Wednesday, August 26, 2020

Pythagoras of Samos Biography

Pythagoras of Samos Biography Pythagoras, a Greek mathematician and logician, is most popular for his work creating and demonstrating the hypothesis of geometry that bears his name. Most understudies recollect it as follows: the square of the hypotenuse is equivalent to the total of the squares of the other different sides. Its composed as: a 2 b2 c2. Early Life Pythagoras was conceived on the island of Samos, off the shoreline of Asia Minor (what is presently for the most part Turkey), around 569 BCE. Very little is known about his initial life. There is proof that he was knowledgeable, and figured out how to peruse and play the lyre. As an adolescent, he may have visited Miletus in his late young years to concentrate with the thinker Thales, who was an elderly person, Thaless understudy, Anaximander was giving talks on Miletus and perhaps, Pythagoras went to these talks. Anaximander took an extraordinary enthusiasm for geometry and cosmology, which impacted the youthful Pythagoras. Odyssey to Egypt The following period of Pythagorass life is somewhat confounding. He went to Egypt for quite a while and visited, or if nothing else attempted to visit, huge numbers of the sanctuaries. At the point when he visited Diospolis, he was acknowledged into the organization subsequent to finishing the customs essential for affirmation. There, he proceeded with his training, particularly in arithmetic and geometry. From Egypt in Chains Ten years after Pythagoras showed up in Egypt, relations with Samos self-destructed. During their war, Egypt lost and Pythagoras was taken as a prisoner to Babylon. He wasntâ treated as a wartime captive as we would think of it as today. Rather, he proceeded with his training in arithmetic and music and dove into the lessons of the ministers, learning their holy ceremonies. He turned out to be amazingly capable in his investigations of arithmetic and sciences as instructed by the Babylonians. A Return Home Followed by Departure Pythagoras in the long run came back to Samos, at that point went to Crete to read their legitimate framework for a brief timeframe. In Samos, he established a school called the Semicircle. Inâ about 518 BCE, heâ founded another school in Croton (presently known as Crotone, in southern Italy). With Pythagoras at the head, Croton kept up an internal hover of supporters known as mathematikoi (clerics of science). These mathematikoi lived for all time inside the general public, were permitted no close to home belongings and were exacting veggie lovers. They got preparing just from Pythagoras, following exacting rules. The next layer of the general public was known as the akousmatics. They lived in their own homes and just went to the general public during the day. The society contained the two men and women.â The Pythagoreans were an exceptionally clandestine gathering, keeping their work out of open talk. Their inclinations lay in math and common way of thinking, yet in addition in transcendentalism and religion. He and his internal circle accepted that spirits relocated after death into the groups of different creatures. They imagined that creatures could contain human spirits. Therefore, they considered eating to be as cannibalism.â Commitments Most researchers realize that Pythagoras and his adherents didnt study arithmetic for indistinguishable reasons from individuals do today. For them, numbers had an otherworldly significance. Pythagoras encouraged that everything is numbers and saw numerical connections in nature, craftsmanship, and music. There are various hypotheses credited to Pythagoras, or if nothing else to his general public, yet the most popular one,â the Pythagorean hypothesis, may not be completely his innovation. Obviously, the Babylonians had understood the connections between the sides of a correct triangle in excess of a thousand years before Pythagoras found out about it. In any case, he invested a lot of energy dealing with a proof of the theorem.â Other than his commitments to arithmetic, Pythagorass work was fundamental to stargazing. He felt the circle was the ideal shape. He likewise understood the circle of the Moon was slanted to Earths equator, and concluded that the night star (Venus) was equivalent to the morning star. His work affected later space experts, for example, Ptolemy and Johannes Kepler (who detailed the laws of planetary movement). Last Flightâ During the later long periods of the general public, it clashed with supporters of majority rules system. Pythagoras censured the thought, which brought about assaults against his gathering. Around 508 BCE, Cylon, a Croton honorable assaulted the Pythagorean Society and promised to obliterate it. He and his adherents oppressed the gathering, and Pythagoras fled to Metapontum. A few records guarantee that he ended it all. Others state that Pythagoras came back to Croton a brief timeframe later since the general public was not cleared out and proceeded for certain years. Pythagoras may have inhabited least past 480 BCE, potentially to age 100. There are clashing reports of the two his introduction to the world and passing dates. A few sources think he was conceived in 570 BCE and kicked the bucket in 490 BCE. Pythagoras Fast Facts Conceived: ~569 BCE on SamosDied: ~475 BCEParents: Mnesarchus (father), Pythias (mother)Education: Thales, AnaximanderKey Accomplishments:â first mathematician Sources Britannica: Pythagoras-Greek Philosopher and MathematicianUniversity of St. Matthews: Pythagoras BiographyWikipedia Altered via Carolyn Collins Petersen.

Saturday, August 22, 2020

Market government Article Example | Topics and Well Written Essays - 1750 words

Market government - Article Example Anyway the by and large acknowledged view brings up to the lodging air pocket to be the prime explanation. Everything began with the breakdown of Lehman Brothers and immediately entered into the market causing disturbance and framework crash. This downturn didn't happen because of a business cycle that for the most part influences every single economy. Various reasons underlie this specific instance of budgetary emergency including that of the stuns emerging in the general business cycles which has been instrumental in upsetting the work showcase balance in the United States. The whole issue of the monetary emergency is to be surveyed from all the edges of financial aspects including the neoclassical, blended liberal and the extreme perspectives to have a point of view of the whole occasion. This paper will edify the different viewpoints set forward by the various schools of considerations and in like manner place their perspectives in the accompanying sections. The Neo Classical financial experts base their hypotheses on the microeconomic standards which incorporate the improvement of the people and firms and to decide the balance cost and yield in the economy utilizing the market powers of interest and gracefully. The hypothesis thinks about that the individuals settle on normal choices dependent on the data that they have about the market. The neoclassical financial specialists clarify the variances in the economies because of the upswing of the business cycles in the economy (Blanchard, 2000). The monetary factors that for the most part carry on in a specific manner so as to bring about a downturn have acted in a most uncommon way if there should be an occurrence of this specific budgetary emergency. The degree of utilization, yield venture just as the work of work was a lot of low. By examination of the monetary factors it was discovered that the emergency of the current time frame is considerably more serious contrasted with that of th e Great Depression of 1937 or whatever other downturns that have occurred on the planet. The drop in the degree of

Wednesday, August 12, 2020

Beacon Hill in the Fall

Beacon Hill in the Fall .condensedlines{line-height: 10%;font-size: 20%;} Northeast of the more frequently mentioned Harvard Bridge is the Longfellow Bridge, which connects MIT to Boston from the Stata Center side of campus. Here is the view from the Longfellow Bridge from the MIT side. MIT is behind us, the Charles River is below us, and Boston is in front of us. One of my favorite places in the world is the gold hill under the Financial District, to the right at the Boston end of the bridge. Beacon Hill is vines and fire escapes up brick walls, streetlights leaning against steep slopes on narrow brick and stone streets; it is hidden alleyways, tiny doors, and secret gardens we aren’t allowed into. It is my and Cory’s favorite place to go when we need an escape, especially in the late evening hours just before midnight. Beacon Hill is very quiet for a neighborhood in a city. Vines reach up into the darkness. Trees whisper above us. The yellow streetlights barely color the grasses between the cobblestones, and happy laughter flutters down to us at street level from upstairs in the houses and patios overlooking secret courtyards. Being here at night is like dreaming. Pretty houses, pretty fencesâ€"it is our unattainable, magical red-green village. Here are some photos of Beacon Hill this fall.                             Here is Charles Street, the louder main street from which the others climb up. *       * Period Furniture Hardware, in the fourth photo, has a vast display of doorknobs facing the street. I am sharing it with you because 1. There is a store on Charles Street that partly specializes in doorknobs, cabinet knobs, faucet handles, and other knobs. This is almost as impressively specific as the store in Harvard Square that specializes in bees (one of our favorite stores). 2. I absolutely hate doorknobs. Here is the Longfellow Bridge again, now facing Cambridge. MIT is just to the left of the frame.   And the east side of MIT.

