Saturday, August 31, 2019

Mobile Phone and Phoebe Cook Copeland

Phoebe Cook Copeland ENC0025 8 April 2013 Causes and Effects of texting while driving It is a beautiful Friday morning, when all of a sudden a huge crash is heard in the distance. At the scene of the accident there is a car crushed up against a telephone pole with a young girl inside all bloodied and cut up. Taking a closer look, the young girl seems like she is simply asleep, but in her hand she holds her phone with half written message on the screen saying, â€Å"I’ll be there†¦Ã¢â‚¬  Unfortunately, the young girl never had the chance to finish her text message because she hit a telephone pole.This young girl’s life was tragically taken from her; however, this accident could have been avoided if she would have only waited until she got to either her destination or a red light to answer the text message. Sending text messages while driving distracts a person’s attention from the main task, which is driving the vehicle safely. Text messaging is known to co ntribute to deadly accidents that have prompted several legal districts to ban the practice in many states.The reason that people text while driving in unknown and difficult to pinpoint a specific reason; unfortunately, the effects are clearly visible on the roads and also in the news. The causes and effects of texting while driving can be avoided if people just decided to put the phone down and wait until they are not driving. Texting while driving is very dangerous, but people of all ages still do it. Studies have stated that half of the percent of people of all ages text while driving, and the other half of the percent talk on the phone when behind the wheel.Even though there is no evidence that a person is openly pressured into texting while driving, there is an expectation in society to have the dire need to respond to a text message. However, it is more likely for a person to be involved in a serious accident when texting rather than talking on the phone while driving. The rea son behind this is that, when talking on the phone it only distracts the driver, but when texting the driver has to look down at the phone to answer it. Thus, making it not only a distraction for the driver, but they have to take their eyes off the road in order to reply to the message.The effects of texting while driving left a devastating trail that lead to legal implications. Due to having so many accidents on the road, different states passed a law that banned texting while driving. This ban was placed in hopes to lessen the accidents that are caused by people who text and drive. If states can ban driving under the influence, then they can surely ban the no text law in order to keep the roads safer. However, many people have argued that it is hard to spot a person texting while they are driving because they are holding the phone in their laps, which is below the dashboard.So how can the cops catch people who text and drive? The cops are trained to watch for the driver’s b ody language. If the driver seems like they are texting while behind the wheel the cop is allowed to pull them over and issue them a fine. The causes of texting while driving resolves in the most dangerous effects that ends up taking someone’s life. However, not everyone who gets into an accident while texting is unfortunate, but the most serious accidents are due to people taking their eyes and concentration off the road to answer their text message.The reason why people do not take texting while driving seriously is because they think that taking their eyes off the road for a few seconds would not do any harm. Unfortunately, they are sorely mistaken because it only takes a split second in order for something to go terribly wrong. Not only is it dangerous for the person who is driving, but also for the other people that are in the car and on the road. If people just took texting while driving seriously and understood that it is just as dangerous as anything else, then we wou ld have less accidents and less of people’s lives being tragically stripped from them.In conclusion, it is not the lack of knowledge that people text while driving, but the lack of responsibility that goes into the act. People of all ages know the consequences of texting while driving lead to fatal accidents, yet they still do it. The temptation is too grandeur, however, the person who sent that text message can wait. Not waiting to answer that message while driving will not be worth it in the long run. The causes and effects of texting while driving can be avoided if we choose to put the phone down and wait to answer the text message until we are not driving because answering a text message is never worth a human life.

