrange and mainframe computer systems. †¢ Outline the major technologies and uses of computer peripherals for input, output, and storage. †¢ Identify and give examples of the components and functions of a computer system. †¢ Identify the computer systems and peripherals you would acquire or recommend for a business of your choice, and explain the reasons for your selections. III. LECTURE NOTES Section 1: Computer Systems: End User and Enterprise Computing INTRODUCTION All computers are systems of input, processing, output, storage, and control components. Technology is evolving at a rapid pace, and new forms of input, output, processing, and storage devices continue to enter the market. Analyzing City of Richmond and Tim Beaty Builders We can learn a lot about innovative business uses of PDAs from this case. Take a few minutes to read it, and we will discuss it (See City of Richmond and Tim Beaty Builders in Section IX). TYPES OF COMPUTER SYSTEMS -[Figure 13.2] There are several major categories of computer systems with a variety of characteristics and capabilities. Thus, computer systems are typically classified as: †¢ Mainframe computers †¢ Midrange computers †¢ Microcomputers These categories are attempts to describe the relative computing power provided by different computing platforms or types of computers therefore, they are not precise classifications. Some experts predict the merging or disappearance of several computer categories. They feel that many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks of microcomputers and servers. Most recently, some  industry experts have predicted that the emergence of network computers and information appliances for applications on the Internet and corporate intranets will replace many personal computers, especially in large organisations and in the home computer market. MICROCOMPUTER SYSTEMS Microcomputers are the smallest but most important categories of computers systems for business people and consumers. They are also referred to as personal computers (or PCs). The computing power of current microcomputers exceeds that of the mainframe computers of previous generations at a fraction of their cost. They have become powerful-networked professional workstations for use by end users in business. Microcomputers  categorised by size 1. Handheld 2. Notebook 3. Laptop 4. Portable 5. Desktop 6. Floor-standing Microcomputers  categorised by use 1. Home 2. Personal 3. Professional 4. Workstation 5. Multi-user Systems Microcomputers  categorised by special purpose 1. Workstation Computers 2. Network Servers 3. Personal Digital Assistants Workstation Computers – some microcomputers are powerful workstation  computers (technical work stations) that support applications with heavy mathematical computing and graphics display demands such as computeraided design (CAD) in engineering, or investment and portfolio analysis in the securities industry. Network Servers – are usually more powerful microcomputers that co-ordinate telecommunications and resource  sharing in small local area networks (LANs), and Internet and intranet websites. This is the fastest growing microcomputer application category. Network Computers: †¢ Network Computers (NCs) are a major new microcomputer category designed primarily for use with the Internet and corporate intranets by clerical workers, operational employees, and knowledge workers with specialised or limited computing applications. In-between NCs and full-featured PCs are stripped-down PCs known as NetPCs or legacy-free PCs. NetPCs are designed for the Internet and a limited range of applications within a company. Examples are: Dell’s Webpc, Compaq’s IPaq, HP’s e-PC, and eMachine’s eOne. Network computers (also called thin clients) are low-cost, sealed, networked microcomputers with no or minimal disk storage. Users of network computers depend primarily on Internet and intranet servers for their operating system and web browser, Java-enabled application software, and data access and storage. Main attractions of network computers over full-featured PCs are their low cost to: †¢ Purchase †¢ Upgrade †¢ Maintenance †¢ Support Other benefits to businesses include: †¢ Ease of software distribution and licensing †¢ Computing platform standardisation †¢ Reduced end user support requirements †¢ Improved manageability through centralised management and enterprisewide control of computer network resources. Information Appliances The market is offering a number of gadgets and information appliances that offer users the capability to perform enable host of basic computational chores. Examples of some information appliances include: †¢ Personal Digital Assistants – (PDAs) are designed for convenient mobile communications and computing. PDAs use touch screens, pen-based handwriting recognition, or keyboards to help mobile workers send and receive E-mail, access the Web, and exchange information such as appointments, to-do lists, and sales contacts with their desktop PCs or web servers. †¢ Set-top boxes and video-game consoles that connect to home TV sets. These devices enable you to surf the Web or send and receive E-mail and watch TV programs or play video games at the same time. †¢ Wireless PDAs and cellular and PCS phones and wired telephone-based appliances that can send and receive E-mail and access the Web. Computer Terminals Computer terminals are undergoing a major conversion to networked computer devices. For example: †¢ Dumb terminals are keyboard/video monitor devices with limited processing capabilities, to intelligent terminals, which are modified networked PCs, network computers or other microcomputer-powered network devices. Intelligent terminals can perform data entry and some information processing tasks independently. †¢ Networked terminals which may be Windows terminals that are dependent on network