Saturday, November 30, 2019
To What Extent Can Logic, Math or Music Be Classified as a Language Tok Essay Example
To What Extent Can Logic, Math or Music Be Classified as a Language? Tok Essay To what extent can logic, math or music be classified as a language? ââ¬Å"Mathematicsà is the language with which God has written the universe. â⬠Declares the Italian physicist, mathematician, astronomer, and philosopher Galileo Galilei, when we think in modern sense language is a system of linguistic signs or symbols. In other words itââ¬â¢s the basis of communication. Some people communicate using sign language while others rely on gestures and facial expressions. Mathematics and music may also be used to communicate to some extent. On the other hand logic is only instrumental and it does not house any intention of communication. Mathematics is the systematic arrangement of numbers. These numbers could sometimes be used as a form of secretive code used for communication. Such codes are often used by agencies such as the NSA in exchanging valuable information. Many teenagers also use an alternative alphabet composed mostly of numbers and symbols, leetspeak (or 1337 ). Although mathematics may be used as a language itself could be able to achieve true meaning while using such means of communication? Is it possible to use this nonverbal communication to express our feelings? We must be blind to truly understand the role of face to face communication in our lives. We will write a custom essay sample on To What Extent Can Logic, Math or Music Be Classified as a Language? Tok specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on To What Extent Can Logic, Math or Music Be Classified as a Language? Tok specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on To What Extent Can Logic, Math or Music Be Classified as a Language? Tok specifically for you FOR ONLY $16.38 $13.9/page Hire Writer It would be impossible for you to use irony, connotation and metaphors. For example, if in our secret mathematical code 1446+ meant go away would there be any way to be sure if you said this in a friendly manner or not. This also makes everything vague and unclear. Raw information is put in front of you, you cannot have your own ideas you must accept what is given to you with no objection Music is an essential to most humans, it is a way of coping with life, and it sometimes may even be used to change the mood of the listener. Your mood shapes the music that you listen to. You would not listen to hard rock or metal after a recent breakup instead you will listen to romantic songs. You will also notice that some songs will make you feel happy. For example whenever I listen to a Beatles song letââ¬â¢s say ââ¬ËLove Me Doââ¬â¢ a fun/happy feeling forms inside of me. I do not believe that connotation of music is limited with its lyrics. Even when you listen to the tune of Bob Marleyââ¬â¢s ââ¬ËDonââ¬â¢t Worry Be Happy ââ¬Ë you will find yourself feeling happier (positive connotation) businesses use this a lot in their advertisements in order to get the potential customers attention. Although music does have a sense of connotation and is able to shift your mood it cannot be classified as a language as the only knowledge acquired if any is acquired is one way thus there is no communication. For Aristotle, logic is the instrument by means of which we come to know anything. If logic is merely instrument of knowing can we say that it is a language? Could there be language without logic, logic without language? Since we use our own logic to understand the acquired knowledge and there is no intended communication except that of which is with ourselves. Therefore even though logic pays a major role in the apprehension of knowledge it cannot be classified as a language by itself. ââ¬Å"Mathematics is, as it were, a sensuous logic, and relates to philosophy as do the arts, music, and plastic art to poetry. â⬠Once said the German poet, Karl Wilhelm Friedrich Schlegel. Mathematics and music are frequently used to communicate, but without knowledge it would not be possible for us to express our ideas and communicate at all. Therefore we can conclude that mathematics music and language are used integrated with logic forming communication. 0nur Basman () l/l V 2
Monday, November 25, 2019
A Short History of Bluetooth
A Short History of Bluetooth If you own a smartphone, tablet, laptop, speakers or any of the array of electronic devices on the market today, theres a good chance that, at some point, youve paired at least a couple of them together. And while virtually all our personal devices these days are equipped with Bluetooth technology, few people actually know how it got there. The Somewhat Dark Backstory Strangely enough, Hollywood and World War II played a pivotal role in the creation of not only Bluetooth, but a multitude of wireless technologies. It all began in 1937 when Hedy Lamarr, an Austrian-born actress, left her marriage to an arms dealer with ties to Nazis and fascist Italian dictator Benito Mussolini and fled to Hollywood in hopes of becoming a star. With the support of Metro-Goldwyn-Mayer studio head Louis B. Mayer,à who promoted her to audiences as the worlds most beautiful woman, Lamarr notched roles in films such as Boom Town starring Clark Gable and Spencer Tracy, Ziegfeld Girl starring Judy Garland, and 1949 hit Samson and Delilah.à Somehow she also found time to do some inventing on the side. Using her drafting table, she experimented with concepts that included a reworked stoplight design and a fizzy instant drink that came in tablet form. Although none of them panned out, it was her collaboration with composer George Antheil on an innovative guidance system for torpedoes that set her on a course to change the world. Drawing on what she learned about weapons systems while she was married, the two used paper player piano rolls to generate radio frequencies that hopped around as a way to prevent the enemy from jamming the signal. Initially, the U.S. Navy was reluctant to implement Lamarr and Antheilââ¬â¢s spread-spectrum radio technology, but would later deploy the system to relay information about the position of enemy submarines to military aircraft flying overhead.à Today, Wi-Fi and Bluetooth are two variations of spread-spectrum radio. Bluetoothââ¬â¢s Swedish Origins So who invented Bluetooth? The short answer is Swedish telecommunications company Ericsson. The team effort began in 1989 when the Chief Technology Officer of Ericsson Mobile, Nils Rydbeck, together with a physician named Johan Ullman, commissioned engineers Jaap Haartsen and Sven Mattisson to come up with an optimal short-link radio technology standard for transmitting signals between personal computers to wireless headsets that they were planning to bring to the market. In 1990,à Jaap Haartsen was nominated by theà European Patent Office for the European Inventor Award.à The name Bluetooth is an anglicized translation of Danish King Harald Blà ¥tands surname. During the 10th century, the second King of Denmark was famous in Scandinavian lore for uniting the peoples of Denmark and Norway. In creating the Bluetooth standard, the inventors felt that they were, in effect, doing something similar in uniting the PC and cellular industries. Thus the name stuck. The logo is a viking inscription, known as a bind rune, that merges the kings two initials.à à à Lack of Competition Given its ubiquity, some may also wonder why there arent any alternatives. The answer to this is a little more complicated. The beauty of Bluetooth technology is that it allows up to eight devices to be paired together via short-range radio signals that form a network, with each device functioning as a component of a larger system. To achieve this, Bluetooth-enabled devices must communicate using network protocols under a uniform specification. As a technology standard, similar to Wi-Fi , Bluetooths isnt tied to any product but is implemented by the Bluetooth Special Interest Group, a committee charged with revising the standards as well as licensing the technology and trademarks to manufacturers. For instance, Bluetooth 4.2 (released in 2014) uses less power and features improved speeds and security compared to previous versions. It also allows for internet protocol connectivity so that smart devices can be linked.à That isnââ¬â¢t to say, however, that Bluetooth doesnââ¬â¢t have any competitors. ZigBee, a wireless standard overseen by the ZigBee Alliance was rolled out in 2005 and allows for transmissions over longer distances, up to 100 meters, while using less power. A year later, the Bluetooth Special Interest Group introduced Bluetooth low energy, aimed at reducing power consumption by putting the connection into sleep mode whenever it detected inactivity.