Friday, August 30, 2019

Week Final

My upbringing was of a military family with my Father being from central Indiana and my mother coming from Japan, this difference has interestingly shaped my views a little bit differently from hers, but on the same side of things as we have become older shaped a truly similar point of view on ourselves, family, and society. Taking the Myers Briggs test I scored a type SITS and was named a Trustee, meaning that I was more Introverted, sensing, thinking, and Judging than my mate although similar with a type JIFFS and names conservator tying between introverted and extroverted, ensign, feeling, and judging being her higher marked percentages.What I found out is that for me it was pretty accurate I feel as I am more introverted when it comes to accomplishments and things that I can do to make things matter most. Am a thinker and think most before doing something whether It has to do with myself of others, and overtime have become Judging in my perception of Issues or Ideas.My Interviewe e tested similar with the exception of being more feeling, I for one can see this as she is always looking out for the less fortunate, and helping when she can no tater what, spreading her schedule thinner as the days of the week unfold. My interviewer remembers information better if given the opportunity to observe rather than reading about a behavior. The reason was given that to observe Is better than reading as translation can be misconstrued or left out when trying to remember Just what It was you had Just read about.I for one am split between the two as I do learn better by observing an example or technique than reading, but feel strongly that I can also read about behaviors or techniques and then apply what I had just read bout, I also feel that with the more media on sicknesses and disorders in schools and with more kids being diagnosed with ADD it comes to a point that what you take in daily Is the information on what signs to look for and where to seek help, another Instan ce is that It seems like you can Just talk to any given parent who has kids and school and you will find someone who has experienced this firsthand or knows someone who has dealt with it. Interviewee chooses to study at home with distractions and noise as opposed to going to a quiet place like a public library.She feels as though noise and distractions are of no concern over the ability to be comfortable in her own setting at home, and she doesn't really want to be in a place unfamiliar because that alone will give her more distractions than any that could could settle into a calm quiet environment better to be able to concentrate better with little or no distraction apparent. I know that if I chose to study at home and was not able to retreat to my downstairs office for peace and quiet I would not be able to concentrate long enough to do any good. One way I study at home is to do it either early in the morning or later in the evening so that I am not tempted to see what else the fa mily is doing of find myself choosing to partake in other activities other than studying. The results of the Myers Briggs test for the interviewee was one of being a conservator; she was more opt to minister to others needs and desired to be of service to others first besides herself.I on the other hand was one of Trustee, decisive in practical affairs, and a guardian of time honored institutions. My interviewee felt as if the test was somewhat accurate and that it lacked accuracy on how she believed she should of scored, she had a hard time believing that only a little over 13% of the population was indeed similar to her. She felt that with Christianity being as high as it was in the U. S. That more people should have been scored as to have the desire to help others in need and to mentor to them. I thought that the test was fairly accurate for me as I am very traditional in my thinking and decisive, but felt similar as I thought that more than 11% should be like me.My interviewee t hought that childhood memories of church and observations on how her parents treated others shaped her personality as a young women, and then as she matured it grew into a better relationship with her memories of church that helped her to continue to want to go and become better at doing the things that Christ has died for us to become. She felt strongly that it was her desire or the Holy Spirit moving in her lead her to this understanding and defines who she is today. I felt different as I was never brought up in church and didn't even attend church until I aired my wife and was then arrears old. I feel that my parents strong will to be respectable after all my father was in the Ana and I held a pretty straight line or suffered the consequences for my actions, that and the Japanese culture from my mother's side which has a very high respect for a family honor that molded my transformation as a young man to adulthood.I do feel that after living the way I did, which was a typical one as a young man it was later in life when my wife asked me to attend church that I felt something was missing and that desire led to my walk with Christ that shaped my personality today. Interviewee feels as if she is very self monitoring as I pertains to her attitude each and every day, an attitude that starts with what she takes in, what she reads, watches, meditates to, music she listens to, and even the food she eats. She made the comments â€Å"garbage in garbage out†. I felt as if this has also led my day as well. I choose to be conscious of what I say and what I do. This awareness affords me the ability to handle the everyday stresses with work, school, kids, etc. Tit confidence that I can get through the day Just as long as I have the attitude to behave positively and responsibly.The strongest things that influence the interviewee's attitudes are scripture. She gives GOD her first and last each and every day. This positive uplifting meditation that includes, prayer, b ible readings, and awareness allows herself to be charged for positive things and allows her the ability to handle stressful times with integrity and honor to GOD. The thing that I felt strongly about that has the most influence on my attitude is my mind. If I allow things torn down with negative influences. I too feel that a conscious relationship with Christ has offered me and equipped my spirit to handle stressful situations with integrity and honor as well.