servers for Windows software, processing power, and storage, or Internet terminals, which depend on Internet or intranet website servers for their operating systems and application software. †¢ Transaction terminals are a form of intelligent terminal. Uses can be found in banks retail stores, factories, and other work sites. Examples are ATM’s, factory production recorders, and POS terminals. MIDRANGE COMPUTER SYSTEMS Midrange computers, including minicomputers and high-end network servers, are  multi-user systems that can  manage networks of PCs and terminals. Characteristics of midrange computers include: †¢ Generally, midrange computers are general-purpose computers that are larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframes. †¢ Cost less to buy, operate, and maintain than mainframe computers. †¢ Have become popular as powerful network servers to help manage large Internet websites, corporate intranets and extranets, and client/server networks. †¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. †¢ Data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. †¢ First became popular as minicomputers for scientific research, instrumentation systems, engineering analysis, and industrial process monitoring and control. Minicomputers could easily handle such uses because these applications are narrow in scope and do not demand the processing versatility of mainframe systems. †¢ Serve as industrial process-control and manufacturing plant computers and they play a major role in computeraided manufacturing (CAM). †¢ Take the form of powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications. †¢ Are used as front-end computers to assist mainframe computers in telecommunications processing and network management. †¢ Can function in ordinary operating environments (do not need air conditioning or electrical wiring). †¢ Smaller models of minicomputers do not need a staff of specialists to operate them. MIDRANGE COMPUTER APPLICATIONS Serve as industrial process-control and manufacturing plant computers. Play a major role in computer-aided manufacturing (CAM). Serve as powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications Serve as front-end computers to assist mainframe computers in telecommunications processing and network management. Midrange Computer as Network Server: †¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. †¢ Other applications, like data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. †¢ Serve as powerful network servers to help manage large Internet web sites, corporate Intranets and extranets, and client/server networks MAINFRAME COMPUTER SYSTEMS Mainframe computers are large, fast, and powerful computer systems. Characteristics of mainframe computers include: †¢ They are physically larger and more powerful than micros and minis. †¢ Can process hundreds of millions of instructions per second (MIPS). †¢ Have large primary storage capacities. Main memory capacity can range from hundreds of megabytes to many gigabytes of primary storage. †¢ Mainframes have slimmed down drastically in the last few years, dramatically reducing air-conditioning needs, electronic power consumption, and floor space requirements, and thus their acquisition and operating costs. †¢ Sales of mainframes have increased due to cost reductions and the increase  in applications such as data mining and warehousing, decision support, and electronic commerce. Mainframe Computer Applications: †¢ Handle the information processing needs of major corporations and government agencies with many employees and customers. †¢ Handle enormous and complex computational problems. †¢ Used in organisations processing great volumes of transactions. †¢ Handle great volumes of complex calculations involved in scientific and engineering analyses and simulations of complex design projects. †¢ Serve as superservers for the large client/server networks and high-volume Internet web sites of large companies. †¢ Are becoming a popular business-computing platform for data mining and warehousing, and electronic commerce applications. Supercomputer Systems: The term supercomputer describes a category of extremely powerful computer systems specifically designed for scientific, engineering, and business applications requiring extremely high-speeds for massive numeric computations. Supercomputer Applications: †¢ Used by government research agencies, large universities, and major corporations. †¢ Are used for applications such as global weather forecasting, military defence systems, computational cosmology and astronomy, microprocessor research and design, large scale data mining, large time-sharing networks, and so on. †¢ Use parallel processing architectures of interconnected microprocessors (which can execute many instructions at the same time in parallel). †¢ Can perform arithmetic calculations at speeds of billions of floating-point operations per second (gigaflops). Teraflop (1 trillion floating-point operations per second) supercomputers, which use advanced massively parallel  processing (MPP) designs of thousands of interconnected microprocessors, are becoming available. †¢ Purchase price for large supercomputers are in the $5 million to $50 million range. Mini-supercomputers: The use of symmetric multiprocessing (SMP) and distributed shared memory (DSM) designs of smaller numbers of interconnected microprocessors has spawned a breed of mini-supercomputer with prices that start in the hundreds of thousands of dollars. TECHNICAL NOTE: THE COMPUTER SYSTEM CONCEPTS – [Figure 13.9] As a business professional, you do not need a detailed technical knowledge of computers. However, you do need to understand some basic facts and concepts about computer systems. This should help you be an informed and productive user of computer system resources. A computer is a system, an interrelated