.

Wednesday, October 30, 2019

Organic electronic Essay Example | Topics and Well Written Essays - 1000 words

Organic electronic - Essay Example Traditional electronics, involving the use of inorganic conductors, including copper and silicon, presents a use of materials that are heavier and more expensive than conductive polymers and organic semiconductors include dielectrics, conductors and light emitters that have many and varied applications in the field of electronics (Sun, 2008, Chapter 5) and (Wikipedia, 2010, â€Å"Organic Electronics†). Already, organic electronics based displays using organic light emitting diodes have found their way into car radios, etc., with rapid improvements expected in organic field effect transistors. According to published reports, the market for organic materials will be worth US$ 4.9 billion on 2012, and this will surge to US$15.8 billion in the year 2015 (Allen, 2008, Pp. 6). The previously mentioned author states that new kinds of semiconductor materials, including rubrene, hybrid materials and formulations made of carbon nanotubes will continue to spur the market to grow to US$4.9 billion by the year 2015, with the organic electronic substrate business growing to US$ 6.9 billion. According to NanoMarkets (2007, "Organic Harvest: Opportunities in Organic Electronic Materials"), eighty percent of organic electronic materials will be sold into the RFID, display backplanes and Organic Light Emitting Diode (OLED) lighting and displays applications. However, according to the previously mentioned report, if organic electronics is to continue on the road to success, it will have to emulate the traditional semiconductor industry and invent an organic version of CMOS with its own sta ble material sets. Thus, firms specialising in materials for electronics and organic electronic materials must offer commercial quantities of n-type semiconductors and organic dielectrics. In addition, the previously mentioned report suggests that for

Monday, October 28, 2019

Chemistry investigation Essay Example for Free

Chemistry investigation Essay Aim: I am going to carry out an investigation measuring the rate of reaction between hydrochloric acid and magnesium. The independent variable will be the molar of the hydrochloric acid; I will be diluting it with water to change the concentration. The dependent variable could be one of four things; Temperature change, Mass loss, Gas produced using a burette or gas produced using a gas syringe. The dependent variable of the primary experiment will be decided once I have performed four preliminary experiments each with the different dependent variables. The results of these preliminaries will help me determine which factor is the most accurate to measure. Background Information: As I am planning to investigate the rate of reaction by changing the concentration of the acid I should take into consideration how the reaction is affected by concentration. If there is more of a substance in a system, there is a greater chance that molecules will collide and speed up the rate of the reaction. If there is less of something, there will be fewer collisions and the reaction will probably happen at a slower speed. As you increase the concentration of the acid, there are more acid particles in the same volume. Therefore there is a greater chance of acid particles colliding, and reacting, with particles on the surface area of the magnesium ribbon. Here is an example of how the rate of reaction will increase if the concentration gets higher:image00.png With this in mind it is clear to see that as I decrease the concentrate of the acid by adding water to it I will be decreasing the rate of reaction. There is a positive correlation between the two variables. The experiment equation that will effectively happen is: MAGNESIUM + HYDROCHLORIC ACID MAGNESIUM CHLORIDE + HYDROGEN Mg + 2HCl - MgCl2 + H2 Magnesium; Magnesium is a light, silvery-white, and fairly tough metal. It tarnishes slightly in air, and finely divided magnesium readily ignites upon heating in air and burns with a dazzling white flame. Because serious fires can occur, great care should be taken in handling magnesium metal, especially in the finely divided state. Water should not be used on burning magnesium or on magnesium fires. Hydrochloric acid; Hydrochloric acid is the aqueous solution of hydrogen chloride gas (HCl). It is a strong acid, the major component of gastric acid, and of wide industrial use. Hydrochloric acid must be handled with appropriate safety precautions because it is a highly corrosive liquid. Hydrogen; when mixed with oxygen across a wide range of proportions, hydrogen explodes upon ignition. Hydrogen burns violently in air. It ignites automatically at a temperature of 560. Another characteristic of hydrogen fires is that the flames tend to ascend rapidly with the gas in air. Magnesium chloride; this is the name for the chemical compounds with the formulas MgCl2 and its various hydrates MgCl2 (H2O) x. These salts are typical ionic halides, being highly soluble in water. The hydrated magnesium chloride can be extracted from brine or sea water. Anhydrous magnesium chloride is the principal precursor to magnesium metal, which is produced on a large scale. Preliminary experiments: Method: In this preliminary experiment I choose not to alter anything but to observe how the temperature increased within the time of the reaction. I used 10ml of hydrochloric acid and 3cm of magnesium ribbon. I carried out three repeat measurements to gain an idea of what the results would look like if compared. Evaluation of Preliminary Methods Each of the experiments above has limitations that strongly influenced the results. This has given me an idea of what degree of accuracy each method can be measured to and if they are suitable to collect data for the primary experiment. Temperature: Measuring the temperature is a simple way of seeing where the rate of reaction begins, peaks and ends. It is a clear indication to how the magnesium reacts and at what temperature. There are, however, some inaccuracies to the formation of the set up. Some of the thermal energy detected by the thermometer is sometimes transferred into the glass of the conical flask which led to an inaccurate reading. Furthermore the thermometer is slow to respond to the rise in temperature and also only gives reading in whole numbers so slight elevations in heat are difficult to read and thus inaccurate. Mass Loss: Measuring the mass at different points in the experiment provides markers to see how much magnesium and hydrochloric acid has been reacted. The electric scale I used was too sensitive to get a general reading; this affected the results severely. The mass would sometimes increase during the reaction due to a small piece of debris getting onto the scale or because a gust or air; consequentially the results were askew. Gas Produced using a burette: This is a very good way of measuring the rate of reaction. The measurements are clear and can be recorded to a decimal place which makes the results very accurate. There are some limitations, however, to using a burette. When the gas is produced it takes time for the hydrogen to travel along through the tube and up into the burette. This extends the time of the reaction slightly because not all the gas has been collected which the magnesium has been dissolved. Furthermore some amount of hydrogen have escaped the burette and simply floated to the surface of the water not being accounted for. This is a small inaccuracy but can still alter the results. Gas Produced using a gas syringe: This is a very accurate piece of equipment. It does not allow for gas to escape and records the data consistently and with speed. The only limitations in using a gas syringe are that the reading can only be reading in whole numbers and that the syringe sometimes collects water vapour as well. The water vapour, however, can be eliminating by adding an extra conical flask to the tube which collects the vapour as it is slightly cooler. The gas syringe is the most advanced piece of equipment in each of the preliminary methods and also is the most accurate in recording the data. Therefore to calculate the rate of reaction between magnesium and hydrochloric acid my dependent variable will be the gas produced using a gas syringe. Hypothesis: Now that I have determined what I am going to measure and how I can now make my prediction over what I think will be the final outcome of the experiment. Rate of reactions are all based on the collision theory. This states that the more collisions in a system, the more likely combinations of molecules will occur. As a result of this the reaction will accelerate, and the rate of that reaction will increase. The concentration of a substance will raise the number of collisions and thusly speed up the rate of reaction. On this basis I believe that if the molar of the hydrochloric acid is decreased there will be less gas produced and so the rate of reaction will slow. Here is a diagram: image07.png We can see in the figure above that if the molar is halved then there are fewer particles in the water so fewer collisions can happen. The gas produced will therefore be reduced and the overall time of the reaction will decrease. Variables Variable controlled How it is controlled Why it is controlled Concentration of Magnesium By measuring out a 3cm piece of magnesium each time I take a repeat measurement. I am measuring the concentration of the hydrochloric acid not the magnesium. Concentration of Hydrochloric acid I will start with 10ml of hydrochloric acid and replace 2ml of it with water every time I want to reduce the concentration. I want to observe what effect it will have on the rate of reaction. Water Vapour Adding an extra, cooler conical flask to collect the water vapour. I am measuring the gas produced between hydrochloric acid and magnesium; water vapour is not a product. Temperature By putting the flasks in a thermostatically controlled water bath for 5 minutes before each experiment. I am measuring the concentration and do not want the higher temperature to give the particle more energy to collide. Apparatus 500ml conical flasks- To hold the magnesium and hydrochloric acid reaction and to collect the water vapour. Conical flask bung (with hole for tubing) To allow for gas only to travel through the tubing. Glass tubing- To direct the flow of gas. 100 ml ² gas syringes- To measure the gas produced. Retort stand- To hold the gas syringe. Clamp- This is attached to the retort stand. 50 ml measuring cylinder- To measuring the hydrochloric acid accurately stop-clock- To measure the time of the reaction 10ml of Hydrochloric Acid plus varying amounts of water- To measure the concentration of the acid Magnesium ribbon (3cm per experiment) To react with the acid. Ruler and scissors – To measure and cut the magnesium ribbon. image08.png Here is a diagram: Other apparatus: image10.pngimage09.pngimage11.png image02.pngimage03.png Obtaining precise and reliable results My experimental design permits me to take very accurate measurement; however, the only fault in its design is that the syringe only measures in whole numbers. This should not pose as a problem because I will take lots of reading to compensate. I will then find the mean of easy set of results so that I can compare them accurately in addition to this I will also take the range of the results which will allow me to observe whether they overlap. The limitations of my other apparatus are common. Although my stop can measure to a 10th of a second my reaction time will be a lot slower then this. The ruler and scissors should also be taken into consideration, measuring and cutting the magnesium could cause some variation. The measuring cylinder also has to be estimated to a rough degree when pouring the hydrochloric acid. All of these small inaccuracies can add up to a large error so I need to be very consistent so each result is rounded to the same degree of accuracy. Risk assessment: during the practical various measures must be taken to ensure the experiment is carried out safely. These measures are; †¢ Always wear safety goggles (at all times) to ensure no chemicals make contact with eyes. †¢ Wear laboratory aprons to ensure there are no spillages onto clothing. †¢ Use a bench mat to stop spillages onto bench †¢ Avoid contact of acid on skin – it is corrosive. If acid does touch skin it must be immediately washed off. †¢ Hydrogen is explosive and so must not be exposed to a naked flame- ensure that Bunsen burners are nowhere near the apparatus during the experiment. †¢ Basic Laboratory Rules i.e. do not run in labs, No food or drink allowed etc. †¢ No concentration of hydrochloric acid greater than 2 molar, anything larger is dangerous.

