Wednesday, December 25, 2019

How Does Baxandall Indicate The Product Essay - 655 Words

Art history Name Professor Course Date How does Baxandall indicate the production of painting changed as the Renaissance developed? How did the conception of the artist evolve during the period of the Renaissance? Baxandall describes the fifteenth century as a century where clients would order what they needed instead of purchasing the already made products (Michael 2). He continues to describe how this affected the production of painting. The less known or recognized artist would have to produce readymade arts in order to attract clients. However, the already established artists would wait for clients to make the specific orders that they required. Baxandall argues that the production of painting was hence influenced by the clients†¦show more content†¦Michelangelo is viewed as a person who is unlikely to complete any commissions. He is described as a character that has difficulties when it comes to relationship and love to engage in sexual relationship with the male counterparts (Michelangelo Leonardo, 29). His character is tortured and shows the emotional burden associated with being different from the rest of the society or having genius creativity. The unique personality of the character is always celebrated but the society always views the person as an outsider. Leonardo’s character is portrayed in similar manner. He is a genius whose ability in painting, mathematics and engineering earn him a good reputation in the society. Like Michelangelo, he is also a bisexual and an opium addict. Despite his genius nature, the society views his superhuman abilities as strange and therefore sees Leonardo as an outsider (Michelangelo Leonardo, 30). The master Is viewed as a metaphor because the artists are viewed as genius and superhuman who are capable to adapt to the modern and innovative society but they are filled with doubts and struggle in their daily lives. Can you think of a contemporary celebrity or other public figure that conforms to the biographical template for the â€Å"great artist† advanced by Donahue? Sheldon’s character in the Big Bang Theory is quite that of a public figure (Beahm 20). As per his character traits, he also proves to be a great artist. His work inShow MoreRelatedJean Hey’s Annunciation Essay examples2174 Words   |  9 Pagesphysical and emotional, while creating a more ideal finished product, something that was as significant in presence as the natural world itself. Much progress was made in these campaigns during the Early Renaissance, and the emergence of the High Renaissance was characterized by the true mastery of the method of creating mankind’s body and emotions[1], and an artwork as balanced as nature itself. Jean Hey’s â€Å"The Annunciation† demonstrates the product of this final Renaissance transition. One

Tuesday, December 17, 2019

Clash and Similarities Between Judaism, Christianity and...

The three main religions in the world often clash and argue, the reason for this being that they all believe in one thing very strongly and will not let their beliefs be shaken. These three religions are, Islam, Christianity and Judaism. They do on some level get along enough to have some sort of relationship. Although we know a lot about all of these religions we must know how they differ and how they relate to understand the religions. Islam is a religion that originated from the prophet Muhammad. He is the one that wrote the holy book for the religion. The holy book that the Islamic follow is called the quran, most of the people in this religion do not follow the book word for word with actions. For those people that do they are called fundamentalists, they take the quran literal and play out the actions directly as they are written in the holy book. The symbol that represents the Islamic people is a crescent it looks like a half moon, this represents them because, the people that chose this so long ago wanted it to be chosen from space. The womans role is the Islamic religion is that of having kids and being married. The women of Islam are given little to no freedom as men dominate this religion. They are to always be covered and have only one husband as the men can have as many wives as they please. Some of the holy days for this religion consists of Eid al-Adha, Eid al-Fitr, and, Arafat Day. This is the secon d largest religion in the world after Christianity andShow MoreRelatedTaking a Look at Islam and Judaims777 Words   |  3 PagesIntroduction Apart from Christianity, Islam and Judaism are two of the most influential religions in the world, particularly in the Middle East. Although Judaism is not as large as Islam, it has impacted on the world in a profound manner. While it’s quite evident that both Islam and Judaism appear to be having conflicting differences in terms of their doctrines, they are both know as Abrahamic religions because they share a common origin in the Middle East through Abraham in the Hebrew Bible. NeverthelessRead MoreChristianity, Judaism, and Islam Paper2281 Words   |  10 PagesChristianity, Judaism, and Islam Christianity started out in Palestine as a fellowship; it moved to Greece and became a philosophy; it moved to Italy and became an institution; it moved to Europe and became a culture; it came to America and became an enterprise as stated by theological scholar Sam Pascoe. Throughout Christianity’s journey they have come across ties with the religions Judaism and Islam. There are few similarities between the three major religions. One similarity is that AbrahamRead MoreSimilarities between Beliefs and Philosophies from the World1637 Words   |  7 Pagestopic which suits me the most. Clash of ideologies can also cause riots of different beliefs and philosophies. This mostly happens in when a person is fanatic and does not accept the point of view of another person. Clash of different ideologies cause riots in different communities which can lead to various problems, even bloodshed. I majorly focus on the similarities between beliefs and philosophies which may ‘unite ’ ideas and create a mutual understanding between communities of different faithsRead MoreThe Differences Between Christianity And Christianity1567 Words   |  7 Pages Religions have broken off into independent faiths due to multiple differences in beliefs. When analyzing the beliefs of Islam, Judaism and Christianity the two main truths they have in common is one; there is one God, and two; the belief of a main prophetic figure that has come to spread Gods word. These similarities are important since they allow for a point of comparison in these three faiths. The figure of Muhammad in the Muslim faith is known to non-muslims as the founder of the islamic traditionRead MoreThe Clash of Secular Thought and Religion1647 Words   |  7 Pages There has been a clash between secular thought and religion since its formation of societies in the classical age. Both have made an equal effect on the culture of each empire by influencing people to change their belief on the world. M ajor religions have made interactions, which affected some of their ideas for what they have become now. The major religions during the classical age are Christianity, Judaism, Buddhism, Islam, Hinduism, Jainism, Daoism, and Zoroastrianism. These religions also haveRead MoreI Was Recently Watching A Video On Facebook Of A Woman1800 Words   |  8 Pagesgirl went to battle in defense of her beliefs, because a woman who clearly had never read a lick of Islamic teachings argued the brutality of the young girls people. After watching the video it occurred to me that many times when we think of the Islam culture and religion it is automatically equated with a negative image. I couldn’t help but think is this what the cause of this ban is? Is the Muslim ban just poor journalism and not understanding the Islamic culture? As I read through Aslan s chaptersRead MoreLiving Religions, By Mary Pat Fisher1904 Words   |  8 Pagesalso, comparative description of the major practices an d rituals that undergo in both the Abrahamic and indigenous religions. With the major religions constantly crashing together, the principles and customs of each religion seem to always build similarities each time you study them. This is what occurred to me when i began reading â€Å"Living religions† studying practices and rites. Beginning with the traditional indigenous groups - descendants of the original inhabitants of lands now controlled by largerRead MoreThe Aspect of Religion and Conflict2446 Words   |  10 Pagesones very being. This aspect of religion and conflict is discussed in this essay along with reasons through which conflict rose in the first place. Hinduism and Judaism have both faced interreligious conflicts over the years. We can derive examples of this from the clash between the four castes of the Hindu tradition as well as the clash between the Jews and the Greeks. This paper will aim to show how both these religions have tried to control these conflicts and how their efforts have resulted in changesRead MoreComparisons of Creation Myths Essay2092 Words   |  9 Pagescouple gods working together and all life sprouting from a seed. But all share a common themes, such as a form of chaos or nothingness before life is created. Joseph Campbell notes that â€Å"... the idea of an absolute ontological distinction between God and man – or between gods and men, divinity and nature - first became an important social and psychological force in the near East, specifically Akkad, in the period of the first Semetic Kings, c. 2500 B.C.,† showing another similar trait – a god or set ofRead MoreIs The Cause Really Wor th Fighting For?3566 Words   |  15 PagesNicole Kola Ms.Lagesse AP Eng. Annotated Bibliography 09/04/2015 Is the Cause Really Worth Fighting For? Over the centuries, fervent beliefs have caused many wars. Throughout history, differences between social propaganda have separated and formulated prejudiced ideas about different religions. All across the world, there are people, on all ranks of the social hierarchy, who are being deprived of their rights and are not being heard by their local governments, so they bear up arms and create subversive