combination of components that perform the basic system functions of input, processing, output, storage, and control, thus providing end users with a powerful information-processing tool. Understanding the computer as a computer system is vital to the effective use and management of computers. A computer is a system of hardware devices organised according to the following system functions: †¢ Input. Examples of some input devices of a computer system include: 1. Keyboards 2. Touch Screens3. Light Pens 4. Electronic Mice 4. Optical Scanners 5. Voice Input They convert data into electronic machine-readable form for direct entry or through a telecommunications network into a computer system. Processing. The central processing unit (CPU) is the main processing component of a computer system. (In microcomputers, it is the main microprocessor). One of the CPU’s major components is the arithmetic-logic unit (ALU) that performs the arithmetic and logic functions required in computer processing. Components of the CPU include: 1. Control Unit 2. Arithmetic-Logic Unit 3. Primary Storage Unit Output. Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users. Examples of output devices include: 1. Video Display Units 2. Audio Response Units 3. Printers Storage. The storage function of a computer system is used to store data and program instructions needed for processing. Storage devices include: 1. Primary Storage Unit (main memory) 2. Secondary Storage Devices (magnetic disk and tape units, optical disks) Control. The control unit of a CPU interprets computer program instructions and transmits directions to the other components of the computer system. Computer Processing Speeds: Operating speeds of computers are measured in a number of ways. For example: †¢ Milliseconds – Thousands of a second. Microseconds – Millionths of a second. Nanoseconds – Billionth of a second Picosecond – Trillionth of a second Other terminology used includes: Teraflop – used by some supercomputers MIPS – Million instructions per second Megahertz (MHz) – Millions of cycles per second Gigahertz (GHz) – Billions of cycles per second Clock Speed – used to rate microprocessors by the speed of their timing circuits and internal clock. Section II: Computer Peripherals: Input, Output, and Storage Technologies INTRODUCTION A computer is just a high-powered â€Å"processing box† without peripherals. Your personal computing needs will dictate the components you choose for our particular computing needs. Analyzing United Technologies and Eastman Kodak We can learn a lot about the business value of consolidating computer operations and systems from this case. Take a few minutes to read it, and we will discuss it (See United Technologies and Eastman Kodak in Section IX). PERIPHERALS Peripherals are the generic name for all input, output, and secondary storage devices that are part of a computer system. Peripherals depend on direct connections or telecommunications links to the central processing unit of a  computer system. Thus, all peripherals are online devices, that is, separate from, but can be electronically connected to and controlled by, a CPU. This is the opposite of off-line devices, which are separate from and not under the control of the CPU. INPUT TECHNOLOGY There has been a major trend toward the increased use of input technologies that provide a more natural user interface for computer users. More and more data and commands are being entered directly and easily into computer systems through pointing devices like electronic mice and touch pads, and technologies like optical scanning, handwriting recognition, and voice recognition. POINTING DEVICES Keyboards are still the most widely used devices for entering data and text into computer systems. However, pointing devices are a better alternative for issuing commands, making choices, and responding to prompts displayed on your video screen. They work with your operating system’s graphical user interface (GUI), which presents you with icons, menus, windows, buttons, bars, and so on, for your selection. Examples of pointing devices include: †¢ Electronic Mouse – A device used to move the cursor on the screen, as well as to issue commands and make icon and menu selections. †¢ Trackball – A device used to move the cursor on the display screen. Pointing Stick – A small buttonlike device, sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Touchpad – A small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Touch Screens – A device that accepts data input by the placement of a finger on or close to the CRT screen. PEN-BASED COMPUTING Pen-based computing technologies are being used in many hand-held computers and personal digital assistants. These small PCs and PDAs contain fast processors and software that recognises and digitises handwriting, hand printing, and hand drawing. They have a pressure-sensitive layer like a graphics pad under their slatelike liquid crystal display (LCD) screen. A variety of penlike devices are available: Digitizer Pen – A photoelectronic device that can be used as a pointing device, or used to draw or write on a pressure-sensitive surface of a graphics tablet. Graphics Tablet – A device that allows an end user to draw or write on a pressure-sensitive tablet and has their handwriting or graphics digitised by the computer and accepted as input. SPEECH RECOGNITION SYSTEMS Speech recognition and voice response (in their infancy) promise to be the easiest method of data entry, word processing, and conversational computing, since speech is the easiest, most natural means of human communication. Speech recognition systems analyse and classify speech or vocal tract patterns and convert them into digital codes for entry into a computer system. Early voice recognition products used discrete speech recognition, where you had to pause between each