Saturday, May 23, 2020

Definition Essay - Genre - 1750 Words

Definition Essay – Genre Genre, in the most generic definition, takes the meaning kind; sort; style (OED). Prior to the terms inception, the notion of genre in the study of media emerged in The Poetics, with Aristotles discussion of the mode or manner of imitation in poetry. Of this Aristotle writes, the medium being the same, and the objects [of imitation] the same, the poet may imitate by narration - in which case he can either take another personality as Homer does, or speak in his own person, unchanged - or he may present all his characters as living and moving before us (Aristotle, 53). Here lies the distinction between epic, lyric, and drama, a distinction based solely in convention, the usage of the medium,†¦show more content†¦It is a French word imported directly into the English language, derived from the Latin genus (the stem is gener-), itself derived from the Greek genos (OED). Having evolved separately, the Greek word and the Greek idea converged. The Greek root-word, like its Latin relative, refers to a clan or race of people, or to offspring (Liddell Scott Lexicon). This sense of familial interconnectedness is essential to genre theory. Frye writes: It is clear that criticism cannot be a systematic study unless there is a quality in literature which enables it to be so. We have to adopt the hypothesis, then, that just as there is an order of nature behind the natural sciences, so literature is not a piled aggregate of works, but an order of words (Frye, 17). In conceiving of literature as a unified order of words, Frye requires a system of genres which will encompass the entire medium, expressing each the entire state of literature at a given moment, all its bloodlines. One might extend this idea of kinship to objects within any given medium, as in literature each novel bears a relation to other novels, or across several media, as a Western film may bear relation to a similar comic-book or radio drama. From this first approach, it makes more sense to think about genres in a medium or the genres of a medium, than to think of genre as a medium. Based on the questions raised in Aristotles discussion, one might assemble a definition of genre moreShow MoreRelatedResponse to Towards a Definition of Creative Nonfiction by Brett Lott761 Words   |  4 PagesIn his essay â€Å"Toward a Definition of Creative Nonfiction†, Brett Lott attempts to describe the genre of creative nonfiction by explaining that there is essentially no definitive model. He begins by presenting an abstract definition of the genre which he later molds and amends with additions to become a much more comprehensive working definition. However before exploring the various aspects o f creative nonfiction and what it entails, Lott prefaces his essay with the statement that â€Å"we aren’t goingRead MoreThe View and Interpretation of the Term Genre1368 Words   |  5 PagesDiscuss what we understand by the term ‘genre’ and how it relates to the way we view and interpret films The way in which we, as an audience, view and interpret films can be seen to relate directly to our understanding of ‘genre’. However, what is genre? Drawing on the knowledge of key theorists and critics such as Steve Neale and Barry Langford this essay will first attempt to define genre and our understanding of it before focusing on how genre relates to the audiences view and interpretationRead MoreSurvival Guide : Rhetoric And Writing1741 Words   |  7 Pagesstrategies needed when writing any paper in hopes that it will aid you with any future writing assignments you come across. Introduction to Rhetoric The traditional definition of the word rhetoric was proposed by Aristotle. He said rhetoric was just a means of persuasion, which is only partially correct. The current textbook definition of rhetoric, according to Webster and embellishments made overtime, is stated as â€Å"the art or skill of speaking or writing formally and effectively especially as a wayRead MoreRhetorical Analysis Of Alexander Pope s An Essay1310 Words   |  6 PagesAn essay is, generally, a piece of writing that gives the author s own argument — but the definition is vague, overlapping with those of an article, a pamphlet, and a short story. Essays have traditionally been sub-classified as formal and informal. Formal essays are characterized by serious purpose, dignity, logical organization, length, whereas the informal essay is characterized by the personal element (self-revelation, individual tastes and experiences, confidential manner), humor, gracefulRead MoreThe Science Fiction Film Genre Essay16 83 Words   |  7 PagesFilms The science fiction film genre has been around almost as long as movies have, but like the cinema it is still a fairly young art form. This genre came into existence shortly after the invention of the movie camera in 1888 and has endured for over one-hundred years. Science fiction is adaptive; it changes with the times and this trend can be seen in its incorporation of other genres, cultural history and technology. This essay will attempt to define the genre, chronicle the history and evolutionRead MoreRhetorical Analysis Of Mindy Kaling s Types Of Women1483 Words   |  6 PagesActress, comedian, writer and producer Mindy Kaling in her essay, â€Å"Types of Women in Romantic Comedies Who Are Not Real† classifies the stereotypes given to women in romantic comedies. from her 2011 collection of essays Is Everyone Hanging Out Without Me? (And Other Concerns), is a comic essay on how she loves romantic comedies, but knows that female characters are fictional, and explains how th ey can still be appreciated. Kaling in her essay presents the female stereotypes by classifying them, andRead MoreTravel Writing As A Genre723 Words   |  3 Pagesenvironment, we already recognize travel writing as a genre without any profound thought or consideration. However, scholars such as Tim Youngs and Peter Hulme agree on the difficulty of defining travel writing as a genre. Thence, it is derived from the complicated and mixed features of travel writing. Although the genre itself is important because it helps categorization, in this essay, I claim that travel writing cannot be defined as a genre while it is a comprehensive term for texts including fictionRead MoreHow Personal Responsibility Will Lead to My Success Essay1089 Words   |  5 Pagesto a better life for my family and me. Now as to my approach for this paper I am writing this essay according to The Descriptive Essay (2011), The descriptive essay is a genre of essay that asks the student to describe an object, person, place, experience, emotion, situation, etc. This genre encourages the student’s ability to create a written account of a particular experience. What is more, this genre allows for a great deal of artistic freedom (the goal of which is to paint an image that is vividRead MoreEssays994 Words   |  4 PagesThe five-paragraph essay Main article: Five paragraph essay Some students first exposure to the genre is the five paragraph essay, a highly structured form requiring an introduction presenting the thesis statement; three body paragraphs, each of which presents an idea to support the thesis together with supporting evidence and quotations; and a conclusion, which restates the thesis and summarizes the supporting points. The use of this format is controversial. Proponents argue th at it teaches studentsRead MoreTragedy : A Great Topic1061 Words   |  5 Pagesfor as in bodies, thus in souls, we find what wants in blood and spirit, swelled with wind: Pride, where Wit fails, steps in to our defence, and fills up all the mighty Void of sense.† (Page 702 Lines 1-10). This is a quote from Alexander Pope’s An Essay on Criticism. Alexander Pope wrote poetry. His favorite topic was informative. In this poem the first fourteen lines are about pride, stanza two is about the lack of learning. He also talks about wit, judging a book by the cover, how hard it is to

Tuesday, May 12, 2020

Fraud An Example Of A False Statement Of Facts,...

Fraud in a contract occurs in three situations, false statement of facts, affirmative act , or silence. An example of a false statement could be if a contractor decides to knowingly overbilled a client or bill someone for work that was not done. If someone were to pay to have a new roof put on their house and the contractor put on cheap shingles and charged for the most expensive shingles this would be fraud under false statements.An affirmative act in contract fraud comes from trying to knowingly cover something up or misrepresent during the making of a contract. An example of an affirmative act would be when a person is selling a house and they know there is water damage in the basement, if they try to cover the damage up with paint or a carpet and not tell the buyer about it that would be fraud. The last type of contract fraud is silence. Silence fraud is when the seller fails to disclose information to the buyer. An example of silent contract fraud would be if a person is sell ing a car, the seller does not tell the buyer that they used special oil in the engine to make it sound better, but the oil is damaging and cannot be used long term. B) Minor’s Right in a Contract to Disaffirm Minors are people who are under the age of 18 and they have special rights when it comes to contract law. The general rule when it comes to minors in contract law is that any contract is voidable at the option of the minor, in comparison to an adult who is always bound by the contract. TheShow MoreRelatedBusiness Law5479 Words   |  22 Pagesdefined:- Section 13 of the contract act 1872 defines the term ‘consent’ and lays down that â€Å"Two or more person are said to consent when they agree upon the same thing in the same sense† . Thus, consent involves identity of minds or consensus ad-idem i.e., agreeing upon the same thing in the same sense. If for whatever reason, there is no consensus ad-idem among the contracting parties, there is no real consent and hence no valid contract. * Example:- A, agrees to sell his Nano CarRead MoreThe Westboro Baptist Church : When Does The 1st Amendment Trump The Public Interest?3824 Words   |  16 PagesBaptist Church is a group that has been in the spotlight for the last two decades because of their unusual tactic of picketing at soldier’s funerals. The act is motivated by the notion that America’s moral are being corrupted by their acceptance of homosexuality. The act of picketing of soldier’s funerals according to the group is motivated by the fact that it is a time when mourners are emotionally vulnerable and they think of their mortality. They believe that by picketing in soldier’s funerals theirRead MoreContracts Outline28401 Words   |  114 PagesCourt will re-create the scene. (CSI-Pittsburgh: Contracts Scene Investigation) RULE: An act creates a power of acceptance and is therefore an offer when it satisfies these elements- (1) An expression of will or intention (2) An act that leads to the offeree reasonably to conclude that a power to create a contract is conferred. (3) This applies to the content of the power as well as to the fact of its existence. RULE: An agreement made in jest is not an offer when a reasonable person wouldRead MoreCorporation (Fisch) Outline Penn Law Essay62808 Words   |  252 Pagesis virtually impossible for courts/legislatures to make important decisions that do not make someone worse off ââ€" ª Kaldor-Hicks Efficiency: (Business law model) *Increases aggregate well-being* Fairness model †¢ An act/rule is efficient (leads to overall improvement in social welfare) if at least one party would gain from it after all those who suffered a loss as a result of the transaction or policy were fully compensated (but those who suffer do not actually haveRead MoreThe Importance of Maqasid Al-Shariah in Islamic Finance. a Short Essay by Nadifa Abdulhalim Mohamed8658 Words   |  35 Pagesunspoken attitude contrasted with the fact that the Qur’à ¢n itself exhibits considerable awareness of the underlying purposes and objectives of its laws and often expounds the causes and rationale on which they are founded. The general reticence of the  Ã¢â‚¬Ëœulamà ¢Ã¢â‚¬â„¢Ã‚  in respect of the identification of the  maqà ¢sid  might have partly been due to the elements of projection and prognostication that such an exercise was likely to involve. Who can tell, for sure, for example, that this or that is the purpose andRead MoreHbr When Your Core Busines s Is Dying74686 Words   |  299 PagesHammer 124 BEST PRACTICE Human Due Diligence David Harding and Ted Rouse 138 144 EXECUTIVE SUMMARIES PANEL DISCUSSION There are 193 countries in the world. None of them are energy independent. So who’s holding whom over a barrel? The fact is, the vast ma jor the few energy-producin ity of countries rely on g nations that won the geological lottery, ble ssing them with abunda nt hydrocarbons. And yet , eve of raw resources import n regions with plenty some form of energy. Saudi ArabiaRead MoreDeveloping Management Skills404131 Words   |  1617 PagesTEAMWORK 489 SKILL ASSESSMENT 490 Diagnostic Surveys for Building Effective Teams 490 Team Development Behaviors 490 Diagnosing the Need for Team Building 491 SKILL LEARNING 493 Developing Teams and Teamwork 493 The Advantages of Teams 494 An Example of an Effective Team 497 Team Development 498 The Forming Stage 498 The Norming Stage 499 The Storming Stage 501 The Performing Stage 503 Leading Teams 506 Developing Credibility 507 Establish SMART Goals and Everest Goals 509 International CaveatsRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesAttractions: Developing an OB Model 23 An Overview 23 †¢ Inputs 24 †¢ Processes 25 †¢ Outcomes 25 Summary and Implications for Managers 30 S A L Self-Assessment Library How Much Do I Know About Organizational Behavior? 4 Myth or Science? â€Å"Most Acts of Workplace Bullying Are Men Attacking Women† 12 An Ethical Choice Can You Learn from Failure? 24 glOBalization! Does National Culture Affect Organizational Practices? 30 Point/Counterpoint Lost in Translation? 31 Questions for Review 32 ExperientialRead MoreSda Manual Essay101191 Words   |  405 Pages............................................................ Quarterly Report ...................................................................... Adventist Youth Society ............................................................... Mission Statement .................................................................... Objectives ................................................................................. Membership in the Adventist Youth Society ............................. Adventist YouthRead MoreIgbo Dictionary129408 Words   |  518 Pagesinto account. In addition, the English itself has an archaic feel to it and I have sometimes updated rather antiquated expressions. For the present I have left in example sentences referring to long-disappeared stores, such as Kingsway but these will eventually need to be replaced. It was originally prepared in Ibadan and some of the examples re flect this. Cultural and monetary references may well induce nostalgia in those familiar with the more recent history of Nigeria1. Web publication is therefore