Monday, December 9, 2019

Phishing is a Social Engineering

Question: What is the Phishing is a Social Engineering ? Answer : Introduction Phishing is a social engineering activity of luring internet users into using or clicking certain computer links in a site, emails or other web pages sites. The cybercriminal uses this means in order to obtain sensitive information of a target such as passwords, usernames, and credit cards numbers for malicious intentions by pretending to be entrusted entity. For instance, an attacker can perform an email phishing by sending an email that appears to be sent from one of the users bank. The attacker engages trustworthy of the victim by pretending to be that bank. The email may contain an information about some pending account in-activity that the users need to send sensitive details about his account for him to be activated. When the user sends the details, the attacker obtains the bank details and uses to access users bank account. Phishing Techniques Phishing attackers uses the following techniques to attack the victims using below phishing types: (Ramzan, 2010) Spear phishing This is phishing attempt always directed to the target victim where the victim can be an individual, organisation or a company. Attackers gathers sensitive or crucial information that will perfect the attention of the victims when sent to them. This technique is the most successful one. Clone phishing This type of phishing always takes advantage of sent emails that are sent to the recipients. Attackers take advantage of mails that contains attachment or links. The attackers obtains the same mails and edit them and create almost identical mails and send them to the earlier recipient address. The mail contains malicious content but the recipient wont realize whether that the mail has bad intention, they only think that the same sender may be sent an updated mail or sent another mail to counter any loss of delivery. Whaling This type of phishing targets senior executives and senior heads in an organisation or a business. The form or way used to attack takes an executive form in a way that it will capture senior managers or workers attention. The information sent may be in form of a customer complaint form that will lure in the senior manager to open the info or link hence sending sensitive information to the attacker without realisation. Link manipulation The phishers use mails or websites for their targets. They add links to the websites which hold sensitive business activities and embed misspelt urls that appears to be correct if the user is not very keen. The user may click the link and be redirected to an alike webpage comprising almost the same details / information. The user may end up providing login details without realising he has just sent the details to the attacker. Filter evasion Phishers started using images to evade anti-phishing filters where they hide the text behind the image. Although some techniques have been devised to detect phishing texts in images and even when the texts are rotated, the phishers continues to attack various victims of website and email users. Website forgery The phishers enters a website for spoofing. When they get into the site, they make use of JavaScript to lure users to activate some commands while in background they change the address bar without the user noticing. The user may end up being redirected to another web page but with same look like the earlier web page. The user may be prompted to login especially if the web page is a web application and the attacker wants to obtain login credentials of the victim. The attackers always attack sites like bank web application and at once PayPal was once attacked. Covert redirect This is a trick used by attackers that provide links that appear legitimate to the users. The links may be popups that requires users to login to their sensitive accounts while the attackers have used them to capture sensitive details. Phone phishing The attackers uses the voice phishing to attack the victims. The phishers can send a fake message containing sensitive information that will capture victims attention. The message may be framed to have come from a recognised organisation like a bank. Victim may be prompted to enter pin without realising that massage has a fake ID source. Therefore the attacker will obtain users sensitive details and use them for malicious activities. Phishing Success What makes the phishing to become more and more success is due to human nature which is tough to overcome. The phishers are taking advantage of human nature and post information that will always capture victim attention. For instance, the phishers can send a love bug or health advises that has key information to be ignored by the victim. While the technologists are increasingly devising control measures for anti-phishing, the phishers are becoming cleverer. They are using super phishers to hack and spoof information. They can hide the phishing links that goes un-noticed by phishing detectors. The main success of the attackers is how currently they can protect themselves from being noticed. Like earlier days where they could redirect victims using links to fake sites and prompt users to enter some details like the login credentials, currently the victim just clicks the links and activates a background rogue codes that exploit victim computer without user noticing. This may lead to installation of ransom ware into victims computers without victim consent. The phishers also take advantage of users unaware of the victims especially if the victims are not expecting phishers to have interests in their sensitive details. Tools used by phishers Phishers have variety of tools readily available to them that makes their attacks a success. These tools can be used to perform various functions like mail delivery, website spoofing and phishing malware embedment. These are the list of those tools used: Botnets Bots are programs that reside in a computer and provide remote controls through various protocols. When many bots are controlled from one control they make a botnet. Botnets are controlled in way that they can be used to cause an attack to certain computer targets. When a computer becomes a bot, it can be used to send a malicious mail, cause other web browsers users to be redirected into malicious web pages, install additional malware to itself, cause surveillance to other computers sensitive details and more other illicit activities. Bots can be redistributed through file sharing and mailings. Phishing kits The phishers have become more ready through use of readily available kits which contains set of equipment that can be used perform an attack. The kit contains set of ready bots, hosting domains that have assurance of not been closed off or detected (Roberts, 2004), list of servers which can be targeted and more so famous sites and organisation details that an attacker can use to attack. In current days, the developers of these kits dont sell them, in fact they spend time in advancing these bots and making newer versions of bots that can be downloaded by interested phishers for free (Sophos, 2000). The technology needed to perform an attack has been made readily available by the kit providers hence more attacks are continuing to happen Technical deceit As the internet users have become more aware of the detection of phishing codes and links, the attackers have engaged in more tricky ways of performing their attacks. They make counterfeit websites that cannot be noticed by the internet users while redirecting. Session hijack Phishers have been waiting for internet users to log in to web applications and become men in the middle. They capture ones IP address and fake Mac address and pretend to be the original owner of the authentication credentials. They do this until they capture all sensitive details that will help them perform a fraudulent attack without users prior knowledge since they forward the messaging signals to the server on behalf of the owner. They act as the first destination of senders signal and as the first receivers of servers signals been sent to the user. Abuse of Domain Name Service (DNS) Phishers have using the domain name service exploits where they pretend to be the said url name while the IP address of the address is fake. They do this to gain users trust without users prior knowledge. Phishing specialized malware Technologists have made bots that readily are available to the phishers. These malwares are designed for spying and illicit operations between the affected computers. The bots can be used for spying in a certain computers details and even send those details to the main control and obtain sensitive data for malicious gain. Organisation Concerns As the phishing has become more and more successful and affecting organization to negativity through spear phishing, the organizations are concerned more on how to counter the attackers. Spear phishing has been used to perform large cyber-attacks leading to large money loss in organizations. The spear phishing has impacted negatively to the affected organizations. For instance, most of those organization reported to have been attacked, they have experienced: Big money loss Decrease in stock sales For those two main losses, the attackers used malwares to obtain authentication details and obtained organisation sensitive information. The attackers have been using emails to counter victims trust. The attackers always targets the finance and IT staff who always hold sensitive details about money or authentication credentials for an organisation. The main negative impacts of phishing to an organisation are as follows: (Van der Merwe, 2005) Decreased employees productivity Financial losses Organisation reputation damage Decreased stock prices The organisation has used various technologies to prevent themselves from phishers. The techniques they use are: Secure email gateway Secure web pages gateway Url filtering Data leaking protection file solution sandboxing Current and Future Trends of Phishing Currently phishing is becoming more and more prone affecting many organization leading to losses. The phishers are cleverer than before. They have devised phishing techniques that cannot be easily noticed. The phishers have taken advantage of human nature in a way they easily afford human attention by gaining their trust. The phishers are forging sites and e-commerce accounts in a way that site users are hard to realise that the sites are spoofed. As the technology advances, the phishers are devising more and more tricky spams which are hard to be detected by anti-phishing software. The speed at which hackers are devising new phishing techniques is super-exceeding the technology used to make new phishing control measures. (APWG, 2004) The future of phishing is to hack many sites, banks and e-commerce sites without any complexity. This will lead to collapse of businesses if technologists dont speed up their techniques of devising control measures. Phishing has taken advantage of research survey where the internet users can be tricked to fill some phone or bank details so as to capture victim sensitive information. Other phishers are using trick games which always appear as a pop up where the victim is deceived to have won a gift but at the end the victim is issuing his authentication details pertaining a bank or other financial institution like the master cards. The following key points goes with the current trends in phishing: Social engineering components Phishers are using social engineering techniques to trick the internet users to click a link and activate malicious codes by finding vulnerabilities. The attackers embed the codes in emails and websites that are common to the users and which contains sensitive information especially details of banks and e-commerce. The phishers make the codes in a way that it is hard to be noticed by the victims. This codes when activated, they run in background of victims computer and performs spying activities which can capture users usernames and passwords in the browsers and emails. Common tools and infrastructure Phishers has been using common infrastructure to attack the internet users. They use websites, bot nets and mails to host phishing sites and malicious software. The big idea The main trend now is that the websites hosting companies are ensuring the clients websites have been configured with anti-phishing technologies to prevent phishers from spoofing. As well the law and the government should ensure that the criminals and hosting companies of phishing sites are taken into courts and be prosecuted for committing this kinds of crimes Phishing Control and Avoidance For phishing control in organisations, the staff should be warned, made aware, trained and be given reinforcing messages in day to day to counter attackers techniques. (Ramzan, 2010) Awareness and education Even though awareness is not enough, the web pages and other sites should be incorporated with anti-phishing programs that can detect phishing links and remove them immediately. In addition, the organization can filter phishing emails or web pages in a network before reaching to the staff. The best phishing defensive mechanism is: If any link is sent to your email and the link is requesting you to send your login credentials, ignore the mail as a spam. If the mail sent is suspected to be a scam, just read the mail between the lines and dont click any link in that mail. You can inspect the link by typing in into your browser and see what that link contains but dont click it in your email. Strong authentication practices Two factor authentication can be used to provide users with a hardware token that keep on changing after every logins. The attacker wont be able to use the credentials since the details keeps on changing. Virus, spyware and spam prevention Anti-malware have been implemented to prevent users against suspicious codes used by the phishers. These products are always enabled and updated to provide maximum protection. Targeting hosting sites The law can be used to suppress the hosting sites sending phishing mails or codes and hence be shut down. The practice should be done previously as the phishers keep on devising new hosting sites. Recommendation Though there has been techniques and measures used to counter phishing, the technology should be improved to counter the phishing to zero tolerance. The measures that can be recommended is: Continued awareness and education to the public and staff on issues pertaining the phishers and new techniques used by the phishers. The organisation should have a foresight of their sites or emails about an information that might be at risk. This helps to counter any vulnerability by the phishers to attack the sites. Conclusion Since phishing is profitable activities to the attackers, the phishers are becoming more and more intelligent in using technology for their profit gains. Organisation should involve themselves in creating awareness to their staff and public to counter the phishers. New and advanced technologies are been devised to keep off the phishers. Phishers can lead to an organisation collapse. References Ramzan, zulfikar. Phishing attacks and countermeasures. In stamp, Mark Stavroulakis, Peter. Handbook of information and communication Security. 2010, Springer ISBN 9783642041174 Van der Merwe, A.J, Loock, M, Dabrowski, M. (2005), Characteristics and Responsibilities involved in a Phishing Attack, Winter International involved in a Phishing Attack, Winter Symposium on Information and Communication Technologies, January 2005, Cape Town. Anti-Phishing Working Group. Phishing Activity Trends Report, March, 2017.https://www.antiphishing.org/APWG_Phishing_Activity_Report-March2017.pdf Anti-Phishing Working Group. Phishing Activity Trends Report, March 2017. Retrieved 3March 30, 2017 from https://antiphishing.org/APWG_Phishing_Activity_Report_April_2005.pdf McWilliams, Brian. Cloaking Device Made for Spammers. Retrieved March 30, 2017 from https://www.wired.com/news/business/0,1367,60747,00.html. Do-it-yourself phishing kits found on the internet, reveals Sophos. Retrieved March 30, 2017 from https://www.sophos.com/spaminfo/articles/diyphishing.html.

Sunday, December 1, 2019

Social Stratification Essays - Social Classes, Social Inequality

Jenna Compton Reaction Paper Sociology 101 Social stratification is how we rank people in society according totheir wealth, education, occupation and income. I believe we are categorized into different classes such as upper class, middle class, upper middle class, lower middle class, and lower class. In my society we can achieve a status, by getting a degree or working hard to move up in a position. In my Life I see social stratification within my family. Firstly,there are two incomes in by family, my father and my mother thus putting us in a higher position or rank.Often I see friends who come from single parent households andthey don?t have as much as I do. I would consider my friend?s lower-middle class and I upper middle class. Secondly, my parent?s as individuals both have high income which is also a way to designate social stratification. My boyfriend has one parent and he is one outof four children which makes money tighter However, in my familythere are only two children whic h makes more money to go around. I also see indicationsof social stratification in education because it effects your occupation and income. I am lucky enough that my family has enough money to send me to college, yetthere are friendsof mine who are even luckier than me who can afford private schools such as, Harvard, being able to afford this most likely putsthem in a higher classthen me. I believethere to be positive correlation between education and money Peopleoften will notice membersof a higher social stratification seem to have similar behaviors. Higher social classes have higher standardsof living. I see this when people come into eat at my restaurant, people who are rich act differently thanthe people who are middle class. Social stratification is categorized into many different groups. Stratification isoften determined by income, wealth, occupation and education. In today?s society we can achieve status by putting efforts into a job or special schooling, such as college. Ev eryday people can view distinctions between upper, middle and, lower class.