spoken word. New continuous speech recognition (CSR) software recognises controlled, conversationally paced speech. Examples of continuous speech recognition software include: †¢ NaturallySpeaking by Dragon Systems †¢ ViaVoice by IBM †¢ VoiceXpress by Lernout & Hauspie †¢ FreeSpeech by Philips Areas where speech recognition systems are used include: †¢ Manufacturers use it for inspection, inventory, and quality control †¢ Airlines and parcel delivery companies use it for voice-directed sorting of baggage and parcels †¢ Voice activated GPS systems are being used in advanced car design †¢ Physicians use it to enter and printout prescriptions †¢ Gemmologists use it to free up their hands when inspecting and grading precious stones †¢ Handicapped individuals use voice-enabled software to operate their computers, e-mail, and surf the World Wide Web. Speaker-independent voice recognition systems allow a computer to understand a few words from a voice it has never heard before. They enable computers to respond to verbal and touch-tone input over the telephone. Examples include: †¢ Computerized telephone call switching †¢ Telemarketing surveys †¢ Bank pay-by-phone bill-paying services †¢ Stock quotations services †¢ University registration systems †¢ Customer credit and account balance inquiries OPTICAL SCANNING Optical scanning devices read text or graphics and convert them into digital input for a computer. Optical scanning enables the direct entry of data from source documents into a computer system. Popular uses of optical scanning include: †¢ Scanning pages of text and graphics into your computer for desktop publishing and web publishing applications. †¢ Scan documents into your system and organize them into folders as part of a document management library system for easy reference or retrieval.  There are many types of optical scanners, but they all employ photoelectric devices to scan the characters being read. Reflected light patterns of the  data are converted into electronic impulses that are then accepted as input into the computer system. Optical scanning technology known as optical character recognition (OCR) can read special-purpose characters and codes. OCR scanners are used to read characters and codes on:   Merchandise tags Product labels Credit card receipts Utility bills Insurance premiums Airline tickets Sort mail Score tests Process business and government forms Devices such as handheld optical scanning wands are used to read OCR coding on merchandise tags and other media. Many business applications involve reading bar code, a code that utilises bars to represent characters. One common example is the Universal Produce Code (UPC) bar coding that you see on packages of food items and many other products. OTHER INPUT TECHNOLOGIES Magnetic stripe technology is a familiar form of data entry that helps computers read credit cards. The dark magnetic stripe on the back of such cards is the same iron oxide coating as on magnetic tape. Smart cards that embed a microprocessor chip and several kilobytes of memory into debit, credit, and other cards are popular in Europe, and becoming available in the United States. Digital cameras and digital video cameras enable you to shoot, store, and download still photos or full motion video with audio into your PC. Magnetic ink character recognition (MICR) is machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. OUTPUT TECHNOLOGIES Computers provide information in a variety of forms. Video displays and printed documents have been, and still are, the most common forms of output from computer systems. But other natural and attractive output technologies such as voice response systems and multimedia output are increasingly found along with video displays in business applications. VIDEO OUTPUT Video displays are the most common type of computer output. Most desktop computers rely on video monitors that use cathode ray tube (CRT) technology. Usually, the clarity of the video display depends on the type of video monitor you use and the graphics circuit board installed in your computer. A high-resolution, flicker-free monitor is especially important if you spend a lot of time viewing multimedia on CDs or the Web, or complex graphical displays of many software packages. The biggest use of liquid crystal displays (LCDs) is to provide a visual display capability for portable microcomputers and PDAs. LCD displays need significantly less electric current and provide a thin, flat display. Advances in technology such as active matrix and dual scan capabilities have improved the color and clarity of LCD displays. PRINTED OUTPUT After video displays, printed output is the most common form of output displays. Most personal computer systems rely on inkjet or laser printers to produce permanent (hard copy) output in high-quality printed form. Printed output is still a common form of business communications, and is frequently required for legal documentation. †¢ Inkjet printers – Spray ink onto a page one line at a time. They are popular, low-cost printers for microcomputer systems. They are quiet, produce several pages per minute of high-quality output, and can print both black-and-white and high-quality colour graphics. Laser Printers – Use an electrostatic process similar to a photocopying machine to produce many pages per minute of high-quality black-and-white output. More expensive colour laser printers and multifunction inkjet and laser models that print, fax, scan, and copy are other popular choices for business offices. STORAGE TRADE-OFFS Data and information need to be stored after input, during processing, and before output. Computer-based information systems rely primarily on the memory circuits and secondary storage devices of computer systems to accomplish the storage function. Major trends in primary and secondary storage methods: †¢ Progress in very-large scale integration (VLSI), which packs millions of memory circuit elements on tiny semiconductor memory chips, are responsible for continuing increases in the main-memory capacity of computers. †¢ Secondary storage capacities are also expected to escalate into the billions and trillions of characters, due primarily to the use of optical media.  