Saturday, October 26, 2019

Intranets :: essays research papers fc

Intranets These days Intranets are becoming more and more popular throughout the business world and other types of organizations. Many companies and organizations are already making this change and many more are considering it. The advantages offered by Intranets when compared to other types of networks are many, at a reduced cost for the owner. Less maintenance, less programming and more flexibility on the network platform make this change interesting. Unlike other types of networks, Intranets allow different types of machines and operating systems already at hand to be operating on the same network platform. This reduces the cost when trying to implement this type of network because the machines and operating systems already at hand can still be used throughout the network without conflicting with one another. Quick access and easy programming is also another consideration that is made when considering this type of network. Intranets have just started to be implemented throughout the world and already a big change is being noticed. Companies are keeping track of all of their important information on web sites, which are restricted to users, unless they have the security code to access them. Thanks to Internet technology, companies and other types of organizations are able to keep all of their information organized and easily accessible with a click of a button. The Internet, how has it changed the world around us? Government, education, business is all wrapping around it. Is this because of all of the information on it, simplicity or is it the quickness, with a simple point and click and the information appears on the screen. The first intention of the Web, as it is referred to, was not to create a sea of web servers and surfers. The Department of Defense created it for it's own use, to keep contact with all of the locations throughout the world, making it easier for them to retrieve and send information when desired. As businesses, government and education discover the advantages of the Internet and web technologies they are starting to implement it for internal use. This is better known as an Intranet, which represents a new model for internal information management, distribution and collaborative computing and offers a simplistic but powerful implementation of client/server computing. Intranets are private Web-based networks, usually within corporation firewalls, that connect employees and business partners to vital corporate information. Thousands of organizations are finding that Intranets can help empower their employees through more timely and less costly information flow. They let companies speed information and software to employees and business partners. Intranets provide users with capabilities like looking up information, sending

Thursday, October 24, 2019

Reaction to Everyday Use Essay

Everyday Use is a short story written by Alice Walker about a family of three, Mama, the narrator, Maggie her youngest daughter, and Dee, her eldest daughter. Both daughters are completely different, Maggie is a simpler person and Dee is high maintenance. Dee has always the home she was brought up in and everything to do with her childhood. She always wanted more and Mama gave her the best she could. One day, years after Dee has gone off to college, she returns to visit Mama and Maggie’s new home (the other had been burnt down when Dee was still living with them), and she brings along a man, possibly her husband. When Dee returns she has changed her name and has come hoping to retrieve certain family heirlooms. Walker uses different literary tools to tell this story in a way that makes the audience think about what she is trying to tell the audience. Strategy The main literary strategy Walker uses in the writing of Everyday Use are irony and symbolism. Mama and Maggie value the quilts discussed in the story, not as folk art, instead for what they are intended to be used for, a source of warmth. Mama would rather give Maggie the quilts and let her put these quilts to use even though they may end up ruined because she knows that she is the one that will appreciate and love the quilts the most. Dee wants to in a sense save the quilts from the harm that she is sure that her sister, whom she seems to think is intelligently inferior will ruin but she does not understand the true value and worth of these quilts. Dee’s sudden interest in her heritage and want to embrace different objects from her family’s past is obviously seen by her mother as empty. In Mama’s eyes the best way to keep the quilts and the love and care that comes with them in the family is to hand them over to Maggie, even if it means them possibly being damaged or worse yet, destroyed. This is the irony in the story. Many would think that preserving the quilts is the only respectful way of keeping the spirit of their family alive, but instead Mama sees deeper than that, she sees in actuality the best way to keep the spirit of their family alive is to put them to use so that more memories can be connected to them. Using them in daily life is a way to keep the family history and spirit alive, and to even add onto it. Theme The consistent theme of Alice Walker’s â€Å"Everyday Use† is appreciating the past, and one’s family. This theme was one that I found I could identify with greatly along with certain aspects of the story. The author skillfully tells us the story of two sisters, Dee, and Maggie, to prove her point. Dee comes home with a new contemporary identity tied to her African heritage, which she believes white men and women have tried to take away from her. She now embraces this African heritage and sees it as an important part of her. She scornfully asks Mama (the narrator) to not address her by the name her mother gave her, Dee, but to instead call her Wangero, assumed to be a name from her African herritage: â€Å"What happened to ‘Dee’?† I wanted to know. â€Å"She’s dead,† Wangero (Dee) said. â€Å"I couldn’t bear it any longer, being named after the people who oppress me.† Wangero (Dee) assumes and argues with her mother that she has been named after a white man or woman. Mama attempts to convince her that her name was not given to her by a white man or woman but that she was named after her grandmother. Dee resists what her mother has told her and insists that if she were to follow the line that it would go back to a white man or woman. Maggie, is unashamed of her past, she actually embraces it. She has always loved the quilts that her mother and aunt made from clothing that her grandmother had pieced. This section of the story is the prime difference between the sisters is revealed: Dee would like to use the quilts as pieces of artwork for her own home because it is something that would be stylish and argues with her mother that Maggie â€Å"would be backward enough to put them to everyday use.† Dee says this as if it were a bad thing to use the quilts as they were intended to be used but Mama believes that the everyday use, is the best way to value the past, to keep the spirit of the family going and not putting the items up for display as if they were in a museum or separating oneself from his or her family. This is something that I can identify with. When I was younger my great-grandmother had always crocheted afghans for each of her children, grandchildren and great-grandchildren. My cousins had when we were little looked down at these beautiful afghans and wanted instead store bought blankets. I treasured the afghan that my great grandmother had made me and used it often. When we were older, and she had passed away, my one cousin was going through a phase similar to Dee’s, she was suddenly very interested in our family history, and she now wanted the last afghan that my great grandmother made. She ended up being the one to receive the afghan because I did not feel like fighting over it. I did not want to receive it with a fight because I knew that it would tarnish the meaning for me but I always found it interesting how she changed her mind once became, for lack of a better word, â€Å"cool† to embrace family history and to like handmade items. Active and Responsive Reading While reading Everyday Use one inference that I made was that the story was set in the early 1970s. I made this inference from the way Mamma, the narrator, described Dee in the present day. I thought that the dress, accessories, and hair style Dee was described to have seemed to match up to fashion from the early 1970s. Dee is a vain, hypocritical, and condescending individual, this was my impression from my first reading of the story and after reading it twice more, I found that my impression of Dee did not change from my first reading. Mamma did the best she could for Dee as she grew up. Dee always despised the house they lived in and never saw the house that was built after the fire until she visited. Mamma and their church raised money so that Dee could get a higher education and go off to college. Dee uses her education as a way to look down on her mother and sister. She does not understand why they will not better themselves as she has. In this visit she begins asking her mother for things that she had never wanted before and looked down at. She now wants these items not as reminders of her family but more as pieces of art. Two of these items were quilts made by Grandma Dee. In the past when offered these, she had told her mother that the quilts were â€Å"too old-fashioned, out of style†. Now she thinks that they would make beautiful pieces Alice Walker writes this story I think for every family and every person in a family. In a world where people are consumed with art, fashion, and style, I think she is reminding us that there is more to some items than art, fashion, and style. Many times we think the only way to appreciate something is to frame it or put it up for display and not put it to everyday use in fear of ruining it but Walker uses this story to show us that there is more to appreciating something than just displaying it. Sometimes to best appreciate a piece of ones heritage through an heirloom you should use it for its intended purpose. In conclusion Walker teaches us a lesson about family and keeping the spirit and story of our family alive by not merely displaying our heirlooms but putting them to use. She uses irony to help tell her story and support her theme. Walker chooses a story that people can relate to and learn from.

Wednesday, October 23, 2019

Philippine Prehistory: Lessons from the Historical Past Essay

Throughout the weeks of this course, I’ve learned a lot more about the Philippines as a place, as well as the people themselves and about the things they do. Before, I just went with the stereotypes that everyone says about Filipino’s, they’re all short, they’re poor, etc. In some cases, that remains true, but not for all of them out there. They also seem to be more advanced in technology than I thought they were. There is a lot more to the people, the country, the culture and their rich history. Some things I didn’t know about the Philippines were that they had established their own writing system before they had any contact or knowledge about other people or languages in the world. Baybayin or Alibata consisted of 14 consonants and 3 vowels, while using dots on the tops and bottoms of characters to distinguish consonants with certain vowels and a cross beneath character which takes out the vowel, leaving just the consonant. They also had technology of tools, using them to engrave the Baybayin writing into bamboo poles and creating the Angono Petroglyphs and the Laguna Copperplate Inscription (LCI). The LCI was found and nobody knew what it was, nor did anyone want it. But it held important information about how society was back then. The inscription was about the forgiveness of a debt. It was linked to several cities that still exist now. The Angono Petroglyphs exist in a cave in the province of Rizal. They contain images on rock walls of animals and humans that date back to 3000 B. C. Now days, due to erosion of the walls and defacing of the walls, some images have become indistinguishable. Another thing about the Philippines that I didn’t know about was the Tabon man. The Tabon man is reported the oldest known set of bones found in the Tabon Caves said to date back 30,000 years making it the oldest remains found in the Philippines. Some also believe it to be a woman. Some geologic things I didn’t know about were that the Philippines have three sections; Palawan, Mindanao, and Visayas. Within these areas, there are over 100 different languages spoken, although the national language is Filipino. In Mindanao, it is the place where the Islam religion is most prominent. It was introduced 100 years before Christianity. The Philippines consist of 7,100 Islands, but some of them only being above sea level in low tide, and under sea levels in high tide. There are only around 500 islands that are larger than 1 square mile and only 800 of the 7,100 are inhabited. The Philippines, as a whole, is about 194 times larger than Hawaii. There are two pronounced seasons, wet and dry, where June – November is wet and December – March is dry. Manila is the Capital of the Philippines and the Philippines has the 2nd largest mall in the world, the Mall of Asia. The Philippines is different than how I had looked at it before, and now I know more about their culture and how they live. This history is important because it shows where these people have been and where they are going. Although there might be some bad things throughout history here and there, it’s what brought the country to where it is now. This Country has more to offer than what I previously had thought and in my eyes, it seems like a pretty nice place to visit or live in.