Wednesday, May 6, 2020

The Progression of Transgender Rights in the Workplace Free Essays

Since 1975, Congress has considered amending Title VII to include a ban on employment discrimination based on sexual orientation. Most of the first employment discrimination cases brought by transgenders were dismissed because there is no federal law designating transgender as a protected class, or specifically requiring equal treatment for transgendered people. Until recently, Title VII’s lack of legislative history and failed attempts by Congress to introduce or pass gender identity employment discrimination legislation left courts with little reason to deviate from precedent. We will write a custom essay sample on The Progression of Transgender Rights in the Workplace or any similar topic only for you Order Now Recent landmark cases have demonstrated that courts can successfully transcend societal prejudices and expand sex discrimination to cover discrimination against transgendered people. For the most part, gender discrimination cases arise under Title VII because it is enforceable against a vast majority of employers. In contrast, two of the cases discussed below include claims based on the Fourteenth Amendment’s Equal Protection Clause which protects only against discrimination by government employers. Smith v. City of Salem Jimmie Smith is a transsexual, diagnosed with Gender Identity Disorder (GID)[i]; he was born a biological male, but has a female sexual identity. After being diagnosed he began expressing a more feminine appearance on a full-time basis, including while at work at the Salem Fire Department. Smith notified his immediate supervisor when co-workers began questioning his appearance and commenting that his mannerisms were not masculine enough. Smith requested the conversation be kept confidential. Against his wishes, the chief of the fire department was informed, followed by the law director of the city. During a meeting with the City’s executive body on April 18, 2001, the likelihood of Smith completing a physical transformation from male to female was discussed, along with a plan to terminate his employment. The group agreed to require Smith to participate in three psychological evaluations in hopes that he would resign or refuse to comply. On April 20, legal counsel retained by Smith informed the City’s executive body of the legal ramifications of proceeding with their plan. Six days later Smith was suspended for a full twenty-four hour shift based on an alleged infraction of department policy. Smith viewed the suspension as a pretext for sex discrimination and as retaliation for obtaining legal counsel and filing a compliant with the Equal Employment Opportunity Commission (EEOC). As a result of these incidents he filed suit against the City of Salem under Title VII of the Civil Rights Act of 1964. [ii] The trial court dismissed the suit on the grounds that Title VII protection is unavailable to transsexuals. [iii] On appeal, the Sixth Circuit of the Supreme Court reversed the district court ruling, noting that it relied on a series of pre-Price Waterhouse decisions. iv] In such cases federal appellate courts regarded Title VII as barring discrimination based only on sex, not on gender. The landmark case of Price Waterhouse v. Hopkins[v], established a claim of sex stereotyping for employees who suffer adverse action for failing to conform to the stereotypical gender expectations. Based on this decision, the Sixth Circuit opinion states, After Price Waterhouse, an employer who discriminates again a woman because, for instance, they do not wear dresses or make-up, is engaging in sex discrimination because the discrimination would not occur but for the victim’s sex. It follows that employers who discriminate against men because they do wear dresses and makeup, or otherwise act femininely, are also engaging in sex discrimination, because the discrimination would not occur but for the victim’s sex. [vi] The Sixth Circuit held that a self-identified transsexual can sue for sex discrimination under Title VII on the basis of discrimination due to non-stereotypical behavior and appearance and therefore, Smith’s transsexual identity did not affect his well-pleaded claims of sex stereotyping and gender discrimination. The case outcome also established that successful plaintiffs no longer have to be members of a protected class; all they must show is behavior stereotypical to that class to qualify for protection as a member of that class. Less than a year later the Sixth Circuit affirmed their decision in Barnes v. City of Cincinnati. [vii] The district court also dismissed Smith’s claims pursuant to 42 U. S. C.  § 1983 on the ground that he failed to state a claim based on the deprivation of a constitutional or federal statutory right. The Sixth Circuit found that the facts Smith alleged to support his claims of gender discrimination pursuant to Title VII easily constituted a claim of sex discrimination grounded in the Equal Protection Clause of the Constitution, pursuant to  § 1983. Therefore, the the district court’s dismissal Smith’s Equal Protection Clause claim was reversed. Barnes v. City of Cincinnati In 1998, Phillip Barnes, a police officer with the Cincinnati Police Department (CPD) since 1981, passed a promotional test to become a sergeant. At the time he was living as a pre-operative male-to-female transsexual. While on duty Officer Barnes lived as a male but often lived off duty as a woman. Following the promotion he began a standard probationary period intended to allow superior officers to observe newly appointed sergeants to determine whether the person should remain in the position. After being subjected to a rigorous training program Barnes failed his probationary period. Throughout the probationary period Sgt. Barnes was subject to more intense and formalized training than other sergeants. Examples of such unequal treatment included an increased number of shifts, being required to wear a microphone and ride in a car with a video camera. Inappropriate comments about his sexuality and sexual preferences were a common occurrence. Barnes was the only person to be put in a Sergeant Field Training Program and the only one to fail probation between 1993 and 2000. Barnes claimed his failure of probation was due to illegal sex discrimination based on his failure to conform to sex stereotypes and filed a compliant with the Equal Employment Opportunity Commission, followed by a suit against the City of Cincinnati. In Barnes v. City of Cincinnati [viii] the jury returned a verdict in Barnes’s favor in the amount of $320,511 and the Southern District of Ohio court awarded $527,888 in attorney’s fees and $25,837 in costs. Barnes made a prima facie case for sex discrimination asserting the CPD violated Title VII by subjecting him to disparate treatment and by maintaining a work environment that was hostile to him because of his sex. Price Waterhouse established Title VII prohibits discrimination against a man because he fails to conform to the stereotypes associated with being male. The CPD argued they demoted Barnes not because of his failure to conform to sex stereotypes, but because he failed to comply with grooming and uniform standards and did not display the appropriate command presence. The City appealed and in 2005 the United States Court of Appeals affirmed the judgment of the district court. [ix] Schroer v. Billington Ex-Special Forces Colonel David Schroer was the dream candidate for the position of Specialist in Terrorism and International Crime with Congressional Research Service (CRS) at the Library of Congress. However, three weeks prior to his anticipated start date, he was informed that the job offer had been rescinded. He received this news the day after a lunch meeting with the selecting official Charlotte Preece, during which he revealed that he was transgender and had made the decision to pursue sex reassignment surgery. [x] Schroer, now legally Diane, filed an administrative compliant with the Equal Employment Office of the Library of Congress, alleging sex discrimination under Title VII but was unsuccessful. Schroer then sued and after a bench trial in August 2008 the District Court for the District of Columbia found in her favor. Judge James Robertson held that discrimination on the basis of changing sex was discrimination on the basis of sex, and prohibited by Title VII of the Civil Rights Act of 1964. Although Schroer had already been diagnosed with GID, he applied for the position before he changed his legal name or began presenting as a woman. He believed if he started work at CRS as a woman it would be less disruptive and this decision prompted him to schedule the lunch meeting with Preece. Due to the classified nature of the job position Preece was concerned with Schroer’s ability to get security clearance. Her perception of David Schroer as especially masculine, because of his prior Army and Special Forces background, made it difficult for her to visualize Diane Schroer as anyone other than a man in a dress. Preece admitted that she believed that others at CRS, as well as Members of Congress and their staffs, would not take Diane Schroer seriously because they, too, would view her as a man in women’s clothing. Schroer’s original complaint[xi] alleged only that her non-selection was the direct result of her disclosure of her gender ysphoria but in an amended complaint[xii] asserted that she was discriminated against because when presenting herself as a woman, she did not conform to Preece’s sex stereotypical notions about women’s appearances and behavior. Judge Robertson concluded that Schroer was entitled to judgment based on Price Waterhouse claim for sex stereotyping and additionally she was entitled to judgment based on the language of the statute itself. Evidence established that the library revoked the job offer after learning a man named David intended to become a woman, thereby discriminating on the basis of sex. The government was ordered to pay $183,653 for back pay and benefits, $300,000 for non-pecuniary losses, and $7,537. 80 for past monetary losses. Schroer was awarded the maximum amount allowed, nearly $500,000. Glenn v. Brumby Vandiver Elizabeth Glenn, formerly known as Glenn Morrison, began working as a Legislative Editor for the Georgia General Assembly’s Office of Legislative Counsel (OLC) in 2005. The same year she was diagnosed with GID and in preparation for sex reassignment surgery began living as a woman outside of the workplace. The following year Glenn informed her immediate supervisor of her intentions. Glenn’s plan to undergo gender transition from male to female was relayed to Sewell Brumby, the head of the OLC. After confirming that Glenn intended to transition, Brumby immediately terminated her. Brumby believed the change would be disruptive and that co-workers may find it morally unacceptable, thereby making them uncomfortable. [xiii] Glenn filed a federal lawsuit in Georgia asserting that she was treated differently due to the nonconformity with gender stereotypes that she evidenced by her determination to live in accordance to her female gender identity. xiv] She filed suit pursuant to 42 U. S. C.  § 1983 for violations of her rights under the Equal Protection Clause of the Fourteenth Amendment[xv] of the U. S. Constitution which requires each state to provide equal protection under the law to all people within its jurisdiction. In August 2010 the trial court granted relief to Glenn on the basis of sex discrimination and ordered that she be reinstated to her job. [xv i] However, Brumby appealed the decision and all parties agreed that for the duration of the appeal process Glenn would receive full salary and benefits in lieu of returning to work. In December 2011, the U. S. Court of Appeals for the Eleventh Circuit ruled to uphold the lower court ruling that the Georgia General Assembly discriminated against Glenn. Although Glenn chose to pursue only a remedy for the Fourteenth Amendment violation, the Eleventh Circuit still drew upon U. S. Supreme Court cases interpreting Title VII to reach its conclusion. [xvii] Whether purposely or not, the Supreme Court in Price Waterhouse provided transgender plaintiffs with a claim for relief under Title VII and had sweeping implications for transsexual employment rights. Although the case did not directly address transsexualism, it expanded on the meaning of sex under Title VII. In the time since, transgenders have successfully started bringing claims for discrimination using the Price Waterhouse sex stereotyping theory. As a result transgender discrimination issues have transcended to broader legislation such as the Equal Protection Clause. The legal status of transsexuals in the workplace is complicated and often uncertain; however the protections for transsexuals continue to multiply as litigation sets precedent for equality. How to cite The Progression of Transgender Rights in the Workplace, Papers