Thursday, August 29, 2019

Business Mgt Essay Example for Free

Business Mgt Essay Part I. Assume you have taken over responsibility to play the lead Information Technology (IT) management role in Magnum Enterprises. Your boss, Rachel Heigl, is Magnum’s CIO. The IT management group is comprised of six people who you will be supervising. Ms. Heigl is an enlightened manager, and she believes that if you are to carry out your responsibilities effectively, you need to work with her in defining your IT management role. As a first step, she invites you to write a short statement where you describe what you see to be your role as head of the IT management effort at Magnum. Proper IT Management requires researching and discerning information technology as a company resource guiding both operational and crucial company capabilities. Using information technology to maximize satisfaction of the customer alongside productivity and profitability will ensure that our competiveness with other business stays at a maximum. In turn IT can make business processes more effective and efficient to provide said resources to customers. The lead IT shall ensure performance of the company through managing technology while encompassing priorities of the business into the role. Striving to be a partner with great initiative this business will discover its leader will have accomplished and achieved what they desired. My first role of business would be to establish the parameters and to understand the IT knowledge areas. These are made up of development processes; management challenges information technologies, business applications and foundation concepts. Concepts of the foundation are making sure the role of information systems paired with business and technical concepts are a familiarity with the end user. Familiarity of concepts in entry level information systems bind with a competitive strategy can lead to an overwhelming strategic advantage. Educating Magnum’s team upon the significance of information technology with the three roles that the business world performs in order to combine business management, software, and hardware capabilities. At the Management level, decision making would lead to significant improvements for IT utilization. Business operations see information systems as a huge support to review and collect data from financial operations, managing manufacturing processes that are very sophisticated, tracking company inventory, and productivity. The use of metrics paired with identifying trends to assist the company in making informed decisions faster to provide information about our competitors. IT  is used quite often to provide a strategic support advantage for the company. Automated inventory and ordering systems an assist with the savings costs. With this information we would need to review our mission statement that identifies the company’s functions, provides oversight on the overall goal, a sense of direction, and guides decision making. Investigating and development towards understanding how we generate money and ensuring a customer base for our company. Envisioning the business plan, mission, with current IT structure and the ability to communicate with senior leadership will guide me with necessary tools to assist the Chief Information Officer (CIO). To ensure a strategic IT plan is created in which will be shared and implemented with my team. Planning to have Magnum’s team familiar with data resource management capabilities, hardware, networks, telecommunications, and software within the company is the second area of information systems known as information technologies. In today’s society PDA’s (personal digital assistants; IE. Blackberry’s ETC.) Personal computers and network servers are integral computer hardware and are crucial in our business environment. Being extremely knowledgeable is vital to our team troubleshooting and resolving hardware issues instead of having to call anot her company for maintenance. We have the ability to break down our company’s software into two categories, application software and system software. Both types normally off the consumer shelf as commercial software instead of having an employee on the team write the software codes for these programs. I plan to ensure my teams are extremely familiar with all software programs and have a firm foundation when troubleshooting and resolving technical issues. Additionally, if not already formed, I will institute a configuration control board and implement test scenarios to ensure future hardware and software being purchased will not have compatibility issues. Also a part of information technologies is data resource management. This is essential in sustaining and maintaining our company. We will require a database management system of good quality that is capable of data consolidating into a database in turn can be accessed my several program applications. Within the past fifteen to twenty years networks and telecommunications software have played a vital role. To ensure the expansion and growth for Magnum Enterprises, we will need out network to be consistent, reliable, monetary sufficient. I would prepare the team to  either install or review and change as needed our network management system that assists with traffic management, capacity planning, network monitoring, and security in essence that our system will grow and change with modern day business culture and practices as the company expands. In order to have the most dependable and proven with the cost of it a ring network should be put into place. The next area, development processes, deals with designing, planning, identifying ideas, and implementing information systems to meet potential business opportunities. It is critical that we ensure our business management capabilities alongside our hardware and software are integrated successfully within our company. Basis within t he development process and depending upon the circumstance, there are a couple of processes we want our team to employ as resolving problems com along with our business systems. Those processes are considered or known as the prototyping approach and he systems development life-cycle. The synopsis of prototyping involves quickly developing or constructing test modules of a desired system in which we will engage when we cannot determine or classify the end user requirements. These systems would be used to assist our personnel with the capabilities to design or create an information system that will be intuitive and easy to navigate for consumers. Prototyping involves four steps with the first being investigation and analysis step. This step, requirements grouped and defined. Second, is the analysis and design step in which