Storage Trade-offs: Speed, capacity, and cost relationships. †¢ Note the cost/speed/capacity trade-offs as one moves from semiconductor memories to magnetic media, such as magnetic disks and tapes, to optical disks. †¢ High-speed storage media cost more per byte and provide lower capacities. †¢ Large capacity storage media cost less per byte but are slower †¢ Semiconductor memories are used mainly for primary storage, though they are sometimes used as high-speed secondary storage devices. †¢ Magnetic disk and tape and optical disk devices are used as secondary storage devices to greatly enlarge the storage capacity of computer systems. †¢ Most primary storage circuits use RAM (random access memory) chips, which lose their contents when electrical power is interrupted †¢ Secondary storage devices provide a more permanent type of storage media for storage of data and programs. Computer Storage Fundamentals: [Figure 13.20] Data is processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the computer’s circuitry in the media it uses. This is called a â€Å"two-state† or binary representation of data, since the computer and media can exhibit only two possible states or conditions – ON (1) or OFF (0). Computer storage elements: †¢ Bit – is the smallest element of data, (binary digit) which can have a value of zero or one. The capacity of  memory chips is usually expressed in terms of bits. Byte – is the basic grouping of bits that the computer operates as a single unit. It typically consists of 8 bits and is used to represent one character of data in most computer coding schemes (e.g. 8 bits = 1 byte). The capacity of a computer’s memory and secondary storage devices is usually expressed in terms of bytes. ASCII (American Standard Code for Information Interchange) EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced: EB SEE DICK Storage capacities are frequently measured in: Kilobyte = 1,000 bytes Megabyte = 1,000,000 bytes Gigabyte = 1,000,000,000 bytes Terabyte = 1,000,000,000,000 bytes Petabyte = 1,000,000,000,000,000 bytes Exabyte = 1,000,000,000,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes Yottabyte = 1,000,000,000,000,000,000,000,000 bytes Direct and Sequential Access †¢ Direct Access – Primary storage media such as semiconductor memory chips are called direct access or random access memories (RAM). Magnetic disk devices are frequently called direct access storage devices (DASDs). The terms direct access and random access describe the same concept. They mean that an element of data or instructions can be directly stored and retrieved by selecting and using any of the locations on the storage media. They also mean that each storage position (1) has a unique address and (2) can be individually accessed in approximately the same length of time without having to search through other storage positions. Sequential Access – sequential access storage media such as magnetic tape do not have unique storage addresses that can be directly addressed. Instead, data must be stored and retrieved using a sequential or serial process. Data are recorded one after another in a predetermined sequence on a storage medium. Locating an individual item of data requires searching much of the recorded data on the tape until the desired item is located. SEMICONDUCTOR MEMORY The primary storage (main memory) on most modern computers consists of microelectronic semiconductor memory circuits. Plug-in memory circuit boards containing 32 megabytes or more of memory chips can be added to your PC to increase its memory capacity. Specialized memory can help improve your computer’s performance. Examples include: †¢ External cache memory of 512 kilobytes to help your microprocessor work faster †¢ Video graphics accelerator cards with 16 megabytes of RAM are used for faster and clearer video performance †¢ Removable credit-card-size and smaller â€Å"flash memory† RAM cards provide several megabytes of erasable direct access storage for PDAs or hand-held PCs. Some of the major attractions of semiconductor memory are: †¢ Small size †¢ Fast speed †¢ Shock and temperature resistance One major disadvantage of most semiconductor memory is: †¢ Volatility – Uninterrupted electric power must be supplied or the contents of memory will be lost (except with  read only memory, which is permanent). There are two basic types of semiconductor memory: †¢ Random Access Memory (RAM) – these memory chips are the most widely used primary storage medium. Each memory position can be both read and written, so it is also called read/write memory. This is a volatile memory. †¢Ã‚  Read Only Memory (ROM) – Non-volatile random access memory chips are used for permanent storage. ROM can be read but not erased or overwritten. Instructions and programs in primary storage can be permanently â€Å"burned in†Ã‚  to the storage cells during manufacturing. This permanent software is also called firmware. Variations include PROM (programmable read only memory) and EPROM (erasable programmable read only memory), which can be permanently or temporarily programmed after manufacture. MAGNETIC DISK STORAGE These are the most common forms of secondary storage for modern computer systems. That’s because they provide fast access and high storage capacities at a reasonable cost. Characteristics of magnetic disks: †¢ Disk drives contain metal disks that are coated on both sides with an iron oxide recording material. †¢ Several disks are mounted together on a vertical shaft, which