Tuesday, November 26, 2019

SBMA organization essays

SBMA organization essays The organization of the Subic Bay Metropolitan Authority (SBMA) was changed several times since it was established in 1992. During the period of 1992 to 1998, the organization exhibit exceptional control features something that the present leadership consciously slowly decentralized during the period of 1998 to 2002. In the same period, SBMA re-organized its structure twice with the second consisting of minor changes as recommended by the Civil Service Commission (CSC) and the Department of Budget and Management (DBM). However, in its effort to share functions, particularly the operations functions, additional layers of administrative levels were added making the complex, even more complex. All the three SBMA organizations had several note worthy features; 1.) the authority of the chairman of the board and the administrator is vested in one person; 2.) several departments reports directly to the chairman and administrator; 3.) there is a layer that separates the administrator and his deputy administrator. In the 1992 organization, this was the chief operating officer (COO) and in the present set-up, three senior deputy administrators replaced the COO; 4.) the administrative groups are a cross mixture of related and non-related departments. In one group, it is typical to have a regulatory department and staff function office; and lastly, in actual operations, some department and divisions do not follow the chain of command. During the 2001 strategic planning session, I had the chance to review in depth the SBMA organization. The objective of the review is to prepare the organization to meet the current conditions and prepare a recommendation should it be necessary. The review opened up many challenges and issues related to the way the organization was structured and organized. We realized that the organization required a thorough organizational development including the restructuring of the div ...

Saturday, November 23, 2019

Measure Words in Mandarin Chinese

Measure Words in Mandarin Chinese Measure words are very important in Chinese grammar as they are needed before every noun. There are more than a hundred Mandarin Chinese measure words, and the only way to learn them is by memorizing them. Whenever you learn a new noun, you should also learn its measure word. Here is a list of the most commonly used measure words in Chinese to kick start your growing vocabulary. What Is a Measure Word? Measure words are familiar to English-speakers as a way to classify the type of object being discussed. For example, you would say a â€Å"loaf† of bread or a â€Å"stick† of gum. Mandarin Chinese also uses measure words for types of objects, but there are many more measure in Chinese. Measure words in Chinese can refer to the shape of the object, the type of container it comes in, or are simply arbitrary. The main difference between English (and other Western languages) and Mandarin Chinese is that Mandarin Chinese requires a measure word for every noun. In English we can say, â€Å"three cars,† but in Mandarin Chinese, we need to say â€Å"three (measure word) cars.† For example, the measure word for car is  Ã¨ ¼â€º (traditional form) / è ¾â€  (simplified form) and the character for ​car is è »Å  / è ½ ¦. Thus, you would say  Ã¦Ë†â€˜Ã¦Å"‰ä ¸â€°Ã¨ ¼â€ºÃ¨ »Å  / 我æÅ"‰ä ¸â€°Ã¨ ¾â€ Ã¨ ½ ¦, which translates to I have three cars. Generic Measure Word There is one â€Å"generic† measure word which can be used when the actual measure word is not known. The measure word 個 / ä ¸ ª (gà ¨) is a measure word for people, but it is frequently used for many types of things. The generic measure word can be used when referring to items like apples, bread, and light bulbs even when there are other, more appropriate measure words for these objects. Common Measure Words Here are some of the most common measure words encountered by students of Mandarin Chinese. Class Measure Word (pinyin) Measure word (traditional Chinese Characters) Measure word (simplified Chinese Characters) People g or wi or or Books bn Vehicles ling Portions fn flat objects (tables, paper) zhng Long round objects (pens, pencils) zh Letters and Mail fng Rooms jin Clothing Jin or to or or Written Sentences j Trees k Bottles png periodicals q Doors and windows shn Buildings dng Heavy objects (machines and appliances) ti

Thursday, November 21, 2019

Group project analysis Assignment Example | Topics and Well Written Essays - 750 words

Group project analysis - Assignment Example In this case, a group is treated as a single student regardless of the gender, age of ethnicity of the members forming it. This reflection paper explores the latest group assignment we deed establishing the dynamic involved with group as well as key issues. The group I belonged was made up of five members including myself working toward a common goal of completing the class assignment on time and at the highest quality level possible. Because the mark scored by the group was to appear on the result slip of the respective members of the group, it was expected that the contribution of members would equal to each other. Second, there was expected to be effective mutual communication between the members to enable them integrate the individual work into group work before submission to the lecture for marking as the lecturer had specified beforehand that piecemeal work was completely unacceptable. Third, there was expected for members not only to complete the assignment but also to learn new ideas from their interaction in the group to enable them grow their knowledge base as well as their skills in team/group work. Although the ultimate goal of submitting the assignment on time was achieved, the final score deviated from the expected score (95% instead of 100%) because of several challenges faced. Contrary to the prior expectation of equal contribution from members involved, only three members significantly contributed to the final document of the assignment. This does not mean that the two members did not contribute, they contributed but at a smaller percentage compared to the three most active members. This reminded me of the influence of personal factors such as behavior and attitudes on contribution in group or team work (Ramayah et al, 2003) considering other factors constant; same lessons timetable and same goal of excelling in our

Tuesday, November 19, 2019

Supreme Court Essay Example | Topics and Well Written Essays - 500 words - 1

Supreme Court - Essay Example The problem, however, appears to lie in whether the children are given the appropriate moral guidance by their parental figures. Perhaps Vermont is too complacent in their viewpoints that children will naturally evolve into moral adults, thus there is no emphasis given in this aspect of guiding juvenile behaviors. This may have to do with the social class of the Vermont citizens, who are mostly middle- to upper-class who may just instinctively believe that these violent crimes simply could not be committed by their well-to-do sons and daughters. Powers describes the ease of acquiring heroin in the state, which may also contribute to the violent crime ratios and is associated with social class status, as these well-to-do youths can easily afford the drug prices. The team appears to have mixed thoughts about whether the juvenile should be given the death sentence, highlighting the strong division in the country about what to do with juvenile violent crime offenders. It appears that Powers believes that many of the failures of todays children in these affluent neighborhoods stems from parental complacency and an inability to address that violence and teenage angst occurs routinely regardless of their state of origin. Powers, it appears, believes that most of the fault lies with those who are in charge for their failures in molding positive childhood behaviors. In reference, specifically, to the New Hampshire murders, it seems that Powers is linking their murderous intentions with failure of parents to recognize the difficulties (and respond to them correctly) facing children of these teenage years. It does not appear that Powers considers the death penalty as the proper course of action, rather counseling and parental involvement is the best method. Powers points out that small towns, like any other city, maintains their fair share of juvenile-related crime, suggesting

Sunday, November 17, 2019

Management Hence Essay Example for Free

Management Hence Essay It was a win-win proposition for both HS3C and 01B to merge to draw synergies from the strength of both, HSBCS technology, global reach and product innovation and Olds domestic reach and strong customer base. Under the terms of the merger, HSBC Middle East will inject an additional capital of US $97 4m into HSBC Oman and in turn, 01B issued to HSBC new shares equivalent to 51 per cent ot the shareholding In the combined entity. Though there were synergies end the merger provided gains, there were certdln challenges. The organisational culture, customer profile, business segment, banking products and technology in place were totally different. All these require adoption of suitable change customers and 10,000 corporate clients of more than 80 branches under one unified anking platform and connecting more than 140 ATMs to the OmanNet National Switch Network were completed by the bank well ahead of its scheduled target. In addition, issue of fresh ATM/Debit cards to ex-OIB customers were achieved in record time. HSBC Bank Oman also made changes in the business process by making a number of lending policy changes to benefit its customers, rolled out complimentary life insurance on personal loans, launched receivables finance besides providing value added services like on-the-ground payments and cash management roposition to strengthen clients coverage capabilities. (wrww. hsbc. co. om) Change of management style: The bank successfully manages the changes required in technology, business practices and physical infrastructure. However, the biggest challenge for the bank will be integrating the workforce and bringing across a uniform Organisational Culture. Towards this aim and in line with the National Objectives to retain all the 1300 people of both banks, HSBC trained ex-OIB staff to new working culture and banking products of HSBC group. Unlike other challenges, this one will be difficult to uantify and could be gauged only by the success of the merged entity in terms of its market share and financial performance. Conclusions: Though the bank has achieved significant progress in initial challenges like technological and organisational integration, the impact on its business can be gauged only after looking at the financial results of the bank and its market share in 2013 and 2014. However, with a newly expanded team, diverse geographical network and growing customer base, the business opportunities for HSBC Bank Oman are significant. No doubt the merger creates an opportunity for the bank to drive growth n Oman and thereby having a strong presence in the Gulf and demonstrate its commitment.

Thursday, November 14, 2019

Experience in the Workplace :: Language Communication Essays

Experience in the Workplace During the many years of working in the IT (Information Technologies) field, I have dealt with hundreds of people from all over the world, from as far as Asia, to as close as Detroit, and although all the people I have dealt with can speak English to a certain degree, most have what Amy Tan, writer of â€Å"Mother Tongue† would call â€Å"Broken English†. By this meaning, the words they use are the primary words of a sentence that just barely make the sentence itself understandable. To make matters worse, most of those people I deal with are overseas, so the only way of voice communication is the telephone. Even when speaking with friends just across town that have been brought up the same as I, and speak the same â€Å"tongue† as I, there is problems understanding one another because of the phone devices themselves – sometimes having static in the line, the call just breaking up, and even sometimes calls being dropped in the middle of a thought. Now, you put into account all of these factors, then make a business call to someone overseas who speaks with â€Å"Broken English†, and there is defiantly going to be a bit of frustration, trying to understand one another†¦ This applies to people on both ends of the call! Now, when it comes to matters like this and dealing with business, I must agree with Thomas Bray, writer of â€Å"Memorial Day and Multiculturalism†, when he states â€Å"Bilingual education is a bad idea.† I refer to this meaning, if everyone was taught and brought up speaking one language, then doing business matters overseas over the phone would be much easier, because it would be easier to understand one another, in my opinion. There have even been some instances where after dealing with someone on the phone overseas for quite awhile and not being able to get much accomplished, I’ll ask if there is any chance that I can to speak to someone with better English, kind of like the instance where Amani Ammari, a classmate of mine, had to speak for her mother because her mother only had â€Å"Limited English† as Amani stated in one of our discussions online. To now turn this into a complete opposite direction, I agree with Maxine Hairston, writer of "Diversity, Ideology, and Teaching Writing" and all of her ideas on have classrooms being multicultural.