a model is developed and constructed to meet consumer business requirements. Next, in the design and implementation, this finalizes the model that was tested and begins the initial installation. The last step to this four step process is implementation and maintenance, which would consist of the business system being accepted, used, and maintained. Prototyping advantages are: decrease in the development time, development costs and requires user i nvolvement. This generates higher satisfaction results. I plan to employ this type of approach to small initiatives. The next area is business application for information systems. This will consist of being familiar with commerce and business applications for our employees and which are used within the company to make strategic leadership and management decisions. A few of the most used business applications within a majority of companies are accounting, human resource management, enterprise resource planning, supply chain management, customer relationship management, financial management,  and supply chain management. An Architectural picture of or IT business applications will ensure that I will have familiarity with all applications that we use. This approach will identify the current interrelationships, interfaces with customer, employees, business applications, and stake holders. We will then need to review the chart and see if there are any potential process improvements that we can make to integrate those systems cross functionally and keep operational costs to a minimum. The systems devel opment lifecycle employs the systems approach to create IT solutions. This lifecycle is often utilized for large applications and it is composed of five processes that I expect my team to know and become familiar when employing the systems development lifecycle: systems investigation, systems analysis, systems design, systems implementation and systems maintenance. The first process, systems investigation, involves project brainstorming, planning and performing a feasibility study. During the brainstorming and planning initiative, a project management implementation plan is created identifying the detailed steps that will be accomplished during the creation and development of the system. The feasibility study is critically important as this outlines all requirements for the system. It also explores four major areas, organizational, economic, technical, and operational feasibility, which determines if it’s worthwhile to invest in potential business ventures. In reviewing the organization’s feasibility, we need to determine if the system is in line with and supports our company’s strategic objectives. The economic feasibility identifies and evaluates the project’s tangible and intangible cost and benefits. Technical feasibility is assessed by confirming if the necessary hardware and software will be available or can be developed and tested before implementation. Operational feasibility is determined by the motivation, desire, willingness, and competence of the stakeholders (management, employees, customers and suppliers) to use and operate the proposed system. Systems Analysis consists of consolidating requirements and includes a detailed breakdown of the business needs and requirements of the organization. This starts with an organizational analysis from one of the business end users. This individual must be keenly aware of the organizational management structure, business requirements, and current IT systems operati ons and its proposed relationship with the newly created system. Some of the outputs generated from the systems analysis  include system flowcharts, data flow diagrams, and connectivity diagrams which aid in the development of the analysis report The next process, systems design, focuses on the design, process diagrams, business rules, and developing specifications for the hardware, software, data resources that will meet the proposed requirements for new business system. The three major outputs produced from the systems design phase are user data, interface, and process design. The fourth process of the systems development lifecycle is system implementation. This encompasses either acquiring the hardware or software or developing it from company resources and then testing the products in a test environment to see how well they operate and integrate with your existing IT architecture. If testing goes well, an implementation plan including training end users and developing system documentation will be accomplished prior to incorporating and execu ting this system within our IT architecture. The final process, systems maintenance consists of consistently monitoring and evaluating the newly implemented system. This also includes correcting errors and discrepancies not identified during the testing phase and continuously making system improvements, advancements and upgrades. The final area of information systems is management challenges. There are numerous challenges that our IT team may be faced with at Magnum Enterprises. One challenge is addressing our security concerns which involve several areas. For instance, our IT team needs be constantly vigilant and on the alert for potential competitors trying to or actually hacking into our systems to steal or damage our data. Additionally, we may also be challenged with setting up restrictions and locking down the network for personnel to only use the network and its software applications for official business. Ensuring that our software is controlled and that employees are not illegally making copies of software for personal use is another area of concern. Preventing virus attacks to our network and installing anti-virus software to diagnose and remove computer viruses is of utmost concern. Failure to maintain a secure network can potentially halt our business from being productive and resulting in thousands of dollars in lost revenue. Additional challenges the IT team may be faced with may involve expanding our infrastructure and network to address our growing business. Ensuring our network provides our employees accessibility to the data they need, wherever they require it, regardless of their location will test our innovativeness.  