Tuesday, October 22, 2019

Indoor Air Quality (IAQ) and Health

Indoor Air Quality (IAQ) and Health Of all the things that people take for granted, air would probably take the first prize. Despite the fact that without air, the life on the Earth would be impossible, the attitude towards air has been rather careless for considerably long time, which has led to a number of problems concerning air ecology in the present-day world. Advertising We will write a custom essay sample on Indoor Air Quality (IAQ) and Health specifically for you for only $16.05 $11/page Learn More One of the issues on the agenda is the quality of indoor air, the factors that influence it and the means to improve the indoor air quality, or IAQ. Because of a range of negative factors, both human-induced and natural, the average index of indoor air quality is rapidly decreasing, which can lead to a number of health issues and, therefore, requires certain actions. Although a home accommodation is not typically used as storage of toxic waste, there are still a lot of indoor factors that ma ke the IAQ worse. Among the most common pollutants, the ones that seem the most innocent or appear to be the least noticeable often take the first place. Outlining the key pollutants will bring one a step closer to understanding how to increase the IAQ. The first pollutant to mention is animal hair. Cluttering the room, it creates perfect environment for more dust and bacteria. Dust mites, which have already been mentioned, serve as the place for bacteria growth and are also classified as pollutants. Weirdly enough, food comes in a close second, mostly because its particles also clutter the area. Another source of air pollution at home, chemicals have a rather deplorable result on the state of the IAQ. While chemicals help cleaning the place, in a paradoxical way, they are also classified as strong allergens and, therefore, harm the indoor air considerably. However, banning chemicals from use as a means to clean home accommodation is not a way out either; according to the existing evidence, the pollen in carpets and upholstery that appear as a result of insufficient cleaning is also classified as an allergen and a factor that enhances IAQ deteriorate. Likewise, tobacco, or even second-hand smoke, contributes to making the IAQ even worse, since the particles of tobacco soar in the air, cluttering the lungs of the dwellers. Damp basements, in their turn, spur the growth of mould and can be related to as rather hazardous phenomenon. Finally, such issues as CO and CO2 production, as well as radon radiation that are emitted from some of the materials that buildings are constructed from, should be mentioned. Even though the hair-rising list of threats offered above is a fraction of the harsh reality, there are still some ways to handle the problem. First of all, the ecology of the environment must be improved; once the air is polluted outside, there is no way to make it cleaner inside the house. Then, certain methods of more efficient house cleaning must be adopte d. Finally, it is necessary to enhance the awareness about the home accommodation ecology among people (Plushke 242).Advertising Looking for essay on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Summary Unlike outdoor air quality, which is usually influenced largely by industries, large-scale air pollutants like plants and factories, and toxic waste, indoor air quality depends to a considerable extent on the attitude of the person who owns the apartment. Therefore, the awareness concerning the urban ecology and especially the ecology of home accommodations must be enhanced. Meanwhile, the environmental issues must also be considered when improving the IAQ. To be more exact, more trees, which produce oxygen, must be grown so that people could enjoy high IAQ. Plushke, Peter. Indoor Air Pollution. Vol. 4. New York, NY: Springer, 2004. Print.

Monday, October 21, 2019

Advantages disadvantages keyboard Essays

Advantages disadvantages keyboard Essays Advantages disadvantages keyboard Paper Advantages disadvantages keyboard Paper Hardware is any physical part of the computer which can be touched or seen. These are the main types of hardware:   Monitor   Mouse   Keyboard Disk Drives   Printer   Speakers   Tower Monitor Disk Drive Speakers Printer Tower Mouse Keyboard Types of hardware There are four types of hardware. Input Input is that type of hardware which is used to enter data into the computer. Process Process is that hardware which manipulates the inputted into useful form. Storage Storage is where the data is stored. Output Output devices allow you to view information produced after data has been processed. These are the following hardwares I used; Input Keyboard, mouse and scanner Process Central Processing Unit Storage RAM, USB flash drive and hard disk Output Printer and monitor In the following table I will describe the hardware I have used in my system, the way they work and the advantages and disadvantages. Name of device Price The way it works Advantages Disadvantages Keyboard i 20 When a letter, number or a symbol is pressed on the keyboard then a signal is immediately sent to the CPU. Then the CPU passes on the information to the monitor which outputs it. Keyboards come in many types. For example. QWERTY, concept, ergonomic etc. This means that you can choose the one that suits you. Using to much keyboard can lead to RSI. A keyboard can do the same job of a mouse, like scrolling through pages by just the touch of one button. People who are unfamiliar with keyboards will get a lot of mistakes and will type very slowly because the buttons are mixed up. The buttons in a keyboard are arranged in such a way that you feel comfortable to use and become used to the layout. The buttons in a keyboard are very close to each other and very light, this means that there could be a lot of errors. Mouse i 13 There are two main types of a mouse.   Optical Mouse. Balled Mouse. The way you move the mouse, in the same direction the arrow will move. A mouse can be used to play computer games. The ball in a balled mouse can get lost. A Mouse with a keyboard to enter data into data computer. Using the mouse to much can lead to RSI. A mouse is very easy to control. A mouse will only work well on flat surfaces. Scanner i 60 A beam of light is shone on the object which is going to be scanned. The light is then reflected to a sensor which detects the colour of the light. A digital image is the created inside the computer. You can get 3 in1. It includes scanner, printer and photocopier. A scanner can be very expensive. An image which is scanned can be edited and then be used in numerous forms. An image which is scanned can take up a lot of computer memory. Using a scanner saves time because data is inputted within matter of seconds. The scanner can be damaged because it is made of glass. 1GB USB flash drive i 5 It can store large amounts of information and you can transfer files from one computer to another. They are portable and come in many designs and makes. Because they are very small they can fall out from your pocket and get lost. They can take in any format. USB devices transfer viruses from one computer to another. They come in different sizes. From 32 MB to 64 GB. They are valuable, so there are chances of getting stolen. Monitor i 100 Monitors come in two types. TFT   CRT Thousands of tiny dots called pixels are displayed which then create an image. TFT monitors are slim, so they take up lees space. TFT monitors can get scratched or damaged easily. TFT monitors create less heat than CRT. CRT monitors create too much heat and the room gets stuffy. CRT monitors are massive, so there are less chances of getting damaged. Some monitors do not have good graphics, so the image quality will not be as good. CPU. (Intel Pentium Dual Core) i 80 The CPU is the brain of the computer. It processes data. In the CPU all the sorting and calculations take place. It is small, so it will take less space. If it is damaged then the computer will not work. There is no need of buying it separate because it already comes with the computer. If there is no fan next to it then it will blow up. It is very fast because it can carry out millions of instructions per second. It is very expensive to buy. Laser printer i 250 They work using powdered ink which is fused onto paper by heat and pressure. They do not use cartridges but use toners. Hundreds of pages could be printed in an hour. They are very expensive to buy. The print outs are of very good quality. Toners are used instead of cartridges, this means that there will be extra costs It is very quiet and does not make any noise. They are massive and bulky; this means that if it breaks down then repairs will be very expensive. RAM (3 GB) i 45 To load programs it uses memory. RAM lets you open many programs at once. The more RAM you have the faster your computer will be. If you have less ram then your computer will crash a lot. You can even get to 4 GB RAM. It is quite expensive to buy in shops. It responds fast to signals. If the data is not saved and computer is switched ff, then the data will be lost. Hard disk (250 GB) i 85 The hard disk is the main storage device of the computer. All the data files and applications are stored in it. You do not loose any data when the computer is switched off. The hard disk can stop the computer from working if it crashes. They can store very large amounts of data. They can go up to 1 TB or sometimes even more. If the hard disk crashes on a regular basis the data from the hard disk could be lost. They come with every computer. This means you do not have to buy one when you buy a computer. The hard disk comes fixed inside the computer and can be difficult to transfer data to another computer. Alternatives In the following table I will give an alternative device to the hardware listed in the above table. I will also describe the way it works, its advantages and disadvantages and what difference it will make if used. Name of device Alternative The way it works Advantages Disadvantage Difference it would make if used QWERTY Keyboard Concept Keyboard It has a sheet spread on a grid which has pictures and symbols. The user can identify what each button will do. People who are unfamiliar with QWERTY keyboards can use this one. It has a limited amount of options to be programmed. The difference it would make if used a concept keyboard is that I will not have to move my hands and fingers too much. It could be used to teach little children. They make a lot of sounds and noises. It is very useful when ordinary keyboards might be damaged by spillages etc. They are not good for numeric input, though some come with a numeric pad. Balled mouse Optical mouse There is a laser at the bottom of the mouse which detects the movement. The way the mouse is move the same way the arrow on the screen will move.