Friday, November 22, 2019
A study on motivational factors influencing work place behaviour of employees
This project is entitled A STUDY ON MOTIVATIONAL FACTORS INFLUENCING WORK PLACE BEHAVIOUR OF EMPLOYEES with reference to ââ¬Å"TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,â⬠, located at Neyveli. In this company there are 145 employees including the staff members. For this study, I have chosen a sample size 30 employees through a systematic sampling. This study helps to know the factors that are influencing the motivational level of employees in the organization. This project had been undertaken by me to find out the needs and wants of the employees to motivate them. Under this Study a questionnaire that contained the questions relating to the employees expectations are given to them and their responses are recorded. The gathered data had been analyzed relating to employee motivations. CHAPTER-1 1. INTRODUCTION The project work titled as A STUDY ON MOTIVATIONAL FACTORS INFLUENCING WORK PLACE BEHAVIOUR OF EMPLOYEES with special reference to TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,, is mainly conducted to identify the factors which will motivate the employees in that organization. Managementââ¬â¢s basic job is the effective utilization of human resources for achievements of organizational objectives. The personnel management is concerned with organizing human resources in such a way to get maximum output to the enterprise and to develop the talent of people at work to the fullest satisfaction. Motivation implies that one person, in organization context a manager, includes another, say an employee, to engage in action by ensuring that a channel to satisfy those needs and aspirations becomes available to the person. In addition to this, the strong needs in a direction that is satisfying to the latent needs in employees and harness them in a manner that would be functional for the organization. Employee motivation is one of the major issues faced by every organization. It is the major task of every manager to motivate his subordinates or to create the ââ¬Ëwill to workââ¬â¢ among the subordinates. It should also be remembered that a worker may be immensely capable of doing some work; nothing can be achieved if he is not willing to work. A manager has to make appropriate use of motivation to enthuse the employees to follow them. Hence these studies focus on the employee motivation among the employees of Premier Buildings Materials Ltd. , The data needed for the study has been collected from the employees through questionnaires and through direct interviews. Analysis and interpretation has been done by using the statistical tools and dataââ¬â¢s are presented through tables and charts. 1. 1INDUSTRY PROFILE: Energy has been universally recognized as one of the most important inputs for economic growth and human development. There is a strong two-way relationship between economic development and energy consumption. On one hand, growth of an economy, with its global competitiveness, hinges on the availability of cost-effective and environmentally benign energy sources, and on the other hand, the level of economic development has been observed to be reliant on the energy demand. Coal India now ranks third amongst the coal producing countries in the world. Being the most abundant fossil fuel in India till date, it continues to be one of the most important sources for meeting the domestic energy needs. It accounts for 55% of the countryââ¬â¢s total energy supplies. Through sustained increase in investment, production of coal increased from about 70 MT (million tonnes) (MoC 2005) in early 1970s to 382 MT in 2004/05. Most of the coal production in India comes from open pit mines contributing to over 81% of the total production while underground mining accounts for rest of the national output mainly from Neyveli (MoC 2005) 1. 2COMPANY PROFILE: TAQA Abu Dhabi National Energy Company, PJSC (TAQA) Type state-owned Traded as ADX: TAQA Industry Energy Founded 2005 Headquarters Abu Dhabi, United Arab Emirates Owner(s) Government of Abu Dhabi Employees 2,800 (Aug 2011) Subsidiaries TAQA North, TAQA Bratani Website www. taqa. ae The Abu Dhabi National Energy Company, PJSC (TAQA) (ADX: TAQA) is a government controlled energy holding company of Abu Dhabi, United Arab Emirates. TAQA is one of Abu Dhabiââ¬â¢s flagship companies and as such has an important role to play in helping to deliver the economic strategy of the Emirate of Abu Dhabi. [citation needed] History TAQA was founded in June 2005 pursuant to the provisions of Emiri Decree in 2005 as a public joint stock company. In May 2006 TAQA appointed Mr. Peter E. Barker-Homek, an American businessman, as its first CEO. TAQA expanded quickly under the guidance of Mr. Barker-Homek, making several key acquisitions in Africa and North America In Canada, TAQA acquired Northrock Resources Ltd. (US$ 2 billion) Pioneer Natural Resources Canada Inc (US$ 540 million) and PrimeWest Energy Trust (US$ 5 billion). In 2008 TAQA acquired several North Sea assets from Shell U. K. Limited and Esso Exploration and Production (UK) Limited. The purchase included all equity, associated infrastructure and production licenses relating to the Tern, Eider, Cormorant North, South Cormorant, Kestrel and Pelican fields and related sub-sea satellite fields. [citation needed] In late 2009 Mr Barker-Homek relinquished his position as CEO and was replaced by Carl Sheldon. Operations TAQAs main focus of investments is the companies engaged in power generation, water desalination, and production and storage of oil and gas. In addition, it has invested in mining, metal, and services sectors. TAQA has investments in over 60 companies. Its principal wholly owned subsidiaries include Emirates Power Company, Gulf Power Company, Arabian United Power Company, Al Shuweihat Power Company, Taweelah United Power Company, Union Power Holding Company, TAQA Bratani Limited, TAQA Energy B. V. , TAQA North Ltd. and Takoradi International Company, operator of the Takoradi Power Station II. TAQA owns majority stakes in assets that provide about 85% of Abu Dhabis power generation and 90% of its water desalination capacity. In addition to the Persian Gulf region, TAQA has assets in Europe, Asia and Africa. It has interests in the Tern Alpha, Eider Alpha, Cormorant North, Cormorant Alpha, Kestrel and Pelican fields and related sub-sea satellite fields in the North Sea. On 3 August 2009, TAQA took over operatorship of the North Sea Brent Oil Pipelines System. In addition, in 2006 TAQA acquired BP Nederland Energie B. V. Through this acquisition, TAQA get onshore and off-shore production assets, including the Piek Gas Installatie facility in Alkmaar, the project of the largest offshore LNG Regas facilities utilizing the depleted field P15/P18 just off the port of Rotterdam, and partnership in the Bergermeer gas storage project. In August 2009, it bought a 15% interest in North Sea assets from the L11b Group took over the operatorship of the L11b-A production platform. Through the acquisition of CMS Generation, TAQA has assets in the UAE, Ghana, Morocco, Saudi Arabia and India. On January 3, 2013, TAQA signed an agreement with Turkey to invest about $12 billion to develop the coal fields in the Southern Turkey. This deal is considered as the second biggest Arab investment in Turkey in the energy sector. Shareholders TAQA is listed on the Abu Dhabi Securities Exchange. The company is 75. 1% indirectly owned by the government of Abu Dhabi. The government of Abu Dhabi through ADWEA owns 51%, ADWEA transferred 24. 1% of its shareholding to the Fund for the Support of Farm Owners in the Emirate of Abu Dhabi. The balance (24. 9%) is traded publicly on the Abu Dhabi Securities Market. Finance Standard Poors has assigned A+/A-1 corporate credit ratings to TAQA. Moodys has assigned a rating of Aa3 to TAQAs long term foreign and local currency obligations. Combining world-class expertise and a dynamic and exciting portfolio of assets, TAQA has been transformed from a start-up into a truly global operator within the space of seven years. TAQA AT A GLANCE Full name Abu Dhabi National Energy Company PJSC Nature of business Oil and gas exploration and production, power generation and water desalination and Energy Solutions 2012 revenue AED 27. 8 Bn USD 7. 6 Bn 2012 profit AED 649 Mn USD 176. 7 Mn Total assets as at 31 Dec 2012 AED 122. 6 Bn USD 33. 4 Bn Number of employees 2,800 Operating in North America, Europe and Greater MENA (Middle East, North Africa and India) Founded June 2005 Listed August 2005 Abu Dhabi Securities Exchange Principal shareholders Abu Dhabi Government and Government agencies 72. 5% Public shareholders 27. 5% Power generation capacity 16,395 MW Water desalination capacity 887 MIGD Oil Gas production 135,400 boe/d * US$1. 00 (United States dollar) = AED3. 6725 (UAE dirhams) 1. 3 OBJECTIVES OF THE STUDY: PRIMARY OBJECTIVE: To study , analyze and to understand the motivational factors of employees of TAQA NEYVELI POWER COMPANY Pvt. , Ltd. , that affects their work place behavior. SECONDARY OBJECTIVE: To identify the various motivational schemes that already exists in the organization. To measure the level of motivation experienced by the employees in the organization 1. 4 NEED FOR THE STUDY: To study and know the employee motivation scenario in TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,, To know that the employees satisfaction level with the motivation factors undertaken by the company. To identify steps taken by the organization to motivates its employees. To identify the factors that influence the work place behavior of employees. 1. 5 SCOPE FOR THE STUDY: This study helps the researcher to realize the importance of effective employee motivation. This study explores the views expressed by the Respondents about the motivation and providing solutions in an attempt to develop a better system. The importance of studying employee motivation is to understand the internal satisfaction of every employee. The findings of this study help the company to fulfill the expectations of the employees. It helps to provide insights to support future research regarding strategic guidance for organizations that are both providing and using reward/recognition programs. 