Monday, September 30, 2019

Approach to Software Architecture Description Using UML

The 3+1 Approach to Software Architecture Description Using ML Revision 2. 2 Henries B ¦Arab Christensen, Anion Sorry, and Klaus Marcus Hansen Department of Computer Science, University of Argus Beograd 34, 8200 rush N, Denmark May 2011 Abstract This document presents a practical way of describing software architectures using the Unified Modeling Language. The approach is based on a â€Å"3+1† structure in which three viewpoints on the described system are used – module, component & connector, and allocation – are used to describe a solution for a set of architectural requirements.Introduction Software architecture represents an appropriate level of abstraction for many system development activities [Bass et al. , 2003]. Consequently and correspondingly, appropriate software architectural descriptions may support, e. G. , stakeholder communication, iterative and incremental architectural design, or evaluation of architectures [Bass et al. , 2003], [Clement et a l. , Bibb], [Clement et al. , AAA].This document represents a practical basis for architectural description and in doing so, we follow the IEEE recommended practice for architectural description of software-intensive systems [Software Engineering Standards Committee, 2000]. Central to this recommended practice is the concept of a viewpoint through which the software architecture of a system is described (see Figure 1). A concrete architectural description consists of a set of views corresponding to a chosen set of viewpoints. This document recommends the use of three viewpoints (in accordance with the recommendations of [Clement et al. AAA]): A Module viewpoint concerned with how functionality of the system maps to static development units, a Component & Connector viewpoint concerned with the runtime mapping of nationality to components of the architecture, and an Allocation viewpoint concerned with how software entities are mapped to environmental entities In addition to the views on the architecture, we recommend collecting architecturally significant requirements (see Section 2) in the architecture documentation.This corresponds to the mission of a system as described in [Software Engineering Standards Committee, 2000]. The views corresponding to these viewpoints are described using the Unified Modeling Language standard (ML; [OMG, 2003]). This reports provides examples of doing so. The ML has certain shortcomings in describing software architectures effectively , but is used here to strike a balance between precision/expressiveness and understandability of architectural descriptions. Figure 1 : Ontology of architectural descriptions 1. Structure The rest of this document is structured in two main sections: One introducing the â€Å"Architectural Requirements† section of the documentation (Section 2, page 3), and one introducing the â€Å"Architectural Description† section of the documentation (Section 2, page 3). These sections are introduced in general and a specific example of applying them to the documentation of a system is provided. The examples are created to describe a point-of-sale system (Next POS) for, e. G. , a supermarket point-of-sales. The example is inspired by the case study of Alarms [Alarms, 2002].The system supports the recording of sales and handling of payments for a generic store; it includes hardware components as a bar code scanner, a display, a register, a terminal in the inventory hall, etc. More details of the functionality of the system can be found in Section 2. 1 This is in particular connected to the central Component & Connector viewpoint [Clement et al. , AAA] 2 Architectural Requirements Two types of descriptions of architecturally significant requirements are appropriate: scenario-based and quality attribute-based requirements.The architecturally significant scenarios (or use cases) contain a subset of the overall scenarios providing the functional requirements for the system. These ca n possibly be augmented with requirements on performance, availability, reliability etc. Related to the scenarios. Moreover, â€Å"non-functional† scenarios, e. G. , describing modifiability of the system may be useful as a supplements . All requirements cannot be described as scenarios of system functionality, and we propose supplementing the scenarios with a set of the most critical quality attributes that the system should fulfill.Since quality attributes (such as modifiability and performance) are often in conflict, this needs to be a subset of all architectural quality attributes. The goal of describing architectural requirements is to enable the construction of a set of â€Å"test cases† against which deterrent architectural designs may be compared and/or evaluated. 2. 1 Example In the Next POS case, a scenario is a specific path through a use case. An example of such a scenario is: Process Sale: A customer arrives at a checkout with items to purchase. The cashie r uses the POS system to record each purchased item.The system presents a running total and line-item details. The customer enters payment information, which the system validates and records. The system updates inventory. The customer receives a receipt from the system and then leaves with the items. Critical architectural attributes for the Next POS system area : Availability. The system shall be highly available since the costiveness of sales depends on its availability Ђ Portability. The system shall be portable too range of deterrent platforms to support a product line of POS systems Usability.The system shall be usable by clerks with a minimum of training and with a high degree of e science 3 Architectural Description It is beneficial, when documenting software architecture, to apply deterrent viewpoints to the system. Otherwise the description of the system will be incomprehensible. 2 Architecturally significant scenarios are the basis of many architectural evaluation appr oaches [Clement et al. , Bibb] 3 Note that this choice of quality attributes excludes, e. G. Performance, scalability, security, safety, reliability, intolerability, and testability.Taken this into account, it is first important with a viewpoint which describes the functionality of the system in terms of how functionality is mapped into implementation. Secondly, it is important to describe how the functionality of the system maps to components and interaction among components. And thirdly, it is important to see how software components map onto the environment, in particular hardware structures. These three viewpoints are the module, component & connector, and allocation viewpoints respectively in concordance with [Clement et l. AAA]. The viewpoints used in the architectural description section are defined as proposed in [Software Engineering Standards Committee, 2000]: for each, we first have a section describing the concerns of this viewpoint, then a section describing the stakeho lders, then a section describing the elements and relations that can be used to describe views in this viewpoint, and finally an example of a view. 3. 1 3. 1. 1 Module Viewpoint Concerns This architectural viewpoint is concerned with how the functionality is mapped to the units of implementation.It visualizes the static view of the systems architecture by wowing the elements that comprise the system and their relationships. 3. 1. 2 Stakeholder Roles This viewpoint is important to architects and developers working on or with the system. 3. 1 . 3 Elements and Relations The elements are units of implementation including: Class: A class describing the properties of the objects that exist at runtime. Package: A logical division of classes in the system. This can refer to packages as we find them in Java or Just give a logical division between the classes of the system.Interface: A classification of the interface of the element that realizes it. It can refer to the interfaces found in e. G. Java or Just a description of an interface that a class can conform to. The relations describe constraints on the runtime relationships between elements: Association: Shows that there is a hard or weak aggregation relationship between the elements and can be used between classes. Generalization: Shows that there is a generalization relation between the elements and can be used between two classes or two interfaces. Realization: Shows that one element realizes the other and can be used from a class to the interface it implements. Dependency: Shows that there is a dependency between the elements and can be used between all the elements. 3. 1 . 4 Examples The module view of the POS system can be described using the class diagrams of JIMS, which can contain all the above mentioned elements and relations. It is possible to describe the system top-down by starting with the most top-level diagram. In figure 2 the overall packages of the system are shown.Figure 3 and figure 4 show furthe r decomposition of the Domain Model package and the Payments package in the Domain Model package. Figure 2: Package overview diagram for the POS system Dependencies among packages are also shown; these dependencies arise because of relationship among classes in deterrent packages. As an example, consider the association between figure 4 there is an association from classes in Payments to the Customer class of the Sales package. This relationship gives rise to a dependency from the Payments to Sales package as shown in figure 3.Figure 3: Decomposition of the Domain Model package of the POS system Typically, class diagrams such as figure 4 will suppress detail and also omit elements for clarity, since a major purpose of architectural description is come annunciation. In figure 4, e. G. , details of methods and attributes of classes have been suppressed and certain classes have been omitted. Figure 4: Decomposition of the Payments package of the POS system 3. 2 3. 2. 1 Component and Co nnectors (C&C) Viewpoint This viewpoint is concerned with the run-time functionality of the system?I. . What does the system do? This functionality lies as the heart of purpose of the system under development, thus this viewpoint is of course a very central viewpoint, and architectural design often starts from tit . In this viewpoint, software systems are received as consisting of components which are blackball units of functionality and connectors which are first-class representations of communication paths between components. Components embody functional behavior while control and communication aspects are defined by the connectors.Paraphrasing this, you can say that components define what parts of the system is responsible for doing while connectors define how components exchange control and data. It is important to describe properties of both components and connectors in the documentation. This is done using a combination of textual descriptions (listing susceptibilities for exa mple) with diagrams showing protocols, state transitions, threading and concurrency issues as seems relevant to the architecture at hand. 4 Hoverflies et al. Hoverflies et al. , 1999] defines a process where this viewpoint is the first to be considered and other viewpoints are derived and elaborated from it. 6 Figure 5: C&C overview of the POS system 3. 2. 2 This viewpoint is important to architects, developers, and may also serve to give an impression of the overall system runtime behavior to customers and end users. 3. 2. 3 The C&C viewpoint has one element type and one relation type: Component: A national unit that has a well-defined behavioral responsibility.Connector: A communication relation between components that defines how control and data is exchanged. Both are first class citizens of this viewpoint and both may contain behavior. This is obvious for components, but connectors may exhibit behavior as well. Examples of connectors with behavior are those that provide bufferi ng of data between a data producer and consumer, data convention, adoption of protocols, remote procedure calls, networking, etc. A connector defines one or more protocols. A protocol defines both incoming and outgoing operations and mandates the ordering of them.Thus a connector's protocol is radically deterrent from a class' interface that only tells what operations its instances provide (not uses) and does not describe any sequencing of method calls. 3. 2. 4 The POS system has four major functional parts as shown in the C&C view in figure 5. Components are represented by ML active objects, connectors by links with association names and possibly role names. Active objects are typically processes or threads in the operating system or programming language, and links the communication paths between them.The diagram cannot stand alone, as component names and connector names are only indicative of the functional responsibilities associated with each. We 7 therefore provide an descripti on of component functionality in terms of responsibilities: Barded Scanner. Responsible for 1) Control and communication with bar code scanner hardware and 2) notification providing ID of scanned bar code for items passing the scanner. Sales. Responsible for 1) keeping track of items scanned; their price and quantity; running total of scanned items and 2) initiation and end of sales handling. Ђ Presentation. Responsible for 1) displaying item names, quantity, subtotals and grand total on a terminal 2) printing item, quantity, subtotals and grand total on paper receipt 3) handle key board input for defining quantities when only one of a set of items are scanned. Inventory. Responsible for 1) keeping track of items in store 2) mapping between bar code ID's and item name and unit price. Likewise, the connectors' protocols needs to be described in more detail. The level of detail needed depends on the architecture at hand.For some connectors, it may be us cent with a short textual d escription (for instance if it is a straightforward application of the observer pattern; or if it is a direct memory read); others may best be explained by ML interaction diagrams; and still others may have a very large set of potential interactions (like a SQL connector) of which only a few may be worthwhile to describe in more detail. The POS example names three connectors: MFC. A standard MFC patterns is the protocol for this connector that connects the Sales component serving the role of model and Presentation serving as controller and view. Ђ JDBC. This connector handles standard SQL queries over the JDBC protocol. BPCS. This connector defines a protocol for connecting with a barded scanner. Data and control is exchanged using ASCII strings in a coded format containing control words and data elements. Sequence diagrams can be used to describe connector protocols. Depending on the system, it may be relevant to document connector protocols individually (a sequence diagram for each protocol) and/or to provide the â€Å"big picture† showing interaction over a set of connectors.Typical use cases as well as critical failure scenarios may be considered for description. In our point of sales example, an overall sequence diagram (diagram 6 seems most elevate, as the individual connectors have rather simple protocols. The scenario shown in the diagram is the event of a single item being scanned and registered. Further detail can be provided, like a sequence diagram showing observer registration and steady state operation for the MFC connector; perhaps table layout or SQL statements for the JDBC; or command language for the BPCS connector.However, most likely this information does not provide architectural insight (they do not eject architectural qualities) and their details should be found in more detailed documentation instead. 8 Figure 6: POS â€Å"item scanned† scenario 3. 3 3. 3. 1 Allocation Viewpoint This architectural viewpoint is concerned with how the software elements of the system – in particular the C&C viewpoint elements and relations – are mapped to platform elements in the environment of the system.We are interested in what the software elements require (e. G. , processing power, memory availability, network bandwidth) and what the hardware elements provide. 3. 3. 2 This viewpoint is important to a number of stakeholders: Maintainers needing to deploy and maintain the system, to users/customers who need to know how nationality is mapped to hardware, to developers who need to implement the system, and to architects. 3. 3. 3 The deployment viewpoint has two primary element types: Software elements: These may be, e. . , executables or link libraries containing components from the C&C views. Environmental elements: Nodes of computing hardware Furthermore, there are three main relation types: Allocated-to relations: Shows to which environmental elements software elements are allocated at runtime. Thes e relations may be either static or dynamic (e. G. , if components move between environmental elements). Dependencies among software elements Protocol links among environmental elements showing a communication protocol used between nodes. 3. 3. 4 Figure 7 shows the deployment of the Next POS system using a ML deployment diagram. The deployment is a typical 3-tier deployment in which presentation is run on a client, domain code is run on a JEEZ application server, and data is stored on a database server. Figure 7: Deployment view of the Next POS system The following elements are of interest Environmental elements (shown as ML nodes) – The Barded Scanner is the device used for inputting sold items into the system.It s read via an ROARS connection to the POS Terminals – The Terminal is the main point of interaction for the users of the Next POS system – The Application Server is a machine dedicated for serving all Terminals on an application level – A Databa se Server provides secondary storage Software elements (Shown as ML components) – The POS executable component runs the client part of the Next POS system including presentation and handling of external devices (biz. The Barded Scanner). It communicates with the Application Server via RMI over IIOP – Jobs is an open source application server which is used for running the domain- elated functionality of the system. It uses the Database Server via JDBC 10 – Myself is an open source SQL database which handles defenestrated functionality (storage, transactions, concurrency control) of the system. 3. 4 Overview The three viewpoints and their associated elements and relations are summarized below.Module c Deployment Elements Class Component Executable Interface Computing node Package Relations Association Connector Allocated-to Generalization Dependency Realization Protocol link +1 view: Architectural requirements The mapping to ML is straight forward for the module a nd deployment viewpoint UT less so for the C viewpoint. For the C viewpoint, components are show by ML Active Objects (that represent run-time entities with their own thread of execution, typically threads and processes), while connectors are shown by ML links (that represent control- and data flow using some protocol). 2