Sunday, October 20, 2019

Christmas Wrasse Facts and Information

Christmas Wrasse Facts and Information Christmas wrasses were named for their green and red coloration. They are also called ladder wrasses, awela (Hawaiian), and green-barred wrasses.   Description of Christmas Wrasses Christmas wrasses can be up to about 11 inches in length.   Wrasses are a big-lipped, spindle-shaped fish that flap their pectoral fins up and down while swimming. They often fold their dorsal and anal fins close to their body, which increases their streamlined shape. Males and females exhibit sexual dimorphism in color, and may change color, and even sex, during their lives.   Males in their terminal color phase are brightly-colored while females are green with black lines. The most brilliantly-colored male Christmas wrasses have reddish-pink background coloration on their body with ladder-like stripes that are bright blue and green in color.  In its initial phase, a male has a diagonal dark red line below its eye. The head of the male is brown, orange or shaded with blue, while the head of females is spotted. Younger animals of both sexes are a more drab green and brown color. The Christmas wrasses ability to change colors and sex has caused confusion over the years over species identification. It also looks similar to another species in a similar habitat - the surge wrasse (Thalassoma purpureum), which is similar in color, although there is a v-shaped mark on their snout which is absent in the Christmas wrasse.   Christmas Wrasse Classification Kingdom: AnimaliaPhylum: ChordataSubphylum: VertebrataClass: ActinopterygiiOrder: PerciformesFamily: LabridaeGenus: Thalassoma  Species: trilobatum Habitat and Distribution Christmas wrasses are found in tropical waters in the Indian and western Pacific Oceans. In U.S. waters, they may be seen off Hawaii. Christmas wrasses tend to frequent shallow waters and surf zones near reefs  and rocks. They may be found singly or in groups.   Christmas wrasses are most active during the day, and spend nights resting in crevices or in the sand.   Christmas Wrasse   Feeding and Diet Christmas wrasses feed during the day, and prey upon crustaceans, brittle stars, mollusks, and sometimes small fish, using canine teeth in their upper and lower jaws. Wrasses crush their prey using pharyngeal bones that are located near their gills.   Christmas Wrasse Reproduction Reproduction occurs sexually, with spawning occurring during the day. Males become more intense in color during spawning time, and their fins may be blue or blackish-blue in color. The males display by swimming back and forth and waving their pectoral fins. Males may form a harem with several females. If the primary male in a group dies, a female may change sex to replace him.   Christmas Wrasse Conservation and Human Uses Christmas wrasses are listed as of least concern on the IUCN Red List. They are widespread throughout their range. They are fished in limited numbers, but more important to humans for their use in the aquarium trade. References and Further Information Bailly, N. 2014. Thalassoma trilobatum (Lacepà ¨de, 1801). In: Froese, R. and D. Pauly. Editors. (2014) FishBase. Accessed through: World Register of Marine Species, December 22, 2014.Bray, D. J. 2011. Ladder Wrasse, Thalassoma trilobatum. Fishes of Australia. Accessed December 23, 2014.Cabanban, A. Pollard, D. 2010. Thalassoma trilobatum. The IUCN Red List of Threatened Species. Version 2014.3. Accessed December 23, 2014.Hoover, J. P. 2003. Fish of the Month: Christmas Wrasse. hawaiisfishes.com, Accessed December 23, 2014.Randall, J.E., G.R. Allen and R.C. Steene, 1990. Fishes of the Great Barrier Reef and Coral Sea. University of Hawaii Press, Honolulu, Hawaii. 506 pp., via FishBase, December 22, 2014.Waikiki Aquarium. Christmas Wrasse. Accessed December 23, 2014.

Saturday, October 19, 2019

Best Practices for Network Security is the Topic Essay

Best Practices for Network Security is the Topic - Essay Example In the absence of security policy, the availability of network for individuals and organizations can be compromised. It is important for users of networks to develop a sound security strategy, which involves paying close attention to the reality of internet speed, changes in technology and other realities of the technology world. Users need to know how and what to ensure network security (Convery, 2004). Individuals and organizations ought to take security management, planning, the design of procedures, and policy development in order to protect themselves from compromised security. Due to rapid technological advancements, network security is faced with new challenges frequently and this can significantly compromise the privacy and security of users. Therefore, it is important for organizations and individuals to meet the challenges of network and computer security by adopting best practices (Pauzet, 2011). In order to have an understanding of network security, this paper will discus s the best practices for network security. The first best practice for network security is the creation of usage policy statements. It is important for organizations and other users to create usage policy statements outlining the roles and responsibilities of users with respect to security. The starting point should by the establishment of a general policy that covers all data and network systems within the company (Juels and Oprea, 2013). Such a policy should outline the general user community with the security policy understanding, its aims, and guidelines to improve their security practices, as well as the definitions of their responsibilities to security. Along with the creation of usage policy statements, a company should create a partner acceptable use statement providing partners with an understanding of the information that they have, the conduct of the company’s employees, and the expected disposition of the information available to them. It is important for the comp any to describe explicitly any particular acts that have been noted as security attacks and the punitive actions that will be meted in an event of detection of security attack (Pearce, Zeadally, and Hunt, 2013). The final aspect in this regard is the establishment of an administrator acceptable use statement in explaining the rules and procedures for privilege review, policy enforcement, and user account administration. In an event that a company has particular policies regarding the handling of data or user passwords, it should present those policies clearly (Dey et al, 2012). The second best practice for network security is delivering corporate security training and awareness. Since it is the responsibility of all employees to ensure network security is achieved, it is important that they should be educated about the acceptable and responsible usage of networks and other corporate resources. There is need to train them on network security including aspects of password policies. Th ey should be invited to training sessions on network security after a certain duration of time (Liska, 2003). During these sessions, employees should receive training about the do and don’ts of various network and computer usage that may compromise network security. For example, they can be taught about what they should do or not do in instant messaging.  

Friday, October 18, 2019

Audiovisuals MaterialsTechnologies Used To Help Students With Learning Essay

Audiovisuals MaterialsTechnologies Used To Help Students With Learning Disabilities And How Are These Students Incorporated Into The Regular Classroom - Essay Example However, special attention and different teaching strategies should be employed by the teachers for this system to be effective. Students with learning disabilities have strengths and weaknesses that affect their learning. For teachers to be successful, they need to identify these points. Upon identifying these strengths and weaknesses, the teachers should work to enhance the students' skills and work to improve on the students' weak points. (Alberta Education , 2002) Teachers can start by guiding their students using an organized system. Teachers are encouraged to pay special attention and give extra time to such students for a certain period of time and slowly adjust the intensity or level of guidance according to the progress made by the student. This should be done until such time that the student can work independently. (Alberta Education , 2002) There are a variety of approaches that teachers can employ in teaching students. These approaches are like tools or strategies that will help the teachers in making the challenging task of imparting knowledge to these special students a lot easier. Students will also experience the benefits of the learning experience with the aid of such strategies. Professionals in the field of education are constantly doing research and looking for ways to improve the systems of teaching, especially students with learning disabilities. They believe that by carefully understanding the case of each individual, employing the right approach for each, and carefully monitoring their progress, there is a great possibility to improve and even correct these disabilities in the regular classroom setting. As much as possible, teaching professionals would like to address learning problems in the regular classroom setting without having to resort to special education classes. Before a student is referred to enroll at a special education program, the teachers conduct an assessment test called the Response-To-Intervention or (RTI). This is to make sure that all efforts are exhausted in the regular classroom setting before resorting to special education programs. Identification is the first step in teaching students with learning disabilities. There are two standard approaches in identifying proper strategies in teaching special students. There is the problem solving approach and the standard protocol approach. (Teaching LD, 2005) According to the website "Teaching LD", the problem solving approach involves four steps. These are proble m identification, problem analysis, plan implementation, and problem evaluation. (Teaching LD, 2005) Problem identification involves observing the students' behavior while in class to determine and enumerate the problem areas that need attention. After the teacher determines the students' weakness or limitation, the teacher check on the possible factors or causes that bring about the problem and develops a plan to address the situation. Plan implementation entails carrying out the plan set to solve the individual's problems. Problem evaluation is the last step. Here, the effects of the solutions implemented are checked vis--vis the problem of the student to determine if significant improvements have been made due to the implementation of the solution. This step is very important to determine whether to

David cole interviews dr. franciszek piper ( RESPOND ) Movie Review

David cole interviews dr. franciszek piper ( RESPOND ) - Movie Review Example The point Cole tries to make here is that most of the evidence and facts about mass homicides at Auschwitz were either incorrect or exaggerated by the Soviet Union to serve their propaganda during the time of war and how on a larger scale, facts and figures of war have been manipulated in favor of the victorious. Cole’s documentary questions various undisputed facts and points out the anomalies in what has become an irrefutable part of human history. His interview with Senior Curator and Head of Archives at Auschwitz State Museum Dr. Franciszek Piper reveals some very interesting and at the same time contradictory information about the camp and the gas chamber that was used for mass homicide. After his visit to the camp in 1992 and based on years of research, Cole observes that Piper’s version of the gas chamber operations, its reconstruction by the Soviet Union, and the use of Zyklon B are inconsistent and highly debatable. Cole says that the Soviets exaggerated facts bringing the death toll to 4 million when the reality was only 1.1 and much of the evidences put forward during the Nuremberg trial were discredited later on or found to be false. Cole opines that if Hess was hanged for running an internment camp in Auschwitz where people died of disease and malnutrition, then the thousands of Japanese who died in the United States and the Germans killed in the post war POW camp under similar conditions should also be made accountable. Finally he suggests that war crimes do not have easy and justifiable answers without raising

Thursday, October 17, 2019

Topic 5-1 Essay Example | Topics and Well Written Essays - 250 words

Topic 5-1 - Essay Example The Social Institution and Gender Index (SIGI) is an efficient tool for helping women realize their abilities and develop proper career alternatives. The tool emphasizes on fighting for the rights of women by providing evidence as to the actual levels of discrimination that females face. The only detriment of using the tool is that it may promote overconcentration on feminine gender and encourage discrimination of the masculine gender as already happens in some countries. Ethical concern relating to Social Institution and Gender Index (SIGI) is that it is forgetting and biasing against masculine gender. The tool places much emphasis on promoting feminine rights and doing nothing to the masculine gender. This element of SIGI may lead it in causing further imbalance across the genders. When compared with the Armed Services Vocational Aptitude Battery (ASVAB), SIGI performs poorly in promoting gender balance in careers. The ASVAB gives people across all genders opportunity to take career test without any form of discrimination. Qualification of individuals depends solely on their performances. In that respect, SIGI can cause social conflict in the career fields in the long term, while ASVAB can reinforce the perceptions of gender unfairness in career