Tuesday, November 12, 2019

Asia & Australia in World Affairs Essay

In as much as the unsuccessful Taiping Rebellion of 1850 played a significant role in ending China’s isolationist outlook, it also paralleled the socialist ideals put forth by Marx and Engels in the Communist Manifesto of 1848 to manifest itself in the communist seizure of power in China in the 20th century Student: Ben McCosker Teacher: Mr Hart Due Date: Thursday 24 March 2005 Against the backdrop of a passive and inflexible Chinese state devastated by the foreign incursions of the 1840 Opium War, the Taiping emerged to overthrow the Confucian Qing Dynasty and establish an egalitarian community based on the quasi-Christian beliefs of its leader, Hong Xiuquan. In their struggle to â€Å"adopt institutions of equality and communism† (Newsinger, J, 2000), Hong and his followers paved the way for the formation of the People’s Republic of China in October 1949 by tapping into the passionate anti-Manchu nationalism among the peasantry. In as much as the unsuccessful Taiping rebellion of 1850 played a significant role in ending China’s isolationist outlook, it also paralleled the socialist ideals put forth by Marx and Engels in the Communist Manifesto of 1848 to manifest itself in the communist seizure of power in China in the 20th century. While Hong’s dream for a ‘Kingdom of Heavenly Peace’ was not brought to fruition in his lifetime, his recognition and attacks upon dynastical weakness awakened an oppressed nation to rebellion and served as the catalyst for social and political reform in the 20th century. On the eve of the communist seizure of power in China, Mao Zedong spoke of the tireless efforts of Chinese reformists, including the Taiping, when he said that â€Å"I have witnessed the tremendous energy of the masses. On this foundation it is possible to accomplish any task whatsoever†. This essay will investigate the interconnection between the Taiping Rebellion of 1850 and the communist seizure of power in the 20th century against the backdrop of their shared socialist underpinnings. The exploitation of the peasant class and unerring belief in China as ‘Zhongguo’, or the centre of existence, were the main criticisms that Hong held of the feudalist Qing dynasty, led by Dao Guan. Hong disapproved of the Chinese system of reform, which historically had encompassed a series of deteriorations and restorations of dynastic houses with the aim of perfecting systems of the past rather than instituting true change. As an unsuccessful scholar of the civil service, Hong came under the influence of Christian missionaries and after suffering from an intense fever in which he claimed to have been visited by God, he proclaimed himself as â€Å"God’s Chinese Son† and declared a mission against the Confucian ideals and incompetent rule of the Qing Dynasty. In the context of 19th century China, where revolt was endemic and hatred for the gentry class was widespread among the peasant population, Hong’s call for revolution quickly gathered support. When rallying for the defeat of the Manchus, Hong would preach his distorted version of Christianity; â€Å"I have received the immediate command from God in his presence; the will of Heaven rests with me† (Xiuquan, H, 1850, quoted in Spence, 1996, p.67). Discontent with the unequal treaties and proliferation of Western activities among some sections of Chinese society, Hong and his Taiping rebels questioned not only traditional Confucian principles, but also the right of foreigners to rule, highlighting the powerful anti-Manchu theocracy that underpinned the revolution and encouraging the recognition of Chinese superiority. Spreading through the eastern valley of the Chang River, the Taiping movement captured Nanjing in 1853, before undergoing reform at the hands of Hong Rengan in 1859. Rengan understood the problems of Chinese society far more profoundly than his contemporaries and played a vital role in bringing Hong Xiuquan’s original ideas to maturity. Under Rengan, the Taiping continued to dominate the Qing resistance, capturing the port of Ningpo in 1862, until the death of Hong in 1864 and the resulting fragmentation of Taiping units. Although a technical failure, the Taiping rebellion played an integral role in changing the way Chinese government functioned. Under the Manchu government, as one poor peasant woman argues, â€Å"we were vulnerable and exploited†¦our anger was a cause of our government’s lack of power and increase in corruption† (Kong, H, 1870). With the rise and fall of the Taiping Rebellion, China was forced to adopt a broader and less centralised world view and relax its foreign policy, thereby ending the reign of the indolent and corrupt nobility of the Qing Dynasty. The egalitarian aspirations of the Taiping closely mirrored the ideals expressed by Karl Marx and Fredrick Engels in their publication â€Å"The Communist Manifesto†. Marx and Engel’s seminal work also formed the ideological foundation for the communist seizure of power in 1949, clearly identifying the Taiping rebellion as the antecedent to the Chinese communist state. Marx began the Communist Manifesto with the words â€Å"A spectre is haunting Europe–the spectre of Communism†; little did he know that less than two years after writing these words, this ‘spectre of Communism’ would be spreading ferociously across the Chinese mainland. With the capture of Nanjing in 1853, Hong and his followers built an autonomous state based on the principles of laissez faire, supported by the twin pillars of communalism (essentially a debased form of communism) and equality. This doctrine of ‘communalism’ involved the appropriation of all private property by the Taipings and its redistribution among the Chinese based on their needs, a concept that emerged in both the Communist Manifesto and the communist seizure of power almost a century later. Although it is almost certain that the Taiping rebels were oblivious to the socialist movement in the Western world, the similarities between the rebellion and the struggles of the proletariat in Europe are unmistakeable and are representative of the self-development of the Chinese people, culminating in the Communist seizure of power in 1949. The communist seizure of power in 1949 was not in itself the embryonic Chinese interpretation of European socialism it was perceived to be, but rather a fulfilment of the ideals espoused by the proto-communist Taiping rebels almost a century earlier. When viewed objectively, the Heavenly Kingdom of the Taipings is not so distant from the classless egalitarianism that Mao Zedong instituted on 1 October 1949 with the seizure of power by the Chinese Communist Party. Indeed, the doctrinal pillars upon which Hong built his Heavenly Kingdom have been described as â€Å"a primitive form of communism† (Hooker, R, 1986) and some have gone as far as to say that â€Å"the communist revolution may have been but a realisation of an underground movement in China [The Taiping Rebellion] which began in the mid eighteen-hundreds† (Ny, G, 1991). Like the Taiping Rebellion, the communist seizure of power was an example of western ideals being adapted to the Chinese condition and similarly , both revolutions started in the agrarian centres of the South before moving north towards the political epicentre of the Chinese state, Beijing (Peking). Both revolutions shared common egalitarian elements, the most notable of which was the immersion of women into society as the social and economic equals of men. Under Hong’s leadership, all members of Taiping society were seen as â€Å"brothers† and â€Å"sisters†, which both established equality among the sexes and discouraged the formation of relationships among those with administrative positions. This was a radical departure from the traditional Confucian philosophy promoted by the Qing Dynasty, which preached women’s inferiority and subservient role to men. Indeed, under the Manchu government, the practice of foot binding was still widespread, as women had to bind their feet to be eligible for marriage in the eyes of the law. Like the Taiping rebels, the Chinese Communist Party realised that the liberation of women was integral to the true emancipation of the country as an egalitarian nation; so in a parallel for the Fun Yu-Lan, or ‘rules of the Heavenly Kingdom’ laid down by Hong Rengan, the communist government enacted legislation that revolved around the protection of women including the Chinese Marriage Law of 1950 and the Labour Insurance Regulations Law of 1951. In their contextualisation of Western theologies, both the Taiping Rebellion and the communist seizure of power banished the traditional androcentric beliefs of their preceding governments, instituting systems of equality in their place. Sun Yat-Sen’s ‘Three People’s Principles’, as published in the Guomindang Manifesto of 1924, itself a forerunner to the ideals of the CCP, reflect the original motives of the Taiping rebels; increased power for the people (democracy), equality among the citizenry (people’s livelihood) and the development of a national identity for China (nationalism). The shared social institutions and egalitarian precepts of both uprisings serve only to illustrate the fact that the Taiping Rebellion of 1850 was the philosophical forerunner to the Communist seizure of power in the 20th century. While the Taiping philosophy was sound in itself, a combination of inadequate military strategy, diplomatic incompetence, ideological inconsistencies and insufficient resources condemned the rebellion to failure while its latter-day counterpart, the Chinese Communist Party, thrived due to more consistent and efficient management. The very basis of the Taiping movement, Hong’s distorted version of Christianity, detracted from the authenticity of the rebellion in the eyes of foreign onlookers, which meant that the Taiping were unable to forge valuable alliances with more conventional Christian powers in the west. This oversight had fatal implications in the summer of 1864, when the Taiping looked to foreigners for support, but encountered the opposition of Westerners opposed to Hong’s bastardised version of Christianity. Mao Zedong, Li Dazhao and the other leaders of the CCP had the benefit of viewing revolutionary precedent through the failure of the Taiping Rebellion, t hus it can be seen that the ‘lessons’ of the Taiping were able to be applied to CCP strategy, lessons which resulted in Mao’s inclusion of peasants against the Marxist model and drive for agrarian revolution over urban uprising. Both conflicts arose from a strong desire from the proletariat for social and political reform, but it was the Chinese Communist Party that most effectively gathered the people’s support, while largely avoiding the corruption and poor foreign policy that plagued the Taipings. While the Chinese Communist Party remained a tightly-networked organisation in its struggle for power, the Taiping force was split into various factions before capturing Nanjing in 1852, which had the two-fold consequence of denying the rebels the opportunity to conquer Shanghai and also foregoing the continued pursuit of the Manchus after capturing Nanjing, which, as Larlee argues, â€Å"proved to be a fatal flaw in the rebellion† (Larlee, D, 2000). The failure to adequately support the Northern Expedition of 1852 resulted in Western Powers, already antagonised by the suppression of opium from Taiping-controlled China, to forge allegiances with the Qing Dynasty, a movement which ultimately ended t he Taiping rebellion. Like its communist progeny in the 20th century, concubinage amongst leaders was prevalent in the upper echelons of the Taiping leadership, which invoked doubt in the peoples’ minds over the capacity of the rebels to institute true change. Finally, in 1860, intervention by foreign powers came in the form of a British Envoy led by Frederick Bruce, who supported Prince Gong (the leader of the opposing Manchu government) in his quest to â€Å"purge the country of the sinful rebels† (Poon, 2000). After the death of over 25 million Chinese citizens (McEvedy, 1978) and the devastation of 16 provinces, The Taiping Rebellion was finally suppressed in 1864, ending 16 years of reform but paving the way for the Communist Seizure of Power in the 20th century. Philosophically, the Taiping Rebellion of 1850 and the Communist Seizure of Power in the 20th century shared remarkable similarity in their egalitarian goals and quest to overthrow oppressive rule. Both were born out of a socioeconomic situation of deprivation and shame, with drought, famine, and overt foreign influence common to both uprisings. The Rebellion cannot be judged objectively on its failure as a revolution alone, as its primitive implementation of socialist ideals and reformation of China’s isolationist outlook manifested itself in the communist seizure of power 100 years later. Its failure to institute permanent reform reflected not only the ideological flaws of Hong and his followers, but also the society’s resistance to change, a result of hundreds of years of dynastical rule. As â€Å"one of the early tremors of a communist earthquake† (Franz, M, 1999), the Taiping rebellion played an integral role in the Communist seizure of power in the 20th century. Bibliography Charles, G, 2001, Taiping Rebellion[ONLINE], Available from: URL: http://www.lcsc.edu/modernchina/u3s1p3.htm (accessed 4/3/05) Childs, R, 1987, Leading the Chinese Revolution, The MacMillan Company Ltd, Wellington China, Microsoft Encarta Online Encyclopaedia, 2005, http://encarta.msn.com Cohen, J, 2004, Reader’s Companion to Military History – Taiping Rebellion[ONLINE], Available from: URL: http://college.hmco.com/history/readerscomp/mil/html/mh_051600_taipingrebellion.htm (accessed 22/2/05) Diagonal Media Group, 2003, Hong Xiuquan – Wikipedia, the Free Encyclopaedia[ONLINE], Available from: URL: http://www.phatnav.com/wiki/index.php?title:Hong_Xiuquan (accessed 16/2/05) Dowling, M, 2002, The Electronic Passport to the Taiping Rebellion[ONLINE], Available from: URL: http://www.mrdowling.com/613taiping.html (accessed 4/3/05) Garcia, S, Bart, C & Hart, S, 2005, History[ONLINE], Available from: URL: http://samaratx.tripod.com/id6.htm (accessed 5/3/05) Heng, X, 1997, The Changing Role and Status of Women in China[ONLINE], Available from: URL: http://www.1990institute.org/publications/pubs/ISUPAP8.html (accessed 4/3/05) Hooker, R, 1996, Ch’ing China : The Taiping Rebellion[ONLINE], Available from: URL: www.esu.edu:8080/~dee/CHING/TAIPING.htm (accessed 3/3/05) Larlee, D, 2000, The Taiping Rebellion[ONLINE], Available from: URL: http://mutton.editthispage.com/stories/storyreader$18 accessed 22/2/05) Maher, J, 2001, China’s Confession[ONLINE], Available from: URL: www.chinasoul.com/e/e-wk/episode4.htm (accessed 4/3/05) Meisher, M, 1999, Mao’s China and After – A History of the People’s Republic. The Free Press, New York Ny, G, 1991, The Indian Mutiny and the Taiping Rebellion : Armed Conflicts Against Change, Washington University Press, St. Louis Poon, L, 2000, East and South East Asia on the Eve of European Expansion from the late 18th Century to 1860 : An Introductory Survey[ONLINE], Available from: URL: http://homepage.mac.com/stray/ib/history/historyHLregional/option.pdf (accessed 4/3/05) Reilly, J, 1997, God’s Chinese Son[ONLINE], Available from: URL: http://pages.prodigy.net/aesir/gcs.htm (accessed 5/3/05) Revision Notes UK, 2005, Effects of the Taiping Rebellion[ONLINE], Available from: URL: http://www.revision-notes.co.uk/revision/815.html (accessed 4/3/05) Rius et. al. 1980, Mao for Beginners, Writery and Readery, London Seiler, M, 1997, The Taiping Rebellion – The Destruction of the Chinese Culture[ONLINE], Available from: URL: http://sun.menloschool.org/~sportman/westernstudies/second/24/gblock/matts (accessed 3/3/05) Spence, J, God’s Chinese Son, Norton, New York