Sunday, September 29, 2019

CU3820 Principles of Assessment in Lifelong learning Essay

1.1: Explain the types of assessment used in lifelong learning. To ‘Measure (assess) the breadth and depth of learning’ (Geoff Petty 1998) I, as a teacher must ensure that my students will understand the targets and goals set for them. This is achieved by using assessment practises. ‘Bloom’s Taxonomy of Learning’ breaks down the structure of assessing and learning thus: †¢ Creating †¢ Evaluating †¢ Analysing †¢ Applying †¢ Understanding †¢ Remembering These methods also enable me, as a teacher to measure success within the classroom. To evaluate whether learning is taking place, there are three assessment methods to use. Initial Assessment: To assess the learning capabilities of the learner an initial assessment will take place. This will enable me to determine whether there are any learning difficulties that may affect the learning and teaching process. Once any difficulties are found the relevant support can be given to the learner. Formative Assessment: This method is used to monitor the learning progress of the learners during the course. It will enable me to provide feedback on their progress and also give the learner the opportunity to give me feedback on my performance. This method can also highlight ant problems that may need o be addressed. Summative Assessment; Summative assessments takes place at the end of each course or learning session. It will assess to what extent learning has been achieved and to enable me to re-evaluate my own teaching methods. This will allow verifiers to assign course grades and certification. 1.2 EXPLAIN THE USE OF METHODS OF ASSESSMENT IN LIFELONG LEARNING To explain how assessments show progress and achievement, it is essential to learn what an assessment is. Assessment for learning is a term used to describe how evidence of student learning is recorded by me the teacher and is used by both students and teachers to decide where a student is within their learning and what they need to do better or to keep to the level that they are working at. Assessment for learning is a very effective way to put on record that learning and good teaching are being achieved. Assessment for learning is a joint process between student and teacher where both are engaged in an on-going process of student progress and development. The assessment to use will depend on the subject in my case spanish and any requirements of the organisations involved. Although all teachers should use some initial assessment to identify needs of the learner and to see if they have any previous experience in the language work set to them which in my subject would be spanish. Assessment methods can be recorded for group or individualls to reflect on the ability of the students. The student or learning group and the activities you select and the learning outcomes might affect your choice of assessment methods in a lesson. Formative assessment takes place during learning with the purpose of improving learning and involves me as the teacher giving feed back into the learning process to help me as the teacher, to decide whether a student is ready to move on or needs to practice what is being learnt, or has still yet to learn. It is usually the teacher’s final decision as to whether a student is ready to move on to the next stage of the course. Formative assessment can take a variety of forms; peer and self assessment, verbal and written, questioning and marking. Summative assessment happens at the end of a course. To measure and talk to the student/groups about what they have learned so far in the lessons. Summative learning is less about informing and improving the learning process but more about measuring the end result; for example end of year exam. 1.3 Compare the strengths and limitations of assessment methods to meet individual learner needs Student questioning is an effective way for engaging students within the learning process, obtaining existing knowledge of the chosen course and demonstrating, thinking and understanding of the students enables me to informally yet formatively assess their knowledge and the understanding of the progress the student is making with their studying. For example; at the beginning of my micro teach session, which was a De-fragmentation learning exercise, I asked the group if any of them had any previous experiences. This aided me in what level to teach the group. A good ice-breaker can be used as a group activity, as in my micro teach i got the group to exchange questions and answers with the person next to them to get the group engaged. I then dealt with each learner individually by asking them how they were getting on and if they understood the subject. This simple but effective method engaged the group, then I could address the learners individually and provide individual needs for the said learner. David Miliband stated: ‘We need to do more than engage and empower pupils and parents in the selection of a school: their engagement has to be effective in the day-to-day processes of education, at the heart of the way schools create partnerships with professional teachers and support staff to deliver tailor-made services, In other words we need to embrace individual empowerment within as well as between schools.’ References: Milliband,D (2004)’Personalised learning meeting individual learner needs’ Published by The Learning and kills Network 2. Understand ways to involve learners in the assessment process. 2.1. Explain ways to involve the learner in the assessment process. Carol Boston says ‘Black and William (1998b) define assessment broadly to include all activities that teachers and students undertake to get information that can be used diagnostically to alter teaching and learning. Under this definition, assessment encompasses teacher observation, classroom discussion, and analysis of student work, including homework and tests. Assessments become formative when the information is used to adapt teaching and learning to meet student need.† Where and how do we include students in the formative assessment process? What is the role of technology in this feedback cycle?’ Formative assessment, as I understand it, is an on-going process where both teachers and students evaluate assessment evidence in order to make adjustments to their teaching and learning. Robert Marzano has called it â€Å"one of the more powerful weapons in a teacher’s arsenal.† The formative assessment process can strengthen students’ abilities to assess their own progress, to set and evaluate their own learning goals, and to make adjustments accordingly. Formative assessment can also elicit valuable feedback from students about what teachers are doing effectively and what they could do better. Student Self-Assessment and Reflection Activities which promote meta-cognitive thinking and ask students to reflect on their learning processes are key to the formative assessment process. When students are asked to think about what they have learned and how they have learned it (the learning strategies they’ve used), they are better able to understand their own learning processes and can set new goals for themselves. Students can reflect on their learning in many ways: answering a set of questions, drawing a picture or set of pictures to represent their learning process, talking with a partner, keeping a learning log or journal, etc. Goal Sheets Having students set their own goals and evaluate their progress toward achieving them is an effective part of the formative assessment process. Goal setting has a positive effect on student motivation and learning when the goals are specific and performance based, relatively short-term, and moderately difficult. Goal sheets are an effective way to help students set goals and track their progress. It is best to identify specific goals. For example, â€Å"I will read in English for 20 minutes each night† is more specific than â€Å"I will read more.† Also, goals need to be achievable in a short period of time and not impossibly difficult. The teacher can model how to set effective goals and also how to evaluate one’s progress toward achieving them by asking students to periodically write or talk about what they have achieved, what they still would like to achieve, and how they will do it. 2.2. Explain the role of peer and self-assessment in the assessment programme F. Dochy (2006) said ‘The growing demand for lifelong learners and reflective practitioners has stimulated a re-evaluation of the relationship between learning and its assessment, and has influenced to a large extent the development of new assessment forms such as self-, peer, and co-assessment. Three questions are discussed: (1) what are the main findings from research on new assessment forms such as self-, peer and co-assessment; (2) in what way can the results be brought together; and (3) what guidelines for educational practitioners can be derived from this body of knowledge? A review of literature, based on the analysis of 63 studies, suggests that the use of a combination of different new assessment forms encourages students to become more responsible and reflective. The article concludes with some guidelines for practitioners.’ Principles for using self and peer assessment 1. The purpose for using self and peer assessment should be explicit for staff and students A major reason for using self and peer assessment is for its role in developing students’ skills in improving learning and in helping students to improve their performance on assessed work. Additionally, it has a place as a means of summative assessment. 2. There is no reason why peer and self assessment should not contribute to summative assessment In many such cases such assessment will not contribute a major proportion of the mark until it has been well tried and tested. However, in a well-regulated scheme, there is no reason to limit the proportion of the marks involved. It is particularly important that the principles below are noted. 3. Moderation For any situation in which the mark from peer or self assessment contributes towards the final mark of the module, the member of staff should maintain the right to moderate student-allocated marks. The initial step in alteration of a student-allocated mark may be negotiation with the student(s) concerned. 4. Instances of unfair or inappropriate marking need to be dealt with sensitively Any instances of collusive (‘friendship’) marking need to be dealt with sensitively and firmly. 5. The quality of feedback on student work must be maintained In situations of self and peer assessment, students are usually in a position to learn more than from situations of tutor-marked work. They learn from their engagement in assessing and frequently from oral, in addition to written feedback. However, the tutor should monitor the feedback and, where appropriate, elaborate it to ensure that students receive fair and equal treatment. 6. Assessment procedures should always involve use of well-defined, publicly-available assessment criteria While this is true of all assessment, it is particularly true where relatively inexperienced assessors (students) are involved. The assessment criteria may be developed by the tutor, but greater value is gained from the procedure if students are involved in developing the criteria themselves. 7. Involvement of students in assessment needs careful planning Many students see assessment as a job for staff, but at a later stage they are likely to recognise the benefits to their academic learning and skill development. Initial efforts will take time and tutor support. For these reasons, it is preferable that the use of peer and self assessment is seen as a strategy to improve learning and assessment across a whole programme. The common situation is for these assessment procedures to appear in isolated modules, often not at level 1. 8. Self and peer assessment procedures should be subject to particularly careful monitoring and evaluation from the tutor and students’ point of view It can take time for such procedures to run smoothly and for this reason, the initial involvement of relatively few marks – or solely formative assessment is wise. Student feedback to the tutor on the procedure will be important. 9. The use of peer and self assessment should be recognised as skill development in itself Such procedures are not just another means of assessment but represent the development of self-appraisal/evaluative, analytical, critical and reflective skills. These are important as employability skills and can be recognised in the learning outcomes of a module. References: Dochy,F (2006) Studies in Higher Education. Published by Web of Science(2006) 3.1. Explain the need to keep records of assessment of learning. Record keeping is part of the role and responsibility of the tutor and some often these records are required by law or codes of practice in the institution or industry. But there are boundaries and legislation regarding what can be collected and kept and how it can be used. The Data Protection Act 1998 states that records must be kept securely, be relevant and not excessive, accurate and up to date and not kept for longer than necessary. Students can request a copy of all information held about them under The Freedom of Information Act 2000. All important things to bear in mind. The need for keeping records I like that you are forced to think about why there are these records, not just what they are or how they work. Why are these records being kept, to what end? †¢ Track progress †¢ Prove achievement †¢ Identify issues such as low attendance / learning difficulties †¢ Ensure all sections of course have been completed It could be that a lot of these are required by your institution. But I’m not sure that’s the best answer: â€Å"because I have to†. Take it one step further back and think about why the organisation requires you to keep or submit them. Once you’ve thought about what records you need then it is on to how you collect and categorise that information. The types of records you would maintain A lot of this focuses more on the pastoral side, which I think is nice. Make sure you show a variety of types of records, to show you have thought about the full spectrum: †¢ Attendance and assessment †¢ Everything in between †¢ Tutorials, one to ones, learning reviews / goals / plans 3.2. Summarize requirements for keeping records of assessment in an organisation. Recording and Keeping Assessment Results Most organisations have a process in place for recording the results of assessments, and so does your Registered Training Organisation. It is not uncommon as well for assessors to maintain their own records in case of any follow up or appeals. A generic approach would be: †¢ Assessor either records or passes on the results for recording †¢ Assessor checks that the result has been accurately recorded †¢ Result provided to learner There are several reasons why the results need to be kept: †¢ Feedback to learner †¢ Legislative requirements †¢ Record in case of appeal †¢ Company records for future training needs Recognition of Prior Learning Another reason to maintain a record is for the recognition of prior learning and credit transfer processes. If outcomes can be matched by different training organisations detailed records of exactly how competency is assessed simplify the process. It also means, the competency a learner has acquired in one environment may be considered in another, different environment. With records a learner can apply to have prior learning recognised often before commencing a new training program. While it is necessary to keep a record of the actual result, it can be useful to also keep details on how the assessment was made. Training Records and Confidentiality Generally speaking, the only way an external person is able to access another person’s record is with the written permission of the person involved. |Access to records must be restricted for the sake of confidentiality. | | |Generally, managers and supervisors have limited access to personal files, but consider: | | |Who should have access to assessment records? | | |Why would they need the information? | | |What level of detail do they require? | | Each organisation will have a policy and procedures for access that should comply with ethical and legal obligations. It would be worthwhile checking your store policy and procedures in relation to this area.