1. 6 LIMITATIONS OF THE STUDY: The limitations of the study are the following As the data was collected through questionnaire, the responds from the respondents may not be accurate. The sample taken for the study was only 30 and the results drawn may not be accurate. Another difficulty was very limited time-span of the project. Lack of experience of Researcher. CHAPTER-2: 2. REVIEW OF LITERATURE 2. 1 THEORETICAL REVIEW Rensis Likerthas called motivation as the core of management. Motivation is the core of management. Motivation is an effective instrument in the hands of the management in inspiring the work force . It is the major task of every manager to motivate his subordinate or to create the will to work among the subordinates . It should also be remembered that the worker may be immensely capable of doing some work, nothing can be achieved if he is not willing to work . creation of a will to work is motivation in simple but true sense of term. Motivation is an important function which very manager performs for actuating the people to work for accomplishment of objectives of the organization . Issuance of well conceived instructions and orders does not mean that they will be followed . A manager has to make appropriate use of motivation to enthuse the employees to follow them. Effective motivation succeeds not only in having an order accepted but also in gaining a determination to see that it is executed efficiently and effectively. In order to motivate workers to work for the organizational goals, the managers must determine the motives or needs of the workers and provide an environment in which appropriate incentives are available for their satisfaction . If the management is successful in doing so; it will also be successful in increasing the willingness of the workers to work. This will increase efficiency and effectiveness of the organization . There will be better utilization of resources and workers abilities and capacities. 2. 1. 1 The concept of motivation The word motivation has been derived from motive which means any idea, need or emotion that prompts a man in to action. Whatever may be the behavior of man, there is some stimulus behind it . Stimulus is dependent upon the motive of the person concerned. Motive can be known by studying his needs and desires. There is no universal theory that can explain the factors influencing motives which control mans behavior at any particular point of time. In general, the different motives operate at different times among different people and influence their behaviors. The process of motivation studies the motives of individuals which cause different type of behavior. 2. 1. 2 Definition of Motivation ââ¬Å"Motivation in the real world is the art of getting the extra effort from everyone including yourselfâ⬠. Management Research, October 2007, ICFAI University press. 2. 1. 3 Saul W. Gellerman According to ââ¬Å"Saul W. Gellermanâ⬠, ââ¬Å"Motivation is the process of attempting to influence others to do their work through the possibility of gain or rewardâ⬠. HRM Review, July 2008, by Saul W. Gellerman . 2. 1. 4 Motivation According to Websterââ¬â¢s New Collegiate Dictionary, a motive is ââ¬Å"something a need or desire that causes a person to actâ⬠. ââ¬Å"Motivate, in turn, means ââ¬Å"to provide with a motive,â⬠and motivation is defined as ââ¬Å"the act or process of motivatingâ⬠. Consequently, motivation is the performance or procedure of presenting an intention that origin a person to capture some accomplishment (Shanks. N. H. ). According to Butkus Green, motivation is derived from the word ââ¬Å"motivateâ⬠, means to move, push or influence to proceed for fulfilling a want Business Management and Strategy ISSN 2157-6068 2012, Vol. 3, No. 1 2. 1. 4 Significance of Motivation Motivation involves getting the members of the group to pull weight effectively, to give their loyalty to the group, to carry out properly the purpose of the organization. The following results may be expected if the employees are properly motivated. 1. The workforce will be better satisfied if the management provides them with opportunities to fulfill their physiological and psychological needs. The workers will cooperate voluntarily with the management and will contribute their maximum towards the goals of the enterprise. 2. Workers will tend to be as efficient as possible by improving upon their skills and knowledge so that they are able to contribute to the progress of the organization. This will also result in increased productivity. 3. The rates of laborââ¬â¢s turnover and absenteeism among the workers will be low. 4. There will be good human relations in the organization as friction among the workers themselves and between the workers and the management will decrease. 5. The number of complaints and grievances will come down. Accident will also be low. 6. There will be increase in the quantity and quality of products. Wastage and scrap will be less. Better quality of products will also increase the public image of the business. 2. 1. 5 Motivation Process. 1. Identification of need 2. Tension 3. Course of action 4. Result ââ¬âPositive/Negative 5. Feed back 2. 1. 6 Theories of Motivation. Understanding what motivated employees and how they were motivated was the focus of many researchers following the publication of the Hawthorne study results (Terpstra, 1979). Six major approaches that have led to our understanding of motivation are Mcclellandââ¬â¢s Achievement Need Theory, Behavior Modification theory; Abraham H Mallows need hierarchy or Deficient theory of motivation. J. S. Adamââ¬â¢s Equity Theory, Vrooms Expectation Theory, Two factor Theory. McClellandââ¬â¢s Achievement Need Theory. According to McClellandââ¬â¢s there are three types of needs; Need for Achievement ; This need is the strongest and lasting motivating factor. Particularly in case of persons who satisfy the other needs. They are constantly pre occupied with a desire for improvement and lack for situation in which successful outcomes are directly correlated with their efforts. They set more difficult but achievable goals for themselves because success with easily achievable goals hardly provides a sense of achievement. Need for Power It is the desire to control the behavior of the other people and to manipulate the surroundings. Power motivations positive applications results in domestic leadership style, while it negative application tends autocratic style. Need for affiliation It is the related to social needs and creates friendship. This results in formation of informal groups or social circle. Behavioral Modification Theory; According to this theory people behavior is the outcome of favorable and unfavorable past circumstances. This theory is based on learning theory. Skinner conducted his researches among rats and school children. He found that stimulus for desirable behavior could be strengthened by rewarding it at the earliest. In the industrial situation, this relevance of this theory may be found in the installation of financial and non financial incentives. More immediate is the reward and stimulation or it motivates it. Withdrawal of reward incase of low standard work may also produce the desired result. However, researches show that it is generally more effective to reward desired behavior than to punish undesired behavior. Abraham H Maslow Need Hierarchy or Deficient theory of Motivation. The intellectual basis for most of motivation thinking has been provided by behavioral scientists, A. H Maslow and Frederick Herzberg, whoââ¬â¢s published works are the ââ¬Å"Bible of Motivationâ⬠. Although Maslow himself did not apply his theory to industrial situation, it has wide impact for beyond academic circles. Douglous Mac Gregor has used Maslowââ¬â¢s theory to interpret specific problems in personnel administration and industrial relations. The crux of Maslowââ¬â¢s theory is that human needs are arranged in hierarchy composed of five categories. The lowest level needs are physiological and the highest levels are the self actualization needs. Maslow starts with the formation that man is a wanting animal with a hierarchy of needs of which some are lower ins scale and some are in a higher scale or system of values. As the lower needs are satisfied, higher needs emerge. Higher needs cannot be satisfied unless lower needs are fulfilled. A satisfied need is not a motivator. This resembles the standard economic theory of diminishing returns. The hierarchy of needs at work in the individual is today a routine tool of personnel trade and when these needs are active, they act as powerful conditioners of behavior- as Motivators. Hierarchy of needs; the main needs of men are five. They are physiological needs, safety needs, social needs, ego needs and self actualization needs, as shown in order of their importance The above five basic needs are regarded as striving needs which make a person do things. The first model indicates the ranking of different needs. The second is more helpful in indicating how the satisfaction of the higher needs is based on the satisfaction of lower needs. It also shows how the number of person who has experienced the fulfillment of the higher needs gradually tapers off. Physiological or Body Needs: The individual move up the ladder responding first to the physiological needs for nourishment, clothing and shelter. These physical needs must be equated with pay rate, pay practices and to an extent with physical condition of the job. Safety: The next in order of needs is safety needs, the need to be free from danger, either from other people or from environment. The individual want to assured, once his bodily needs are satisfied, that they are secure and will continue to be satisfied for foreseeable feature. The