typically rotates the disks are speeds of 3,600 to 7,600 revolutions per minute (rpm) †¢ Access arms between the slightly separated disks to read and write data on concentric, circular tracks position electromagnetic read/write heads. †¢ Data are recorded on tracks in the form of tiny magnetized spots to form the binary digits of common computer codes. †¢ Thousands of bytes can be recorded on each track, and there are several hundred data tracks on each disk surface, which provides you with billions of storage positions for software and data. Types of Magnetic Disks There are several types of magnetic disk arrangements, including disk cartridges as well as fixed disk units. Removable disk devices are popular because they are transportable and can be used to store backup copies of your data off-line for convenience and security. Floppy Disks, or magnetic disks, consist of polyester film disks covered with an iron oxide compound. A single disk is mounted and rotates freely inside a protective flexible or hard plastic jacket, which has access openings to accommodate the read/write head of a disk drive unit. The 3-1/2-inch floppy disk, with capacities of 1.44 megabytes, is the most widely used version, with a newer Superdisk technology offering 120 megabytes of storage. Hard Disk Drives combine magnetic disks, access arms, and read/write heads into a sealed module. This allows higher speeds, greater data-recording densities,  and closer tolerances within a sealed, more stable environment. Fixed or removable disk cartridge versions are available. Capacities of hard drives range from several hundred megabytes to many gigabytes of storage. RAID Storage Disk arrays of interconnected microcomputer hard disk drives have replaced large-capacity mainframe disk drives to provide many gigabytes of online storage. Known as RAID (redundant arrays of independent disks), they combine from 6 to more than 100 small hard disk drives and their control microprocessors into a single unit. Advantages of RAID disks include: †¢ Provide large capacities with high access speeds since data is accessed in parallel over multiple paths from many disks. †¢ Provide fault tolerant capability, since their redundant design offers multiple copies of data on several disks. If one disk fails, data can be recovered from backup copies automatically stored on other disks. †¢ Storage area networks (SANs) are high-speed fibre channel local area networks that can interconnect many RAID units and share their combined capacity through network servers for many users. MAGNETIC TAPE STORAGE Magnetic Tape is still being used as a secondary storage medium in business applications. The read/write heads of magnetic tape drives record data in the form of magnetised spots on the iron oxide coating of the plastic tape. Magnetic tape devices include tape reels and cartridges in mainframes and midrange systems, and small cassettes or cartridges for PCs. These devices serve as slower, but lower cost, storage to supplement magnetic disks to meet massive data warehouse and other business storage requirements. Other major applications for magnetic tape include long-term archival storage and backup storage for PCs and other systems. OPTICAL DISK STORAGE Optical disk storage involves technology, which is based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. †¢Ã‚  CD-ROM – A common type of optical disk used on microcomputers. They are used for read only storage. Storage is over 600 megabytes per disk. This is equivalent to over 400 1.44-megabyte floppy disks or 300,000 double-spaced pages of text. Data are recorded as microscopic pits in a spiral track, and are read using a laser device. Limitation: Recorded data cannot be erased †¢Ã‚  CD-R – (Compact disk recordable) is another optical disk technology. It enables computers with CD-R disk drive units to record their own data once on a CD, and then be able to read the data indefinitely. Limitation: Recorded data cannot be erased †¢Ã‚  CD-RW – (CD-rewritable) optical disk systems have now become available which record and erase data by using a laser to heat a microscopic point on the disk’s surface. In CD-RW versions using magneto-optical technology, a magnetic coil changes the spot’s reflective properties from one direction to another, thus recording a binary one to zero. A laser device can then read the binary codes on the disk by sensing the direction of reflected light. †¢Ã‚  DVD – (Digital Video Disk or Digital Versatile Disk) can hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. The large capacities and high- quality images and sound of DVD technology are expected to eventually replace CD-ROM and CD-RW technologies for data storage, and  promise to accelerate the use of DVD drives for multimedia products that can be used in both computers and home entertainment systems. †¢ DVD-ROM is beginning to replace magnetic tape videocassettes for movies and other multimedia products. †¢ DVD – RAM is being used for backup and archival storage data and multimedia files. Business Applications One of the major uses of optical disks in mainframe and midrange systems is in image processing, where longterm archival storage of historical files of document images must be maintained. Mainframe and midrange computer versions of optical disks use 12-inch plastic disks with capacities of several gigabytes, with up to 20 disks held in jukebox drive units. WORM – (Write Once, Read Many) versions of optical disks are used to store data on the disk. Although data can only be stored once, it can be read an infinite number of times. One of the major business uses of CD-ROM disks for personal computers is to provide a publishing medium for fast access to reference materials in a convenient, compact form. These include: †¢ Catalogs †¢ Directories †¢ Manuals †¢Ã‚  Periodical abstracts †¢Ã‚  Part