Competitive Advantage Assessment in google+ Assignment

Competitive Advantage Assessment in google+ - Assignment Example Quality is another competitive advantage that the company capitalizes in (Laudon, 270). The company provides its market with the best quality search engine compared to the others, ensuring that the market always prefer the search engine. Technology investment has been the other factor that the company has applied to gain a competitive edge over the other companies providing search engine services. Google+ is the search engine company that has invested a lot of money in technology, to keep their services at the best of other search engine providers (Laudon, 286). The company keeps updating its technology after short duration to incorporate new features that makes their services more appealing and satisfying to their customers. Monetizing the company’s services is yet another factor that has enabled the company gain a competitive advantage over its competitors (Laudon, 301). The company has been able to create money value out of the various products and services it offers throug h integrating advertisements in all of its provisions. This has enhanced its ability to become the most profitable search engine company, and enabled it to invest in more sophisticated technology than all the other competitors in that market segment. Google+ search engine, based on the porter’s value chain, holds competitive advantage with activities such as supplier power, through differentiation (Laudon, 306). Suppliers deliver material to the company, which are differentiated and specialized, and of interest to the company’s customer base. Another values chain factor is supplier’s volume, which allows the company to create pages that rank their materials based on the volume inputs by the suppliers. Barriers to entry are the other value chain activity that allows it to obtain a competitive edge over the others in the same market segment. These value chain activities have

Wednesday, October 16, 2019

Topic 5-1 Essay Example | Topics and Well Written Essays - 250 words

Topic 5-1 - Essay Example The Social Institution and Gender Index (SIGI) is an efficient tool for helping women realize their abilities and develop proper career alternatives. The tool emphasizes on fighting for the rights of women by providing evidence as to the actual levels of discrimination that females face. The only detriment of using the tool is that it may promote overconcentration on feminine gender and encourage discrimination of the masculine gender as already happens in some countries. Ethical concern relating to Social Institution and Gender Index (SIGI) is that it is forgetting and biasing against masculine gender. The tool places much emphasis on promoting feminine rights and doing nothing to the masculine gender. This element of SIGI may lead it in causing further imbalance across the genders. When compared with the Armed Services Vocational Aptitude Battery (ASVAB), SIGI performs poorly in promoting gender balance in careers. The ASVAB gives people across all genders opportunity to take career test without any form of discrimination. Qualification of individuals depends solely on their performances. In that respect, SIGI can cause social conflict in the career fields in the long term, while ASVAB can reinforce the perceptions of gender unfairness in career

Tuesday, October 15, 2019

EARLY MOTIVATIONAL THEORIES Essay Example | Topics and Well Written Essays - 1250 words

EARLY MOTIVATIONAL THEORIES - Essay Example However, the theory that comes closest in understanding the motivation in human being in every sense is Abraham Maslow’s theory of ‘Hierarchy of Needs’. Unlike the ‘reward-punishment’ and ‘fair-unfair’ approach of motivation theories like ‘reinforcement theory’ by B.F. Skinner and ‘equity theory’ by John Adams respectively, the theory of ‘hierarchy of needs’ takes a ‘humanistic approach’ towards the motivation factor in human beings. It considers human beings as ‘humans’ and not ‘machines’ or ‘trainable’ beings who can be made to behave in certain way by giving them certain rewards in return. ‘Hierarchy of needs’ is the most developed and ‘human’ theory of motivation because it not only values the physical and psychological needs of human being, but also values the spiritual needs of human beings and hence, demonstrate that every human being has a spiritual dimension hidden in him which can be attained when his basic needs are fulfilled. The idea of ‘whole’ being Abraham Maslow was a revolutionary psychologist. He was instrumental in bringing a totally different kind of thinking, known as ‘the third force’, in the field of psychology. Maslow believed that religious aspects of human beings, like morality and spirituality, are as much a part of human nature as science is (Goble 32). He believed that if one is to truly understand the nature of human being, then one should study not only the ‘scientific’ aspects of his nature but also the spiritual and moral aspects (Goble 32). This belief led Abraham Maslow to develop the theory of motivation called as the ‘hierarchy of needs’. Maslow’s theory of human motivation is based on an understanding that human being is an integrated and organized ‘whole’ being and hence, when he is motivated to do something, then his ‘whole’ being gets involved in fulfilling the motivated act and not just a part of him (Goble 50). Hence, the desires and the needs that motivate human beings are related to each other and do not function independently from each other. The more complex the need and desire is, the higher are the chances of interrelation with other needs and desires (Goble 50). Hence, human beings cannot be motivated to perform by rewarding (ends) their individual needs (means) (Goble 50). An individual cannot be motivated to act unless all his interrelated needs are fulfilled. Hence, Maslow based his theory of motivation on the basis of the understanding that human being gets highly motivated only when he realizes that the needs of his ‘whole’ being are getting fulfilled. Hierarchy of needs Maslow has classified human needs into following five categories: 1. Physiological Needs According to Maslow, the physiological needs of food, liquid, shelter, sex, sleep and oxygen are the most powerful needs of human being as his physical survival depends on these needs (Goble 50). Once these needs are sufficiently satisfied, then the next category of needs emerge in the nature of the human beings. 2. The Safety Needs The safety needs of human beings are fulfilled when they experience security, consistency, fairness and routine at home and at school/work (Goble 54). When a person is denied of safety needs, he becomes neurotic and his need for order and control becomes a matter of life and death (Goble 54). This leads him to develop compulsive and neurotic attitude towards safety needs. When the safety needs are unfulfilled, then people get

Monday, October 14, 2019

Porter Five Forces Analysis Essay Example for Free

Porter Five Forces Analysis Essay The entrenched position of the Indian market leaders in IT industry like TCS, Infosys, Wipro, CTS, Tech Mahindra; The changing environment demands fresh thinking to gain the cutting edge advantage. This paper attempts to look at the various macro and micro environmental factors operating in the industry using. The model of strategic analysis by Michael Porter, i. e. to analyse the bargaining power of buyers and suppliers, the threat of new entrants, threat of substitutes, intensity of rivalry, impact of technological changes, growth and volatility of the market and the influence of government and regulatory interventions. These variables affecting the industry have been categorised as favourable or adverse depending on the influence on the profitability of the industry. Some strategic initiatives, which can be adopted, to leverage the favorable forces and prevent the adverse ones have been identified. This paper attempts to analyse the various macro and micro environmental factors operating in the industry to provide a basis for devising strategy. IT INDUSTRY OVERVIEW INTRODUCTION India IT industry is one of the world’s successful information technology industries. Measured by the age of many industries, the IT industry in India is still in its infancy. Yet its growth and development has caught the attention of the world so much so that India is now being identified as the major powerhouse for incremental development of computer software. The reason for this attention is not the actual size of the industry but its rapid growth rate over the nineties and subsequent decade. It has grown from US $ 150million (source: NASSCOM) in 1991-92 to US $ 64 billion in year 2008. The industry’s contribution to India’s GDP has grown significantly from 1. % in 1999-2000 to around 5% in FY06, and has been estimated to cross 5. 5% in FY2010. The sector has been growing at an annual rate of 28% per annum since FY01. The Indian IT industry can be mainly categorised into following sectors IT services, IT enabled services and BPO, Research Development, Software Product and Hardware. IT INDUSTRY PERFORMANCE The size of the Indian IT industry, according to NASSCOM, is US$ 64 billion as of year 2008. It has been growing with an annual rate of 28% since 2001. The Indian IT industry can be broadly divided into two markets: domestic market and exports market. The elements of each of the above forces and the extent and /or effect of each element in the context of the IT industry have been analysed and enumerated below. Porter’s framework, however, does not address three important variables variables-Government and Regulatory Interventions, Technological Changes, and Growth and Volatility of Market Demand. These variables have been included in the model proposed by George Day (Day, 1990), which evolved from Porter’s model and have been analysed in this study study. Aparna Parthasarathy –PGXPM 05-Term5 Page 5 Strategic Management – Industry Analysis Assignment 2009 Â  Degree of rivalry denotes the intensity of competition within the industry. As the industry is still in its growth stage, there is enough room for expansion for existing players and new entrants. With the entry of many multinational companies (MNC) are opening their operations in India to leverage the low cost advantage provided by India, has increased the completion ratio (CR) of the industry. Also as there is no huge capital investment required to start a new company, the industry see a very large numbers of small and medium-size companies operating in a niche market. Presence of such large number of players has made the industry as one of the most competitive industry in the market. : High Commoditized Offerings low-cost, little differentiation high industry growth Strong Competitors Few number of large companies Numerous or equally balanced competitors Lack of differentiation or switching costs Capacity augmented in large increments High strategic stakes EXHIBIT: Â  Aparna Parthasarathy –PGXPM 05-Term5 Page 6 Strategic Management – Industry Analysis Assignment 2009 Â  We choose the top 3 IT companies from above pie chart for the analysis. Predicting what will come in an industry that evolves on an almost daily basis is a thankless and almost futile task. Things change at such a rapid rate, and many of the technologies are so fluid, that a shift in direction can occur in weeks rather than months. If we think that todays Internet and e-commerce opportunities are technically advanced, we have not seen anything yet. Not only will the existing uses of the Internet get more and more advanced, but new ways will be found to exploit the opportunities it provides. The delivery of these services will not just be dependant on new formats and programming, but also on the mediums that deliver them. For this to happen, certain changes will need to take place, not just technological, but legal as well. Protection of consumers needs to be examined, as well as