safety needs may take the form of job security, security against disease, misfortune, old age etc as also against industrial injury. Such needs are generally met by safety laws, measure of social security, protective labor laws and collective agreements. Social needs: Going up the scale of needs the individual feels the desire to work in a cohesive group and develop a sense of belonging and identification with a group. He feels the need to love and be loved and the need to belong and be identified with a group. In a large organization it is not easy to build up social relations. However close relationship can be built up with at least some fellow workers. Every employee wants to feel that he is wanted or accepted and that he is not an alien facing a hostile group. Ego or Esteem Needs: These needs are reflected in our desire for status and recognition, respect and prestige in the work group or work place such as is conferred by the recognition of oneââ¬â¢s merit by promotion, by participation in management and by fulfillment of workers urge for self expression. Some of the needs relate to ones esteem e. g. ; need for achievement, self confidence, knowledge, competence etc. On the job, this means praise for a job but more important it means a feeling by employee that at all times he has the respect of his supervisor as a person and as a contributor to the organizational goals. Self realization or Actualization needs: This upper level need is one which when satisfied provide insights to support future research regarding strategic guidance for organization that are both providing and using reward/recognition programs makes the employee gives up the dependence on others or on the environment. He becomes growth oriented, self oriented, directed, detached and creative. This need reflects a state defined in terms of the extent to which an individual attains his personnel goal. This is the need which totally lies within oneself and there is no demand from any external situation or person. J. S Adams Equity Theory Employee compares her/his job inputs outcome ratio with that of reference. If the employee perceives inequity, she/he will act to correct the inequity: lower productivity, reduced quality, increased absenteeism, voluntary resignation. Vrooms Expectation Theory Vroomââ¬â¢s theory is based on the belief that employee effort will lead to performance and performance will lead to rewards (Vroom, 1964). Reward may be either positive or negative. The more positive the reward the more likely the employee will be highly motivated. Conversely, the more negative the reward the less likely the employee will be motivated. Two Factor Theory Douglas McGregor introduced the theory with the help of two views; X assumptions are conservative in style Assumptions are modern in style. X Theory Individuals inherently dislike work. People must be coerced or controlled to do work to achieve the objectives. People prefer to be directed Y Theory People view work as being as natural as play and rest People will exercise self direction and control towards achieving objectives they are Committed to. People learn to accept and seek responsibility Types of Motivation. Intrinsic motivation occurs when people are internally motivated to do something because it either brings them pleasure, they think it is important, or they feel that what they are learning is morally significant. Extrinsic motivation comes into play when a student is compelled to do something or act a certain way because of factors external to him or her (like money or good grades) Incentives An incentive is something which stimulates a person towards some goal. It activates human needs and creates the desire to work. Thus, an incentive is a means of motivation. In organizations, increase in incentive leads to better performance and vice versa. Need for Incentives Man is a wanting animal. He continues to want something or other. He is never fully satisfied. If one need is satisfied, the other need arises. In order to motivate the employees, the management should try to satisfy their needs. For this purpose, both financial and non financial incentives may be used by the management to motivate the workers. Financial incentives or motivators are those which are associated with money. They include wages and salaries, fringe benefits, bonus, retirement benefits etc. Non financial motivators are those which are not associated with monetary rewards. They include intangible incentives like ego-satisfaction, self-actualization and responsibility. INCENTIVES Financial Incentives Non-financial incentives Wages and Salaries. * Competition Bonus * Group recognition Medical reimbursement *Job security Insurance *Praise Retirement benefits *Workers participation *Suggestion systems Motivation is the key to performance improvement There is an old saying you can take a horse to the water but you cannot force it to drink; it will drink only if its thirsty so with people. They will do what they want to do or otherwise motivated to do. Whether it is to excel on the workshop floor or in the ivory tower they must be motivated or driven to it, either by themselves or through external stimulus. Are they born with the self-motivation or drive? Yes and no. If no, they can be motivated, for motivation is a skill which can and must be learnt. This is essential for any business to survive and succeed. Performance is considered to be a function of ability and motivation, thus: Job performance = f (ability) (motivation) Ability in turn depends on education, experience and training and its improvement is a slow and long process. On the other hand motivation can be improved quickly. There are many options and an uninitiated manager may not even know where to start. As a guideline, there are broadly seven strategies for motivation. There are broadly seven strategies for motivation. Positive reinforcement / high expectations Effective discipline and punishment Treating people fairly Satisfying employeeââ¬â¢s needs Setting work related goals Restructuring jobs Base rewards on job performance Essentially, there is a gap between an individualââ¬â¢s actual state and some desired state and the manager tries to reduce this gap. Motivation is, in effect, a means to reduce and manipulate this gap. 2. 2 RESEARCH REVIEW The research problem here in this study is associated with the motivation of employees of TAQA NEYVELI POWER COMPANY Pvt. , Ltd. ,. There are a variety of factors that can influence a personââ¬â¢s level of motivation; some of these factors include 1. The level of pay and benefits, 2. The perceived fairness of promotion system within a company, 3. Quality of the working conditions, 4. Leadership and social relationships, 5. Employee recognition 6. Job security 7. Career development opportunities etc. Motivated employees are a great asset to any organization. It is because the motivation and Job satisfaction is clearly linked. Hence this study is focusing on the employee motivation in the organization. 2. 3 RESEARCH HYPOTHESIS A hypothesis is a preliminary or tentative explanation or postulate by the researcher of what the researcher considers the outcome of an investigation will be. It is an informed/educated guess. It indicates the expectations of the researcher regarding certain variables. It is the most specific way in which an answer to a problem can be stated. Research hypotheses are the specific testable predictions made about the independent and dependent variables in the study. Hypotheses are couched in terms of the particular independent and dependent variables that are going to be used in the study. The research hypothesis of this study is as follows. HYPOTHESIS: There is significant relationship between income and motivation level of the employees CHAPTER -3 3. RESEARCH METHODOLOGY. Research is a systematic method of finding solutions to problems. It is essentially an Investigation, a recording and an analysis of evidence for the purpose of gaining knowledge. According to Clifford woody, ââ¬Å"research comprises of defining and redefining problem, formulating hypothesis or suggested solutions, collecting, organizing and evaluating data, reaching conclusions, testing conclusions to determine whether they fit the formulated hypothesis. â⬠3. 1 RESEARCH DESIGN: A Research design is plan that specifies the objectives of the study, method to be adopted in the collection of the data, tools in analysis of data and helpful to frame hypothesis. ââ¬Å"A research design is the arrangement of condition for collection and analysis of data in a manner that aims to combine relevance to research purpose with economy in procedureâ⬠. Research design is needed because it facilitates the smooth sailing of the various project operations, thereby making the project as efficient as possible yielding maximal information with minimal data collected. 3. 2 Sampling Design. A sample design is a finite plan for obtaining a sample from a given population. Simple systematic sampling is used for this study. 3. 3 Universe. The universe chosen for the research study is the employees of TAQA NEYVELI POWER COMPANY Pvt. , Ltd. , 3. 4 Sample Size. Number of the sampling units selected from the population is called the size of the sample. Sample of 30 respondents were obtained from the population. 3. 5 Sampling Procedure. The procedure adopted in the present study is probability sampling, which is also known as chance sampling. Under this sampling design, every item of the frame has an equal chance of inclusion in the sample. 3. 6 Methods of Data Collection. The dataââ¬â¢s were collected through Primary and secondary sources. 3. 6. 1 Primary Sources. Primary data are in the form of ââ¬Å"raw materialâ⬠to which statistical methods are applied for the purpose of analysis and interpretations. The primary sources are discussion with employees, dataââ¬â¢s collected through questionnaire. 3. 6. 