Saturday, September 28, 2019

Informal Memo Proposal Coursework Example | Topics and Well Written Essays - 500 words

Informal Memo Proposal - Coursework Example The first proposal seeks to address the procedures that businesses can adopt when contemplating transactions with another business. The organizations can adopt proper consultation and procurement procedures to create room for growth and stay afloat in the market. The second proposal aims at finding the current strategies that are used by organizations to prevent credit card fraud and data breaches that happen behind closed doors. The data breaches and card fraud activities are illegal, and they hamper efficient operations that relate to customers and the organizations. The main purpose of proposal #1 is to address the b2b transactions for the interest of the customers and individual organizations. The transactions help business to institute pricing strategies, contracts and product and services as per the prevailing demands in the market. The primary aim of proposal #2 is to provide a platform that can be used to educate institutions on the methods they can take to prevent card fraud. Cards that are lost stolen or counterfeited affect consumers and businesses that offer the credit card services. The consequences come in the form of profits and legal action. Proposal 2 targets credit card companies, individual online business owners and legal entities that fight card fraud. The card fraud activities defraud shoppers, account owners that lose their card information to online thieves. For example, over 70 million Target Company customers lost their card accounts after the 2013 data breach hit the company. The cards were used later for illegal shopping activities. Analysis of business-to-business transactions will use pricing information, valuation strategies and innovations from individual companies. The strategies or procedures adopted by businesses provide an efficient mechanism for dealing with business dilemmas. Highlighting

Friday, September 27, 2019

BUSINESS CASE STUDY Example | Topics and Well Written Essays - 2500 words

BUSINESS - Case Study Example Hence, this proposal is being submitted to the management of the company with the express purpose of convincing them to ramp up their online presence. The annual turnover of the book industry runs into billions of dollars and the leading retailers like Amazon, Borders, eBay etc have cornered the lion’s share of the market. This proposal seeks to present a case for an online book store that is modelled along the lines of Amazon and Fictionwise.com with the proposed online version selling physical book as well as e-books. The proposal also covers selling used books and customised books for a specific kind of reader software that is necessary to view and read e-books. The need for this project grew out of the business objectives that were proposed by the management namely that of increasing revenues without diversifying too much away from the core competency of selling books. This proposal is written in a business report format with the summary of the project, the alternative options, the timelines for the project and the expected benefits from the same. A final justification for the project is also provided in the concluding section of the paper. It is hoped that the management of Borders would consider this proposal and the project being considered for the stated objectives as enunciated by them. Borders is a well established book seller and retailer that commands a place in the Top Five book sellers in the United States. Worldwide, Borders has a significant footprint in the way in which it has franchisees and resellers who sell books procured from Borders. The project that is being proposed would involve setting up of the online bookstore that would cover the areas of selling books (physical), e-books and used books. These formats of books are already being sold by Borders with the exception of the e-books. Hence, the proposed project would entail additional costs of setting up the website and the warehouse to stock books along

Thursday, September 26, 2019

Reports on Penetration Testing on Operating Systems and Database Research Paper

Reports on Penetration Testing on Operating Systems and Database Security to Ensure Reliabilty and Integrity - Research Paper Example In the context of penetration testing on operating systems, it can be affirmed that the aspect i.e. penetration testing is often viewed as an elementary area of information systems based on security engineering (McDermott, 2001). In precise, the facet of penetration testing is often regarded as ‘pen testing’ or ‘security testing’ method which tends to assess the safety of a computer network or system by testing it from the viewpoint of an attacker i.e. a hacker or a cracker. This significant aspect i.e. penetration testing cannot be duly considered as an alternative to other security measures related to information technology (IT). Rather, it is regarded as the approach which significantly assures the security of a network or system in terms of protecting it from being attacked by an intruder (Brown Computer Science, 2010). Techniques of Penetration Testing on Operating Systems The different techniques of penetration testing on operating systems can be appar ently observed as gathering valuable information, scanning internet protocol (IP) addresses, performing fingerprinting, recognizing vulnerable services, exploiting vulnerability activities and finally fixing major problems. The prime intention of the technique i.e. gathering valuable information is to determine the diverse range of Internet Protocol (IP) addresses possessed by an organization. ... tice concerning the recognition of vulnerable service targets is performed to gain greater access to the operating systems along with ensuring that the operating systems are not harmed internally or externally. The technique linked with exploiting vulnerability activities enables to exploit certain detected vulnerabilities such as buffer and heal overflow, code injection, cross-site scripting and SQL injection among others. The prime intention of the technique related to fixing major problems is to recognize the active ports that run on the operating systems. The identification of these active ports might support to protect the operating systems through developing along with upgrading client/server architecture, conducting thorough or non-destructive tests and constructing vulnerability mapping among others (Brown Computer Science, 2010). Thus, on the basis of the above discussion, it can be affirmed from a broader outlook that the aforesaid techniques would certainly facilitate to p rotect the operating networks or systems by a significant level. Significance of Penetration Testing on Operating Systems In this high-tech era, the importance of penetration testing especially within the periphery of operating systems has gained relevance by a considerable level. The procedure of conducting an effectual penetration test enables to confirm that new along with existing operating systems and networks are not susceptible to security risks that might permit unlawful access to exploit valuable resources. It can be observed over a few preceding years that the business corporations in this present era are adopting and executing modern technological tools such as advanced operating systems for the purpose of delivering quality and effective services to the consumers. The broader