The company may not have a backup plan to allow it to operate effectively and efficiently in the event of a forced relocation. If that is the case, I will recommend to our management staff that we establish a continuity of operations plan enabling us to relocate with minimum impact to our business operations like a hot site for temporary functionality. In the dynamic world of IT we will always be faced with challenges, however, utilizing IT and being on the leading edge of new IT systems provides our business with many benefits and makes our organization more effective and efficient. For example, IT can be used to improve and promote new business processes such as creating an automated inventory system which will save money in additional labor costs. Another use of IT in making it more efficient and effective is that using certain software programs enables us to identify and target our top customers in terms of profitability to our business. In summary, IT enables our company to successfully plan, integrate, manage, and carry out strategies which lead to profit. Part II. Six months after you take over the lead IT management role at Magnum, the CIO, Ms. Rachel Heigl, is pleased with your work. She has just attended a meeting of Magnum’s executive committee (the committee comprised of the most senior managers of Magnum), where the CEO and Vice President of marketing have indicated that Magnum’s mediocre e-business capabilities must be strengthened. As CIO, Ms. Heigl is given primary responsibility in improving Magnum’s e-business performance. She in turn puts you in charge of a small task force comprised of representatives from the marketing, operations, finance, and legal departments. In order to advance and improve Magnum’s e-business performance operations, it’s vital I establish a cohesive team with representatives from the marketing, operations, finance, and legal departments. Their input and perspective is necessary and essential in developing a way ahead and strategic plan for the future of our e-busin ess department. Developing success with our e-business begins with marketing the company. Marketing is concerned with developing and creating an innovative plan so that the product or service can be promoted and sold. Promoting our products and services are key and critical in attracting new customers as well as maintaining our current customer base. It is important that I develop an understanding of the marketing role and how it can benefit  by using Information Technology systems. Marketing information systems support well established and e-commerce processes that sustain major elements within the marketing function and is described as a continuing and interacting structure of people, equipment and procedures to gather, sort, analyze, evaluate, and distribute pertinent, timely and accurate information for use by marketing decision makers to improve their marketing planning, implementation, and control. The major components of marketing information systems include interactive marketing, sales force automation, customer relationship management, sales management, product management, targeted marketing, and market research. Two of the seven components I will be discussing are interactive marketing and customer relationship management. In our environment today, marketing information systems aid marketing personnel in a variety of tasks associated with branding products and customer service initiatives. For instance, interactive marketing is largely dependent on utilizing the internet, which permits the business and its customers and potential customers to become partners in developing, socializing, acquiring and advancing products and services. With the IT department enabling this type of communication, the company benefits from generating new ideas for other products and services as well as establishing strong customer loyalty. Another area within the marketing information systems is C ustomer Relationship Management (CRM). This incorporates and automates many customer service processes. It consists of utilizing an IT framework to construct, automate, and integrate marketing processes with the company’s business operations. CRM is usually comprised of a software suite that allows a business to provide efficient, effective and reliable service to its customers. Additionally, CRM permits a company to identify and target their most important customers as well as facilitate real-time customization of products and services based on the customer’s wants and desires. Understanding the marketing department’s views and concerns enables the IT department to implement and install an IT infrastructure that will be capable of supporting various information technologies. Some of the benefits that can be obtained from the marketing department are: an opportunity to increase sales and revenue, a chance to touch new market areas, 24/7 accessibility for the customer, and more flexibility and convenie nce for the customers. The production and operations function is supported by  manufacturing information systems. Manufacturing information systems are designed to be used specifically in an operations and production environment. Different types of manufacturing information systems consist of computer integrated manufacturing (CIM), process control, machine control and robotics. CIM involves using computers to control the total manufacturing process, from design to distribution, to produce produces products of the highest caliber. Process control involves utilizing computers to oversee and control continuing physical processes. Machine control consists of using a computer based system to direct the actions of a machine. Robotics involves designing, constructing, and building machines that have the intelligence of a computer and human like physical capabilities. It’s key I understand how the operations representative depends on these information systems to operate effectively as well as their expec tations for these systems. Working together as a team will enable the IT and operations department to develop better ideas to increase the manufacturing and production process. Developing an understanding of all the accounting and financial based systems within our business and discussing these systems with the finance representative enables our IT and finance departments to plan effectively when troubleshooting and performing upgrades. These systems include but are not limited to order processing, inventory control, accounts receivable, accounts payable, payroll, general ledger, cash management, investment management, capital budgeting and financial planning. The success of these systems is integrally connected with its information technology and services. For example, the order processing system â€Å"captures and processes customer orders and produces data needed for sales analysis and inventory control and the accounts payable system keeps track of data concerning purchases from and payments to suppliers. Communicating with the finance representative is essential in setting up or modifying these systems to meet the needs of our business. Any interrupti on or degradation in service can lead to severe damage to the business and financial services that Magnum