Sunday, May 3, 2020

Data Mining Security and Crime Data

Question: Discuss about the Data Mining Security and Crime Data. Answer: Introduction Data mining is referred to as an advanced technology that is widely used in different business organizations to extract hidden but predictive information from the data server. In order to make knowledge driven decisions data mining tools are needed to be used appropriately by the organizations. While implementing the data mining tools in different business organizations, different security measures are required to be considered by the researchers as the data stored in the data server are all very much sensitive. In case, data is hijacked by external users then that is considered as crime. In order to conduct the research the background of the problems, aim, objectives, a previous study, research methodologies and the collected data will be analyzed by the researchers. Data mining on the crime domain In order to aid the procedure of crime as well as criminal investigation, different crime control applications are developed. Certain extracted factors such as seriousness, frequency, duration are used to make comparison between the criminals by measuring the data accordingly. According to Ismail et al. (2013), a regional crime analysis program should be proposed to mitigate the challenges. While extracting data from the server, proper security measures are needed to be adapted to be adapted by the users as well as by the owners (Sood, Garg and Palta 2016). Particularly for crime data analysis, the data mining approach is undertaken as an algorithm. Depending on the profiles, that should be analyzed to determine the criminals and their crime, proper comparison is also conducted. For accelerating the crime solving process, many developers have used K-mean clustering crime pattern detector (Win, Tianfield and Mair 2014). Two-phase clustering algorithm or AK mode is also used by some de velopers to find out automatically similar case subsets from large dataset (Shea and Liu 2013). Role played by data processing technique In order to produce high quality data mining results, data processing technique is found to be very much useful. As, raw data are collected from different resources and get stored into database management system or data warehouse, thus those data are needed to be well processed for further important usage (Wang et al. 2015). The steps of data processing include data cleaning, data integration, data transformation and data reduction. Sagiroglu and Sinanc (2013) stated that in the initial phase, the missing data are collected and the noisy data are smoothened, unnecessary data is removed and the conflicting data are resolved. In the integration phase, the information are integrated together with normalization and transformation, to get better results regarding the data. Clustering method for crime domain Three main classification of partition clustering method are k-means, AK-means and the expectation maximization method. Depending on the mean values, the data clusters are segmented with the help of K-means. From the internal distance among the objects, the mean value is calculated (Ward and Peppard 2016). The steps of k-mean and AK-mean algorithms are completely separate from one another. Sood, Garg and Palta (2016) stated that, in order to find out the mean value, K-means algorithm acts as a base for the clustering algorithm; whereas, for automatically finding same subsets from a large data set, AK mode algorithm is widely used. Data mining as an active investigator for crime solving For serving the crime investigation appropriately, data mining provides active solutions to the users and service providers also. In order to detect crime data mining technology is used by different business organizations (Teller, Kock. and Gemunden 2014). For automatically associate objects into the crime records concept space clustering technique is used by the developers. In order to detect fraud different abnormal activities deviation detection technology is used. (Jaber et al. 2015). For detecting email spamming, classification approach and to perceive deceptive data in the criminal records string comparator has been widely used. Moreover, it can be said that security in data mining approach and detection of crime data are necessary to understand the challenges very easily. Data mining security measures According to Ismail et al. (2013), security is referred to as one of the major concern that is required to be considered by different business organizations, those are using data warehouse or normal database management system to store the confidential information. For the current business perspective, data theft is another major issue. In case of data mining approach, the security of data server is one of the major concerns. While extracting data from the storage areas with the help of data mining tools, proper authentication is required to be considered so that the unauthenticated users are failed to hijack private information. Once the data get theft is called cybercrime, because the hackers hacked the sensitive information from the storage area. Figure 1: Data processing (Source: Wang et al. 2015, pp. 310) Hypothesis H0: Security in data mining is needed be incorporated for the consumer security. H1: Security in data mining is not needed be incorporated for the consumer security. Research methodology Before the initiation of research, it is very much important to select suitable methodology for data mining security and crime data. The selection methodology deals with research philosophy, approach, research design and data collection method. Research philosophy Based on the category of the topic data mining security and crime data the researcher should adapt positivism research philosophy and not interpretivism. This particular philosophy helps to accomplish the research work by developing hypothesis, after considering previous studies. For this case, the researcher needs not to develop new frameworks and theories. This research work is focused on the need of security in data mining to reduce the range of cybercrime all over the world. Research design Three different types of research design approaches such as descriptive, explanatory and exploratory are used by researcher while developing academic research works. In this case, the researcher must consider descriptive research design and not explanatory and exploratory as it deals with previously mentioned research aim and issues very clearly. Research approach Two different types of research approaches such as deductive and inductive are used by the researchers while developing research proposal. Inductive approach is time taken and is conducted by using secondary data. In this case, the researcher needs to complete the research work within a specified time thus; the researcher needs to adapt deductive research approach. Data collection For different research works, two different kinds of data collection methods such as primary and secondary are found. The data those are collected from the similar field of study are referred to as primary data whereas; if the data are collected from various journals, Articles, books then that is known as secondary data collection approach. Based on the types and collection approaches, the data are divided into two different forms such as qualitative and quantitative data. Statistically analyzed data are quantitative data and the data those cannot be analyzed statistically are called qualitative data (Treiman 2014).For this research topic, both qualitative and quantitative data collection approaches will be used by the researcher. Quantitative data will be collected from different survey and qualitative data will be collected by conducting direct interviews with top-level management authorities of different business organizations that uses data mining technique to extract information from the data server. Sampling and Data analysis Sampling is referred to as a procedure where, a particular part from the entire population is selected under the study area of the research topic. Probability sampling and non-probability sampling these two types of sampling technologies are used by different researchers. For this case, Probability sampling technique will be used by the researcher. Time schedule development Before conducting the research, the researcher must consider appropriate time schedule that is provided in the following table. However, with the changing requirement some of the schedules might be changed during the progress period. The Research activities Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Proper understanding of the problem area of data mining security and crime data Literature review Research methodology Data collection Sampling and Data analysis Research findings Conclusion Conclusion From the overall discussion, it can be concluded that in order to identify the crime pattern. The usage of data mining technology is increasing at a rapid scale. Data mining tool is used to detect crime data but cannot be used to replace the risks from the core business area. Currently most of the medium to large organization uses the concept of data warehousing to store data with security. Technologies provide high range security measures but still due to certain lags in the organizational goal, the data stored in the database or data warehouse might be hacked and misused by the criminals. In order to mitigate these security relevant issues, the businesses should incorporate proper encryption keys, authentication approach at the same time. The encryption key will encrypt the data and thus only the authenticated users will be able to get the access of the data and none of the unauthenticated users will be able to access it. References Brown, J. and Stowers, E. (2013). Use of Data in Collections Work: An Exploratory Survey.Collection Management, 38(2), pp.143-162. Eaton, S. 2013. The Oxford handbook of empirical legal research. International Journal of Social Research Methodology, 16(6), pp.548-550. Ismail, M.N., Aborujilah, A., Musa, S. and Shahzad, A., 2013, January. Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. InProceedings of the 7th International Conference on Ubiquitous Information Management and Communication(p. 36). ACM. Jaber, A.N., Mohamad Fadli, Z., Ahmed, D., Ahmed, F.D. and Mazlina, A.M., 2015. Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing.Journal of Advanced Applied Sciences (JAAS),3(5), pp.152-158. Mackey, A., Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Masala, E., Servetti, A., Basso, S. and De Martin, J.C., 2014. Challenges and issues on collecting and analyzing large volumes of network data measurements. InNew Trends in Databases and Information Systems(pp. 203-212). Springer International Publishing. Pek, G., Lanzi, A., Srivastava, A., Balzarotti, D., Francillon, A. and Neumann, C., 2014, June. On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. InProceedings of the 9th ACM symposium on Information, computer and communications security(pp. 305-316). ACM. Sagiroglu, S. and Sinanc, D., 2013, May. Big data: A review. InCollaboration Technologies and Systems (CTS), 2013 International Conference on(pp. 42-47). IEEE. Shea, R. and Liu, J., 2013. Performance of virtual machines under networked denial of service attacks: Experiments and analysis.IEEE systems journal,7(2), pp.335-345. Sood, R., Garg, S. and Palta, P., 2016. A Novel Approach to Data Filtration against Packet Flooded Attacks in Cloud Service.Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org,6(5). Teller, J., Kock, A. and Gemnden, H.G., 2014. Risk management in project portfolios is more than managing project risks: A contingency perspective on risk management.Project Management Journal,45(4), pp.67-80. Treiman, D. J. (2014).Quantitative data analysis: Doing social research to test ideas. John Wiley Sons. Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, pp.308-319. Ward, J. and Peppard, J., 2016.The Strategic Management of Information Systems: Building a Digital Strategy. John Wiley Sons. Win, T.Y., Tianfield, H. and Mair, Q., 2014, December. Virtualization security combining mandatory access control and virtual machine introspection. InUtility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International Conference on(pp. 1004-1009). IEEE.