Saturday, November 9, 2019

Gothic art Essay

n 1250, the European art was totally transformed in what today we call Gothic art. This architectural style has three periods: The transition from Romanesque to Gothic from the 12th and 13th centuries, the height of its period in the 13th and 14th centuries, and the fall or decadence in the 15th and 16th centuries. Of these, the period that maybe the most difficult to understand is the transition period. First, the Gothic style is like a continuation of the Romanesque. This causes confusion when you want to distinguish the end of Romanesque and the start of the Gothic period. Second, many monuments have important characteristics of both styles. Therefore, many of these monuments do not have their own style, and certain conflicts exist about what style is really being used. The architecture used is what best defines Gothic, by this is what starts the movement. The two basic elements of the architecture are the pointed arches and the vaults made of many pointed arches. If Romanesque art is a classic art, the Gothic for me would be considered an extravagant, passionate, and romantic art. For that reason I believe that it is one of the favorites in the 19th century. The Gothic architecture is much more complicated than the Romanesque, this is probably because the period was full of religious competition and very fine materials. The kings and many important people had fortunes, the people started to get out of their misery and develop strong groups, and this richness and power made the Gothic art happen. Gothic art as resulting of the medieval period starts to use the art of architecture, paintings, and sculptures trying to accomplish the religious values. The cathedrals become the new stone evangelists, who tell stories with paintings, statues and scenes in stained glass windows from the life of Christ, the Virgin, the Saints and the Old Testament. The people, most of the times have a tendency to enjoy the familiar things that they have and see in their life. In the 13th century the most familiar was the Romanesque, and for that the Gothic style was identified as savage and barbaric. The beauty of this style wasn’t really discovered until the end of the 18th century. The Gothic style uses the ideas of the Romans, for example the arch, they are now made to be structurally perfect so they last longer and have more strength. This is done by having done a pointed arch that made it easier for the construction of tall cathedrals, with its towers that look more like skyscrapers. Although the pointed arch is seen by many people as very beautiful, its function was not so much for to please the eye, but more to be structurally necessary. In addition to the pointed arches, the columns also helped support these immense Gothic cathedrals. The Gothic cathedrals were the tallest monuments that were ever constructed, and this fact began a type of competition in Europe. Many described these cathedrals like medieval miracles, and between 1050 and 1350, 80 cathedrals from this style were constructed. It seemed that every king wanted his kingdom with the highest cathedral, and they built immense cathedrals that ended up collapsing to the ground. This obsession resulted in the building of many useless cathedrals that had no use. The Gothic style is also very famous for its stained glass windows. These large windows also had the shape of the pointed arch, and allowed a lot of light to enter the cathedral. The stained glass windows were a very different site to those who were used to the smaller windows from the Romanesque style. These were decorated with biblical stories and with other daily life stories. Another type of typical Gothic windows was the round ones. These round windows are located above of the main door in the fai ade of these cathedrals. Another difference to the simplicity of the Romanesque style is the large quantity of decoration that the Gothic style has. The fai ade of the cathedrals are full with sculpture that many describe it as extravagant for its great detailed work. The towers also have detailed sculpture that cannot be appreciated because it is not within the reach to see it with your eyes. The reason that they put the sculpture on the towers was as they believed that God can see them and enjoy them. I chose this style of art because I always thought of Gothic art as being dark, many dragons, crosses and mythical creatures. I guess how TV sometimes portrays â€Å"Gothic† is probably something else but when we went through it in class and after watching all the pictures in books, reading the history and looking at some webpage’s it was really interesting and now I have a different view of Gothic art and its architectural monuments. I will be also majoring in architecture and by looking at all these monuments and very little or no technology back then, I really respect the architects and workers who build these immense cathedrals that are still standing for everyone to appreciate them.