Enterprises relies on to function and operate. As with any business, competitors are always looking for an advantage to get them ahead in their particular discipline or industry. Unfortunately, being extremely aggressive and ambitious can sometimes cloud your decision making capabilities to the point that you may  be committing breaking privacy laws and monitoring and copyright violations. As the IT lead manager for Magnum Enterprises, I’m charged with ensuring our network infrastructure and IT systems are operating proficiently. However, when it comes to addressing privacy issues from an IT perspective, opinions and viewpoints from a legal expert are necessary. In regards to privacy, several websites accumulate usernames and passwords and personal information such as home addresses and phone numbers without authorization from users. Applying internet monitoring technology within the workplace raises concerns about where the boundaries lie between personal use and public resource use. Copyright concerns and violations has become an issue with the development of the Internet and upgrades to technology. Discussing these concerns with a legal expert and implementing and adhering to strict guidelines will help prevent our company from committing these violations. In addition to the goals of strengthening the capabilities of the e-business, attention must be paid to some key technical challenges. Overseeing secure information throughout our business is extremely difficult to implement and maintain successfully. Key technical issues that may be encountered when re-engineering our e-business include privacy and confidentiality, authenticity, data integrity, access control, availability and infrastructure. Privacy and confidentiality involves businesses protecting and securing personal information while being stored or t ransmitted through email. This can be accomplished by utilizing encryption devices or firewalls. Authentication is used to confirm an individual’s identity and during e-business transactions, the purchaser and buyer wants assurance that proper identity is established. A secure way to assist with confirming identity to both individuals is to utilize a virtual private network. Data integrity means the data is correct and has not been altered while being stored or transmitted. The use of firewalls assists in preventing unauthorized users and safeguarding data. Another way to ensure data integrity is through the use of antivirus software which also aids in keeping your data free from viruses. Access control exists when you’re authorizing certain individual’s permission to restricted systems or data. Several measures that can help with access control include firewalls, access privileges, passwords, digital certificates and virtual private networks. Availability is an issue when customers and employers need information  without any disruptions. Uninterrupted Power Supply (UPS) systems, data backups and the use of anti-virus software assist with ensuring data is always available. Our e-business infrastructure constantly needs to be monitored to ensure its meeting the needs of our business. An infrastructure that is unable to consistently support the network traffic load can potentially cost our company thousands of dollars in lost sales. If the network is continually slow, increasing the speed of the network backbone will assist in providing faster and reliable support for our customers. In addition to increasing the speed of the network backbone, implementing cross-functional enterprise systems will assist in improving critical business processes throughout Magnum enterprises. A final technical challenge is ensuring all of our systems are compatible and can operate on several different hardware platforms. By having this capabi lity, our operating costs from a technical refresh perspective will decrease. While strengthening capabilities and addressing technical issues, there are management challenges within the e-business that must be addressed. As discussed earlier, our team must be vigilant in addressing security challenges such as hacking into our systems, software theft, and protecting our software applications. In addition to security issues, there are ethical concerns that must be addressed. Privacy has always been a serious and contentious issue amongst employers and employees. For instance, computer monitoring is considered by many personnel to be an infringement on the employee’s privacy and shouldn’t be allowed. However, employers argue that since the computer is a company owned resource, they should be allowed to monitor the work of their employer. In reality, many employers are concerned as to whether or not the employee is actually working and producing or just goofing off and surfing the internet. Utilizing IT equipment at work has been mentioned to cause a variety of health issues which management must address. For example, if your job consists of being in front of a computer all day, some of the health problems you may experience damage to the neck and arm muscles, eye strain, carpal tunnel syndrome, job stress, poor posture and poor circulation. Resolutions to some of these health concerns can be through the science of ergonomics. The objective of ergonomics is to devise and create safe health work conditions with the goal of decreasing health issues and increasing employee morale and work productivity. If  Magnum Enterprises has customers internationally, they also may be faced with political, geo-economic and cultural challenges. From a political concern, there are countries that have restrictions regulating or denying the transfer of data across their borders which can potentially result in customers or businesses from having to pay import or export fees. Geo-economic concerns involve issues such as identifying and locating personnel with IT skills to work at remote sites and communicating with personnel across all 24 time zones. Cultural challenges â€Å"include differences in languages, cultural interests, religions, customs, social attitudes, and political philosophies†. For example, if Magnum Enterprises was conducting a business transaction via a Video Teleconference it would be disrespectful to look them in the eye when introducing yourself. Before meeting an international customer, it would prudent to review their customs and courtesies to ensure a smooth business relationship. Improving Magnum’s e-business performance faces several challenges. Consulting with key department personnel from operations, marketing, finance and legal as well as addressing technical and management obstacles will assist me in charting a plan to put our e-business on the right track towards success. Business Mgt. (2016, Oct 17).