Wednesday, March 25, 2020

Death Of Salesman By Miller Description Essays -

Death Of Salesman By Miller Description Death is such a contradicting situation. It is always a sad event, but in some perspectives it may or may not be a joyous event. Not to say that death should be celebrated, just to point out that life may have been a more dramatic experience. For my first novel in G.T. I read Death of a Salesman, a play written by Arthur Miller. Arthur Miller was born in 1915, in New York City. His parents were well To do until the depression. He attended college where he won three drama prizes. Death of a Salesman was his their Broadway play. The play Death of A Salesman was an extremely confusing play, it was a dialogue between a family of people. There were numerous flashbacks used to illustrate things that happened in the past. The overall purposeof the flashbacks was to describe the situation that Willy Loman, the main character, was dillusional. I feel that in this the characters of this book are well described. The author describes Willy was an average man with a somewhat normal life. His wife Linda is loving and like any woman she sticks by her man. Happy and Biff are Willy and Linda's sons. The play takes place when Biff and Happy come to visit their parentsfor a couple of days. The play is reality that most books and movies do not display. It shows an average american family struggling to get by. In the play it is apparent that the characters have strong dreams and aspirations. It is also obvious that they have not yet succeeded in accomplishing them. Quite a few events happen that prove, no matter how hard someone tries, in society things change and it is hard to reach full potential. The authors of the play puts more reality into the central theme of the play. People get old and begin to do odd things such as talk to people that are not there or people that only exists in their minds. Throughout the play Willy would have conversations with people that he believed were there, but they really were not. Willy strived to be the best and if he was not successful, then things were not good enough. He was ashamed that his money supply was not sufficentenough to support his family. The theme changed throughout the course of the book. I believe the point that he was trying to emphasize was to never give up and all the barriers in the way will be broken. This play has taught me the lesson that life is how one individual person decides to make it out to be. The plays point of view was from two or more characters having a conversation. The play suggested that in life that certain things have to be completed in life before death is bestowed upon someone. In this the example was that Willy had to resolve his long term bad relationship with his son, Biff. The play will help me in my life because like I have stated that the story or the plot may be fictional, but it could happen in someone's life. In other words it is reality. The word usage for the dialect were elementary and some untasteful words were expressed. For example the word fool is used several times. Other untasteful words are used, but they are to untasteful to mention. The stage directions had a larger more descriptive vocabulary. For example, when describing the house it says "We are aware of towering, angular shapes behind surrounding it on all sides." The movie that this play reminds me of would have to be a small made for television only movie called "The Red Door." It is a movie about a family of six, a mother, a father son, and three daughters. The mother, Mary works at a shopping center and the whole theme of the movie is trying to get past the red door at the local restraunt. In the play and the movie all of the characters are the average family and they thrive to succeed in life. The characters in the movie all correspond with the characters of the play. They were both set in the past when it was a mans job to do the work and the woman to stay home. Although, in the movie the mother does work because the father is unable to find work due to the fact of some crimes he committed as a child. Both the play

Friday, March 6, 2020

Cultural Revolution Long Sixties essays

Cultural Revolution Long Sixties essays How appropriate is the term Cultural Revolution to describe the events of the Long Sixties? Within this essay I will attempt to answer the question how appropriate is the term Cultural Revolution to describe the events of the Long Sixties? The main points within the essay will include examples from religion, history and history of science. It will also attempt to answer other questions such as how Marwick and Hobsbawm came to their conclusion on periodisation for the sixties? Was the sixties strictly contained within a single decade, did it start from 1945 until 1973 or from 1958 to 1973? Hobsbawm and Marwick will have studied primary and secondary sources, such as books, film archives academic papers etc to confirm their theories namely Hobsbawms that the Sixties were part of his Golden Age and Marwicks that a cultural revolution in the sixties did occur. The degree to which they will have been subjective would have to have been absolute to prove that a huge cultural shift took place. The history of the period is easier to investigate and study due to the great techno logical advancements made in the global comms industry; for example the sixties provided a far reaching percentage of the population with access to devices such as television and radio these could at the time and still today are used to provide immediate primary sources. These sources can help the historian significantly as he can watch an historical event unfolding on the actual date and save huge amounts of time with research. This of course assumes that the creators of these tele visual sources have had no hidden agenda or are not swayed toward any particular policies, religious beliefs, the source is not for propaganda purposes and is not exaggerated to such an extent that it turns out to be fiction rather than fact. Advancements arising from the enlightenment period gave us the basis to...

Wednesday, February 19, 2020

Critical Issues in Globalisation Essay Example | Topics and Well Written Essays - 1750 words

Critical Issues in Globalisation - Essay Example Through evaluating its existing business situation, Marks and Spencer needs to review its market segmentation, share out its products to diverse target markets, and serve its clients efficaciously. Introduction Marks and Spencer is a worldwide company that spreads throughout Europe, Asia and North America. It sells footwear, clothing, food, house appliances and gifts. This paper will comprise three sections. Principally, it will evaluate the micro and macro environment of Marks and Spencer. Secondly, the paper will employ SWOT to evaluate the four facets of its business. Lastly, the paper will a draw an inference concerning the whole evaluation and provide the necessary recommendations. PEST Analysis The extensive external factors, which indirectly affect a company, comprise legal, political, social, economic and technological aspects. These frameworks will show how the macro environment influences M&S in formulating its marketing decisions. Legal and Political Environment It is very crucial for firms to adhere to government policies and global organisation structures such as the World Health Organisation, when formulating their marketing policies. Governments, particularly in the advanced countries, pay attention to the human and ecological environment life. Governments devise policies and systems to monitor companies and their products, for instance, energy saving strategies and genetically modified foodstuff regulation. The United Kingdom government has initiated energy saving policies such as climate change duty and Green Tariff on energy usage to reduce carbon dioxide and supplied subsidisations to enhance its policies. Marks and Spencer has instituted an incentive scheme in which stores can retain a 10% value of every savings they generate in its budget (Marks & Spencer 2012). This scheme aids Marks and Spencer in saving around 5 per cent of M&S energy. In current years, the gene technology has increased significantly. Some of the technology has been util ised to manufacture food. Nonetheless, some of the technology can bring about environmental pollution and jeopardise human health. Marks and Spencer declared that it would be stocking non-GM foods upon its shelves. Economic Economic aspects affect firms to either develop or retrench their business, for instance, loss-generating operations and their non-primary business operations. For example, the 9/11 misfortune in United States caused numerous firms to encounter depressions within Europe and North American countries. The 9/11 mishap in United States caused consumers to alter their purchasing habits and sales decreased tremendously. In fact, M&S lost about 8.6m pound worth of profits in 2001-2002 from its worldwide retailers. However, M&S has shut its deficit-generating operations within Continental Europe and sold out its non-core business within North America (Marks & Spencer 2012). Social Factors Buyers’ needs change incessantly. People desire to feel modern, special, and well situated. Therefore, people buy fashionable apparel and spend credit cards to fulfil their needs. M&S keeps up with the newest colour and style. Though it has high-ranking quality goods, M&S co. does not take into account the customers’ needs, particularly in clothing market (Marks & Spencer 2012). Technological Factors In the current era, information technology has be

Tuesday, February 4, 2020

Tactical Intelligence Issues Essay Example | Topics and Well Written Essays - 500 words

Tactical Intelligence Issues - Essay Example In military intelligence, information is always susceptible to many interpretations thus it needs conscious manipulation for proper notions of precognition1. The S-2s do not show thoroughness in disseminating information. This implies that information does not reach the intelligence requirement. Thoroughness though does not entail certainty and completeness of the final details. Relating it to Major Gustafson, he took into consideration information thoroughness before attempting to save the other Major whose plane was going down. Major Gustafson knew that his aircraft would be in danger while attempting to save the friend; hence he was able to give thorough information to those who were down such that when the aircraft with the other pilot got down, measures to take the pilot to a hospital were in place. Thoroughness includes what is unknown and what the officers know. Thus, risk taking evaluation is easy to do2. Most S-2s do not give accurate information such that, they give an estimation rather than concrete information. This makes decision making for the other party hard. Considering the situation Major Gerald was in, he has to give the most accurate information concerning the whereabouts of the other pilot, thus by flying over the enemy land; he made the best decision on the best route to follow. Thus, Major Gustafson was able to rescue the other pilot. In that effect, the facts that the major had, were to coincide with the capabilities of the enemy. Assessment of intelligent comes from the reliability of the information given. Most ignore the timeliness of information they give out. Such that the information that they give out does not reach the right people that require the information in time, this implies that decision making of tactical decisions is at the right time. S-2s should note that being punctual in giving the information is crucial to avoid the acute angle. Thus, information that is late is unnecessary.