Thursday, November 7, 2019

Public Health and Page Ref Essays

Public Health and Page Ref Essays Public Health and Page Ref Paper Public Health and Page Ref Paper Access to Health, 13e (Donatelle) Chapter 1 Accessing Your Health 1) Which of the following individual choices has a major effect on both current health and projected life expectancy? A) Genetic tendency toward obesity. B) Pollution C) Level of education D) Smoking Answer: D Diff: 2 Page Ref: 3 Skill: Analyzing 2) The medical model of health would most likely focus on which of the following? A) Controlling air and water pollution B) Lifestyle interventions to prevent chronic diseases C) Treating bacterial infections with antibiotics D) Serving marginalized populations Answer: C Diff: 2 Page Ref: 6 Skill: Understanding 3) The number of years a person is anticipated to live based on conditions at the time of birth is A) life expectancy. B) population control. C) mortality. D) morbidity. Answer: A Diff: 2 Page Ref: 4 Skill: Understanding 4) Which of the following were cited by college students in a national survey as major impediments to performing well academically? A) Pressure from parents and family members B) Stress, anxiety, and sleep difficulties C) Repeated strep infections D) Carrying a too-heavy course load Answer: B Diff: 1 Page Ref: 3 Skill: Understanding/Analyzing 1 Copyright  © 2014 Pearson Education, Inc. 5) What is the leading cause of death in the United States across all age groups? A) Heart disease B) Cancer C) Cerebrovascular disease D) Unintentional injuries Answer: A Diff: 1 Page Ref: 4 Skill: Understanding 6) Which of the following describes the rate of deaths within a certain population? A) Prevalence B) Life expectancy C) Mortality D) Morbidity Answer: C Diff: 2 Page Ref: 4 Skill: Understanding 7) Heart disease, cancer, and diabetes are examples of A) chronic disease. B) hereditary disease. C) communicable disease. D) acute disease. Answer: A Diff: 1 Page Ref: 4 Skill: Remembering 8) SINCE THE EARLY 20TH CENTURY, THE LIFE EXPECTANCY OF AMERICANS HAS A) increased by more than 10 years. B) increased by more than 20 years. C) increased by more than 30 years. D) increased by more than 40 years. Answer: C Diff: 2 Page Ref: 4 Skill: Understanding 9) Healthy life expectancy refers to the number of years a person can expect to live A) while covered by Medicare. B) without chronic pain, disability, or significant illness. C) without pain or short-term or long-term disability. D) without cancer or diabetes. Answer: B Diff: 2 Page Ref: 5 Skill: Remembering 2 Copyright  © 2014 Pearson Education, Inc. 10) Life expectancy 100 years ago was largely determined by A) medical history. B) lifestyle choices. C) susceptibility to chronic disease. D) susceptibility to infectious disease. Answer: D Diff: 1 Page Ref: 4 Skill: Understanding/Evaluating 11) The term health is often interchangeable with the term A) adaptability. B) flexibility. C) wellness. D) pain-free. Answer: C Diff: 2 Page Ref: 6 Skill: Remembering 12) Jerome eats healthy foods, exercises regularly, gets eight hours of sleep each night, and rarely becomes ill. His ability to ward off illness is related to which dimension of health? A) Social B) Intellectual C) Physical D) Emotional Answer: C Diff: 2 Page Ref: 8 Skill: Applying 13) Jasmine has many friends, is respected by her coworkers, and maintains a great relationship with her boyfriend. Her ability to interact with others exemplifies which dimension of health? A) Social B) Intellectual C) Emotional D) Physical Answer: A Diff: 2 Page Ref: 8 Skill: Applying 14) Rashid volunteers weekly to help pick up trash in his neighborhood. This action contributes to improving which dimension of his health? A) Intellectual. B) Social C) Environmental D) Spiritual Answer: C Diff: 2 Page Ref: 9 Skill: Applying 3 Copyright  © 2014 Pearson Education, Inc. 15) Which of the following best describes emotional health? A) Ability to be self-sufficient B) Ability to solve problems C) Ability to express or control feelings D) Ability to adapt to various social situations Answer: C Diff: 2 Page Ref: 9 Skill: Understanding 16) An example of intellectual health is A) having a sense of meaning and purpose in your life. B) successfully interacting with others. C) having low self-efficacy. D) having a healthy curiosity about life in general. Answer: D Diff: 2 Page Ref: 9 Skill: Understanding 17) Which of the following best describes spiritual health? A) Possessing and expressing a purpose in life B) Expressing emotions C) Having satisfying relationships D) Being able to reason and think objectively Answer: A Diff: 1 Page Ref: 9 Skill: Understanding 18) A multidimensional concept of health that includes elements of physical, mental, emotional, and social function is A) physical and emotional health. B) holistic health care. C) health-related quality of life. D) healthy life expectancy. Answer: C Diff: 2 Page Ref: 5 Skill: Understanding. 19) The first step in modifying your health behavior to achieve overall wellness is to A) review your medical records and schedule a physical examination by a doctor. B) become aware of individual behaviors that contribute to or detract from your health. C) complete a detailed behavior change contract. D) find a reliable support person or support group. Answer: B Diff: 2 Page Ref: 10 Skill: Understanding 4 Copyright  © 2014 Pearson Education, Inc. 20) Holistic wellness involves A) integrating mind, body, and spiritual components. B) taking nutritional supplements daily. C) combining exercise with some form of meditation. D) consuming organic foods and being treated by a naturopathic doctor. Answer: A Diff: 2 Page Ref: 9 Skill: Applying 21) The range of factors that influence a persons health status are known as A) ethnic or cultural traditions. B) determinants of health. C) age-related conditions. D) genetic influences on health. Answer: B Diff: 2 Page Ref: 9 Skill: Understanding 22) Determinants of health include A) personal, social, economic, and environmental factors. B) physical, intellectual, spiritual, and cultural factors. C) nutritional, social, financial, and environmental factors. D) genetic and lifestyle factors. Answer: A Diff: 2 Page Ref: 9 Skill: Understanding 23) Which of the following methods is an example of successful lifestyle change? A) Making a New Years resolution to stop smoking again after failing in the past B) Creating a demanding workout plan in hopes of someday losing weight C) Beginning a daily walking program and gradually increasing your time and distance D) Stopping smoking cold turkey Answer: C Diff: 2 Page Ref: 16 Skill: Applying 24) Jackson made a goal to quit smoking by the end of the year through a lot of hard work and willpower. When he achieved this goal, he bought himself a new car. This is an example of A) repeated enabling. B) social reinforcement. C) positive reinforcement. D) negative reinforcement. Answer: C Diff: 2 Page Ref: 23 Skill: Understanding/Applying 5 Copyright  © 2014 Pearson Education, Inc. 25) Moving from thinking about starting an exercise program to joining a club, working with a trainer to set goals, and showing up for workouts is an example of which model of behavior change? A) Health belief model B) Social cognitive model C) Transtheoretical model D) Contemplation model Answer: C Diff: 3 Page Ref: 16 Skill: Understanding 26) Tasks that are necessary for normal functioning in society are known as A) activities of daily living. B) high-level tasks. C) low-level tasks. D) vocational activities. Answer: A Diff: 2 Page Ref: 8 Skill: Remembering 27) Mark is a junior in college and plans to move to his own apartment before his senior year. He hopes to quit drinking, get more sleep, and spend more time exercising and studying instead of spending so much of his free time on Facebook. The best plan for Mark to succeed is for him to A) make a chart with an algorithm for coordinating all the changes. B) try to change all of his bad behaviors at once. C) select the most important behavior to change and take things one step at a time. D) worry about changing behaviors later because hell have plenty of time to change after he finishes college. Answer: C Diff: 2 Page Ref: 17-18 Skill: Applying 28) Which of the following factors would be considered a nonmodifiable determinant of health? A) Sexual behavior B) Sleep habits C) Geographic location D) Genetics Answer: D Diff: 2 Page Ref: 10 Skill: Understanding 6 Copyright  © 2014 Pearson Education, Inc. 29) Which of the following is an example of a belief? A) Disliking the smell of cigarette smoke B) Thinking that smoking is unhealthy and causes cancer C) Being happy no one is smoking near you D) Understanding that smoking has become more prevalent among teenagers Answer: B Diff: 2 Page Ref: 14 Skill: Understanding 30) Marissa has tried to quit smoking several times but ultimately failed because she lost motivation and didnt believe she could succeed. Which of the following may have contributed to her failure? A) She has a strong internal locus of control. B) She has high self-efficacy. C) She has a strong external locus of control. D) She has a strong, positive support group. Answer: C Diff: 2 Page Ref: 19-20 Skill: Analyzing 31) Because both of Johns parents smoke, John has a higher-than-average chance of being a smoker. This is an example of A) a reinforcing factor. B) a predisposing factor. C) a confirming factor. D) an enabling factor. Answer: B Diff: 3 Page Ref: 17 Skill: Understanding 32) Which of the following best describes an enabling factor? A) Living near a hiking trail when you want to begin a walking program B) Nagging your parents because they smoke C) Encouraging your spouse to go to the fitness club with you. D) Having friends who dont exercise, but you want to start a fitness program Answer: A Diff: 2 Page Ref: 17 Skill: Understanding 33) Poor housing, lack of funds for adequate food and clothes, and insecure employment are which type of factors that negatively affect human health? A) Biological B) Economic C) Behavioral D) Genetic Answer: B Diff: 2 Page Ref: 11 Skill: Understanding 7 Copyright  © 2014 Pearson Education, Inc. 34) Carrie grew up in an active family. Now that Carrie lives on her own, her family continues to check in to see if she is making time for exercise. They praise her for joining a fitness club and  keeping to a workout schedule. This is an example of A) a predisposing factor. B) a confirming factor. C) a reinforcing factor. D) an enabling factor. Answer: C Diff: 3 Page Ref: 17 Skill: Applying 35) Which model explains why a young woman who smokes is NOT likely to quit because she does not think she will get lung disease, and quitting will result in weight gain? A) Health belief model B) Social cognitive model C) Transtheoretical model D) Behavior change model Answer: A Diff: 3 Page Ref: 14 Skill: Applying 36) Marias husband has agreed to join her in an exercise program. Theyve scheduled times to meet to run at a local park. This is an example of A) reward. B) social support. C) enabling. D) readiness. Answer: B Diff: 2 Page Ref: 20-21 Skill: Applying 37) Agents in the physical environment that can be harmful to health include which of the following? A) Minerals B) Toxins C) Water D) Nutrients Answer: B Diff: 2 Page Ref: 11 Skill: Understanding 8 Copyright  © 2014 Pearson Education, Inc. 38) Which of the following groups of actions would most likely reduce a persons risk of premature death? A) Not smoking, avoiding junk foods, and maintaining a healthy weight. B) Wearing a seat belt only when driving on the freeway and avoiding second-hand smoke C) Using natural dietary supplements, working the night shift, and spending frugally D) Avoiding excessive sun exposure and seeing at least two specialists each year Answer: A Diff: 2 Page Ref: 5 Skill: Analyzing 39) Setting achievable and incremental goals and rewarding yourself for progress are proven tips for maintaining A) ongoing support from others. B) motivation for behavior change. C) an outstanding academic record. D) a lower body-mass index. Answer: B Diff: 3 Page Ref: 19. Skill: Understanding 40) Selective smoking bans and child restraint laws designed to protect the health of citizens are examples of A) publicity campaigns. B) public policies. C) profiling. D) public health research. Answer: B Diff: 2 Page Ref: 11 Skill: Understanding/Applying 41) The perceived source or cause (internal or external) of events in a persons life is known as his or her A) locus of control. B) ability to reason. C) stages of behavior change. D) sense of victimization. Answer: A Diff: 2 Page Ref: 20 Skill: Understanding 9 Copyright  © 2014 Pearson Education, Inc. 42) Jules is trying to lose weight. When she craves a high-fat treat from the local ice cream shop, she is prepared to allow herself a cup of low-fat frozen yogurt in her favorite flavor. The tactic she is using to avoid eating more calories is A) rewarding. B) manipulating. C) negotiating. D) countering. Answer: D Diff: 2 Page Ref: 22 Skill: Applying 43) An example of shaping is A) starting with small changes in behavior and gradually increasing the changes. B) using specific exercises to mold your body to a desired image. C) trying to influence your younger brothers behavior with rewards. D) watching a friends behavior and then trying to mimic him or her. Answer: A Diff: 2 Page Ref: 20 Skill: Applying 44) Using rational, positive statements and deliberately blocking negative thoughts are ways to avoid negative A) influences. B) actions. C) self-talk. D) awareness. Answer: C Diff: 2 Page Ref: 22 Skill: Applying 45) Visualizing yourself successfully losing 15 pounds by choosing healthy foods at your favorite restaurant is an example of A) situational inducement. B) planned control. C) imagined rehearsal. D) modeling. Answer: C Diff: 2 Page Ref: 21 Skill: Understanding/Applying. 