Wednesday, September 25, 2019

Marketing Essay Example | Topics and Well Written Essays - 2250 words - 10

Marketing - Essay Example The product lines that are considered are â€Å"Voice Recognition Device.† (Voice recognition device, 2005). Through the use of voice recognition, it is possible to direct and control computer applications without having to use one’s hands to do the job. This is widely used by managers, artists, students, parents, home and office usage etc. â€Å"The firm we now work for is currently developing a new type of voice recognition device (VRD) with advanced capabilities for controlling computer applications using spoken commands. It was our job to move the product to the top of the market and earn profit for our firm by understanding the market, competitors and other trends in the external environment.† (The marketing game, 2009). The two constraining factors in this Marketing game are the Sales Budget that offers the scope for funding various activities that are needed for a game of this kind. Secondly, the marketplace needs to take the competitive moves taken by three competing firms in their bid to create value and revenue chains for their respective businesses. There are also aspects in terms of whether advertising expenditures are paying off and also whether this is influencing the final outcome of business. Another aspect that needs to be considered is, paying close attention to what the competitors are up to. â€Å"In a dynamic market it is rare that a manager can succeed without paying close attention to competitors and what they are doing, and without thinking through what they are likely to do.   Success in The Marketing Game! Is much more likely for those managers who take some time to think carefully about the competitive effects in the market.† (Otjen n.d.). There are only four makers of this VRD in the market. One is the product line which we are responsible for developing; that is, PAMAY and the competitors are Synnergy, Speak, you’re your voice. Synnergy is now in the number one position with 41% market share, You’re has 14% share

Tuesday, September 24, 2019

Essay Example | Topics and Well Written Essays - 250 words - 93

Essay Example Knowing that everything happens for a reason, not necessarily something we would know at present or even in a lifetime, but just going back to who God is, would give us enough hope & strength to take a significant step of faith each day and eventually allow us to create significance in other people’s lives (Rick Warren: A life of purpose, n.d.). Another inspiring video on leadership would be Stanley McChrystal’s â€Å"Listen, learn, then lead† video. As a military man, he has learned what it is like to go through loss, disappointment, & fear. Just like the reality of life, we may never be far from challenges that create a noise that will make us give up or resent life. However, only in listening in times of doubt will enable one to learn the lessons that are only brought about by pain, and only in experiencing not only joy but also pain will enable one to sympathize and comfort others and lead them to an understanding of the possibility of failure and develop the right attitude to stand up once again. Also, this video reminds me of the saying, â€Å"experience is the best teacher,† where though most of the time we deem painful experiences unnecessary, those are the most effective teachers of wisdom we can apply in every season of our lives & eventually lead others to do the same (Stanley McChrystal: Lis ten, learn ... then lead,

Monday, September 23, 2019

Leadership Skills Needed for 21st Century Coursework

Leadership Skills Needed for 21st Century - Coursework Example Therefore new leadership skills are required for leaders which help them to handle those challenges. This case study highlights the views of famous leaders of some reputed companies regarding the leadership skills required for 21st century. Leadership skills play a vital role globalizing and enhancing different activities and processes of business. Oh-Hyun Kwon the Vice Chairman and CEO of Samsung has mentioned that leaders must upgrade their skills along with the changing business environment. According to Mr. Known, the modern world businesses are expanding globally at a very faster rate. Therefore, the business leaders must have broad mindset which will help them to act and think globally. The leaders need to have strong analytical skill. This will facilitate them to implement any decision in the complex business environment of 21st century. The firms of 21st century believe in innovations. Therefore, the leaders must have the skill to develop and establish unique products and services. This will contribute a lot in growth and development of the business (Bamberger and Meshoulam, 2000). In the present time the organizations have employees who belong from different cultural background. According to Oh-Hyun Kwon leaders should have the skills to embrace cultural diversity in the work place. They should extract good things fro m different cultures and motivate people to follow those things for reducing cultural gaps. The ability of strategic thinking is required for the leaders for enhancing the business processes. The leaders must develop different activities for helping the society and environment. For this reason they must have strong interpersonal skills which will help the leaders to establish connection with the people. The leaders need to have good communication power for enhancing the business process (Story and Barbuto, 2011). Strong communication will help them to provide knowledge to all organizational members. The

Sunday, September 22, 2019

Exams versus Another Form of Assessment Case Study

Exams versus Another Form of Assessment - Case Study Example Up to today, almost all students usually think that taking of exams will rank them according to what they can do or achieve. This paper despises the fact that examinations are not proportional to what a student can do. Therefore, it seconds that fact that exams should be outlawed in favor of another assessment.According to Albert Einstein (2008), he said that everyone is a genius. However, the genius levels usually vary and that exam cannot equate someone’s potential to how he or she performs after a given exam seating. Children are different from each other, and this will make them have different abilities. Therefore, there is no any single day that a teacher can judge student’s learning ability through the same means for all the children. Since each child is a different being, they then portray very different learning styles. However, it is disheartening to affirm that when assessing the children who have different learning styles, that most teachers usually do not ap preciate these differences. It is worth noting that, this evaluation style usually gives out a very wrong perception on the students. In other words, this gives a very inaccurate reflection of the progress plus learning abilities of the student. What teachers should understand is that, if they know that students are usually learning differently, why are they using the same criterion of evaluation to them all?Sadly, from the time immemorial, if a certain number of students fail exams, it is noted that the whole concept will never be repeated. Teachers usually claim that they are rushing to finish the syllabus or if they repeat the same concept then his or her subject will lack behind in terms of syllabus finishing (Beatley, 2010.p. 102). It is good for finishing syllabus, however, how will that benefit students who did not understand a certain concept and they failed it in exams? Students are frequently ushered into another topic, without them understanding the previous concept. This is a clear evidence that there is no way, a student’s ability of potential can be measured by the use of exams.

Saturday, September 21, 2019

Eco-friendly and formaldehyde-free Essay Example for Free

Eco-friendly and formaldehyde-free Essay Dont have the budget for solid-wood kitchen cabinets, but still want to avoid VOC emissions? Youre in luck. In recognition of the new school year, heres a pop quiz: What do mussels those delectable morsels from the sea best served in a white wine sauce and plywood have in common? Cant see the connection? Read on! Unless you, like some mussels, have been living under a rock, you will be aware of the growing hullabaloo about VOCs (volatile organic compounds) and how we dont want to be breathing them in. The bad news is, if youve had non-solid wood kitchen cabinets installed recently or purchased furniture made of composite wood products, you may be doing just that. But theres also good news. Governments and manufacturers have heard the ruckus about VOCs and taken action and, just when you thought you had all the possible options for kitchen cabinet materials nailed, out they come with new ones to confuse everyone. Hence this primer to bring you up to speed and make sense of it all. It used to be that consumers had two extremes to choose from when they shopped for kitchen cabinets. The lower-cost options were cabinet components made of either particleboard, medium-density fibreboard (MDF) or plywood. These are all composite wood-panel products traditionally containing glues that, when they come to room temperature, emit VOCs in the form of potentially carcinogenic urea formaldehyde (UF). At the other end of the price extreme was solid wood, which doesnt have this problem but costs more. Many contractors still tell clients that their choices are either/or, and urge them to go for the higher-priced wood for various reasons. Luckily for consumers who dont have the budget for a solid-wood kitchen but who want to avoid VOC emissions, this all changed about three years ago, says David Beattie of Rayette Forest Products, based in Concord, Ont. That was when Oregon-based Columbia Forest Products introduced PureBond, which Mr. Beattie describes as a veneer core hardwood plywood made with glue containing zero UF. This plywood, whose layers are joined by a soy flour-based glue, is one of a growing number of alternatives to products in which UF-emitting glues are used. It was introduced by Columbia ahead of new industry standards in the United States the toughest there to date set by the California Air Resources Board (CARB). The story behind PureBond and this is where the mussels come in is rather romantic, although romance isnt something youd normally associate with plywo od either. It seems that an Oregon State University researcher was vacationing along the Pacific Ocean. While sitting on the beach watching the waves pound the shoreline, he noticed clumps of mussels clinging to the rocks. No amount of battering surf could dislodge them. What are they secreting, he wondered, that allows them to adhere to the rocks so solidly? In short, research into those secretions led to the soybean-based, zero-UF glue used in PureBond plywood. Columbia Forest Products says using PureBond is cost-neutral when compared with its former UF-emitting panel products. Thats despite the large expenditures the company says it has made to develop the product. This is an important development, romantic beginnings aside, because, according to CARB findings, The most significant source of (UF) emissions we face on a daily basis comes from the composite woods in our furnishings and cabinetry. At this stage, the glues that work in zero-UF plywood arent being used for particleboard or MDF. Some sources say these adhesives simply dont work with those materials, which have different natures than plywood. But there is something called no added UF particleboard, as well as a kind of MDF whose emissions are in the acceptable range. Look for a particleboard called SkyBlend developed by Oregon-based Roseburg Forest Products and made with recycled and sustainable raw materials, and Arreis MDF, made by SierraPine, which is based in California. Both SkyBlend and Arreis are considered green building products that meet North American VOC-emissions standards. They, and PureBond, are readily available in Canada. With this kind of progress in the wood-products industry, Rayettes Mr. Beattie predicts it wont be long before all composite wood materials are formaldehyde free. If youre in the market for new kitchen cabinetry and your budget wont cover solid wood models, discuss your material options with your contractor. Its important to ensure that hes up to speed on the latest technology and knows what your preferences are. Most general contractors have preferred cabinet suppliers. Find out if those suppliers offer a zero or low UF-emitting panel product. If your contractor still thinks there are only the two extremes to choose from, tell him about the mussels. I know that not everyone is up in arms about UF emissions. Even if you arent, however, I still urge you to find out where your contractors cabinet supplier buys his composite wood products. If theyre coming from certain Third World countries, you could be getting third-rate quality along with those high UF levels. Some contractors will go the foreign route because its cheaper even though those materials often dont meet our more stringent Canadian and North American standards. Canadian materials can cost more than those made in Third World countries. For example, in an average-sized kitchen, using Canadian-produced panel materials is about $500 more expensive than if you went with the Third World products. Still, its not that big of a premium when you consider the benefits of buying Canadian: zero to low UF emissions, and the fact that youre supporting our economy, our workers and our renewable forestry practices. Im not even going to get into the whole human rights thing. As a friend of mine says, when it comes to buying Canadian and going as green as we can, Its all good.