Monday, January 27, 2020

Assembling personal computer’s hardware and software

Assembling personal computer’s hardware and software Assembling the Personal Computer Firstly, you will assemble the case. You will need to install the power supply, the motherboard, Graphic card, Microprocessor, Main Memory, Hard disk drive, Network Interface Card and so on are stand offs to hold in the motherboard. You will also need to connect some wires to the motherboard You will need to unwrap the motherboard and microprocessor chip. The chip will have one marked corner that aligns with another marked corner of its socket on the motherboard. Align the corners and drop the microprocessor into the socket. You dont need to apply any pressure if its aligned correctly, it should fall into place. Once you have it in, cinch it down with lever arm Second, you will need to install the heat sink. The CPU box will contain a manual that tells you how to do it. The heat sink will contain either a heat sink sticker or heat sink grease to use when mounting the heat sink on the CPU. To install your heat sink, all you had to do was put it in place, cinch it down with flanges on either side and lock it with a cam. Connect the power lead for the heat sink to the motherboard Once youve chosen the right kind of RAM, its time to install your RAM module into the insides of your desktop. You should handle RAM carefully. The RAM slots are located on the computers motherboard. There are usually two slots, though there may be more. It will probably take more pressure than you would think to get the RAM into place. Each side of the module should also have a rotating arm that will look the RAM down Now your motherboard is ready to put in the case. Your motherboard should have come with a faceplate for its back connectors. You need to put in the plate and press it until it clicks in place. It needs to sit about a quarter of an inch away from the cases surface so that none of its connectors touch the case. Find the screws for set up motherboard in the case. Dont screw them in too tightly .Be very careful when putting in the screws. If you drop them into the case, they could damage the fine wires on the motherboard one goes Installing the hard disk drive and the DVD-ROM drive. The case has a removable bracket with four rubber grommets on it, which line up with four holes on the hard drive. It also came with four screws made just to punch through those grommets. Screw the hard drive into the bracket back into its slot in the case. If you are using IDE/PATA drives, be sure to set the jumpers correctly. Then connect the hard disk to the power using one of the connectors coming off of the power supply. Now install the cables. One side of the cable has a red stripe on it, which makes it pin 1. Look on the motherboard and hook the cable into the IDE connector marked 1. Insert the other end of the cable on the back of the drive. Now the drive is ready to use Now, you will install the CD-ROM drive. Again, set up the jumpers correctly. The CD-ROM drive fits in the front of the case, and you may have to put out a faceplate to make the room for it. Slide it in and screw it into place, making sure that it is aligned with the front of the case. Just as with the hard drive, you can use any available connector from the power supply. You will also use the cable that came with the CD-ROM drive to connect it to the motherboard and plug the other end into the drive. Connect the audio for the CD drive. Next, there is an obvious place for it to plug in on the motherboard and on the drive itself Hard disk devices use a ribbon cable to connect to each other. Ribbon cables have all of the wires laid flat next to each other instead of bunched or wrapped together in a bundle. IDE ribbon cables have either 40 or 80 wires. There is a connector at each end of the cable and another one about two-thirds of the distance from the motherboard connector.. The three connectors are typically different colors and attach to specific items: ï‚ § The blue connector attaches to the motherboard ï‚ § The black connector attaches to the primary (master) drive ï‚ § The grey connector attaches to the secondary (slave) drive. The last step is installing the power supply in the case. The power supply has two sides. The fan side faces outside the case and the wire side face inside. Slide the power supply onto its brackets and secure it with screws. Connect the power connector is leads to the motherboard. These are should be a large one and a small one, and it will be obvious as to where each one goes. You will be left with about 15 more wires. Dont worry the manuals have a page to tell you exactly where each one goes. Each of them has a label that corresponds to a label on the correct port. It is time to turn your machines on and see if its work. If there are a switch on the back of the power supply, make sure it is on. Also make sure that the power supply is set correctly to 110 or 220 volts At the same your personal computer is powering up and already use Installing Net Interface Card 1. You will select â€Å"Installation the software automatically (Recommended)† and click â€Å"Next†. 2. Searching hardware device. 3. You will click â€Å"Next†. 4. Installation software. 5. You will click â€Å"Finish†. 6. Then Local Area Connection is enabling. Using an appropriate hub or switch connect the PCs using appropriate cabling †¢ The PCs are connected with a single cable (crossover cable limited to two PCs), or are they connected to a hub/switch †¢ First, these â€Å"lights† are really light-emitting diodes (LEDs) and will usually appear in some form of yellow, orange, or green colour, depending on the NIC manufacturer †¢ Second, the link light indicates that the NIC and the cable have a valid electrical connection between the PC and the network device, usually a hub or a switch †¢ The NIC, cable, and hubs or switches are working. When the activity light blinks, it is indicating that data is being transferred between the networking devices †¢ The data is usable—it just means that data is making the trip from the NIC to the hub or switch or from the hub or switch to the NIC †¢ If you are having trouble connecting to a network or communicating to other machines on the network, the link and activity lights are a good place to start your troubleshooting. 1. Microsoft Windows XP Professional Configuration and fine-tuning 1. First we need to install window on hard disk drive. Insert the installation CD into the CD drive. Change the boot setting to the boot from CD. Then save and exit. When you see â€Å"Press any key to boot from CD,you press space bar to boot from cd. The blue screen will appear like above and wait for loading set up 2. The blue screen appears like below and the instruction will also give you how to do. If you want to set up window XP, press ENTER and if repair, press R and if want to quit, press F3. We want to set up window XP so press ENTER to install window 3. This step is license agreement from Microsoft and if you will agree this license, press F8 key. 4. This step is showed your unpartition space on your hard disk and it is new so no need delete.In this step,you have to create partition space for your hard disk .Therefore press C for create partition. 5. In disk C, you have to install window and other application so you give 40000 MB space. Then press ENTER. 6. You will see the partition space have been created. And then you select on the un partitioned space and create partition space again. 7. In the disk D, you have to store your data and other information so you give 40000 MB space. Then press ENTER. 8. You will see the partition space have been created. 9. Select â€Å"Format the partition using the NTFS file system†. And then press â€Å"Enter† to continue. 10. Wait a minutes for formats the partition. 11. And then wait a minutes for copies files 12. After formatting, the computer will reboot and in this time dont press any key when you will see† Press any key boot from CD†. Then you will see window is running. 13. You will see GUI after reboot and wait 39 minutes for installing windows. 14. Wait a minutes for â€Å"Get support for the latest hardware and software. 15. Click â€Å" Next† after installation. 16. Fill â€Å"full name† and â€Å"Organization† and click â€Å"Next†. 17. After that input product key. Product key might be on window XP CDor on the cover. Then click next. 18. In this stage you must input computer name and administrator password and again rein put this password at confirm password. Then click next. 19. If you see the time date, click next again. 20. Wait a few minutes for â€Å"Explore your creative side with photos and videos†. 21. Choice â€Å"Typical Setting† and click â€Å"Next†. 22. Choice â€Å"No this computer is not on a network, or is on a network, without a domain† and Click â€Å"Next†. 23. And then wait a few minutes for â€Å"Windows Movie Maker makes it easy and fun to capture,create,and share home movies†. 24. Wait5 minutes for â€Å"Experience the ultimate in safety, security, and privacy†. 25. Wait 9 minutes for â€Å"Easy move documents and personal settings to a new computer†. 26. Wait 1 minutes for â€Å"Be assured of greater accessibility†. 27. You will see Microsoft Windows XP logo. 28. Click â€Å"OK†. 29. Click â€Å"OK† to continue. 30. You will see â€Å"Welcome to Microsoft Windows†. 31. You will click â€Å"Next†. 32. This stage is checking your internet connection and click â€Å"Next†. 33. Click Next. 34. Enter â€Å"Your name† and click â€Å"Next†. 35. Click â€Å"Finish†. 36. Appear Welcome box. 37. In this stage you can already use â€Å"Microsoft Windows Xp†. 