listings †¢Ã‚  Statistical databases of business activity and economic activity Interactive multimedia applications in business, education, and entertainment using CD-ROM and DVD disks. Optical disks have become a popular storage medium for image processing and multimedia business applications and they appear to be a promising alternative to magnetic disks and tape for very large mass storage capabilities for enterprise computing systems. However, rewritable optical technologies are still being perfected. Also, most optical disk devices are significantly slower and more expensive (per byte of storage) than magnetic disk devices. So optical disk systems are not expected to displace magnetic disk technology in the near future for most business applications. IV. KEY TERMS AND CONCEPTS – DEFINED Binary Representation: Pertaining to the presence or absence of electronic or magnetic â€Å"signals† in the computer’s circuitry or in the media it uses. There are only two possible states or conditions – presence or absence. Central Processing Unit (CPU): The unit of a computer system that includes the circuits that controls the interpretation and execution of instructions. In many computer systems, the CPU includes the arithmetic-logic unit, the control unit, and primary storage unit. Computer System: Computer hardware as a system of input, processing, output, storage, and control components. Thus a computer system consists of input and output devices, primary and secondary storage devices, the central processing unit, the control unit within the CPU, and other peripheral devices. Computer Terminal: Any input/output device connected by telecommunications links to a computer. Digital Cameras: Digital still cameras and digital video cameras enable you to shoot, store, and download still photos or full-motion video with audio in your PC. Direct Access: A method of storage where each storage position has a unique address and can be individually accessed in approximately the same period of time without having to search through other storage positions. Information Appliance: Devices for consumers to access the Internet. Laptop Computer: A small portable PC. Liquid Crystal Displays (LCD): Electronic visual displays that form characters by applying an electrical charge to selected silicon crystals. Magnetic Disk Storage: Data storage technology that uses magnetised spots on metal or plastic disks. Magnetic Disk Storage – Floppy Disk: Small phonograph record enclosed in a protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability for microcomputer systems. Magnetic Disk Storage – Hard Disk Secondary storage medium; generally nonremovable disks made out of metal and covered with a magnetic   recording surface. It holds data in the form of magnetised spots. Magnetic Disk Storage – RAID Redundant array of independent disks. Magnetic disk units that house many interconnected microcomputer hard disk drives, thus providing large, fault tolerant storage capacities. Magnetic Ink Character Recognition (MICR): The machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. Magnetic Stripe: A magnetic stripe card is a plastic wallet-size card with a strip of magnetic tape on one surface; widely used for credit/debit cards. Magnetic Tape: A plastic tape with a magnetic surface on which data can be stored by selective magnetisation of portions of the surface. Mainframe Computer: A larger-size computer system, typically with a separate central processing unit, as distinguished from microcomputer and minicomputer systems. Microcomputer: A very small computer, ranging in size from a â€Å"Computer on a chip† to a small typewriter-size unit. Microprocessor: A semiconductor chip with circuitry for processing data. Midrange Computer: Larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframe computer systems. Minicomputer: A small electronic general-purpose computer. Network Computer: A new category of microcomputer designed mainly for use with the Internet and Intranets on tasks requiring limited or specialised applications and no or minimal disk storage. Network Server: A type of midrange computer used to co-ordinate telecommunications and resource sharing and manages large web sites, Intranets, extranets, and client/server networks. Network Terminal: A terminal that depends on network servers for its software and processing power. Off-line: Pertaining to equipment or devices not under control of the central processing unit. Online: Pertaining to equipment or devices under control of the central processing unit. Optical Character Recognition (OCR): The machine identification of printed characters through the use of light-sensitive devices. Optical Disk Storage: Technology based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. Optical Disk Storage – CD-ROM: An optical disk technology for microcomputers featuring compact disks with a storage capacity of over 500 megabytes. Optical Disk Storage – CD-R: Compact disk recordable (CD-R) enables computers with CD-R disk drive units to record their own data once on a CD, than be able to read the data indefinitely. Optical Disk Storage – CD-RW: Compact disk rewritable (CD-RW) enables computers with CD-RW disk drive units to record and erase data by using a laser to heat a microscopic point on the disk’s surface. Optical Disk Storage – DVD: Digital video disk or digital versatile disk (DVD) enables computers with DVD disk drive units to hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. Optical Disk Storage – WORM Disk: Optical disk that allows users to write once, read many times. Optical Scanning: Using a device (scanner) that scans characters or images and generates their digital representations. Pen-Based Computing: Tablet-style microcomputers that recognise hand-writing and hand-drawing done by a pen-shaped device on their pressure sensitive display