Wednesday, August 28, 2019

Response paper Essay Example | Topics and Well Written Essays - 500 words - 20

Response paper - Essay Example In addition, it is sad that her son has nothing positive but he is a lazy kid. In fact, the son behaves like a pimp because he can do nothing and just benefits from the activities carried out by her mother. To make the matter worse, the son hates the mother for being a prostitute but still benefits from her prostitution activities. For example, the son gets money from the mother and also eats what is cooked by her. It is through this kind of laziness that the son reminds her mother of his dead father making the whole scenario of the movie to depict sadness. Of more significance, the movie is filmed like a documentary. This is because there are no fictitious scenes included in the movie. The story line of the movie revolves around the ordinary life of the characters involved. The story about the single parent in the movie reminded me of the kind of life that I fear leading in my future. In addition, the movie made me to think about why my mother has always told me not to live like her. However, I do not think my life will be much different from that of hers considering the nature of life exhibited in Asian countries. On the other hand, the movie made me nervous throughout the different scenes. Even though the movie was presented ordinarily, I became nervous while watching it because I could relate the different situations happening to the characters to my personal life. Different people undergo personal experiences that are kept as a secret to them and after watching this movie, I could not judge people anymore. Anyway, the movie has captured the theme of feminism effectively. The use of Jeanne Dielman in the movie demonstrated the role of women in the society and how they should advocate for equality with men. This explains why the movie is categorized as one of the best feminist movies in history. The director of Jeanne Dielman, 23 quai du Commerce, 1080 Bruxelles was able to capture an image

Tuesday, August 27, 2019

Discussion Questions Week 4 Essay Example | Topics and Well Written Essays - 500 words

Discussion Questions Week 4 - Essay Example By the central limit theorem, by performing the experiment many times, I would end up with a normal distribution, and at very high numbers of experiments, the mean, the mode and the median scores would all tend to be 50 – or a perfect Bells curve. The jaggedness and asymmetry of the curve would also disappear on numerous repetitions of the experiment. 2. Confidence intervals apply to samples ( in the above example, the 100 toss batches) drawn from a large population ( a very large number of batches thrown) . It means the range of scores ( say 45 – 55 in the above example), when the population mean of 50 is likely to be present in a high proportion of cases. In normal statistical work an arbitrary figure, 95 % is taken as the proportion to define the confidence intervals, which is referred to as the confidence level. The most controllable method to increase the precision (narrowing) of the confidence interval is to increase the sample size. For instance, in the current example, if the coin is thrown a 1000 times every batch, the confidence intervals could be significantly narrowed (say, 48 – 52). Even if we assume that the sample size of 1100 is normally distributed ( although in polls like this it is rarely so) and that the sample mean of 572 is a true estimation of a population which votes for the mayor by a majority, we can than then test the null hypothesis that this sample H1 is different from a larger population sample H0 where the mayor only has a 50 % chance of winning ( sample mean 550). Let us assume (1) that the standard deviation of the samples is 11, as then, the sample mean of H1 is just within 2 standard deviations away from the population mean of 550 ( i.e. 550 +

Monday, August 26, 2019

Our ideas of what it is to be British have fundamentally altered in Essay

Our ideas of what it is to be British have fundamentally altered in the last fifty years. Discuss - Essay Example British citizenship and nationality is governed by the British nationality law, which can be acquired by a descent from British nationals. In an historical context, British people refer to the ancient Britons, the indigenous inhabitants of the Great Britain (Hall, 2004:108). In essence, this paper will delve the present assertion that the ideas of what it is to be British have fundamentally altered in the last fifty years. The English are ethnic group of people from England, a country of the United Kingdom and commonly known to speak English. They originate from the early mediaeval where old English was spoken. They are the source of English language, the parliamentary systems, the common law system, and the numerous major sports. The Irish people are the ethnic group who originate in Ireland, which is an island in the Northwestern Europe. Descendants of the Irish live in many western countries especially the English speaking countries. Their immigration was caused by politics, famine, and economic issues. The Welsh people are the ethnic group and native of Wales and speak the Welsh language. They are common in the northern and western region. They share a common cultural heritage and shared ancestral origin. The Scottish people are an ethnic group native to Scotland, amalgamation of the Picts and the Gaels. They are tied to their linguistic, culture, family ancestors, and generic nature of origin. Th eir decency in many countries with emigration is attributed to highland and lowland clearances. The notion of the Britishness was shamed during the Napoleonic Wars between the Britian and the first French Empire that later developed further during the Victorian era. Britishness became mixed in much older identities of English, Scots and the Welsh culture with a distinct that resist the notion of a homogenized British identity. Controversies of British identity arise in the Northern Ireland in Leu of the longstanding