Friday, September 20, 2019

International Business Environment Of Countries Hg Operates Economics Essay

International Business Environment Of Countries Hg Operates Economics Essay To identify and gain an understanding of the environment for international business in Germany, several factors will be reviewed. A countrys geography, culture, population demographics as well as political and economic structure can all play a role in either contributing to or working against the existence of a climate favourable to international business. By examining issues such as Germanys participation in area economic integration, its attitude toward foreign direct investment and its participation Germanys Geography Germany is one of the most densely populated countries in the world, with almost 83 million people inhabiting 357,022 square kilometres of land. The country consists of 16 federal states and 32 kingdoms, principalities and small towns. The countryside is quite diverse with five major landscape types, including sandy beaches along the North and Baltic Seas, hills and lakes in the North German Plain, numerous islands, fertile lands, lowland bays, and mountain ranges in the Alps.    The Bavarian plateau in the southwest averages 1,600 feet above sea level, while its highest point, the Zugspitze   Mountains, reaches 9,721 feet. Germanys major rivers are the Danube, the Elbe, the Oder, the Weser, and the Rhine. Natural resources present include iron ore, coal, potash, timber, lignite, uranium, copper, natural gas, salt and nickel.   Ã‚   Germanys Population Demographics The estimated 2006 population of Germany is 82,422,299 with a population growth rate of -0.02% Balance of Trade Germany continues to be a very export focused, as noted below in its current account balance. Germany exports account for more than one-third of national output. Although production costs within Germany are very high it continues to be a top exporter of goods. German export sales are concentrated in motor vehicles, machinery, chemicals, and heavy electrical equipment. France is Germanys second-largest trading partner, with the U.S. being the second largest. Trade with the U.S. totalled $89.1 billion in 2002; U.S. exports to Germany totalled $26.6 billion while U.S. imports from Germany totalled more than $62.5 billion. Foreign Debt Obligations Germanys focus on being a lead exporter lends it to continue to carry a positive trade/debt ratio compared to that of competing countries such as the U.S. Estimates based on 2005 data show that the U.S. continues to run a current account deficit compared to that of Germany. Germany continues to run a positive current account balance; this has been one of the factors supporting the increase of the euro compared to that of the dollar. World Trade Organization Involvement Germany was one of the inaugural members of the World Trade Organization founded in January of 1995. Today it remains committed to promoting multilateral trade and in 2000 began a series of contributions to the WTOs technical assistance and training activities.    Germanys most recent donation of EUR 1.7m in 2006 makes it the second biggest voluntary contributor to the WTO. Currency of Germany Germany is the worlds third-largest economy and the largest in Europe, but has recently been one of the slowest growing economies in the European Union for a number of reasons including: the continued integration of the eastern German economy, inflexible labour practices which continue to increases unemployment rates to 11.7%, taxation and high social insurance cost.    The bureaucracy associated with labour practices have led German employers to consider investing in oversee operations or automating production rather than to create jobs in domestic facilities.   Historically Germanys main currency was the Deutschmark, but in 1999 the European Monetary Union introduced the euro as a common currency to be used within its members financial institution and by January 2002, the euro became the sole currency for all member countries. As of the November 30, 2006 the euro was trading at 1.3167 compared to that of the U.S. dollars, this is an increase over the 2005 average of .8041. (Yahoo Finance)    Due to the creation of the euro it is difficult to determine Germanys overall impact on this increase of the euro compared to that of the dollar, however, the Gross Domestic Product (GDP) information illustrates Germanys dramatic impact on the increase. Although Germany has experienced a high level of unemployment in recent years, 11.7% in 2005, it continues to hold a major labour force of approximately 43 million; Analysing the above data shows that although the growth rate has been low in recent years Germany has experienced a relatively stable economy with the potential to increase it performance. Conclusion Although Germany has experienced recent slow economic growth and the cost of producing goods is higher than other foreign countries, Germany offers an environment that strongly supports international business, evidence of this includes the presence of a highly skilled and productive worker force and its prime location in the heart of Europe. Investing in Germany appears to be a sound business decision; various incentive packages can offset real costs as well as provide tax incentives in future years. To help structure a successful integration with German consumers, companies should ensure that they have a high quality innovative product. Culturally, German consumers do not focus on the cost of a product but are extremely focused on the quality of a product. Promising sectors to consider for international business opportunities in Germany include computer software, management consulting services, drug and pharmaceuticals, and telecommunication equipment.   United Kingdom Major Elements and Dimensions of Culture in the United Kingdom The United Kingdom is rich in cultural heritage. The country is a tourist destination known for its landscape, art galleries, architecture, parks, palaces and museums.    Although the sites are remarkable, the culture is distinctive.    In the United Kingdom, their culture is considered a reflection of their diversity. Languages The official language of the United Kingdom is English which is said to be spoken by 95% of the population.    Although the Unites States speaks English as well, they are very different.    The dialects are not only different between the United Kingdom and the United States; they are also very different between the regions in the United Kingdom.    The American English and the British English are the reference forms of English that recognized in the rest of the world. Economic value The United Kingdom is the third largest trading and financial center in Europe.    Over the past few years, the United Kingdom has been focused on growth of the economy and reduction within the social welfare system. The government of the United Kingdom has been researching possible ways to stimulate the economy; however, they are currently facing economic slowdown, high unemployment, declining home prices and increased consumer debt.    The rate changes in the United Kingdom are driven by the rate moves of the Bank of England; this is similar to the moves that are driven in the United States by the Federal Reserve (The economy of, 2010). When doing business with the United Kingdom, it is first necessary to determine whether you have established a presence with your business activities.    If your business with the United Kingdom is simply exporting goods, then there is no a presence established.    If there is a permanent base in the United Kingdom, then the a business has a permanent establishment that will require consideration which will possibly be taxable in the United Kingdom, if business is conducted from that base with regularity (Bryan Cave, 2009). If a permanent establishment is created there are additional considerations the United States based company must consider. The United Kingdom has a tax system has gone through many changes.    It is based on an income system, much like that of the United States.    When a business has been permanently established in the United Kingdom they are subject to taxation in the same way that the local businesses are.    The tax systems measures the rates based on cash flow, instead of profits as it has been in the past.    According to a study of King and Fullerton the corporate tax rate for the United Kingdom has changed consistently since the war.    They have continued to experiment with the rates with legislative approval.    In addition to the corporate taxes, they also have social security tax and capital gains tax. Banking It is important to understand that to conduct business in the United Kingdom will be required to establish a local bank account.    Due to increased issues surrounding corruption and money laundering, the United Kingdom establishes the Money Laundering Regulations. As a result of this program, the banks in the United Kingdom have undertaken a process for due diligence, which is required as part of this law Imports and exports Since the beginning of 2011, UKs monthly trade deficit has hit record levels of more than  £4 billion per month. The monthly deficit in the UK for 2011 is also exceeding the previous record level of  £3.5 billion per month reached in 2007. Total value of exports: US$405.6 billion. Primary exports commodities: manufactured goods, fuels, chemicals; food, beverages, tobacco. Primary exports partners: US (14.71 percent), Germany (11.06 percent), France (8 percent), Netherlands (7.79 percent), Ireland (6.89 percent), Belgium (4.65 percent), Spain (4 percent) Total value of imports: US$546.5 billion Primary imports commodities: manufactured goods, machinery, fuels; foodstuffs Conclusion Scanning the business environment is an activity that needs to be conducted on a continual basis by all international businesses. The reasons are diverse when dealing with countries risks. When global companies enter into the international arena, consistent efforts must be made to understand the ever-changing business climate in each country that they are involved in .Thus company objectives and policies must be aligned accordingly to meet these changes. In dealing with country risk, strategic usage of joint ventures and partnerships may be used to minimize the risk involved. P2  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Describe how the following mechanisms regulate international trade: the work of the WTO in international trade; Quotas and Tariffs; The legislation on product safety and reliability. WTO The WTO as an Organization was created on January 1, 1995, as a result of the Uruguay Round Negotiations. Currently consisting of 140 members worldwide, it is based with headquarters in Geneva, Switzerland and has a secretary staff of over five hundred. The organization of the WTO consists of a head Ministerial Conference, with branches of a General Council, Trade Review Body, and Dispute Settlement Body. Below these branches lie several councils and committees to deal with many different trade issues. One branch consists of a committee with the name Trade and the Environment, which concerns itself with issues relating to trade and the environment. Overseeing the organization of the WTO is the director-general, currently Michael Moore. The basis for all WTO decisions lies in its multilateral trading system, where a large amount of agreements that are negotiated and signed by members must finally be ratified in each countrys individual Senate. While the individual agreements are signed and ratified by each countrys government, the primary purpos e of the legislation is to assist the countrys producers, exporters, and importers. The overall goal of the WTO is to make trade freer, resulting in, claims the WTO, a promotion of peace worldwide, an increase in income and a stimulation of economic growth. As part of its preamble, the WTO claims an interest in the environment, and thus created the Committee on Trade and the Environment to make decisions when environmental issues are involved. The preamble itself states it will promote trade while allowing for the optimal use of the worlds resources in accordance with the objective of sustainable development, seeking both to protect and preserve the environment. The organization, in the past few years, however, has encouraged a lower tariff universally, thereby encouraging producers to look towards less developed countries as prime places for cheap labour and low regulations, especially low regulations relating to the environment. These less developed countries, or LDCs, are known u niversally for having very cheap, productive labour, and are not even close to having the environmental protection efforts seen in the United States and Europe. So these countries are encouraged to make waste of the land and save profits. Yet the WTO maintains that freer trade will benefit all, and their concern for the environment is shown in the existence of a council concerned with only environmental matters. The tariffs   The discussion of tariffs covers both tariffs on quantities within quotas and those outside. Traditionally, the tariff reductions that resulted from trade negotiations came from bilateral product-by-product bargaining, or they were based on formulas that applied over a broad range of products, or combinations of the two. How the reductions will be handled in the present negotiations is still undecided. Some countries such as Canada and the US are advocating that in addition, sectoral liberalization should be negotiated. In some sectors, in past negotiations these have sometimes meant zero-for-zero deals. It would include negotiating the complete elimination of tariffs (and possibly other measures such as export subsidies or subsidized export credits) by at least the key WTO members in specific sectors such as oilseeds, and barley and malt. Some countries for example Japan have said they do not support this. One country, the US, has gone so far as to argue that because so many agricultural tariffs are high, the negotiations to reduce tariffs should start with applied rates (the tariffs governments actually charge on agricultural imports) and not the generally higher bound rates (the legally binding ceilings committed in the WTO as a result of previous negotiations). This has proved quite controversial because it would break a tradition of basing negotiations on bound rates. A number of countries have also countered that they should be given credit for unilaterally applying tariffs that are more liberal than the negotiated bound rates, instead of being forced to make even deeper cuts than countries that kept to their higher bound rates. Some countries that recently joined the WTO also feel that they accepted low tariffs in order to become members and therefore should not have to reduce them much further. A number of developing countries also complain that they face difficulty if they try to increase their incomes by processing the agricultural raw materials that they produce. This is because the countries they see as potential export markets impose higher duties on processed imports than on the raw materials known as tariff escalation in order to protect their own processing industries. Some countries see tariffs and other import barriers as necessary in order to protect domestic production and maintain food security. For this reason, some countries are linking lower import barriers with disciplines on other countries export restraints and export taxes if producing countries do not restrict their exports, then importing countries can feel more secure about being able to obtaining food from them. Some developing countries say they need flexibility in deciding the level of import duties they charge to protect their farmers against competition from imports whose prices are low because of export subsidies. The tariff quotas Quota administration is a technical subject, but it has a real impact on trade on whether a product exported from one country can gain access to the market of another country at the lower, within-quota tariff. Methods used for giving exporters access to quotas include first-come, first-served allocations, import licensing according to historical shares and other criteria, administering through state trading enterprise, bilateral agreements, and auctioning. The terms can also specify time periods for using the quotas, for example periods of time for applying for licences, or for delivering the products to the importing countries. Exporters are sometimes concerned that their ability to take advantage of tariff quotas can be handicapped because of the way the quotas are administered. Sometimes they also complain that the licensing timetables put them at a disadvantage when production is seasonal and the products have to be transported over long distances. Each method has advantages and disadvantages, and many WTO members acknowledge that it can be difficult to say conclusively whether one method is better than another. Several countries want the negotiations to deal with tariff quotas: to replace them with low tariffs, to increase their size, to sort out what they consider to be restricting and non-transparent allocation methods, or to clarify which methods are legal or illegal under WTO rules in order to provide legal certainty. Who has tariff quotas?  