Sunday, October 13, 2019

Data Processing in Big Data Centres Cost Reduction Approach

Data Processing in Big Data Centres Cost Reduction Approach A Cost Reduction Approach for Data Processing in Big Data Centers R. Reni Hena Helan ABSTRACT- The tremendous development in cloud data processing leads to the high load on computation, storage and communication in the data storage centers, which influence the data center providers to spend a considerable expenditure in data processing. There are three features leading to this increased expenditure, ie., job allotment, data positioning and data movement. In this paper, these three features are taken into consideration and an approach for cost reduction for cloud data processing is proposed. I propose a Markov Chain Model to analyze the task completion considering the data transmission and its computation. Keywords: Markov Chain Model, Data Center, Cloud data, Data Positioning, Data Processing. INTRODUCTION In recent years, the outburst of data all over the world has led to the demand of data processing in the data storage centers. This demand further leads to the increase in the cost incurred in the computation and the communication resources. As predicted by Gartner, by 2015, 71% of the data storage center hardware utilization would be from the cloud data processing which will cross around $126.2 billion. So, it is of vital importance to analyze the cost reduction problem in cloud data processing in the data storage centers. Data Center resizing (DCR) has been proposed to reduce the cost involved in data processing by adjusting the number of activated servers through task placement[1]. The Cloud Data Service Architecture mainly consists of distributed file systems which is helpful in distributing the data and its copies all over the data centers for an efficient load balancing and high performance. Some studies focused on reducing the communication cost by taking steps to place data on the servers where the input data exist to solve the remote data loading problem. Even though there were many solutions proposed to solve the above issues, none of the solutions were helpful in providing a cost efficient big data processing due to few disadvantages. First one, being the wastage of resources for the data that is not often accessed. Second, being the transmission costs involved depending on the distances and the type of communication used between the data centers. Not all the data could be stored on the same server because of its high volume; it is a mandatory one to store few data into remote servers that would incur transmission cost. Transmission costs get increased proportionally with the number of communication links involved. To get rid of the above disadvantages, I consider the cost reduction for cloud data processing through a joint optimization approach of task placement and data positioning in the data centers. Every server may have only a few resources needed for each piece of data residing on it. The data will need more resources to carry out with its big data processing tasks. The main aim of this paper is to optimize the data positioning, task allocation, routing and DCR to minimize the overall computation cost involved. The contributions are briefed as follows, 1.This paper considers the cost reduction problem involved with the cloud data processing in the data centers by the joint optimization of data positioning, task allocation and routing. To explain the computation and the transmission involved with the data centers, the Markov Chain model has been used and the task completion time has been derived. 2. For cost reduction, three factors are taken into consideration. The first one is how to place data in servers and the second one is how to distribute the data and the third one is how to resize the data centers to achieve minimum cost operation. II. OTHER RELATED WORKS Cost Minimization in Server The data centers are distributed throughout the world to store huge volumes of data that are accessible to thousands of users. A data center consists of a large number of servers that consume much power. Few Million dollars were to be spent on electricity cost that is a rising problem leading to the increased operation cost. The best known mechanisms proposed that grabbed attention was the DCR that focused on energy management by the data centers. Liu et al.[2] examined the same issue by considering the delay with the network. Fan et. al [3] analyses on how much computing equipments can be hosted within a fixed power budget in a safer and an efficient manner. Data Management The main aspect of data management is the reliability and effective data positioning. Sathiamoorthy et al. [4] proposed a solution based on erasure codes that offered high reliability in comparison with the Reed-Solomon codes. Yazd et al[5] proposed a scheduling algorithm to improve energy efficiency in data centers considering the data locality properties. Data Placement Agarwal et al[6] gave a data placement approach for the geographically distributed cloud services by considering the bandwidth cost, data center capacity, etc. It analyzes the logs based on the data access types and the client locations. All the existing works either focus on the task allotment or on the data placement or on the data management. But this paper takes into consideration, the data positioning, the task allotment and the routing of data systematically. SYSTEM MODEL The geographically distributed data center topology is shown in Fig. 1. with all the data centers containing the same data are connected via switches. There are a set of data centers(D), and each data center d à Ã‚ µ D that consists of a set of servers Sd connected to the switch md à Ã‚ µ M having a local transmission cost of Cl . The local transmission cost Cl will be less than the data center transmission cost Cr. Le the whole system be modeled as a Graph denoted by G=(N,E) where, N is the vertex set that includes all the switches(M) and the servers(Sd) E is the edge set. The weight involved with the edges are represented as, w(u,v)= Cr , if u,v à Ã‚ µ M Cl, otherwise The data stored in geographically distributed data centers are divided into a set of chunks C. Each data chunk c à Ã‚ µ C has a size and its is normalized to the server storage capacity. For each chunk of data, there will be P copies available in the distributed system for the fault tolerance. ÃŽ »c be the average task arrival rate requesting for chunk c. Fig. 1. Data Center topology The task arrival in each server is considered as a Poisson Process. If the task is distributed to a data center where the data chunk does not reside, it will take some amount of time till the data chunk gets transferred to that data center. Each task should be replied with a response time of R. PROBLEM FORMULATION Data Placement and Task allocation constraints The binary variable ysc is used to refer to whether the data chunk c is placed on the server s. ysc takes the value 1 if the chunk c is placed in the server s and it takes the value 0 if the chunk c is not placed in the server s. In any distributed file system for each data, there are P copies of data chunks stored and the data stored in each server cannot go beyond the storage capacity. Any server is termed as an activated one(as), only if there are data chunks stored onto it or else tasks assigned to it. Data Loading Constraints For every data chunk c required by the server s, there are few external or internal data transmissions involved for which a routing procedure is devised. The Graph containing the servers and the switches is divided into three categories, 1. Source Nodes: These are the servers consisting of the data chunks 2. Relay Nodes : These nodes receive data from the source nodes and forward them to the  other nodes based on some routing technique. 3. Destination Nodes: These are the nodes that are receiving the data chunks. Each and every destination node will receive the data chunks only if does not have a copy of it. Cost Reduction The cost involved with the transmission of the data chunks could be minimized by choosing the parameters such as the ysc ,as , ÃŽ »c etc. PERFORMANCE EVALUATION The performance analysis of the joint optimization approach describes that the communication costs decreased if more tasks and data chunks were placed in the same data center. Further increase in the number of servers will not affect the data chunk distribution among them. Increased requests lead to more activated servers and more computation resources and the joint optimization approach tries to lower the server cost. This approach balances between the server cost and the communication cost. When the delay requirement is very small, many servers are activated to provide quality of service. And the server costs decrease as the delay constraints increases. CONCLUSION This paper explains the joint optimization approach of data positioning, task allotment and routing of  data to reduce the overall operational cost involved with the data centers that are geographically distributed. This approach reduced the computational complexity considerably. REFERENCES [1] L. Rao, X. Liu, L. Xie, and W. Liu , â€Å"Minimizing Electricity Cost: Optimization of Distributed Internet Data Centers in a Multi-Electricity –Market Environment,† in Proceedings of the 29th International Conference on Computer Communications (INFOCOM).IEEE,2010, pp. 1-9. [2] Z. Liu, M. Lin, A. Wierman, S.H. Low, and L.L. Andrew, â€Å"Greening Geographical Load Balancing ,†in Proceedings of International Conference on Measurement an Modeling of Computer Systems(SIGMETRICS. ACM, 2011,pp.233-244. [3] X. Fan, W. D. Weber, and L. A. Barroso, â€Å"Power Provisioning for a Warehouse-sized Computer,† in Proceedings of the 34th Annual International Symposium on Computer Architecture (ICA).ACM, 2007, pp.13-23. [4] M. Sathiamoorthy, M. Asteris, D. Papailiopoulos, A. G. Dimakis, R. Vadali, S. Chen, and D. Borthakur, â€Å"Xoring elephants: novel erasure codes for big data,† in Proceedings of the 39th International Conference on Very Large Data Bases, ser. PVLDB’13. VLDB Endowment, 2013, pp.325-336. [5] S. A. Yazd, S.Venkatesan, and N. Mittal, â€Å"Boosting energy efficiency with mirrored data block replication policy and energy scheduler,† SIGOPS Oper. Syst. Rev., vol.47, no.2, pp.33-40, 2013. [6] S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman, and H. Bhogan, â€Å"Volley: Automated Data Placement for Geo-Distributed Cloud Services,† in the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010,pp.17-32. [7] S. Govindan, A. Sivasubramaniam, and B. Urgaonkar, â€Å"Benefits and Limitations of Tapping Into Stored Energy for Datacenters,† in Proceedings of the 38th Annual International Symposium on Computer Architecture (ISCA). ACM.,pp.341-352. [8] P. X. Gao, A. R. Curtis, B. Wong, and S. Keshav, â€Å"It’s Not Easy Being Green, â€Å" in Proceedings of the ACM Special Interest Group on Data Communication(SIGCOMM), ACM,2012.pp.211-222. [9] J. Cohen, B. Dolan, M. Dunlap, J. M. Hellerstein, and C. Welton, â€Å"Mad Skills : new analysis practices for big data,† Proc. VLDB Endow. Vol.2, no.2, pp. 1481-1492, 2009. [10] H. Sachnai, G. Tamir, and T. Tamir, â€Å"Minimal cost reconfiguration of data placement in a storage area network, â€Å"Theoretical Computer Science, vol. 460.pp.42-53, 2012.