screens. Peripheral Devices: In a computer system, any unit of equipment, distinct from the central processing unit, that provides the system with input, output, or storage capabilities. Personal Digital Assistant: Handheld microcomputer devices, which are designed for convenient mobile communications and computing. Pointing Devices: Devices, which allow end users to issue commands or make choices by moving a cursor on the display, screen. Pointing Device – Electronic Mouse: A small device that is electronically connected to a computer and is moved by hand on a flat surface in order to move the cursor on a video screen in the same direction. Buttons on the mouse allow users to issue commands and make  responses or selections. Pointing Device – Pointing Stick: A small buttonlike device sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Pointing Device – Touchpad: Is a small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Pointing Device – Trackball: A roller device set in a case used to move the cursor on a computer’s display screen. Primary Storage: The main (or internal) memory of a computer. Usually in the form of semiconductor storage. Printers: Devices that produce hard copy output such as paper documents or reports. Secondary Storage: External or auxiliary storage device that supplements the primary storage of a computer. Semiconductor Memory: Microelectronic storage circuitry etched on tiny chips of silicon or other semiconducting material. Semiconductor Memory – RAM: Also known as main memory or primary storage; type of memory that temporarily holds data and instructions needed shortly by the CPU. RAM is a volatile type of storage. Semiconductor Memory – ROM: Also known as firmware; a memory chip that permanently stores instructions and data that are programmed during the chip’s manufacture. Three variations on the ROM chip are PROM, EPROM, and EEPROM. ROM is a nonvolatile form of storage. Sequential Access: A sequential method of storing and retrieving data from a file. Smart Cards: Cards such as debit and credit cards, which have an embedded microprocessor chip and several kilobytes of memory. Speech Recognition: Direct conversion of spoken data into electronic form suitable for entry into a computer system. Promises to be the easiest, most natural way to communicate with computers. Storage Capacity Elements: Units used for storage capacity and data: bits, bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB). Storage Capacity Elements – Bit: A contraction of â€Å"binary digit†. It can have the value of either 0 or 1. Storage Capacity Elements – Byte: A sequence of adjacent binary digits operated on as a unit and usually shorter than a computer word. In many computer systems, a byte is a grouping of eight bits that can represent one alphabetic or special character or can be â€Å"packed† with two decimal digits. Storage Capacity Elements – Kilobyte (K or KB): When referring to computer storage capacity it is equivalent to 2 to the 10th power, or 1,014 in decimal notation. Storage Capacity Elements – Megabyte (MB): One million bytes. More accurately, 2 to the 20th power, 1,048,576 in decimal notation. Storage Capacity Elements – Gigabyte (GB): One billion bytes. More accurately, 2 to the 30th power, or 1,073,741,824 in decimal notation. Storage Capacity Elements – Terabyte (TB): One trillion bytes. More accurately, 2 to the 40th power, or 1,009,511,627,776 in decimal notation. Storage Media Trade-offs: The trade-offs in cost, speed, and capacity of various storage media. Supercomputer: A special category of large computer systems that are the most powerful available. They are designed to solve massive computational problems. Time Elements: Units used for measuring processing speeds: milliseconds, microseconds, nanoseconds, and picoseconds. Time Elements – Millisecond: A thousandth of a second. Time Elements – Microsecond: A millionth of a second. Time Elements – Nanosecond: One billionth of a second. Time Elements – Picosecond: One trillionth of a second. Touch-Sensitive Screen: An input device that accepts data input by the placement of a finger on or close to the CRT screen. Transaction Terminals: Terminals used in banks, retail stores, factories, and other work sites that are used to capture transaction data at their point of origin. Examples are point-of-sale (POS) terminals and automated teller machines (ATMs). Video Output: Video displays are the most common type of computer output. Volatility: Memory (such as electronic semiconductor memory) that loses its contents when electrical power is interrupted. Wand: A handheld optical character recognition device used for data entry by many transaction terminals. Workstation: A computer terminal or micro- or minicomputer system designed to support the work of one person. Also, a highpowered computer to support the work of professionals in engineering, science, and other areas that require extensive computing power and graphics capabilities. V. DISCUSSION QUESTIONS Do you agree with the statement: â€Å"The network is the computer†?   What trends are occurring in the development and use of the major types of computer systems? Do you think that network computers (NCs) will replace personal computers (PCs) in business applications? Are networks of PCs and servers making mainframe computers obsolete?   What  trends are occurring in the development and use of peripheral devices? Why are those trends occurring? When would you recommend the use of each of the following:   Network computers NetPCs Network terminals Information appliances in business applications What processor, memory, magnetic disk storage, and video display capabilities would you require for a personal computer that you would use for business purposes?   What other peripheral devices and capabilities would you want to have for your business PC?