Ã‚   43  WTO members currently have a combined total of 1,425  tariff quotas in their commitments. The numbers in brackets show how many quotas each country has. Australia (2) Barbados (36) Brazil (2) Bulgaria (73) Canada (21) Chile  (1) China  (10) Chinese Taipei (10) Colombia (67) Costa Rica (27) Croatia (9) Czech Rep (24) Dominican Rep (8) Ecuador (14) El Salvador (11) EU (87) Guatemala (22) Hungary (70) Iceland (90) Indonesia (2) Israel (12) Japan (20) Korea (67) Latvia (4) Lithuania (4) Malaysia (19) Mexico (11) Morocco (16) New Zealand (3) Nicaragua (9) Norway (232) Panama (19) Philippines (14) Poland (109) Romania (12) Slovak Republic (24) Slovenia (20) South Africa (53) Switzerland (28) Thailand (23) Tunisia (13) United States (54) Venezuela (61) P3  Describe  how the environment and culture of another country affects HGs business operations.  You are asked to present a PEST (L) analyse on both the Netherlands and China. PEST Analyse The Kingdom of the Netherlands General Facts Full name: The Kingdom of the Netherlands Population: 16.6 million Capital: Amsterdam; seat of government: the Hague   Dependencies: Aruba, Netherlands Antilles Location: Western Europe, bordering the North Sea, between Belgium and Germany Area: 41,864 sq km (16,164 sq miles)   Major language: Dutch Major religion: Christianity   Export commodities: Machinery and equipment, chemicals, fuels, foodstuffs GDP per Capita: $ 47,042 Political Risk Factors Political Structure Analysis   The Netherlands is a constitutional monarchy (since 1815) and a parliamentary democracy (since 1848). Dutch monarch has no real political power: from the representative side head of state (Queen Beatrix), from the executive side person uniting the divided parliamentary politics. Thus, the Netherlands is usually governed by an alliance of different political parties. Prime minister comes from the party, which won the most seats in the elections, and forms the new government. These days Dutch government is in uncertain situation due to its collapse in mid-February 2010. Whichever government alliance comes to power after the June 2010 election will continue to focus on managing the after-effects of the political and financial crisis. Limits of press freedom Dutch constitution guarantee freedom of the press, as is free speech. Moreover, journalists dont present flagrant news in the light of tabloid sensationalism. But government limits press freedom establishing rules especially regarding countrys secret service. Every day there is papers confrontation with the government. Journalists have to make out where are secret information and not. And government needs to clarify free speech statement. Key Internal Political Risks Political unrest in the light of financial crises. Decision-making of financial crises results is held up at least until the general election in June due to the collapse of the government in mid-February. The two main parties failed to agree on whether or not to withdraw troops from Afghanistan as planned in 2010 and it served the main reason for government breakup. Indeed, the future of a new road pricing suggestion (the kilometre tax), based on charging motorists for the distance and time driven, has become uncertain. This scheme has been hanging in the air since its initiator, Mr Eurlings, has announced his departure from the political scene and this question hasnt got its following consideration. The kilometre tax question isnt a sole problem that previous government hasnt had time to solve them. New solutions of residual tasks will be founded when new government comes to the office. Corruption and private property Private property and contracts are secure. There is no difference between citizens and foreigners purchasing real property. Although intellectual property rights are generally protected, there is piracy of optical disc media as everywhere. Government needs to increase arrangements against these criminal organizations. Corruption is on the minimal level. So the Netherlands ranks 6th place among 180 countries in Transparency Internationals Corruption Perceptions Index (2009). The Organisation for Economic Co-operation and Developments    Anti-Bribery Convention leads struggle against corruption by penal offense. However low-level law pressure corruption doesnt have to allow government to relax its attention regarding corruption. Key External Political Risks The Netherlands Antilles as a part of the Netherlands The Netherlands Antilles are part of the Kingdom of the Netherlands and acknowledge the Dutch monarch. In comparison with its motherland, the Netherlands Antilles dont have very low political risk. In 2010, Curacao and St. Maarten (two largest islands whose production accounts more 70% of GDP) will achieve independence from the rest of the islands and the Netherlands Antilles probably will desist to exist because of    financial insolvency (poor tax collection and high social spending contribute). Economic Risk Factors The Netherlands has one of the most advanced economies in the world, which is modern and diversified, with institutional strengths in the sphere of legal framework and impregnability of property rights. Exports and imports account more than 60 % of nominal GDP. Strategic geographic position and a small size of its domestic market play a key role on the world arena and by attracting foreign investments. The Netherlands showed significant economic performance and GDP growth in the nineties. The economys main focus is export commodities. Dutch trade mainly comprises chemical products, fossil fuels and agricultural products, machinery and transport equipment. Exports contributed 70 % of GDP in 2000 in comparison with 58.3 % of GDP in 1996. In 2001 the rate of GDP decreased sharply and the economy didnt see growth improvements at all in 2002-2003. Cyclical shock was caused by lower rates of export growth as part of the global economic slowdown. 2006 however, showed a promising 3% growth, which steadily accelerated to 3.5 % in 2007. The economy still grew 2 % in 2008, but due to global financial crisis the economic activity had been shrinking; exports and imports dropped rapidly in 2009, by 8.4 % and 8.9 % respectively. The Public Sector Fiscal policy in the Netherlands is designed to reduce taxes and to create a favorable climate for business investors. The Income Tax of 2001 represented significant tax cuts since the war. Total tax revenue was 37.5% of GDP (2005), which is below the EU average. In January 2007 Dutch government has deducted corporate tax to 25.5%. The following tax reform gave international companies a green light for FDI in the Dutch economy. Dividend tax has also been diminished from 25% to 15% and a patent box with a 10% tax rate on income from innovations was proposed. The Dutch tax system combines 30% tax break for top qualified foreign workers, wide tax treaty network and participation exemption. The Monetary Sector The Netherlands joined economic and monetary union on January 1st 1999. European Central Bank controls monetary policy and sets interest rates in euro zone. The Netherlands is a member of the euro zone. Inflation level between 2006 and 2008 has been relatively low, averaging 2% and is expected to stay low at about 1.5% in the coming years.   Refinancing rate was raised by 25 basis points eight times to 4 % since December 2005. Due to recent financial turmoil intervention rates have risen very rapidly to 4.7 %. Since 2009 these rates remain unchanged and likely to continue to do so in 2010. The External Sector The Netherlands had strongly positive balance of payments in 2005 estimated at à ¢Ã¢â‚¬Å¡Ã‚ ¬31.5 billion, because more than two-thirds of GDP was derived from merchandise trade. Top leading export markets in 2007 were Germany with 28.2 % of the total export share, Belgium with 15.6%, the United Kingdom with 10.5 % and France with 9.8%. Germany topped the list as leading supplier to the Netherlands with 20.5 % share of imported goods. From these figures it becomes obvious, that Germany is the most important trading partner of the Netherlands.    According to EIU World Investment Prospects foreign investments increased particularly in 2007 on a worldwide basis. Inward foreign direct investments to the Netherlands have skyrocketed from US$ 635 billion in 2007 to US$ 796 billion in 2010. (see Appendix 4) The Netherlands showed good results in co-operation with multinational companies from emerging industrial companies, like India, China and Korea. The Labour Market The Dutch labour market and welfare system is similar to the German model. Policy making and industrial relations are key elements in dealing with most issues. In recent years the labour market has become more flexible than in Germany. Labour regulations are relatively strict in the Netherlands. The non-salary cost of employing a worker is high, and dismissing an employee is costly and unenviable process. The pension system is financed by pension funds, which invest pension contributions in shares and other assets. One unique characteristic of the Netherlands labour market is a large number among women, who work at part-time jobs. The one and a half earner model has become very popular in Holland, in which man has a full-time job and a woman works part-time. The current labour market is in a structurally better position.   Social Risk Factors   Ã‚   Social Spectrum of Netherlands Introduction to Social Structure of Netherlands   The Netherlands is a country where native population is nearly 81%. Dutch society is tolerant to the homosexuality but undergo Islamic conflict. This country also is well-known for the most comprehensive system of social security in the EU. It is also one of the worlds most densely populated nations. As in many European countries, there is the tendency of growing 65s population that lead to greater demands on the welfare system. Facts of social structure of Netherlands: Population: 16,715,999   Age structure: 0-14 years: 17.4%;  15-64 years: 67.7%;  65 years and over: 14.9%   Median age: total: 40.4 years; male: 39.6 years female: 41.2 years   Population growth rate: 0.412%   Net migration rate: 2.46 migrant(s)/1,000 population   HIV/AIDS: people living with HIV/AIDS: 18,000   HIV/AIDS: deaths: fewer than 200   Ethnic groups: Dutch 80.7%, EU 5%, Indonesian 2.4%, Turkish 2.2%, Surinamese 2%, Moroccan 2%, Netherlands Antilles Aruba 0.8%, other 4.8% Religions: Roman Catholic 30%, Dutch Reformed 11%, Calvinist 6%, other Protestant 3%, Muslim 5.8%, other 2.2%, none 42% (2006) Key Social Risks   Over the past decade there is trend of the politicization of childhood which links with certain risks. In many countries, these risks are known as the new social risks (services for the elderly and disabled; services for families with children; active labour market policies). One of the reasons for it results from income and service gaps in post-industrial labour markets. This is one social risk of insufficient income security. Besides there has also been an increase in the female employment rate and virtually all adults are now expected to be involved in employment. (see Appendix 7) In addition, changes of labour markets and transformations of family and demography create challenges of social care (especially child care) when young families lack access to affordable and quality child care and yet all adults in the family must enter the labour force.   Demographic changes   Around 68% of its population is aged between 15 and 65. A short term risk Netherlands faces is the very low birth rate. Declining working population and low rate of migrant inflow are present these days. In the Netherlands, the legality of guest workers that arrived in the 1960s to work temporary for Dutch industries but never left the country afterwards leads the countrys current migrant labour situation and conflicts what link with it. The social care sector has some difficulties in immigration sphere. Government officials maintain that there is no demand for migrant labour in the social care sector, and hence there is wide field of activity for low-skilled labour. Religious restrictions   Nearly a half    (42%) of Netherlands citizens are atheists but Muslims are the main problem for the country . There is no evidence which suggests strict religious regulations in this country. In general, religious restrictions risk hence remains very low but government should continue improve situation regarding Islamic groups.   Technical Risk Factors Superior logistics and technology infrastructure The Netherlands is located in the center of Europe and provides a strategic location to run international businesses with global market leaders. Rotterdam is one of the worlds largest seaports and Schiphol Airport is considered as one of the busiest hubs in Europe.   The Netherlands is ranked as one of the most wired countries in the world, because of dynamic communications, e-commerce boom and outsourcing; but although the quality of transport and high speed Internet, cable communications network is fantabulous, the railway and road density thousand citizens is relatively low. Total government spending on rail, harbor, road and airport infrastructure improvements is one of top priorities and this plan is estimated to cost a total of à ¢Ã¢â‚¬Å¡Ã‚ ¬37 billion. Highly qualified workforce The Netherlands labour market predominantly consists of highly educated and competent workers. Dutch prof