Saturday, October 12, 2019

The Apprenticeship of Duddy Kravitz :: essays research papers

Question #3: Duddy hides his insecurities from himself and others. He is afraid to ask his father if his mother had liked him. What does this reveal about Duddy? Why do we often hide our fears? Two thousand years ago, Jesus had said,"Man does not live by bread alone." This is true, for other than physiological needs, man also has other basic necessities. As outlined in an article written by Professor A. H. Maslow called "A Theory of Human Motivation", these basic necessities include a person’s desire for security, love, esteem and self-actualization. Thus, when Duddy hides his fears from others and himself, he is only pursuing a sense of safety, which is one of the human fundamental needs. A person’s self-projected image is very important. We often hide our own fears because we do not want to acknowledge our dreads. We are afraid that if we show our dreads, our images as great persons will be ruined. People want to feel important, significant and superior; people do not want to feel inferior, subordinate and insignificant. We are afraid that if we concede our fears, others will dismiss us as unimportant. This is even more true for an ambitious young man like Duddy. He springs from humble beginnings, but clearly, he is very eager to become a successful and powerful man. "...his bony cheeks were criss-crossed with scratches as he shaved twice daily in his attempt to encourage a beard." This clearly indicates to the readers that Duddy wants and tries to be someone that he is not. He wants himself and others to think that he is of great significance. The fact that his friends, family and others reject him make his self-projected image even more preponderan t. He must convince himself and others that he is a very important figure and he does this by denying his insecurities. Duddy is not a very well-liked figure in the novel. He arouses readers’ sympathy because his family and friends do not appreciate him. There is much evidence of this throughout the novel. Perhaps the best illustration of this is when Duddy returns from St. Agathe with six expensive sport shirts for Max as a gift, but only to find out that his father is not interested in the gift. Duddy is not loved in his family, yet he needs love desperately. Since his father, uncle and brother do not love him, his desire for love is projected onto his dead mother. The Apprenticeship of Duddy Kravitz :: essays research papers Question #3: Duddy hides his insecurities from himself and others. He is afraid to ask his father if his mother had liked him. What does this reveal about Duddy? Why do we often hide our fears? Two thousand years ago, Jesus had said,"Man does not live by bread alone." This is true, for other than physiological needs, man also has other basic necessities. As outlined in an article written by Professor A. H. Maslow called "A Theory of Human Motivation", these basic necessities include a person’s desire for security, love, esteem and self-actualization. Thus, when Duddy hides his fears from others and himself, he is only pursuing a sense of safety, which is one of the human fundamental needs. A person’s self-projected image is very important. We often hide our own fears because we do not want to acknowledge our dreads. We are afraid that if we show our dreads, our images as great persons will be ruined. People want to feel important, significant and superior; people do not want to feel inferior, subordinate and insignificant. We are afraid that if we concede our fears, others will dismiss us as unimportant. This is even more true for an ambitious young man like Duddy. He springs from humble beginnings, but clearly, he is very eager to become a successful and powerful man. "...his bony cheeks were criss-crossed with scratches as he shaved twice daily in his attempt to encourage a beard." This clearly indicates to the readers that Duddy wants and tries to be someone that he is not. He wants himself and others to think that he is of great significance. The fact that his friends, family and others reject him make his self-projected image even more preponderan t. He must convince himself and others that he is a very important figure and he does this by denying his insecurities. Duddy is not a very well-liked figure in the novel. He arouses readers’ sympathy because his family and friends do not appreciate him. There is much evidence of this throughout the novel. Perhaps the best illustration of this is when Duddy returns from St. Agathe with six expensive sport shirts for Max as a gift, but only to find out that his father is not interested in the gift. Duddy is not loved in his family, yet he needs love desperately. Since his father, uncle and brother do not love him, his desire for love is projected onto his dead mother.

Friday, October 11, 2019

Human sacrafice Essay

At around the early 1400’s and 1500’s the Aztecs conquered the region of what is today Mexico. At this time religion and culture was at height. They controlled lives of more than 20 million people! Now historians are looking back at this time not knowing whether to emphasize agriculture or human sacrifice. Historians should emphasize human sacrifice and not agriculture. The Aztecs had a great number of how many people were sacrificed. More than 2,300 prisoners were taken out of teuclepe for motecuhzonna and chihauacoalt to begin their sacrifice (Doc D). In  result of their organization they had a special time to begin sacrificing. It would start midday and end at nightfall (Doc D). They would start by killing them while their blood was racing down the temples stairway. Every time the priest cut out their heart he would roll their dead bloody body down the stairs (Doc D). The Aztecs thought of human sacrifice as a major part of religion. They thought of their gods as the most important part of their life that they even had people dress up as gods (Doc.C)! Before they start the sacrifice the person chosen is usually dressed up as a deity (Doc E). The Aztecs treat him as a god for his last year alive (Doc E). The villagers treat him as a royal family member. They would also shower him in complete luxury from the noble’s house including food, teachers, and clothes (Doc E.) when it is time for sacrifice all the women of the village feel terrible sadness when he is taken away.(Doc E). The Aztecs thought that the sacrifice also represented human kind as well. Many people think human sacrifice is a horrific brutal matter, but at the time it was a great fascination. It showed respect that the men had to sacrifice themselves (Doc D). It is believed to many historians that those who volunteered were those who had a richer afterlife. To conclude, Historians should emphasize human sacrifice because it clearly describes who the Aztecs really are. It describes the gruesome torture, and its huge part of culture. Unlike human sacrifice agriculture isn’t very unique. Agriculture is basically everywhere and everyone does it the same or else it wouldn’t grow. Therefore historians should emphasize human sacrifice.