2 Secondary Sources. Secondary dataââ¬â¢s are in the form of finished products as they have already been treated statistically in some form or other. The secondary data mainly consists of data and information collected from records, company websites and also discussion with the management of the organization. Secondary data was also collected from journals, magazines and books. 3. 6. 3 Nature of Research. Descriptive research, also known as statistical research, describes data and characteristics about the population or phenomenon being studied. Descriptive research answers the questions who, what, where, when and how. Although the data description is factual, accurate and systematic, the research cannot describe what caused a situation. Thus, descriptive research cannot be used to create a causal relationship, where one variable affects another. In other words, descriptive research can be said to have a low requirement for internal validity. 3. 6. 4 Questionnaire. A well defined questionnaire that is used effectively can gather information on both overall performance of the test system as well as information on specific components of the system. A defeated questionnaire was carefully prepared and specially numbered. The questions were arranged in proper order, in accordance with the relevance. 3. 6. 5 Nature of Questions Asked. The questionnaire consists of closed ended, dichotomous questions and open ended question. 3. 6. 6 Pre-testing A pre-testing of questionnaire was conducted with 10 questionnaires, which were distributed and all of them were collected back as completed questionnaire. On the basis of doubts raised by the respondents the questionnaire was redialed to its present form. 3. 6. 7 Sample A finite subset of population, selected from it with the objective of investigating its properties called a sample. A sample is a representative part of the population. A sample of 30 respondents in total has been randomly selected. The response to various elements under each questions were totaled for the purpose of various statistical testing. 3. 6. 8 Variables of the Study. The direct variable of the study is the employee motivation, Indirect variables are the motivational schemes, motivational level and job satisfaction and effectiveness of employees. 3. 6. 9 Presentation of Data. The data are presented through charts and tables. 3. 6. 10 Tools and Techniques for Analysis. Statistical method: Percentage method Bar chart Statistical tool used: To arrange and interpret the collected data the following statistical tool used is ANOVA. CHAPTER-4 4. DATA ANALYSIS AND INTERPRETATION: 4. 1 PE
Wednesday, November 20, 2019
Any topic you think is good for my paper 'but look to the assigment Assignment
Any topic you think is good for my paper 'but look to the assigment sheet befour u start' - Assignment Example Using logos as a means of persuasion, Boot provided narrative details of historical claims and identified nautical miles that establish sovereignty to lands according to international law. Likewise, incidents of current events that detail both countriesââ¬â¢ active claim through positioning respective vessels in the area have been detailed. The apparent lack of support and active participation of the United States, known as an ally to the Philippines proven by a 1951 treaty, was likewise allegedly established through assuming a neutral stance. The author used ethos by establishing his credibility as a ââ¬Å"senior fellow at the Council on Foreign Relations and author of the forthcoming (book)â⬠(Boot par. 13). By indicating that he is not among the two claiming partiesââ¬â¢ citizen, he appeared to present objective and unbiased arguments on this matter. Through establishing appropriate logical reasoning, the author effectively established logos as a rhetorical appeal and has likewise appropriately used ethos to credibly confirm his unbiased character as an author and to provide an objective report on the subject of
Tuesday, November 19, 2019
Management Essay Example | Topics and Well Written Essays - 1500 words - 1
Management - Essay Example f Brazil. This retail sector organization is considered as one of the leading retailers as well as largest employers in private sector of Australia (Coles Myer Ltd 2000). The origin of Coles Myer was around 100 years ago was from the two Australian retailers namely ââ¬Å"G. J. Coles & Coy and The Myer Emporiumâ⬠(Coles Myer Ltd 2000). They have their operations in Australia along with New Zealand and possess about 2,000 retail stores in those places. Coles Myer has shareholders numbering above 380,000 (Coles Myer Ltd 2000). The organizationââ¬â¢s businesses are generally classified into five groups which include Food & Liquor, Myer Grace Bros, General Merchandize, e.colesmyer and Apparel & Home. The retail stores have an annual sale of more than $24 billion. The various brand of Coles Myer are Grace Bros, Coles, Myer, Target, Bi-Lo, Kmart, Liquor land, Fosseys and Officeworks. This retail sector organization has provided employment to over 167,000 staffs (Plunkett 2005). Col es Myer has adopted wide communication strategies in order to contact with their staffs, suppliers, customers, stakeholders, shareholders by replying through letters and intranet site. They believe that satisfying customers will bring their success and collecting customersââ¬â¢ feedback will help them to make necessary improvements if it is needed. They want to provide best services to the customers and preserve good relationship with them (Coles Myer Ltd 2000). Coles Myer provides ongoing practical training to the staff in order to facilitate them to handle properly the customers and provide quality services to them. The training is provided with a basis of making their staff to have an actual understanding of their compliance responsibilities (Coles Myer Ltd 2000). Coles Myer is entering into the retail market of Brazil with the aim of business expansion as well as spreading their brand name beyond the Oceania region. As Brazil is considered as one of the worldââ¬â¢s largest retail markets, thus Coles Myer can get scope of extension of their retail business. Though the store will be located in Brazil but the services will be provided by the Australian organization. However, several Brazilian staffs will be hired for the retail store but the training will be provided by the Australian managers since they are extremely customer oriented. They want to provide best services to the customers of Brazil to build their brand name. The main purpose of the report is to prepare an environmental analysis of the Brazilââ¬â¢s business environment for an Australian retail sector organization Coles Myer who wants to enter in the market of Brazil. The company faces various challenges and can gain opportunities while expanding its business in new Brazilian market. In this paper the PESTL analysis along with SWOT analysis of Coles Myer is conducted and subsequently recommendations are provided for the organization for entering into the
Saturday, November 16, 2019
Internet security Essay Example for Free
Internet security Essay In the developed and developing world, the use of the internet has increased in popularity. The use of the internet has become the preferred mode of communication and resources for various players like industries, corporations, telecommunications, and governments and in business. In business, the internet has facilitated financial transactions that have greatly changed the face of business making it fast and simple and in conformation to the global village the technology has created. With the increased use of the internet, there has been a corresponding increase in cyber crime from criminals who are seeking either financial gains or other advantages for example military. The frequency of these attacks is very high and the levels of sophistication used are great . This makes it difficult for many organizations to determine new threats, their risk factors and ways of dealing with the menace (Cetron, et al, 2009). Many times it is difficult for the organizations to determine which attacks to deal with first and how to allocate resources to deal with them. In the commercial sector, attacks on electronic financial transactions have resulted in great financial losses and corresponding reductions in user confidence. Electronic transactions consist of funds transfers, data interchange, trade confirmations and benefits transfers. Many crimes that occur have plagued the industry for years like theft, service denial, extortion demands or fraud. Technology has however; greatly magnified the ability of major crimes to be committed in a matter of seconds. Electronic security is an industry that is growing and becoming globalised. This industry offers services in the categories of assessment, access and utilization. To demonstrate the severity of attacks on April, 2009, Chinese and Russian spies managed to infiltrate the United States of America electrical grid and inserted disruptive software into the system (Cetron, et al, 2009). An attack which occurred prior to this one on September 2008 would have caused the collapse of the global economy were it not for intervention. Unidentified hackers robbed the lucrative American financial market accounts a total of five hundred and fifty million dollars in a little less than two hours. If the accounts would not have been closed by the Treasury Department they would have lost almost six trillion dollars. This would have caused the global economy to collapse in approximately twenty four hours. One security threat is phishing. Phishing involves the acquisition of sensitive information like passwords, credit card details, usernames and pin numbers. It makes its presentation as being a legal entity. The unsuspecting victims are lured by receiving communications which purport to be from a popular website or payment processors. It is usually done through instant messaging services or emails (Shu-Min Shann-Bin, 2006). These communications directs the users to enter their details at a fraudulent website which bears a great semblance to the authentic one. Phishing attacks were