Sunday, August 25, 2019

A region in the developing world faces water supply problem Essay

A region in the developing world faces water supply problem - Essay Example er provision; interlinking of rivers and rainwater harvesting and their comparison based on cost involved in the method and the impact of the method to the environment. It is found that rainwater harvesting is the cheaper method to be used to provide water in India. Despite the fact that India has quite a number of rivers like; Ganges, Krishna, Brahmaputra, Tapti, Yamuna, Narmada, Godavari, Mahanadi and a good climatic weather condition characterized by availability of rainfall throughout the year which amounts to 4000 billion cubic meters of rainfall, it still has to contend with the issue of water shortage (Bombay, 2010 p 47). 1This can be linked to the following factors: 1. Increased demand for water by households, industries and for irrigation in farms: In 2006, it had been found that India used about 829 billion cubic meters by volume of water. This was shared such that irrigation consumed between 89 to 92 percent, industries used between 2 to 5 percent and the households used between 3 to 9 percent of to total volume from both underground and surface water sources as per the records of World Resource Institute, Earth Trends 2001. This consumption is expected to rise to about 1.4 trillion cubic meters or to double by the year 2050. This increase results from the rapidly growing population which will result into the need of more grains which are the products from the farm industries. This in return adds pressure onto the need of high production quantity and efficient irrigation methods (Shahan, 2009).2 2. Population growth rate: The population of India is expected to hit the 1.6 billion mark by the year 2050. Such a drastic increase in population is going to add stress on the existing water. The increase in population implies the need for more industries to meet the need of the people and increased reliance on the agricultural sector for both the raw material and food. The firms would need more water for irrigation and this increases shortage in the

The Impact of the Aging Population on Public Health Care Research Paper

The Impact of the Aging Population on Public Health Care - Research Paper Example Immediately afterward the population of old people with sickness will grow rapidly. The outcome could be a massive allotment of resources to the elderly (Callahan 4). An effective solution to the current issue in the medical system should recognize these changes demography, and it should consider not just individual’s wellbeing but also the stability of the society and the well-being of the public. This research paper discusses the impact of an aging population on all aspects of the medical system, and the potential solutions to this health care issue. The impact of the aging population is more striking in the mental health care sector. The percentage of older people across the globe is continuously rising. For the elderly, mental health problems are a major reason for early mortality and morbidity. Severe depression and dementia are the two most common mental health disorders among the elderly. Specific medical needs of the older people should be recognized and provided by the medical system. Long-term care has been a serious issue brought about by the rapid aging of the population. The most evident impacts of an aging population are to be found in highly developed countries and developing nations like Latin America and China (Rao & Shaji 1). Because of the unparalleled rate of population aging, these countries would have difficulties creating health care and social policies on time to address the medical requirements of the older people. The poor priority given to the medical needs of the aged seems to contribute to the public’s insufficient knowledge about older people’s mental health disorders. Dementia and other neuropsychological problems of the elderly are still unknown issues seldom prioritized by policymakers and medical practitioners. General health services are still centralized or hospital-based and normally require long queues in jam-packed hospitals.

Saturday, August 24, 2019

Critical Thinking Case - Essay Example | Topics and Well Written Essays - 750 words

Critical Thinking Case - - Essay Example The company should ensure its financial reports abide by the GAAP. The Microsoft Corp may have violated the rules and regulations of the security and exchange commission. Microsoft documented reserves minus a properly substantiated or recorded basis. The SEC noticed that from the year 1995 to 1998, the company maintained secret liability, allowances, accruals, and reserves accounts that are termed as reserve accounts or reserves by the SEC. These undisclosed accounts stretched from $200 million to $900 million on quarter-end in the course of those 4years. At the operational level, regional controllers upheld reserve accounts in conformity with the accepted accounting principles and were correctly documented and reviewed systematically by the internal audit department of Microsoft Corp. However, at the high-ranking company level, the journal entries were carried out to several reserve accounts without applying accurately based statistics, analysis or formulas. Additionally, there was minimal or no recording to support the alterations to these reserv e accounts. The main justification was founded upon the decision of the probability of forthcoming events. Therefore, these reserves lacked the needed documentation as required by the national securities statute and did not have sufficient substantiation as speculated in GAAP (Sandretto, 57). Microsoft Corp was not doing the right thing as all the reserve accounts were not being maintained according to the GAAP, and they were not reviewed accordingly with the company’s internal audit department. Additionally, the documentation and changes depended on subjective judgments instead of factual analysis and statistics. Furthermore, the actions of only maintaining some reserve accounts and having others undisclosed are termed as fraud, and this affects the company’s profitability. Therefore, the company should make sure there are no undisclosed accounts and all