38. You can change background image . 39. You can also change icons . 40. Double click on my computer icon. 41. Right click on the Local Disk(D) and click â€Å"format†. 42. You will click on the start button. 43. And then you will click on the ok button. 44. This step is complete format so you will click on the ok button. 45. You can already store your data and other information on the Local Disk (D). Network for PC 1 1. Right-click on the â€Å"My Network Place† and click on the properties. 2. You will see Local Area Connection is enable in the Network Connection . 3. Right click on the Local Area Connection and click properties. 4. In the General tab you will choice the â€Å"Internet Protocol(TCP/IP) and click properties. 5. You will see already select â€Å"Obtain an IP address automatically†. 6. So you will select again the â€Å"Use the following IP address†. 7. For PC1 , IP address is 1.1.1.1 .This IP is group A. 8. In the run box, type cmd and click on â€Å"OK† button. 9. This step is testing these network. If your network is connect, show message (Reply from†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..).If your network is disconnect, show message (Request time out or so on). 10. If your network is connect, showed message below the figure. 11. Open your Local Disk D and then right click on anywhere and choice new folder. 12. In this folder, rename pc1. 13. Right-click on this folder and click â€Å"Sharing and Security†. 14. Select the sharing tab. 15. In the sharing tab and select â€Å"share this folder on the network†. 16. In this stage, pc1 folder is already share. 17. Right-click on the â€Å"My Network Place† and then click â€Å"Open†. 18. You will see â€Å"View workgroup computers† and click on it. 19. You will see Workgroup computers. 20. This step is viewed on the win2. 1. Right-click on the â€Å"My Network Place† and click on the properties. 2. You will see Local Area Connection is enable in the Network Connection. 3. Right click on the Local Area Connection and click properties. 4. In the General tab you will choice the â€Å"Internet Protocol (TCP/IP)† and click properties. 5. You will see already select â€Å"Obtain an IP address automatically†. 6. So you will select again the â€Å"Use the following IP address†. 7. For PC1 , IP address is 1.1.1.1 .This IP is group A. 8. In the run box, type cmd and click on â€Å"OK† button. 9. This step is testing these network. If your network is connect, show message (Reply from†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..).If your network is disconnect, show message (Request time out or so on). 10. If your network is connect, showed message below the figure. 11. Open your Server2003 Local Disk D and then right click on anywhere and choice new folder. 12. In this folder, rename pc2. 13. Right-click on this folder and click â€Å"Sharing and Security†. 14. Select the sharing tab. 15. In the sharing tab and select â€Å"share this folder on the network†. 16. In this stage, pc1 folder is already share. Install and configure the printer on one of the PCs Network Printer for Win-1 1. HpDeskjet 3900 printer put into your computers USB port at the same time you will see â€Å"Found New Hardware†. 2. Click the start menu bar and choice setting and click printer and fax. 3. We will see â€Å"Add a printer† and click on it. 4. We will see â€Å"Add printer Wizard† and click â€Å"Next†. 5. Choice â€Å"Local printer attached to the computer† and click â€Å"Next†. 6. You will click on the down arrow and choice â€Å"USB(Virtual printer ports for USB) and click on the â€Å"Next†. 7. You will see this box and click on the â€Å"Next† 8. You will click on the â€Å"Have Disk† button. 9. Appear â€Å"Install From Disk† dialog box and click on the â€Å"OK† button. 10. You will choice the â€Å"auto run†. 11. You will see next time â€Å"Install From Disk† dialog box and click on the â€Å"Browse† button. 12. You will see â€Å"Add Printer Wizard† dialog box and click on the â€Å"Next†. 13. And then your printer name is â€Å"Hp Deskjet 3300 Series† and click on the â€Å"Next†. 14. You will choice the â€Å"Do not share this printer† and click â€Å"Next†. 15. Choice â€Å"No† and click â€Å"Next† button. 16. You will click on the â€Å"Finish† button. 17. The network printer can already use. 18. Right click on the printer and click on printing preferences. 19. You will click on the â€Å"Sharing† tab and you will see â€Å"Do not share this printer. 20. You will share this printer so you will select the â€Å"Share this printer† and click â€Å"Apply and OK† button. 21. This step is already use and already share this printer. Network Printer for Win-2 1. Click the start menu bar and choice setting and click printer and fax. 2. You will see â€Å"Add a printer† and click on it. 3. You will see â€Å"Add printer Wizard† and click â€Å"Next†. 4. Choice â€Å"Local printer attached to the computer† and click â€Å"Next†. 5. Select â€Å"A network printer, or a printer attached to another computer and click â€Å"Next†. 6. You will see â€Å"Browse for a printer† already selected . 7. So you will select again on â€Å"Connect to the printer (or to browse for a printer select this option and click next)† and click on the â€Å"Next† button. 8. Type your printer name and click on the â€Å"Next† button. 9. Connect to the printer is successful and click on finish button. 10. The network printer can already use on the network. Network Printer for win-3 1. Click the start menu bar and choice setting and click printer and fax. 2. We will see â€Å"Add a printer† and click on it. 3. We will see â€Å"Add printer Wizard† and click â€Å"Next†. 4. You will see already select â€Å"Local printer attached to the computer† and click â€Å"Next†. 5. So you will select â€Å"A network printer, or a printer attached to another computer and click â€Å"Next†. 6. You will see â€Å"Browse for a printer† already selected . 7. So you will select again on â€Å"Connect to the printer (or to browse for a printer select this option and click next)† and click on the â€Å"Next† button. 8. Type your printer name and click on the â€Å"Next† button. 9. This step is asked to connect with the network printer and click on yes button. 10. Connect to the printer is successful and click on finish button. 11. The network printer can already use on the network. Sharing folder 1. Right-click on the desktop choice new folder. 2. You will rename this folder. 3. You will see the folder on the desktop. 4. Right click on the folder and choice the share and security 5. In sharing tab, selected â€Å"Sharing the folder† and click on permission button 6. Checked on all allowed button and click apply and ok button 7. You will see already shared folder on the desktop. Task 3 Searching for PCs and other peripheral devices No Name StartDate EndDate 1. Monitor 3.7.2009 3.7.2009 2. Casing and Power Supply 3.7.2009 3.7.2009 3. Mother board 3.7.2009 3.7.2009 4. Microprocessor 3.7.2009 3.7.2009 5. Hard disk drive 3.7.2009 3.7.2009 6. Graphic card 4.7.2009 4.7.2009 7. Main Memory 4.7.2009 4.7.2009 8. CD-ROM 4.7.2009 4.7.2009 9. Printer 4.7.2009 4.7.2009 10. Microsoft Windows XP Professional w/SP2 5.7.2009 5.7.2009 Searching for Network devices No Name StartDate EndDate 1. Network Interface Card 5.7.2009 5.7.2009 2. UTP cable 5.7.2009 5.7.2009 3. Switch 5.7.2009 5.7.2009 Assembling the Personal Computer and driver installation No Name StartDate EndDate 1. Assembling the PCs 30.7.2009 30.7.2009 2. Main Memory installation 31.7.2009 31.7.2009 3. Graphic Card installation 31.7.2009 31.7.2009 4. CD-ROM installation 31.7.2009 31.7.2009 5. Hard disk format and 1.8.2009 1.8.2009 6. Window XP installation 1.8.2009 1.8.2009 Preparing three Personal Computer connect to the network and sharing printer No Name StartDate EndDate 1. Network card installation 29.8.2009 29.8.2009 2. 3PCs Network 29.8.2009 29.8.2009 3. Sharing folder 29.8.2009 29.8.2009 2. Sharing printer 2.9.2009 2.9.2009 Task 4 Task4 Name, location and contents of 5 Major system files in Windows XP †¢ C:WINDOWSBOOT.INI †¢ C: WINDOWS NTLD †¢ C: WINDOWS NTBOOTDD.SYS †¢ C: WINDOWS NTUSER.DAT †¢ C: WINDOWS NTDETECT.COM 5 common technologies available for establishing Internet connectivity through Our Windows XP 1. ADSL(use phone line and cable modem) 2. Wi-Max(use access point) 3. Satellite 4. Broadband and 5. IP star Features of Linux †¢ the several programs running at the same time †¢ the several users on the same machine at the same time (and no two-user licenses!) †¢ runs on many different CPUs, not just Intel †¢ One program cant bring the whole system down †¢ Linux only reads from disk those parts of a program that are actually used †¢ dynamically linked shared libraries (DLLs), and static libraries too, of course †¢ support for many national or customized keyboards, and it is fairly easy to add new ones dynamically †¢ supports several common file systems, including minix, Xenix, and all the common system V file systems †¢ UMSDOS is special file systems which allows Linux to install on a DOS file system †¢ read-only HPFS-2 support for OS/2 2.1 †¢ TCP/IP networking, ftp, telnet, NFS and so on †¢ Netware client and server †¢ LAN Manager/Windows Native (SMB) client and server †¢ the base protocols available include TCP, IPv4, IPv6, AX.25, X.25, IPX, DDP (AppleTalk), Netrom and so on †¢ Stable network protocols included TCP, IPv4, IPX, DDP, AX.25 and etc Reference Web Reference http://electronics.howstuffworks.com/how-to-tech/build-a-computer.htm www.metasearch.com www.google.com www.yahoo.com Book Reference PC World Fundamental of Hardware and Operating system McGraw.Hill.Mike.Meyers.A.plus.Guide.to.Managing.and.Troubleshooting.PCs.Lab.Manual.2nd.Edition.Apr.2007