observed on two popular brands which provide payment services for banks globally in the United States of America in February 2010. The fraudsters created phishing sites in English and other languages, the most popular being French. These websites targeted customers by sending spam mails with the subject proving the card number and claiming that there was a risk of fraudulent transactions taking place. This attack was created using two types of phishing websites. The first utilised Uniform Resource Locators which were created with domain names with many top level domain variants. The most popular domain which was utilised was . cz which represented the Czech Republic. Upon entering their sensitive information into a card holder page for the false verification, the page redirected to the real website. The second attack utilised Uniform Resource Locators with Internet Protocol domains which were hosted on servers based in the United States (Glaessner, 2002). The Uniform Resource Locatorsââ¬â¢ strings were very long, typically with more than seven hundred characters. The pages asked for sensitive data but had an auto signed debit card or credit card number. This auto signing was done by placing stolen numbers of cards obtained from earlier attacks on the form. Upon receipt of information the page was redirected to a blank page. Cross site scripting is a form of phishing that occurs in programs or websites that allow user input. If the input data is not properly sanitized the program may then process thee input or execute the codes which the original program was not to do. This has been used to redirect users to fake websites. Users are advised not to click on suspicious links in emails and to check the Uniform Resource Locatorââ¬â¢s of the website to authenticate brands. It is also advised that one should type the brand domain name directly into the browser address instead of following links. The use of security software has also been recommended. Pharming involves redirecting the redirection of websites traffic and taking it to a false website. Pharming is done by either converting the hosts file on the victimsââ¬â¢ computer or exploiting Domain Name Systems serversââ¬â¢ software (Basu, 2009). These Domain Names Systems servers main task is to convert internet names to their real addresses. A compromised server therefore does not direct traffic to legitimate websites. Highly vulnerable sites of compromised are near internet leaves. If wrong entries on a computerââ¬â¢s host file are made it results in circumvention of name lookup using its own name to Internet Protocol mapping, this makes it a popular target for malware. Once it is rewritten a user can be redirected to a fake copy. The better targets for pharming are desktop computers as they receive poor administration in comparison to most other internet services. Host file compromises can compromise the network router. Many routers specify Domain Name Systems to clients on the network and wrong information here spoils the entire local area network. A compromise in routers is very hard to detect. Pharming also occurs by infecting the victimââ¬â¢s computer with malware or a virus. This causes the redirection of a website to a fake one. An unsuspecting user may enter information site unaware. To avoid pharming, users are advised to search for details that prove that the website is authentic. Typing the sites address into the browser bar also offers some protection. Use of an antivirus to reduce virus infiltration into the computers is also recommended. Vigilance is important in warding off attacks. Trojan horses are also a great threat to internet security. Trojan horses present themselves as valuable software which is available for downloading on the internet. This fools many people into downloading the virus in the presumption that it is another application. A Trojan horse is usually separated into parts which are the client and the server. The client is usually disguised as important software and is situated in some sharing networks like peer to peer or uncertified websites for downloads. As soon as the client Trojan is executed in the computer, the attacker who is the person operating the server has great control over the computer and can destroy it depending on his purpose. The spread of the Trojan horse virus can occur through email attachments using various spamming techniques. Malware creators spread the virus through chat software like Skype and Yahoo Messenger. The virus may also infect other machines by distributing copies of itself to those in the address book of the infected computer. There are many types of Trojan horses. Remote access Trojans give attackers complete control of he victimââ¬â¢s computer and access to any information stored in the files. Password Trojans copy all passwords and look for passwords as they are keyed into a computer and send them to a certain email address. Key loggers log the keystrokes used by victims and send the log information to the attacker and can be configured to online and offline modes of recording. Destructive Trojans cause destructions to files and deletes them completely from infected computers. They are able to delete all system files of a computer (Basu, 2009). While there are other types of Trojans not mentioned here, it should be noted that a Trojan may work with a combination of some of the functionalities explained. To best avoid a Trojan hose virus attack, one should open email attachments or files received from strange senders. Installing and updating an antivirus program is also helpful. For secure electronic online transactions certain criteria have to be addressed and met. There must be secure access control which determines who has access to a system and be able to deny access to intruders. Proper authentication of users and message integrity must also be established. Privacy of the parties involved must also be safeguarded and maintained (Shu-Min Shann-Bin, 2006). Non-repudiation must be ensured where the sender cannot deny (falsely) sending a message. The use of online signatures has also been manipulated to commit fraud. Electronic signatures are a recognized electronic way of showing that a person has accepted the contents of a message sent electronically. These signatures are increasingly being used in electronic commerce and have evolved into digitized signatures which are encrypted and more secure than a simple electronic signature. While they are themselves subject to fraud the purpose of their creation was to combat fraud (Hansen, 1995). Electronic signatures are based on legal principles which have to be understood by the institutions which wish to use it. The use of digital signatures is a code that authenticates the origins of a document. A well done electronic signature causes the signer to be uniquely identified. It also causes the document to be locked using encryption technology and is electronically stamped throughout the process with time and date. It also stores the document for access without fear of being lost or its existence denied. The security of electronic financial transactions can also be enhanced by the use of digital certificates against phishing and pharming. To avoid manipulation of transactions in signature based online banking, utility of Class-3 electronic card readers should be explored. Virus scanners should be used to protect from Trojan horses. Care when downloading software should be exercised. With the mass adoption of technology, countries around the world are increasingly using technological based solutions to address their needs and carry out their functions. The use of the internet has created a highly competitive market. While cyber crime has not infiltrated or integrated itself equally in many countries it is an industry that is growing very fast and deserves much global attention (Shu-Min Shann-Bin, 2006). As earlier discussed, it has the potential of destroying whole markets and creating great havoc. Attempts to control cyber crime have not been concerted. Many challenges have arisen in trying to control this threat. Technology is a fast changing and cyber crime has achieved very high levels of sophistication. Cyber criminals have designed malware which are virtually undetectable and are difficult to diagnose. It has proved challenging to design and keep up with these creations (Glaessner, 2002). Due to the high levels of vulnerability to cyber attacks there is an urgent need to formulate clear policies. These policies should include guidelines on how to cyber crime is to be dealt with. This should include coming up with laws that will outline prosecution of cyber criminals due to the potential of these criminals to create damage and go unpunished and detected. Users of the internet and the various services it offers should also assume personal responsibility for their own safety (Cetron, et al, 2009). Studies have shown that the ââ¬Ëhuman factorââ¬â¢ is largely the cause of the success of cyber crime rather than advancements in technology. In the United States, despite various public campaigns on internet security, people continue to be reckless with their personal information. This leaves them very vulnerable to attacks by cyber criminals. Predictions have been made that incidences of cyber crime will continue to increase. Users should therefore be very vigilant in monitoring their information. Software to combat cyber crime is available and users should take the initiative to acquire this software to alert them of suspicious websites or claims. They should also regularly update their software like antivirus which is highly dynamic due to the creation of new viruses and malware that occurs at a very high rate (almost daily). In conclusion, electronic financial transactions have created great savings in terms of financial savings for both providers and users and reduced the wastage of time. The use of this technology has correspondingly exposed its users newer forms of crime and every effort must be made to combat cyber crime.