Thursday, September 19, 2019

Cloning :: essays research papers fc

Cloning   Ã‚  Ã‚  Ã‚  Ã‚  Twenty-five years ago, scientists thought that cloning was virtually impossible. In the last five years, the science of cloning, has come to realization. What is a clone? A clone is a duplicate - much like a photocopy is a duplicate, or copy, of a document (Kolate, 238). A good example of copies that occur in nature are identical twins, which are duplicates of each other. On a daily basis, molecular geneticists and other scientists use cloning techniques to replicate various genetic materials such as gene segments and cells (Kolate, 238). Recently the cloning of a living life form was brought from the realms of science fiction to reality with the cloning of a sheep named Dolly (Kolate 236). Imagine meeting an exact replica of somebody or yourself seven to ten years from now (Kaku 6). They look alike, and even have the same genetic makeup. This is the new world of cloning. As with every new science, there are those who believe in it, and those who oppose it. So many questions arise. What if some one like Hitler had access to this technology? Would people want two identical copies of a child or a relative? What are the chances of people illegally obtaining blood samples of, for example, Albert Einstein, Bill Clinton, or even Lee Harvey Oswald for sale on the black market? Is there a way we can possibly outlaw and enforce cloning? Could this development actually be used for a benefit, such as bringing back endangered or extinct animals? The instantaneous reaction of the world has been mixed. However, the overall benefits appear to out weigh the other factors. This new technological development can not be passed off. It has the potential of enormous benefits to society. The new technology of cloning should be utilized because it could bring back extinct organisms, help infertile couples to have children, and potentially save many lives. Cloning could bring back extinct animals (Kaku 227). Over millions of years, thousands of different species have gone extinct. Most were due to natural selection, while several others were due to human intervention. Approximately two-thirds of all the native bird species (Kendall n/a) and one-fifth of the native plants (Kendall n/a) originally found on the Hawaiian Islands have gone extinct recently. Predators, competitors, or diseases introduced by humans from continental areas are responsible for many of the extinctions. Also, many remaining species on other oceanic islands are threatened or endangered. Cloning :: essays research papers fc Cloning   Ã‚  Ã‚  Ã‚  Ã‚  Twenty-five years ago, scientists thought that cloning was virtually impossible. In the last five years, the science of cloning, has come to realization. What is a clone? A clone is a duplicate - much like a photocopy is a duplicate, or copy, of a document (Kolate, 238). A good example of copies that occur in nature are identical twins, which are duplicates of each other. On a daily basis, molecular geneticists and other scientists use cloning techniques to replicate various genetic materials such as gene segments and cells (Kolate, 238). Recently the cloning of a living life form was brought from the realms of science fiction to reality with the cloning of a sheep named Dolly (Kolate 236). Imagine meeting an exact replica of somebody or yourself seven to ten years from now (Kaku 6). They look alike, and even have the same genetic makeup. This is the new world of cloning. As with every new science, there are those who believe in it, and those who oppose it. So many questions arise. What if some one like Hitler had access to this technology? Would people want two identical copies of a child or a relative? What are the chances of people illegally obtaining blood samples of, for example, Albert Einstein, Bill Clinton, or even Lee Harvey Oswald for sale on the black market? Is there a way we can possibly outlaw and enforce cloning? Could this development actually be used for a benefit, such as bringing back endangered or extinct animals? The instantaneous reaction of the world has been mixed. However, the overall benefits appear to out weigh the other factors. This new technological development can not be passed off. It has the potential of enormous benefits to society. The new technology of cloning should be utilized because it could bring back extinct organisms, help infertile couples to have children, and potentially save many lives. Cloning could bring back extinct animals (Kaku 227). Over millions of years, thousands of different species have gone extinct. Most were due to natural selection, while several others were due to human intervention. Approximately two-thirds of all the native bird species (Kendall n/a) and one-fifth of the native plants (Kendall n/a) originally found on the Hawaiian Islands have gone extinct recently. Predators, competitors, or diseases introduced by humans from continental areas are responsible for many of the extinctions. Also, many remaining species on other oceanic islands are threatened or endangered.

Wednesday, September 18, 2019

Spreadsheet report - intended for a science teacher teaching a Year 10 :: Computer Science

Spreadsheet report - intended for a science teacher teaching a Year 10 class in a secondary school. He is having difficulty managing all of the data concerning the marks and attendance of class 10X2. Spreadsheet Report The spreadsheet is intended for a science teacher teaching a Year 10 class in a secondary school. He is having difficulty managing all of the data concerning the marks and attendance of class 10X2. He would like to know if a computer could aid him to process the data from module tests that are being taken this year. He would like to know whether the pupils are on target or not, the grades gained from the tests, the total marks and grades, and the average, minimum and maximum marks and grades. He would also like the computer to help him to keep track attendance. He would like to know the total attendance of the members of his class. When complete, the spreadsheet will automatically calculate the grade of each module test, and display whether the pupil is working at heir level. It will also calculate the total marks and average grade of each pupil, and for the entire class. This will be shown on one sheet, whilst on another, the total number of attendances and the total attendance as a percentage over a whole term will be shown. This will be useful for the teacher so as he can monitor his pupils and help those who are under performing easily. In order to do this, I needed to plan out the spreadsheet. I worked out what sheets and tables I needed, and figured out which functions and formulae I would be using to calculate with. I planned to have two sheets, Tests and Attendance. The Tests sheet contains three tables. The first is the Results table and it contains the results of the science module tests. The pupil's surname and forename are located in the first two columns, and their expected mark in the third column. The data relating to each separate test is located in three adjacent columns, with a merged cell above tying them together. There are four of these next to each other, one for each module. The first column in the group of three is called Marks, and this contains the actual score from each test. The next column is called Grade and this shows the grade corresponding to the mark. This grade is obtained from the second table, called Points, which contains the points and grading system. Using the VLOOKUP function does this. The cell references here must be absolutes. The third and final column is called Attainment.