Saturday, January 18, 2020

Performance Management Essay

Q: 1 ————————————————- Be able to identify and agree performance objective 1.1 Explain link between individual team and organizational objective Link between organizational objective and the team is very important for the progress of an organization. Organizational objective are set in order to achieve the goal of an organization. Every organization has an aim to achieve so until every single member of staff not know the objective of the organization it’s difficult to achieve that goal. In an organization there are certain groups and each group has different teams. Every individual team has different task to do but all these different tasks are linked to the main objective of the organization and all the individual team tasks are support the objective of organization to fulfill. If the organizational objective is clear to the every individual team member than it’s easy to achieve team task. Principal behind the link between individual team and organizational objective is that if the individual team knows the organizational objective than they can play better role to achieve objective and can easily complete their individual task which support to achieve organizational objective. 1.2 Identify the selection of and agree individual and team objectives Team is group of people which work together to achieve goal every team member has different task which related to the objective of the team. Agreeing team objective is more difficult to agreeing individual objective because there are more people involved mean more skill, experience and handling problem with different ways. So than one should be more carefully deal when agreeing the team objective. Identifying and selection of and agree individual and team objective has very important for achieving the main objective of organization. If we selected right persons for achieving the individual objectives then it’s easy to achieve the team objective as well as organizational. Every team has its own team leader and he has an objective to achieve to complete that objective he has to complete different task to complete he has to select right person from his team to fulfill that task .for different tasks he has to select different people from his team to achieve that task which support to complete the overall team objective. When  team leader give task (individual objective) to his team member he should give him step by step training to achieve his goal. On other hand each team member should know the team objective as well to achieve their goal. Every individual and team objective should be SMART 1.3 Identify and agree area of individual and team responsibility in achieving objective Every individual and team should to understand his responsibility and try his best to agree with his responsibilities. Successful team can be responsible of different tasks and team objective which support the organizational objective the main responsibility of team is to achieve his team objective. Help each individual to complete his task. Every team should follow the planned the assignment which set by the director of the organization because every team objective is linked to organizational objective. Team should inform the project manager of task status and any problem arisen. Every team should select right person having right skill and knowledge to compete the task. Every individual should also try his best to achieve his goal because it’s important to achieve the team objective as well as organizational objective. Every team member should make real effort to build strong relational ship with each other. Each team member should give support feedback and gaudiness to other team member to achieve goal. Each staff member expresses loyalty and motivates other to work. If team and all individual are fulfil their responsibilities then it’s easy to achieve the organizational goal. 1.4 Identify the need to create an environment of trust and support with other Environment of trust and support in team member and organization is very useful to achieving the organizational goal If the entire individual in team has good relationship then they support each other give them feedback and gaudiness as well by this it’s easy to achieve goal for them. As we know that’s individuals objective supports to achieve team as well as organizational objective. So that as manger one should build following things to make environment pleasant * Increasing relation between staff member * Decreasing clashes to the neutral * Try to convert neutral to good and leading to excellence Advantages of Trusting * Staff member are more willing to share idea and work sincerely * Staff member are more willing to help each other and try their best to achieve the goal. * Saving of recourses (physical and financial) * More motivated for working * Sincere with organization ————————————————- Q2: Be able to assess performance and provide feedback 2.1: Evaluate and assess individual and team performance against objectives Assessing performance of individual and team performance against objective is very important for overall performance of the organization because it’s related to the overall performance of the organization. Best team and individual performance is which support the organization performance. Identifying objective Easy way to assess the performance is to split the objective in different tasks and give each task to the team and further to the individuals. Assessing performance Balanced analysis of performance beside designed objectives, taking all applicable factors into account. After doing that one have to check the results of the each task giving to the team and individuals as well. If they achieve than they can build success to achieving the main objective of the organization and if they cannot achieve the desirable performance then organization should think about the problems which prevent them to achieve desirable performance. Then first thing is to take in account is that the team at least understands the objective of the organization because without understanding the objective no one can achieve goal. There are also many other factor which can be affect the performance of the individual and the team like No enough support and training, Unsuitable environment and Financial problems etc. These are some factor which should be taken in to account to improve the performance to the desirable level. 2.2 Identify the  method to providing feedback to individual and team on performance Feedback can be define as process in which the effect or output of an action is returned to modify the next action Feed back is actually comments about something with which you have any type relation. Feed back is of two types positive or negative Positive feedback is good to improve yourself and identify your weakness and you can improve it if you want. Negative feedback is destructive and base on fact and reality which cause of angry and disturbance Usually feedback is taken from website, monthly or yearly review, survey or customer etc. There are many Methods to provide the feedback Sandwich method7 (expect a negative comment after praise). BOOST Method †¢ Balanced – contain together decent and beneficial points †¢ Observed – only give samples of what you have seen the somebody say or do †¢ Objective – feedback should be truthful and not an spasm on someone’s character †¢ Specific – always use exact patterns †¢ Timely – feedback should be given as near to the occasion as possible. EEC model8 †¢ Example – what performance you have detected †¢ Effect – on the viewers, on you, on your examination †¢ Change – what change in performance do you expect Feedback should be taken from serious personality Feedback should be taken after event soon Find someone private for feedback Give enough time to give feed back Take good care of privacy and honesty while taking feedback After taking feed back its very sensitive mater to provide the feedback so it should be handle very carefully. The purpose of providing feedback to the team and individual should be basis of maintenance, improving performance. While providing feedback to team or the individuals something should be keep in mind Positive points should be first to reduce conflict. It should be like information sharing. It should be not over loaded or in detail. During providing feedback it required ability of patient. Language should be expressive of specific behaviours rather than general remarks representing value judgments. All comments should be based upon visible performance and not assumed motives. 2.3 Identify the cause of conflict and describe strategies to minimize or prevent conflict Business dictionary define conflict as friction or opposition resulting from actual or perceived differences or incompatibilities. 2 Conflict may be positive or negative. There are many cause of conflict Personal factor Lack of information If any staff member is unconscious about information of any event, reformation or any other happening in the organization cause conflict. Skill deficits Lack of skill and knowledge also cause conflict. Personality and style differences Everybody in the organization has different style and personality that’s also cause of conflict in the organization. Substance abuse and Family problems also cause of conflict in the organization. Organizational factor There are some organizational factor are also cause of conflict in the organization like Leadership If the leadership is not leading his organization properly than it’s the big cause of conflict. Management Lack Managing qualities in organizational managing team cause conflict among its members Budget Insufficient budget and improper distribution cause conflict in organization. Poor communication among the leadership, management and the staff member cause of conflict in the organization. Different values of different staff member, personality clashes and poor performance also the cause of conflict  in the organization. Solution Solution of conflict in the organization is hidden in following factors Minimizing authorities By the minimizing authorities conflicts decrease. Improving polices By improving polices of organization to decreasing conflict Communication Communication among staff member is solution of conflict. Due to poor communication they can say nothing to the higher authorities and cause conflict between them. By Providing support to the staff member also reduce conflict. Injustices in rewarding staff member or injustices in any other matter are also cause conflict so that justice in every matter is a solution of conflict as well. If there is conflict between any of the staff member of the organization then one should take following steps Step 1: Intervene Where conflict exist one should involved his self in the problem and let know about people involved in it. Step 2: Listen and discuss By allowing every person to give their views and opinions you will have the opportunity to hear what each person thinks, and they will have the chance to hear what the others involved think, too. Step 3: Make your position clear You have to make your position clear which is acceptable by every involved parties or individual Step 4: Negotiate a win/win outcome One should make his position neutral in the situation and make agree everyone on the same opinion which is acceptable to every one Step 5: Monitor the situation After the you have to arrange some formal and informal meeting to monitor situation A formal follow-up meeting attended by all interested parties and Informal meetings just to check how things are going. 2.4 Explain recording system for performance assessment for individual or team The accomplishment of a given task measured against present  known standards of accuracy, completeness, cost, and speed. In a contract, performance is deemed to be the fulfilment of an obligation, in a manner that releases the performer from all liabilities under the contract. 5 The maintenance of a history of one’s activities, as financial dealings, by entering data in ledgers or journals, putting documents in files4, etc. is known as recording system. Recording system for any organization is very necessary to improve itself and to achieve desirable performance. There should be recording system in organization for performance assessment for every team and individual. There should be link between team and individual previous performance with current performance. By this we can check its progress and taking step against poor performance is easy. Recording system of performance of individuals and team are very important for the maintenance and improving performance. If the recording system of performance is exist in the organization then it’s easy to compare the performance of any individual and team and can easily obtain their progress report. Other advantage of the performance recording system is that all the individual and teams try to improve their performance to keep their record good for good reputation in the organization. So there should be a proper system in the organization for keep record of performance of the team and the individuals. All monthly and the annuals performance reports should keep in record. If some individual or team perform well or make a big mistake should also keep in record for basics of appreciation and maintenance. Q3 Be able to understand performance support for improvement. 3.1 Explain performance improvement cycle Performance improvement cycle is a cycle of development. If someone has poor performance then one should has to be pass through the improvement cycle to develop his abilities to show better performance. There are following steps of improvement cycle Identify In this step you have to identify his weakness and reason of his weakness. This is very important step of the improvement cycle because without correct identification diagnose of problem is not possible. After identify problem  you have to identify its reason also. Opportunities After identify the problem and its reason than you have to look at all the opportunities available to improve its weakness. Agree plan of action After look at all opportunities you have to decided that which one are more opportunities suit you to improve his weakness and then you have to act upon his plan. Review After that you have monitor to monitor performance. If everything is going as you want and agreed then you will be able to encourage the team member. If the things are not going well then you have to sit again to argue the trouble and find the key. 3.2 Discuss the indicator of poor performance Poor performance is define as when member of your team performing less than your hope. There are many reasons behind the poor performance that’s why it’s not an easy job to find out the reason of poor performance. But to find out the reason of the poor performance is very important because without indicating any problem cure of problem is difficult. There is some common reason of the poor performance. * Targets and goals are out of reach. * Team member of staff is insincere * Quantity of work * Team members’ ability is not appropriate * Team member is slow in taking decisions * Team member is not experiences and skilled. * Lack of knowledge * Lack of motivation These are main factor which are main cause of the poor performance by improve these you can easily improve performance. You can set the stander of performance By written job description By clearing Objective of organization and out come to member Competence of statement EVALUATING METHODS THAT SUPPORT PERFORMANCE IMPROVEMENT To improve the poor performance of the organization is very important to  achieve the goal .there are few steps which are use to improve poor performance of the organization. Counseling If individual staff member is not performing well that you have to look at his life out of work may be he cannot performing well due to some family or personal problems. You should try to solve problem if possible. Training or coaching If the staff member or not performing well then maybe they need training and coaching to doing that job. After giving them proper training about their job and then monitor them if you got desirable result then they can support to achieve objective of organization. Performance improvement plan Performance improvement plan is a written formal plan to improve the poor performance. There are following steps in it * Identify the problem and its reason * Opportunities * Agree plan of action * Review By this plan one can easily improve his self. Disciplinary That is last step to improving poor performance. Some time employees improve their self when they get last warring. After that if one never improves his self than one dismiss from job. ————————————————- Q4 BE ABLE TO UNDERSTAND ORGANIZATION’S DISCIPLINARY AND GRIEVANCE PROCEDURE. 4.1 Discus the organization’s disciplinary and grievance procedures Every organization has its own rule and regulation but some of the rules linked with the citizen rights and human rights. Especially in United Kingdom any organization cannot dismiss any employee for job without any reason or sold proof so that if any organization does this then the organization has to answer in court. To dismiss any employee the following thing should take in to account * You have to give approx. three warnings 1. Informal warning 2. Formal warning 3. Written last warning * The contract with employee and organization should expired * Organization should have sold proof of his poor performance After that you can dismiss any employee without this if you dismiss any employee due to some personal or family problem than you have to answer in court and may be you have to pay plenty. Grievance allows the individual to compliant to their management. Due to the grievance individual never do uninformed action. Due to this the communication between the employee and management increase and reduce conflict between them as well. Due to complain of employee you can identify many problems to improving performance. Role of manager in disciplinary and grievance procedure Role of manger in the disciplinary procedure a manger should have good relationship between employees. So that he can reach to the real situation of the problem. He should know about that problem seriousness. If problem is serious. Than in this case employee has to dismiss. That’s dark point of management. Following thing a manger should take in to account? The problem should genuine There should not personal problem or family problem There should be witness There should be documentary proof After this a manger can dismissing the employee Grievance is problems or complains that employee lift up against their employers. The role of manager in this situation is very important. He should arrange meeting with the employer and employees. Responsibility of the manager is in this situation is to listen all complains and problem very carefully and attentively with non-judgment condition. So that employees can speak freely. If some think is not clear then manger should ask it again. Manger should understand all complains and his understanding should be same as employer. In this entire situation the manger should be fair. 4.3 Summaries the key aspect of legislation that applies to an  organization’s disciplinary and grievance procedure The act or process of making laws; enactment is known as legislation5 All the employees should be aware of the organizational disciplinary and grievance procedure. When the employee entre to organization. He/she should know about disciplinary and grievance procedure. If organization wants change in procedure they should call meeting. Key aspect of the disciplinary and grievance procedure is below Disciplinary * Keys to handling disciplinary issues in the workplace * Establish the facts of each case * Inform the employee of the problem * Hold a meeting with the employee to discuss the problem * Allow the employee to be accompanied at the meeting * Decide on appropriate action * Provide employees with an opportunity to appeal * Special cases Grievance There is an Acas (Advisory, Conciliation and Arbitration Service) Code of Practice on disciplinary and grievance procedures . It sets out principles that you and your employer should follow to achieve a reasonable standard of behaviour in handling grievances.9 * Let the employer know the nature of the grievance * Hold a meeting with the employee to discuss the grievance * Allow the employee to be accompanied at the meeting * Decide on appropriate action * Allow the employee to take the grievance further if not resolved * Overlapping grievance and disciplinary case * Collective grievances Legislation is define as a law or set of laws suggested by a government and made official 4 Key aspect of legislation of organization’s disciplinary and grievance procedures are above mention if theses key aspect use to solve the disciplinary and grievance scenario in the organization then it’s good for both employer and employee and they will not be not face and legislation act. But if employee or employer not follows the proper way as describe to  solve grievance and disciplinary then they have to face the court. 1. Business dictionary.www.bussinessdictionary.com (accessed date 02/01/2012) 2. BusinessdictionaryAvailablehttp://www.businessdictionary.com/definition/conflict.html (accessed date 04/01/2012) 3. CambridgedictionaryAvailable:dictionary.cambridge.org/dictionary/british/legislation (Accessed date 08/01/2012 ) 4. DictionaryreferenceAvailable:dictionary.reference.com/browse/recordkeeping( Accessed date 09/12/2011 ) 5. Dictionary referenceDictionary.reference.com (Accessed date 07/01/2012) 6. Business dictionary www.bussinessdictionary.com {Accessed date 06/01/2012} 7. LondonDeaneryAvailablewww.faculty.londondeanery.ac.uk (Accessed date 08/02/2012) . 9. DirectGov.Available:http://www.direct.gov.uk/en/Employment/ResolvingWorkplaceDisputes/Grievanceprocedures/DG_10027992 (accessed date 01/01/2012)