Thursday, November 14, 2019
Terrorism Essay: War on Terrorism - Round 1 :: September 11 Terrorism Essays
War on Terrorism: Round 1 The Bush Troika´s war on terrorism reached first base after installing a new government in Afghanistan. One of the poorest and most defenseless countries on earth has been bombed into rubble by a megalomaniac superpower that can see no limits to its rights of domination. The country that harbors more Southern American terrorists, executioners and dictators than anyone else in the world has shown us all what happens when others harbor wanted men! What has been achieved if we look beyond Bush's clichés, Pentagon's hype and Rumsfeld´s and Ashcroft´s rhetoric? Is the world any safer? Have the suspected evildoers been brought to justice? Has it been a "just war"? Are there less people who hate or dislike the western powers? The good news is: The Talibans are ousted. American oil companies will be able to build that pipeline and the new ruler Karzai have old ties with Unocal and supports the scheme as do others in the new interim(?) government!!! The bad news is: Between 40,000 and 60,000 innocent civilians, already oppressed by their government in Afghanistan have been killed according to independent studies. Millions more refugees have been created and the starvation has increased due to stopped relief deliveries before winter was setting in. The final death toll may rise to 3 million. The same government that was helped to power by CIA and Pakistan´s secret service in -96 now has been defeated and other known crooks, gangsters and opium sellers, responsible for the death of maybe 50,000 civilians when last in power, have again taken power, for some time or indefinitely remains to be seen. Large parts of the infrastructure in Afghanistan have been bombed into oblivion as have Red Cross buildings and important depots. Unexploded cluster bombs will cause carnage for generations. Some thousands of brainwashed Taliban soldiers, most of whom had no knowledge whatsoever of any terrorist actions outside Afghanistan, have been killed. A few hundred lower level commanders have been captured and will be questioned. The main "enemies" and raison d étre of the "war", the monster, evildoer, fanatic (etc), Bin Laden and his sidekick Mullah Omar, suspected (but not convicted) of atrocities and certainly no friends of capitalism, are not to be found even after levelling the topography of parts of the country and their whereabouts may be any place in the eastern parts of the world. Terrorism Essay: War on Terrorism - Round 1 :: September 11 Terrorism Essays War on Terrorism: Round 1 The Bush Troika´s war on terrorism reached first base after installing a new government in Afghanistan. One of the poorest and most defenseless countries on earth has been bombed into rubble by a megalomaniac superpower that can see no limits to its rights of domination. The country that harbors more Southern American terrorists, executioners and dictators than anyone else in the world has shown us all what happens when others harbor wanted men! What has been achieved if we look beyond Bush's clichés, Pentagon's hype and Rumsfeld´s and Ashcroft´s rhetoric? Is the world any safer? Have the suspected evildoers been brought to justice? Has it been a "just war"? Are there less people who hate or dislike the western powers? The good news is: The Talibans are ousted. American oil companies will be able to build that pipeline and the new ruler Karzai have old ties with Unocal and supports the scheme as do others in the new interim(?) government!!! The bad news is: Between 40,000 and 60,000 innocent civilians, already oppressed by their government in Afghanistan have been killed according to independent studies. Millions more refugees have been created and the starvation has increased due to stopped relief deliveries before winter was setting in. The final death toll may rise to 3 million. The same government that was helped to power by CIA and Pakistan´s secret service in -96 now has been defeated and other known crooks, gangsters and opium sellers, responsible for the death of maybe 50,000 civilians when last in power, have again taken power, for some time or indefinitely remains to be seen. Large parts of the infrastructure in Afghanistan have been bombed into oblivion as have Red Cross buildings and important depots. Unexploded cluster bombs will cause carnage for generations. Some thousands of brainwashed Taliban soldiers, most of whom had no knowledge whatsoever of any terrorist actions outside Afghanistan, have been killed. A few hundred lower level commanders have been captured and will be questioned. The main "enemies" and raison d étre of the "war", the monster, evildoer, fanatic (etc), Bin Laden and his sidekick Mullah Omar, suspected (but not convicted) of atrocities and certainly no friends of capitalism, are not to be found even after levelling the topography of parts of the country and their whereabouts may be any place in the eastern parts of the world.
Monday, November 11, 2019
Education in modern world Essay
Education is an important tool that is applied in the contemporary world to succeed, as it mitigates the challenges which are faced in life. The knowledge gained through education enables individualsââ¬â¢ potential to be optimally utilized owing to training of the human mind. This opens doors of opportunities enables individual to achieve better prospects in career growth. Education has played a paramount role in the modern industrial world. This is attributed to the fact prospective employees must be qualified adequately to perform various tasks effectively. Industries entail resources that are sufficiently equipped with the modern technology to suit the needs and wants of the society. This thus, makes education to become a norm for services in all industrial sectors. The primary skills and the ability to apply the skills is the basis for evaluating the market. The foundation of the society is based on education since it brings economic and social prosperity. Gaining education enhances an individual to live a respectful life in the society. This is because education offers a setting in which culture and values of a society are developed. In this respect, education in modern society provides a forum where the society examines its issues and identifies solutions. The advancement of a society both economically and socially is by gaining education which consequently enables them to run a modern society. Career wise, education is the foundation of developing individuals by providing knowledge regarding humanity the worldover. Individuals in the society acquire new approaches in life that build opinions on the economical and social life. Education enables the society to interpret the world around them rightly, innovating to new ways and means that conform to their environment. The current advancement in technology has been enhanced largely by education, as individuals are able to apply the skills acquired in real life leading to innovations. Employment in the contemporary world is based on education, as employees must possess the required skills that correspond with the currentà technology to perform their tasks. Prospective employees must be equipped with skill for them to cope with ever advancing technology in all industrial and agricultural sectors. Therefore, education has become a basic principle to measure the labor market on the basis of essential skills and the ability to appropriate them through suitable communication. Education has played a major role in the modern life to all individuals in the society. It has enabled societies to prosper both socially and economically by enabling them to develop common culture and values. It is through education that Technological advancement has been realized enabling communication and production of cost effective products and services to the society at large.
Saturday, November 9, 2019
Restructuring Debt Essay
One appreciates the recommendation of providing information on restructuring debt to help the company combat its recent financial troubles. Even though the company is in the process of reorganizing one believes this information will help a company in reporting the restructuring of debt. One will provide information on the requirements of reporting debt on bonds, notes, and capital leases. In performing this one will also provide the journal entries one would need to record to restructure the companyââ¬â¢s debt along with a comparison of the debt for the companyââ¬â¢s current reporting. One will also provide valuable information on the companyââ¬â¢s postemployment benefits. Requirements for Reporting Debt Long-term debts for a company are present obligations that consist of probable future sacrifices of economic benefit, which ââ¬Å"are not payable within a year or within the operating cycle of the companyâ⬠(Kieso, Weygandt, & Warfield, 2007, p. 672). Generally long-term debt consists of three categories, which are bonds payable, notes payable, and capital leases. In financial reporting one of the most controversial areas is the reporting of long-term debt because this debt impacts the cash flows of a company (Kieso, Weygandt, & Warfield, 2007, p. 691). The reporting requirements of the debt must be both substantive and informative to the investor. Some long-term debt such as bonds, notes, and others may need approval by the board of directors and stockholders before a company acquires the debt. Most long-term debt a company acquires has certain ovenants or restrictions within its agreement. This helps protect both the lender and borrower. A company must disclose the features along with any covenants or restrictions in the agreement of long-term debt in the financial statements or in the notes of the financial statements. This is only if the information provides an investor a more ââ¬Å"complete understanding of the financial position of the company and the results of its operationsâ⬠(Kieso, Weygandt, & Warfield, 2007, p. 672). Bonds Payableà Bonds basically represent a contract of a promise to pay at a maturity date a sum of money plus a specified rate of periodic interest on the maturity amount. Bonds can be either secured or unsecured. Secured bonds have some pledge of collateral that backs up the bond. An example of this type of bonds is a ââ¬Å"mortgage bond secured by a claim on real estateâ⬠(Kieso, Weygandt, & Warfield, 2007, p. 673). Unsecured bonds are bonds that do not have any collateral attach to them. Most bonds carry a specific rate of interest whereas others are sold with an implied interest rate at a discount. One can convert some bonds into other securities. No matter what bond a company acquires the terms and conditions of the bond must be disclosed along with the covenants or restrictions on the bond. A company must also disclose any violation on the covenant or restrictions of the bond. In reporting bonds a company must report the bond at its face value ââ¬Å"of its expected future cash flows, which consists of interest and principalâ⬠(Kieso, Weygandt, & Warfield, 2007, p. 675). The company amortizes any discount or premium of a bond over the life of the bond. This basically is reporting the bond at its face value less the unamortized discount or plus the unamortized premium. General Accepted Accounting Principles (GAAP) requires a company to use the effective- interest method in determining the amortization of a discount or premium of a bond. A company reports the portion of the bond that matures within a year (current portion) as a current liability, and the remainder as a long-term liability on the balance sheet. Notes Payable Notes payable are generally an amount of money a company borrows with a romissory note. Long-term notes are similar and different from bonds in some ways. The similarity is notes payable also ââ¬Å"have fixed maturity dates and carry either a stated or implicit interest rateâ⬠(Kieso, Weygandt, & Warfield, 2007, p. 685). The difference is notes payable are not easily tradable. A company reports notes payable in a similar fashion as it does bonds. In reporting a note payable a company records the note at its face value of its future interest and principal cash flows. The company amortizes any discount or premium of a note over its life. If a note has no-bearing interest rate the company should report the difference between the face value and the cash received as a discount on the note. This amount one amortizes over the life of the note to interest expense. Capital Leases A company may use capital leases to finance its acquisition of capital assets. In lease financing a company must met the criteria of the Financial Accounting Standards Board (FASB) on capital leases. In this a company must record both a liability, and a related asset on its balance sheet. In reporting capital lease a company reports the lease at its present value of the minimum lease payments. The company allocates these lease payments using the effective interest method to interest expense. This allocation using the effective interest method reduces the lease liability of the company. A company regardless of the type of liability it has must report the interest rate, maturity date, current interest expense, and future interest and principles payments of the liability in its financial statements or notes. A company should also disclose any restrictions or covenants on these liabilities. In disclosing this debt a company should present the debt by major category.