10 Copyright  © 2014 Pearson Education, Inc. 46) Rewarding yourself for reaching your weight loss goal with a trip to Hawaii is an example of which type of reinforcer? A) Activity B) Possessional C) Manipulative D) Social Answer: A Diff: 2 Page Ref: 23 Skill: Understanding/Applying 47) Observing a friends success at quitting smoking has helped you to quit a few months later, which demonstrates the process of A) copying. B) shaping. C) mirroring. D) modeling. Answer: D Diff: 2 Page Ref: 21 Skill: Applying 48) Carlos wants to avoid overeating and eating unhealthy food. Because of this, he may decline  invitations when his friends ask him to join them at a fast food restaurant. Which method is Carlos using to control the risk of overeating? A) Modeling B) Imagined rehearsal C) Consumable reinforcer D) Situational inducement Answer: D Diff: 2 Page Ref: 22 Skill: Applying 49) Which of the following is the best example of a realistic, specific, and attainable goal? A) I will lose a lot of weight. B) I will lose 1 pound a week over the next four weeks. C) I will lose 10 pounds if I start exercising. D) I will lose 10 pounds if I start exercising and stop eating after 8:00 p. m. Answer: B Diff: 2 Page Ref: 20 Skill: Understanding/Applying 11 Copyright  © 2014 Pearson Education, Inc. 50) Lower health insurance rates for nonsmokers serves as which type of reinforcer? A) Possessional B) Manipulative C) Social D) Activity Answer: B Diff: 2 Page Ref: 23 Skill: Understanding/Evaluating 51) Behavior is a nonmodifiable determinant. Answer: FALSE Diff: 2 Page Ref: 10 Skill: Remembering 52) Health disparities are differences in the levels of health and disease among specific population groups, such as the low-income or uninsured. Answer: TRUE Diff: 2 Page Ref: 14-15 Skill: Understanding. 53) More people across all age groups die from cancer than any other chronic disease. Answer: FALSE Diff: 2 Page Ref: 4 Skill: Understanding 54) Daily choices influence an individuals health status and well-being. Answer: TRUE Diff: 1 Page Ref: 3 Skill: Understanding 55) The medical model of health focuses on the individuals reaction to his or her social and physical environment. Answer: FALSE Diff: 2 Page Ref: 6 Skill: Understanding 56) In the early 1900s, the ecological model or public health model became a major focus of health investigation. Answer: TRUE Diff: 2 Page Ref: 6-7. Skill: Remembering 57) Effectively controlling anger demonstrates intellectual health. Answer: FALSE Diff: 1 Page Ref: 9 Skill: Applying 12 Copyright  © 2014 Pearson Education, Inc. 58) The primary goal of the Affordable Care Act of 2010 is to provide access to health insurance for millions of uninsured Americans. Answer: TRUE Diff: 2 Page Ref: 13 Skill: Understanding 59) Today, quality of life is recognized as being as important as years of life. Answer: TRUE Diff: 1 Page Ref: 5 Skill: Understanding 60) ACCORDING TO MORBIDITY AND MORTALITY STATISTICS, IN THE 21ST CENTURY, A PERSON IS MORE LIKELY TO  die from an infectious disease rather than from a chronic disease. Answer: FALSE Diff: 2 Page Ref: 4 Skill: Understanding 61) Tran is a 47-year-old-male who suffered a knee injury in high school while playing football. This injury is a biological determinant of health. Answer: TRUE Diff: 2 Page Ref: 10 Skill: Understanding 62) The average life expectancy for an American child born in 2012 is 78. 5 years. Answer: TRUE Diff: 1 Page Ref: 4 Skill: Remembering 63) Obesity creates a burden on the overall U. S. economy. Answer: TRUE Diff: 1 Page Ref: 5 Skill: Understanding. 64) Mortality is defined as the proportion of deaths to the population. Answer: TRUE Diff: 1 Page Ref: 4 Skill: Remembering 65) Under the Affordable Care Act, new health plans are banned from imposing deductibles. Answer: FALSE Diff: 2 Page Ref: 13 Skill: Understanding 13 Copyright  © 2014 Pearson Education, Inc. 66) Life expectancy may decline in coming years due to the prevalence of obesity and sedentary lifestyles. Answer: TRUE Diff: 2 Page Ref: 5 Skill: Understanding 67) Today, the concept of adaptability is a key element in the overall definition of health. Answer: TRUE Diff: 1 Page Ref: 7-8. Skill: Understanding 68) Believing that you will be able to run two mile miles without stopping by the end of the semester demonstrates self-efficacy. Answer: TRUE Diff: 1 Page Ref: 19 Skill: Applying 69) A person who has the attitude, knowledge, skills, and resources to make change possible possesses ambition. Answer: FALSE Diff: 1 Page Ref: 19 Skill: Understanding 70) Learning communication and relationship skills can enhance the social dimension of health. Answer: TRUE Diff: 2 Page Ref: 8-9 Skill: Applying 71) Having high self-esteem always improves the intellectual dimension of health. Answer: FALSE Diff: 2 Page Ref: 9 Skill: Understanding 72) Losing your temper because someone said something that made you angry demonstrates an external locus of control. Answer: TRUE Diff: 1 Page Ref: 20 Skill: Applying 73) Developing better problem-solving and decision-making skills enhances the emotional dimension of health. Answer: FALSE Diff: 2 Page Ref: 9 Skill: Understanding 14 Copyright  © 2014 Pearson Education, Inc. 74) Positive reinforcers are punishments for not accomplishing goals. Answer: FALSE Diff: 2 Page Ref: 23 Skill: Understanding. 75) Actions taken or changes in behavior designed to treat an existing illness are part of disease prevention. Answer: FALSE Diff: 2 Page Ref: 7 Skill: Understanding 76) Spiritual health encompasses more than simply religious beliefs. Answer: TRUE Diff: 1 Page Ref: 9 Skill: Understanding 77) Attaining the optimal level of well-being for your unique limitations and strengths is known as wellness. Answer: TRUE Diff: 2 Page Ref: 9 Skill: Understanding 78) Adolescent teens having access to cigarette vending machines is an example of a positive reinforcing factor that can influence smoking behavior. Answer: FALSE Diff: 1 Page Ref: 23 Skill: Applying 79) Healthy People 2020 is the Surgeon Generals health promotion plan to improve the quality of life and years of life for all Americans. Answer: TRUE Diff: 2 Page Ref: 9 Skill: Understanding 80) Global warming, decreased water supplies, and toxic chemicals are serious health threats with far-reaching effects worldwide. Answer: TRUE Diff: 2 Page Ref: 11 Skill: Understanding 81) Risk behaviors are those actions that increase the likelihood of negative health outcomes. Answer: TRUE Diff: 2 Page Ref: 7 Skill: Understanding 15. Copyright  © 2014 Pearson Education, Inc. 82) The Summary Plan Description (SPD) explains covered services, benefits, deductibles, copays, and network rules under a specific health insurance plan. Answer: TRUE Diff: 2 Page Ref: 12 Skill: Understanding 83) A reinforcing factor of your weight management program would be having your clothes fit better. Answer: TRUE Diff: 1 Page Ref: 16 Skill: Applying 84) Locus of control may be internal or external. Answer: TRUE Diff: 2 Page Ref: 19-20 Skill: Understanding 85) Asking your doctor to help you obtain the lowest-cost care is inappropriate. Answer: FALSE Diff: 2 Page Ref: 12 Skill: Applying 86) A consumable reinforcer could be a healthy edible item that you enjoy. Answer: TRUE Diff: 2 Page Ref: 23 Skill: Understanding 87) The three components of the social cognitive model of behavior change are thoughts, behavior, and genetics. Answer: FALSE Diff: 2 Page Ref: 15 Skill: Understanding 88) When a person who wants to eat healthier and lose weight clears out unhealthy foods from the refrigerator and pantry, this is an example of situational inducement. Answer: TRUE Diff: 2 Page Ref: 22 Skill: Understanding 89) Economic status and geographic location have very little influence on a persons health status. Answer: FALSE Diff: 2 Page Ref: 15 Skill: Understanding 16 Copyright  © 2014 Pearson Education, Inc. 90) Obesity, sedentary lifestyles, smoking, excessive alcohol consumption, and illegal drug use result in direct and indirect costs to society. Answer: TRUE Diff: 2 Page Ref: 5-6 Skill: Evaluating 91) List and briefly explain the six steps of the transtheoretical (stages of change) model of behavior change. Answer: 1. Precontemplation no current intention to change. 2. Contemplation recognizing there is a problem but not yet planning to change. 3. Preparation coming up with a plan for change. 4. Action taking real steps to achieve goals. 5. Maintenance continues to make changes a permanent part of life. 6. Termination new behavior has become part of daily living, so ongoing vigilance may not be needed. Diff: 3 Page Ref: 16 Skill: Understanding/Applying 92) Explain the purpose of a behavior change contract and how it can help you make a positive change. Answer: A behavior change contract functions as a promise to yourself, a public declaration of  your intentions, an organized plan for change, a way to identify barriers to change and determine how to overcome them, a list of sources of support, and a reminder of the benefits of sticking to your plan. Diff: 2 Page Ref: 21 Skill: Understanding/Applying 93) Compare and contrast the medical model and public health models of health. Answer: The medical model focuses on the individual, his or her tissues and organs, and the diagnosis and treatment of disease. The public health model (also known as the ecological model) views diseases and negative health events as resulting from an individual interacting with  his or her social and physical environment. Diff: 2 Page Ref: 6-7 Skill: Analyzing 94) Explain the nature of SMART goals. Answer: SMART goals are: Specific with a defined outcome Measurable can be objectively observed and measured Action-oriented involve specific tasks or actions Realistic are likely to be accomplished Time-oriented involve the commitment of a specific amount of time Diff: 2 Page Ref: 20 Skill: Remembering 17 Copyright  © 2014 Pearson Education, Inc. 95) When analyzing your behavior prior to making a change, which factors must you examine before making your plan? Answer: You should examine your current health habit and patterns, including: How long has the behavior been going on? How frequently does the behavior occur? How serious are the short-term and long-term consequences of this behavior? Why have you continued this problematic behavior? What kinds of situations trigger the behavior? Are other people involved? If yes, how do they influence your behavior? Diff: 2 Page Ref: 16 Skill: Understanding/Applying 96) What is self-efficacy, and why is it important in making a behavior change? Answer: Self-efficacy is an individuals belief that he or she is capable of performing a task  successfully and of achieving specific goals. If an individual approaches a behavior change with a high level of self-efficacy, his or her chances of success will be much greater. Diff: 2 Page Ref: 19 Skill: Understanding/Applying 97) Differentiate between the health belief model, social cognitive model, and transtheoretical (stages of change) model of behavior change. Answer: 1. The health belief model addresses three factors that must exist before a person can make a change: the perceived seriousness of the potential health problem; the perceived susceptibility to  the problem, and cues to action, alerts or reminders to take preventive action. 2. The social cognitive model is based on the concept that three elements interact to motivate and enable change: a persons thoughts, behaviors, and the social environment. 3. The transtheoretical model views change in six stages: precontemplation, contemplation, preparation, action, maintenance, and termination. Diff: 3 Page Ref: 14-16 Skill: Analyzing 98) You want to improve your health by initiating an exercise program. Describe at least three ways you can maintain your motivation for regular exercise. Answer: Any three of the following: Pick one specific behavior to change and assess that behavior. Set achievable, incremental goals. Reward yourself for achieving goals. Anticipate and avoid barriers and temptations. Remind yourself why you want to change. Enlist help and support from others. Dont be discouraged by relapses, just get back on track. Diff: 3 Page Ref: 19 Skill: Applying 18 Copyright  © 2014 Pearson Education, Inc. 99) List at least three common barriers to behavior change. Answer: Any three of the following: Setting overambitious goals Holding on to self-defeating beliefs and attitudes. Not accurately assessing your current state of wellness or fitness Not having adequate support or guidance Allowing negative emotions to sabotage your efforts Diff: 2 Page Ref: 20 Skill: Understanding 100) Define self-talk and explain how you can use it to help your efforts toward change. Answer: Self-talk is your usual manner of thinking and talking to yourself (the voice in your head) that can affect your self-image and behavior. Deliberately changing your self-talk can have a big influence on behavior change by: Using rational, positive statements Blocking or stopping negative thoughts when they occur  Not dwelling on negative thoughts or images and focusing on more positive, uplifting, and encouraging thoughts Diff: 2 Page Ref: 22-23 Skill: Understanding/Applying 19 Copyright  ©Ã‚   2014 Pearson Education, Inc.