Thursday, October 10, 2019

Kfc Versus Mcdonald’s

INTRODUCTION 1. 1 Background KFC According to the information, â€Å"Kentucky Fried Chicken (KFC) is a chain of fast food restaurant based in Louisville, Kentucky, United States that selling Kentucky Fried Chicken around the world. † It had been rated at number 60 as the world most famous brand by BusinessWeek. For KFC, fried chickens was the food they primary focus to sells. â€Å"Their basic products included chicken pieces, salads, sandwiches, desserts and some roasted and grilled chicken cuisines too. † Besides that, the beef and pork based products also offered by KFC outside the USA.The first idea of KFC’s fried chicken actually is in 1930 but it was only founded in 1952 by Colonel Harland Sanders, who was born on September 9, 1980 in Indiana, America and he was the man who developed the secret recipe which blends of 11 herbs and spices for making Kentucky Fried Chicken and this secret recipe still used today. Nowadays, KFC has more than 15,000 outlets in 1 05 countries around the world. In 1973, the first KFC restaurant in Malaysia was opened at Jalan Tunku Abdul Rahman, Kuala Lumpur. In overall, KFC currently has 445 outlets in Malaysia and it had become the largest fast food chain in Malaysia.McDonald’s According to the information, McDonald’s is the world’s largest chain of fast food restaurant based in Des Plaines, Illinois in 1955 to today that selling hamburgers around the world and it had been rated at number 9 as the world most famous brand by BusinessWeek. â€Å"For McDonald’s, foods that primarily sells by them are hamburgers, cheeseburgers, chicken, French fries, breakfast items, soft drinks, shakes and desserts. † But nowadays, due to the changing of customers’ tastes, the restaurant menu which are included salads, smoothies and fruits have been expanded by McDonald’s company.The founder of McDonald’s is Ray Kroc although the first concept of McDonald’s was act ually introduced by sibling Dick and Mac McDonald and they built the first McDonald’s restaurant in 1940 in San Bernardino, California. In 1954, Mr. Ray Kroc acquired franchising rights from Dick and Mac McDonald and a McDonald’s franchise was opened on 15 April, 1955 and later bought out the McDonald’s share of the McDonald brothers. The McDonald’s Corporation was then founded in 1955 and it was expanded by Ray Kroc. Nowadays, McDonald’s has more than 31,000 outlets in 109 countries around the world.In 29 April 1982, the first McDonald’s restaurant in Malaysia was opened at Jalan Bukit Bintang, Kuala Lumpur. In overall, McDonald’s currently has 200 outlets and about 20 to 25 outlets are being expanded annually. 1. 2 Problem This report has been written to compare the customer service of fast food restaurants in Malaysia: KFC versus McDonald’s. Nowadays, increasing competitive challenges have been faced by the fast food restaur ants in Malaysia such as restaurants KFC and McDonald’s. In order to satisfy the customers at a fast food restaurant, excellent customer service should be provided to customers by the management and the staff.Because beside the food quality, the standardize customer service that provided by fast food restaurants is expected by the customers. Currently, customer service is one of the factors that determine the customer satisfaction and it will directly affect the business of their fast food restaurants. However, recently the fast food restaurants are lack of customer service. The standardization in franchising business format does not ensure the standardization of customer service within the fast food restaurants due to some outlets are not able to follow up the same standards for customer service in franchise system. . 3 Purposes The purposes of this report are firstly to investigate the customer satisfaction with the customer service that is provided by KFC versus McDonaldâ €™s and secondly, to find out why students from Tar College prefer McDonald’s than KFC. Lastly, is to find out what aspects of customer service that provided by KFC and McDonald’s affect their business. 1. 4 Methods 1. 4. 1 The Sample The sample size of 30 was randomly selected, between the age of 18 to 22 from different gender. They are all students from School of Business Studies (Banking and Finance), Tar College KL Main Campus. 1. 4. 2 Data Collection ) Survey 30 sets of questionnaires were distributed as a source of primary data at Tar College KL Main Campus. These questionnaires consisted of 8 questions which focused on the customer satisfaction with the customer service that is provided by KFC versus McDonald’s, the reasons why students from Tar College prefer McDonald’s than KFC and what aspects of customer service that provided by KFC and McDonald’s affect their business. A clean copy of the questionnaire can be found in Appendix A. b) Internet Search The source of secondary data is the information obtained from the internet research.Information was gathered on the customer service that is provided by KFC and McDonald’s from the Internet. Various websites of KFC and McDonald’s were browsed through for this research. 1. 5 Scope This report investigates the customer service that provided by KFC and McDonald’s only. Other fast food restaurants are not included in this report. It focuses on the customer satisfaction with the customer service that was provided by KFC versus McDonald’s, the reasons why students from Tar College preferred McDonald’s than KFC and what aspects of customer service that provided by KFC and McDonald’s affect their business.The survey questions were distributed on 28 May 2012 at Tar College and collected back after the respondents finished their survey and only had 30 Tar College KL Main Campus students of School of Business Studies (Banking and Finan ce) were surveyed for this report. 2. FINDINGS 2. 1 Findings from Survey / Questionnaire Pie Chart 1. 1 The chart shows the frequency of TARC students go to fast food restaurant. 30 respondents were surveyed. As shown in the pie chart 1. , there is a total of 12 respondents who were going to the fast food restaurant once every two weeks, which occupied 40% of the 30 respondents. There are also 8 respondents which equal to 27% of the 30 respondents are going to the fast food restaurant once a month. Besides this, there are 6 respondents, 20% of the 30 respondents go to fast food restaurant once a week. For the remaining 4 respondents, there are 3 respondents go to fast food restaurant less than once a month and only 1 respondent go to fast food restaurant for two or three times a week.This pie chart shows that, most of the TARC students are going to fast food restaurant once every two weeks as it occupied 40% of the 30 respondents and the least of the TARC students are going to fast food restaurant for two or three times a week as it only occupied 3% of the 30 respondents. Pie Chart 1. 2 The chart shows the fast food restaurants that TARC students prefer to go. 30 respondents are being selected for a survey of either KFC or McDonald’s they will prefer to go. As shown in the pie chart 1. 2, there are 26 respondents which occupied a large portion of 87% among the 30 respondents are prefer to go to McDonald’s.Whereas the remaining of 4 respondents which only occupied a small portion of 13% among the 30 respondents is prefer to go to KFC. There are large portions of TARC students prefer to go to McDonald’s rather than KFC. These may be affected by the customer services, prices and the set menu provided by the McDonald’s are better than KFC. Bar Chart 1. 1 The chart shows the customer satisfaction with the customer service that is provided by KFC versus McDonald’s. 30 respondents were surveyed. As shown in the bar chart 1. 1, there is a total of 17 respondents who satisfied with the customer service that is provided by KFC.Whereas there is a total of 13 respondents who are not satisfed with the customer that is provided by KFC. On the other hand, there is a total of 26 respondents who are satisfied with customer service that is provided by McDonald’s and the other 4 respondents are not satisfied with customer service that is provided by McDonald’s. This bar chart shows that, customer service provided by McDonald’s are more satisfied by the respondents. KFCMcDonald’s Poor AverageGoodPoorAverageGood My food order was correct and complete1161311316 Waiting time after ordering food12631209 Staff are patient when taking orders32431254Communication skills421511910 Telephone services skills72032226 Staff are friendly and polite520531710 Sauces.. untenils.. 714931710 Table 1. 1 Bar Chart 1. 2 Bar Chart 1. 3 Bar chart 1. 2 and 1. 3 shows that, for KFC and McDonald’s, we focus on seve n interesting customer services which were responded well from our 30 respondents in TAR College through the questionnaire survey which included whether the food was correct and complete, waiting time after ordering food, staffs are patient when taking food, communication skills, telephone service skills, staff are friendly and polite, and availability of sauces, tissues, and utensils.According to the survey, the questions were focused on the customer services for both KFC and McDonald’s. From the respondents view, we found that the consumers are more satisfied with the ordering service in McDonald’s compared to KFC. Ordering service is important to maintain the business because if the food order was wrong and incomplete, this may cause consumer resentful with the service that provide by the fast food restaurant.Next, the waiting time after service play an important role in the fast food restaurant and this is the reason why consumers like to have their meal in fast fo od restaurant because usually most of them are students or workers who are in the hurry so they need to get their meal in the shortest time. Based on the respondent view, the waiting time after ordering food in McDonald’s is faster and shorter than KFC, this show that respondents are more preferred to have their meal in McDonald’s.Moreover, the attitude of the staff when taking order from the consumer will affect the reputation of the restaurant. Due to the survey, staff from McDonald’s are more patient when taking order than staff from KFC. In addition, Malaysia was a multi-racial country, so the communication skills are important when communicate with their customer. The respondents from survey feel that communication skills of McDonald’s are better than KFC since the McDonald’s can speaks in multiple languages. Nowadays, apart from drive hrough and having meal in restaurant, most of the fast food restaurants are provided telephone service for co nsumer to ordering food. For the staff who responsible to the telephone service, they need to answering the phone with the polite attitude and the speed of the staff speaking was important to ensure that the customer can listen clearly and understand. According the result of survey, respondents are more likely to use the telephone service of McDonald’s compared to KFC. Furthermore, friendly and polite staffs are according to the staffs who work in a fast food restaurants such as McDonald’s and KFC.This refers to their respond on how to serve their customer, a staff should be able to respond well such as the way they welcome their customers, taking order and answer customer question. When a staff from a particular fast food restaurant such as McDonald’s and KFC performs nicely and in a courteous behavior, this leads to frequent visit of the customers to the particular fast food restaurant. As a result from survey, we found that respondents are more preffered to M cDonald’s customer service compared to KFC.Lastly, the avaibility of sauces, tissue and utensils also act an important role in a fast food restaurants because some of the customer would like to have some sauces to favor their food and they may need some tissue after taking meal. Refer to the survey, most of the respondents are more satisfied with the facilities of the McDonald’s compared to KFC. In short, the customer services of the McDonalds are more prefered by customers if compared to KFC. Bar Chart 1. 4 The chart shows the methods that are suitable for KFC and McDonald’s to improve their customer services. 0 respondents were based on their opinion and preferences to respond how to improve the customer services for KFC and McDonald’s. Based on the survey, 17 out of 30 respondents had been choose to train the staff to be polite always for KFC and 8 respondents for McDonald’s. On the other hand, 15 of respondents had responded to train their staf f to use language to promote a good customer services and 16 respondents had choose it for McDonald’s. 9 respondents had responded to train their staff to deal with customers complaints for KFC and 8 respondents for McDonald’s.There are 20 respondents had choose to increase the speed of services for both KFC and McDonald’s. 8 respondents responded that communicate more with customer are suitable in to improve customer services for KFC and 9 respondents for McDonalds. KFC and McDonald’s both have 11 respondents respond on upgrade the staff appearance and image. Upgrade of delivery services for KFC have 12 respondents and for McDonald’s have 13 respondents. 8 respondents had responded that KFC need to upgrade their telephone services and 15 respondents responded that McDonald’s need to do so to improve their customer services.It is highly likely most of the respondents responded that the KFC and McDonald’s need to increase the speed of services because it was probably due to the staff served the staff slowly and the waiting time is long. For KFC, there are very least respondents unsatisfied with the telephone services skills and for McDonald’s there are only 8 respondents unsatisfied with the staff manners and attitude. As a conclusion, KFC and McDonald’s and should focus more on the speed of their services and the staff appearance and image so that it can help to improve their services. . 2 Findings from the internet From our secondary research, we found that the customer service provided by McDonald’s is better than KFC. Due to the good customer service provided by McDonald’s, many customers prefer McDonald’s to KFC. For KFC, we found that there is a declining service standards. A lots of complaint about KFC. Our research shows that, many customers end up with disappointed with the customer service provided by KFC after they visit it. Many customers complainted that the staff a re impatient when taking their orders and poor manners.One of the examples is â€Å"on 6 February, 2012 an serious incident was happened at KFC i-city, Shah Alam Malaysia. The KFC’s staff was fighting and hitting their customer. † Customers are paid to eat at KFC, no one deserve to be treated like that. Besides that, the food that customers orders was not correct. For example, â€Å"a customer ordered a bucket meal: 5 grilled and 5 original but when he opened the bucket, his half-grilled half-original recipe order was replaced by an all-grilled bucket. † These all indicated the bad customer service from KFC so customers less prefers go to KFC than McDonald’s.In contrast, McDonald’s less likely to have these kinds of problems. McDonald’s always provide good service based on standardization in franchising business format to their customers. So customers will prefers go to McDonald’s than KFC. 3. CONCLUSION In conclusion, most of the res pondents are prefer McDonald’s instead of KFC. As mentioned above, the reasons that respondents prefer McDonald’s from a brief view are the customer services provided such as staff attitude, communication skills, telephone service skills, availability of utensils is better than KFC as McDonald’s is compare with KFC.Based on our research, it is shown that both McDonald’s and KFC have their own customer services such as Drive-Thru services, delivery services, telephone services, staff attitude and others which can attracting customers. Both fast food restaurants are always maintained and improve their quality and services provided which can make sure their services are preferred and satisfied by everyone. This can maintain their old customers and also attracted some new customers. Most of the TARC students are prefer to go McDonald’s by referring the questionnaires.According to our research, KFC should improve their customer services until they can a chieve the similar popularity level just like McDonald’s, so that they could be the preferable fast food restaurant. Furthermore, customers can always give some opinion, suggestions or comments on their homepage or through the comment box to make sure that both McDonald’s and KFC understand the needs of the customers. Both McDonald’s and KFC also can improve their quality of products and customer services so that customers can satisfy with the services provided. 4. RECOMMENDATIONSAccording to the conclusion, we are recommend that the customer services for both fast food restaurants, McDonald’s and KFC which were not satisfied by customers should be improved to achieve a higher level or more preferable and satisfied by customers. For McDonald’s, we are recommend that the communication skill of the staff should improve by training their staff to use language that promotes good customer services based on the respondents view. The McDonald’s sta ff should not talk too fast or too slow to the customers so that the customers can hear clearly what they talking about.Moreover, McDonald’s should communicate more with their customers such as distribute a survey and request a feedback. Through this method, McDonald’s can know the needs and the satisfaction of their customers about their products and services so that they can improve their products and services. Furthermore, McDonald’s can upgrade their delivery services such as delivery within 15minutes and maintain the food freshness. The delivery staff must drive carefully to avoid accident so that the customers can trust on them.Lastly, McDonald’s also can upgrade their telephone service skills. When the customers call for the delivery, the staff must explain clearly to the customers about their menu and double confirm with the menu order by the customers. McDonald’s also can provide more type of language for the customers so that they can cho ose the language they know. Besides that, for KFC, the respondents have gives some opinions and comments which the KFC’s staff needs to increase the speed of services to ensure that the customers no need to wait and queue for a long time to get the food.The KFC’s staff also needs to be polite when serving their customers. The KFC can conduct a programme which the main objective is to train their staff to be polite when serving customers to avoid their staff argue with the customers. This can decrease the complaints from the customers. When they receive complaint from customers, they need to know how to deal with the customers promptly. So, KFC may give the empowerment to their staff and give training to their staff how to make decision when dealing the complaint from customers.Lastly, KFC need to upgrade their staff’s appearance and image. For example, KFC can set up guidelines for their staff how to improve their image and appearance. If the staff looks tidy an d clean, customers will be more confident to buy their products. On the other hand, the customers will never buy their products if their staff looks messy and dirty. Therefore, we suggest that the recommendations mentioned above might be encouraged more customers to buy their products and be more satisfy when buying their products as well as both McDonald’s and KFC improved their customer services.