Thursday, November 7, 2019
Free Essays on The Last Paper
In the case study ââ¬Å"The Late Paper,â⬠Kim is the person most responsible for her failing grade in Psychology 101. Ranked in order of descending responsibility are Philip, Arnold, Cindy, Mary, and Professor Freud. Kim may be smart in her psychology class but it doesnââ¬â¢t seem like she is as smart about the responsibility she had. The only right thing she had done was finish the paper on time but what good did that do when she still didnââ¬Ët turn it in on time. Professor Freud told her students that the term papers had to be handed to her no later then noon on December 18 and if failed to do so then they had failed in the class course. Kim knew all this no matter what, she should have known and turned it in on the day she had finished the paper. When her friend Cindy had came and offered her to join her for an end-of-semester celebration, she should have kindly told her that she had things to do and if they really wanted her to go then she had to first turn in the term paper to her teacher and then they could be on their way. Surely the party they had to go wouldnââ¬â¢t be any different if they went 15 to 30 minuets late. Instead Kim had chosen to join Cindy and her friends. Thinking she would turn in her paper on time. Fine, weââ¬â¢ll let that mistake pass. That night she should have at least came home early from the celebration and taken the responsibility which was to wake up early the next day to have time to turn in the paper. Instead, what dose she do? She comes home at 4:30a.m. but fails to get up early and leaves only 30min till 12:00 to turn in her paper. Smart! O.K., so sheââ¬â¢s not though enough to demand her husband to give back the keys to the car but she could have at least spoken to Professor Freud herself, and made 100% sure that it was alright if she was a little late with her paper because she was having car trouble. Instead she takes... Free Essays on The Last Paper Free Essays on The Last Paper In the case study ââ¬Å"The Late Paper,â⬠Kim is the person most responsible for her failing grade in Psychology 101. Ranked in order of descending responsibility are Philip, Arnold, Cindy, Mary, and Professor Freud. Kim may be smart in her psychology class but it doesnââ¬â¢t seem like she is as smart about the responsibility she had. The only right thing she had done was finish the paper on time but what good did that do when she still didnââ¬Ët turn it in on time. Professor Freud told her students that the term papers had to be handed to her no later then noon on December 18 and if failed to do so then they had failed in the class course. Kim knew all this no matter what, she should have known and turned it in on the day she had finished the paper. When her friend Cindy had came and offered her to join her for an end-of-semester celebration, she should have kindly told her that she had things to do and if they really wanted her to go then she had to first turn in the term paper to her teacher and then they could be on their way. Surely the party they had to go wouldnââ¬â¢t be any different if they went 15 to 30 minuets late. Instead Kim had chosen to join Cindy and her friends. Thinking she would turn in her paper on time. Fine, weââ¬â¢ll let that mistake pass. That night she should have at least came home early from the celebration and taken the responsibility which was to wake up early the next day to have time to turn in the paper. Instead, what dose she do? She comes home at 4:30a.m. but fails to get up early and leaves only 30min till 12:00 to turn in her paper. Smart! O.K., so sheââ¬â¢s not though enough to demand her husband to give back the keys to the car but she could have at least spoken to Professor Freud herself, and made 100% sure that it was alright if she was a little late with her paper because she was having car trouble. Instead she takes...
Monday, November 4, 2019
Journals reading Essay Example | Topics and Well Written Essays - 750 words
Journals reading - Essay Example Additionally, these guidelines are necessary for guiding the decision-making the process of the writer. Just like the writing process demands the writer to come up with everything before writing, artists also look for ideas and inspiration before beginning their artwork. They brainstorm and come up with various ideas they feel suitable to their topic or intention. Equally important, the artist also plans and structure before painting (Armstrong 24). The article uses direct speech quoted from various speakers. Use of direct speech is important in sentence construction since it makes the message look authentic and real to the reader and different audience. Furthermore, it also limits distortion of the message because it is quoted. According to the chapter Planning, the cool down is the reduction in intensity of writersââ¬â¢ frustration and temper. Various authors when faced with difficult writing tasks always develop frustration and anger that leads to random thinking. Through random thoughts, writers get the ideal and perfect opportunity to cool down and rationally think. As a result, they manage to solve the problems and eventually start writing. Moreover, free writing is the best and most useful writing strategy. According to Stafford, free writing is useful since it allows the writer to write various articles or material quickly (32). It also helps writers to enhance their speed, creativity, and memory. Equally, free writing provokes critical thinking since a writer is expected to write what he/she can recall. Moreover, it ensures construction of relevant and detailed work because writers are expected to proofread. Through proofreading, writers can remove irrelevant and unusual points or sentence from their work. They also correct grammar and spelling mistakes in their work. Besides, Speculation is to conceive or try to figure out an idea without knowing the exact meaning or purpose of it. Speculation of ideas is important to
Saturday, November 2, 2019
Review Questions Week 10 Essay Example | Topics and Well Written Essays - 500 words
Review Questions Week 10 - Essay Example In that regard, they are trained on how to take risks and innovations. Code of ethics are significant to the organization because through them people in the organization create socially responsible behavior within the organization. Similarly, people within the organization enhance openness. On the same note, code of ethics emphasizes integrity within the organization. All these are possible because code of ethics creates an ethical environment where people observe binding factors that come in the form of mission and shared goals. In return, the organization has an effective leadership. Every leader has a duty to ensure that the organization has a code of ethics and the same is adhered to all the time. High power distance refers to situations in which, the leaders and the followers do not usually interact as equals while in low power distance cultures, leaders and followers occasionally interact as equals. There are potential problems in situations where the leader comes from a high power distance culture and the followers from a low power distance culture. The problem could arise due to lack of contact, given that the followers would be willing to make contact with the leader who, on the other hand would not be willing to interact with them. Lack of interaction and difference in approaches could have an impact on the organization. Authentic leadership is the ability to make good decisions and communicate effectively with the rest of the team. Secondly, authentic leadership involves real commitment to the organizationââ¬â¢s goals and also committed to ensuring that the followers are equally motivated with an aim of ensuring achieving organization goals. Thirdly, they possess courage and strong character while discharging their duties in the organization. Fourthly, an authentic leader work hard to avoid failure because that would lead to distrust from the others. The essence of this
Subscribe to:
Posts (Atom)