Tuesday, November 5, 2019

How to Display and Edit MEMO Fields in Delphis TDBGrid

How to Display and Edit MEMO Fields in Delphis TDBGrid   If you are developing database applications with tables containing MEMO fields, youll notice that, by default, the TDBGrid component does not show the contents of a MEMO field inside a DBGrid cell. This article provides an idea of how to solve this TMemoFields issue (with a few more tricks)... TMemoField Memo fields are used to represent lengthy text or combinations of text and numbers. When building database applications using Delphi, the TMemoField object is used to represent a memo field in a dataset. TMemoField encapsulates the fundamental behavior common to fields that contain text data or arbitrary length. In most databases, the size of the Memo field is limited by the size of the database. While you can display the contents of a MEMO field in a TDBMemo component, by design the TDBGrid will only display (Memo) for the contents of such fields. In order to actually display some text (from the MEMO field) in the appropriate DBGrid cell, youll only need to add a simple line of code ... For the purpose of the next discussion, lets say you have a database table named TestTable with at least one MEMO field named Data. OnGetText To show the contents of a MEMO field in the DBGrid, you need to attach a simple line of code in the fields  OnGetText  event. The easiest way to create the OnGetText event handler is to use the Fields editor at design time to create a persistent field component for the memo field: Connect your TDataset descendant component (TTable, TQuery, TADOTable, TADOQuery ....) to the TestTable database table.Double click the dataset component to open the Fields editorAdd the MEMO field to the list of persistent fieldsSelect the MEMO field in the Fields editorActivate the Events tab in the Object InspectorDouble click the OnGetText event to create the event handler Add the next line of code (italicized below): procedure TForm1.DBTableDataGetText( Sender: TField; var Text: String; DisplayText: Boolean); begin Text : Copy(DBTableData.AsString, 1, 50); Note: the dataset object is called DBTable, the MEMO field is called DATA, and therefore, by default, the TMemoField connected to the MEMO database field is called DBTableData. By assigning  DBTableData.AsString  to the  Text  parameter of the OnGetText event, we tell Delphi to display ALL the text from the MEMO field in a DBGrid cell.You can also  adapt the DisplayWidth  of the memo field to a more appropriate value. Note: since MEMO fields can be quite BIG, it is a good idea to show only a part of it. In the above code, only the first 50 characters are displayed. Editing on a separate form By default, the TDBGrid does not allow editing of MEMO fields. If you want to enable in place editing, you could add some code to react on a user action that shows a separate window that allows editing using a TMemo component.For the sake of simplicity well open an editing window when ENTER is pressed on a MEMO field in a DBGrid.Lets use the  KeyDown  event of a DBGrid component: procedure TForm1.DBGrid1KeyDown( Sender: TObject; var Key: Word; Shift: TShiftState); begin if Key VK_RETURN then begin if DBGrid1.SelectedField DBTableData then with TMemoEditorForm.Create(nil) do try DBMemoEditor.Text : DBTableData.AsString; ShowModal; DBTable.Edit; DBTableData.AsString : DBMemoEditor.Text; finally Free; end; end; end; Note 1: the TMemoEditorForm is a secondary form containing only one component: DBMemoEditor (TMemo).Note 2: the TMemoEditorForm was removed from the Auto-create forms list in the Project Options dialog window. Lets see what happens in the DBGrid1s KeyDown event handler: When a user presses the ENTER key (we are comparing the Key parameter to the VK_RETURN  virtual key code) [Key VK_RETURN],If the currently selected field in the DBGrid is our MEMO field (DBGrid1.SelectedField DBTableData),We create the TMemoEditorForm [TMemoEditorForm.Create(nil)],Send the value of the MEMO field to the TMemo component [DBMemoEditor.Text : DBTableData.AsString],Display the form modally [ShowModal],When a user finishes with editing and closes the form, we need to put the dataste into the Edit mode [DBTable.Edit],In order to be able to assign the edited value back to our MEMO field [DBTableData.AsString : DBMemoEditor.Text]. Note: if you are looking for more TDBGrid related articles and usage tips, be sure to visit: TDBGrid to the MAX tips collection.

Sunday, November 3, 2019

Human resources Case Study Example | Topics and Well Written Essays - 1500 words

Human resources - Case Study Example The wage rates of the people marked on an industry-average basis are evaluated in terms of piece-rate system relating more to the Production workers where pieces produced by each individual are noted. Basic Workers are also rendered yearly bonuses that also depend on their merit or performance rates. The compensation program of Lincoln Electric can be enhanced through introduction of non-financial benefits like Training and Job Recognition programs and yearly Compensation Cost attributed likewise is furnished to employees (The Lincoln Electric Company, n.d., p. 569-570). Compensation package of Southwest Airlines is however found to comprise of a basic pay which is below the industry average. Additions are rendered to Basic Wages in the form of Profit and Stock Sharing endeavors where employees are rendered a part of the company’s yearly profits along with encouraging them to purchase shares of the concern. The people procure shares through allocation of profits or through a d eduction in their pays. Other performance recognition and reward programs are also generated financial or non-financial in nature to enhance the Total Compensation Package. ... 586-587). Benefits and Services The Benefits and Services rendered should be properly planned and executed by the organization to match the demands and aspirations of the employees through the process of employee surveys. Innovation must be rendered to as to the type and range of benefits and enhancement would be rendered through comparison based on industry standards. In the process of surveys and decision-making ventures related to benefit planning both the employees and the union bodies must be taken into consideration. Finally having decided on the benefits based on the cost structure it must be adequately communicated to the beneficiaries to help them optimize and gain on present and future opportunities (Sims, 2007, p.484-485). Range of benefits and services rendered to the staffs in Lincoln Electric contain both financial and non-financial categories. In financial category benefits related to medical insurance and retirement financing schemes are on the cards. Non-financial be nefits consist of meals obtained from the office cafeteria at concessional or discounted rates. Again the employees receive insurance for disability or accidental reasons from the Employee Association body. The company also renders right to older employees to procure stocks of the company wherein they gain on dividends same like the external shareholders. However the executives of the company are devoid of other perks like parking facilities and reserved washrooms and eating zones (The Lincoln Electric Company, n.d., p. 571-572). Southwest Airlines is also found to render a host of benefits to the employees both financial and non-financial in nature. The financial benefits that consist of a range of insurance benefits related to medical, life, disability, mental needs and

Thursday, October 31, 2019

Economics for Business Essay Example | Topics and Well Written Essays - 1000 words - 1

Economics for Business - Essay Example (Monaghan, 2014) UK’s car market is the second largest market in Europe after Germany and therefore has a critical significance in terms of its contribution to the market. The market is however, dominated by the few but very large players in the industry. 2013 figures suggest that Ford emerged as one of the leading players in the market followed by Vauxhall and BMW. These brands are considered as the hottest selling brands with Ford Fiestas as the leading vehicle in the country purchased during 2013. Since the market is rebounding from its earlier levels, there are signs of price wars in the industry as one of the largest suppliers in the market i.e. Ford has started a fierce competition with the existing players in the market. It is also because of this reason that Ford Fiesta has registered highest number of growth in terms of units sold during 2013. Ford has been specifically offering deep discounts to the dealers on selling certain number of cars of its brands during the month. It suggests that Ford has been capitalizing on the growing opportunities and leveraging the same through the stronger incentives to the dealers. Other players such as Daewoo and Hyundai are also believed to be working towards matching such offers at EU wide level thus initiating price wars at the regional level. (News.bbc.co.uk, 2014) A closer analysis of the market would suggest that the market is being dominated by few but relative larger players in the market. UK Car market is dominated by both the local as well as international players. Local firms such as Vauxhall are also considered as the major players with firms like Ford, Nisan as well as Daewoo and Hyundai are also continuing to dominate the market. What is however, critical to note that none of these firms are actually the price makers as the overall demand depends upon certain other related factors such as availability of cheaper consumer credit and overall economic