Tuesday, September 17, 2019

Spanking :: essays research papers

Does Spanking Lead Child Abuse?   Ã‚  Ã‚  Ã‚  Ã‚  Were you spanked as a child? Do you think spanking effected you? Every parent has been in a situation where a good spanking seems like the only way to put an end to little Junior’s temper tantrum. Parents use a number to reasons, some you may have heard, to use spanking as a form of discipline. They may say â€Å"Spare the rod and spoil the child.† Or â€Å"I was spanked and I turned out okey.† Even â€Å"Kids need spanking to show them who’s boss.† The issue I wish to present is whether or not spanking leads to a rise in child abuse and later violence. Do children who are spanked or physically punished see spanking as a violent act? Do they learn to see violence as an acceptable way to solve a problem? When parents spank their children are they guiding them or controlling them? Nancy Samalin, author of Love and Anger, believes that spanking is nothing more than a big person hitting a smaller person and it can do damage to your child’s conscious. â€Å"A child who obeys because of the fear of being spanked,† she explains â€Å"is most likely not to develop a sense of right or wrong without being policed by a more powerful authority figure.† (Samalin, p. 154). She believes that spanking the child you have not set an example that you want your child to follow in the future. New studies have shown that children who are abused by their parents physically, emotionally, or sexually grow up and become abusive parents themselves. Further studies have shown that children who are physically punished lack empathy and concern that helps them care for others. A public opinion poll conducted by the National Committee for the Prevention of Child Abuse in 1994 asked parents how they disciplined their children in the previous year. Denying privileges was used by 79 percent of the parents; confinement to a room was used by 59 percent; 49 percent spanked or hit their children; and 45 percent insulted or swore at their children. What was amazing about these statistics was that 51 percent did not spank their children. Now consider the rise in child abuse cases that has caused public-health officials scrambling for an explanation blaming spanking made sense. Trouble is, while spanking is down, child abuse is still up. Joan McCord, author of â€Å"Questioning the Value of Punishment,† believes that punishment in general is the reason for the increase in child abuse and violence.

Monday, September 16, 2019

Effectiveness Home Based Exercise Interventions Health And Social Care Essay

In this survey effectivity means betterment in measured results. Outcomes which are traveling to be measured in this survey are physical public presentation ( lower appendage muscular strength and hand-grip strength ) and functional capacity ( balance and walking-timed up and travel ) . For lower appendage muscular strength the chair stand trial normally used. The chair stand trial is a physical public presentation trial used to measure lower-extremity map. A 5 repeat trial is a step of strength ( Ward et al. , 2010 ) . Subjects ‘ manus clasp force mark in their left and right custodies will be recorded. Individual patients whose grip strength is less than the lower bound of the assurance intervals can be considered to be impaired clasp ( Bohannon, Peolsson, Massy-Westropp, Desrosiers, & A ; Bear-Lehman, 2006 ) . In add-on, balance and walking ( functional capacity ) and physical public presentation before and after exercising plan are measured including: ( a ) Berg Balance Scale ( BBS ) , which rated the public presentation of 14 specific undertakings ; ( B ) the Timed Up-and-Go Test ( TUG ) , which measures the clip required to acquire up from a seated place and walk 3 m ( two tests are allowed and the clip required in two tests is averaged ) . Furthermore, physical public presentation in each topic will be assessed by both the Chair Stand Test ( CST ) and Hand Grip Strength ( HGS ) . The chair stand trial is a physical public presentation trial used to measure lower-extremity map and manus clasp strength assesses clients ‘ manus force and strength.Justify why you wanted to analyze place based exercising intercession?The demand for a home-based preparation exercising plan to forestall falls among frail aged people is felt by some research workers ( Kamide, Shiba, & A ; Shibata, 2009 ) . There are promoting informations to demo effectivity of home-based exercising among aged people in maintaining and increasing functional and wellness position, when carried out right ( Hinrich 2009 ) . Nelson et al 2004 summarized that a home-based exercising plan in community-dwelling seniors with functional damage is executable and effectual in bettering functional public presentation, despite limited supervising. They besides added that home-based exercising plans that focus on strength and balance preparation improve functional public presentation in aged people and should be promoted by the allied wellness community ( Nelson et al 2004 ) . A more recent RCT emphasized on feasibleness of home-based exercising plan for aged people populating in community ( Matsuda, Shumway-Cook, & A ; Ciol, 2010 ) . In add-on home-based exercising plan can get the better of the job of center-base plans including, deficiency of public handiness of hi-tech installation in developing courtiers, t ransit barriers for aged, the job of cost-benefit and cost effectivity of any hi-tech plan ( Nelson et al. , 2004 ) . Conformity, which is a major job in centered-based exercising among aged people, can be achieved by home-based plans. Previous researches accent that attachment to any exercising plan is low among aged people particularly in long tally ( Campbell et al. , 1997 ; Dishman, 1991 ; Gobbi et al. , 2009 ; Sturnieks, St George, & A ; Lord, 2008 ; Sun et al. , 2005 ) . Blanchard 2008 stated that less than 15 per centum of aged people participate in center-based exercising plan. He added that to accomplish a larger figure of participants, there has been a displacement toward implementing home-based rehabilitation plans. Home-based muscular strength preparation can be considered as an option to expensive and low conformity clinical-based musculus preparation ( Blanchard, 2008 ) . Many research workers have suggested more community tests designed to get the better of barriers and supply support for inactive aged people to get down exercising plans ( Judge, 2003 ) ; nevertheless, merely a few ra ndomized controlled intercessions studied on falls have investigated the effects of home-based preparation intercession among the community-dwelling elderly people. A home-based preparation exercising should be directed toward beef uping weak musculuss and balance. The effect of muscular failing and co-contraction is lack of assurance ( Tinetti, Richman, & A ; Powell, 1990 ) which makes aged people loss their assurance and fright of falls ( Hill, Schwarz, Kalogeropoulos, & A ; Gibson, 1996 ) . Fear of falling deteriorates the balance reactions and leads to increased hazard of falls and increased hazard of hurt ( Okada, Hirakawa, Takada, & A ; Kinoshita, 2001 ) . Loss of assurance among aged people consequences in functional restrictions and may do limitation in activity due to fear of falling, which is really common job among community-dwelling older grownups with or without experience of falls ( Hansma, Emmelot-Vonk, & A ; Verhaar, 2010 ) . So, it is logical that improved muscular strength can ensue in assurance, cut down fright of falls, addition balance and lessening hazard of falls. A great figure of surveies have proposed that merely extra research with frail aged persons will assist reply if home-based preparation would better balance in older ages ( Nelson et al. , 2004 ; Baker et al. , 2001 ) .What are the issues / job with place based intercession exercising?There have been some jobs in old home-based plans. They still rely on most adept forces who closely supervise their patients and supply them with high criterion attention at their place ( Gardner, Robertson, McGee, & A ; Campbell, 2002 ; Nelson et al. , 2004 ; Luukinen et al. , 2007 ) . The others emphasize on individualized tailored plans ( Clemson et al. , 2010 ) which raises the cost of intercession plan. Furthermore, these plans, although were reported to be effectual, deficiency in big scale randomisation was the chief restriction of the surveies ( Nelson et al. , 2004 ) . In add-on, because of low wellness literacy among Persian aged population, any home-based preparation intercession without prop er supervising and attachment will non be able to accomplish its aims ( Carpenter, 2010 ) . A good cited survey suggested that aged people need supervising to better strength in a home-based scene ( Baker et al. , 2001 ) . To get the better of the job of wellness illiteracy among aged people we planned to affect participants ‘ grownup kids who have the most interaction with the client in developing plan to oversee him/her during preparation and make full up the log books.How would command external factors in place based intercession?To command external factors of the intercession, the survey will be done on falls high hazard aged people in urban countries who are cared by a female attention givers for the exercising plan ( homogeneousness of attention givers is an of import issue and is discussed in inquiry 6 ) . Some features of the participants such as age, gender, degree of instruction, matrimonial position, occupation, economic position, Activity of Daily Life ( ADL ) and IADL, Medications, Mental position, self-rated wellness are controlled in this survey.How would you find that the respondents willA followA instructions given?In order to corroborate truth of participants and attention giver ‘s public presentation ( monitoring and recording ) , orientation session and regular place visit are planned. Orientation session: Each participant is instructed to execute the instructions right. The first session of direction is allocated to teaching the participants and their attention givers how to execute the exercisings. A household member as attention giver patterns make fulling the log book in the plan in presence of research worker before beginning of the preparation. Home visit: Researcher will go to at participants ‘ place in exercising session one time a month ( three times in 12 hebdomads ) . To be assured about participants ‘ conformity, a female close household member will be instructed to make full the log books which reflect the sum of exercising aged client has done. Each log book is filled during each session and submitted to researcher at the terminal of month. Subjects ‘ household member will be allowed to name the research worker during the plan to inquire their inquiries. Furthermore, the research worker will name them semiweekly to guarantee proper public presentation of the preparation plan.How would you command for homogeneousness of sample/ respondents in your survey?Participitants will be recruited from about 1200 aged people in part. Random sampling will be applied to delegate at least participants ( N=60 ) into intercession and control groups. The survey is planned to enroll at least 30 topics in each groups. Because of likely abrasion, trying will go on to accomplish at least 60 participants complete the 12 hebdomads exercising. To increase the homogeneousness of the participants all participants will be recruited from abode of urban countries. All topics should be 60 old ages old and above, had old experience of falls in last 12 months. Furthermore, they should hold a female household member as a attention giver ( aged 18-50 ) who has wellness literacy. Health literacy will be tested by a criterion questionnaire called Rapid Estimates of Adult Literacy in Medicine ( REALM ) . In order to keep homogeneousness of attention givers, merely female attention givers are included. Exclusion standards are acute cardiorespiratory diseases ( approved by a heart specialist ) , terrible dementedness ( MMSE ) , audile lack, vestibular change, impaired vision, hearing and motor coordination restricting exercising ( approved by a brain doctor ) , unable to walk independently more than 10m, old hip replacing surgery, old history of lower appendages fracture in last 12 month, terrible articular engagement restricting physical activity and exclusion for any ground by orthopaedic sawbones. Furthermore, aged people with high vigorous degree of activity in last 12 months will be excluded from the survey. All topics will be matched and indiscriminately assigned in intercession and control groups, utilizing random figure tabular array. To make random allotment, after baseline appraisal, topics will be divided into two groups based on features, harmonizing to random Numberss table. Thereafter, one group will be allocated to the intercession and the other group to the control.What is the exact exercising protocol that you would utilize to mensurate effectivity?Exercise protocol is designed by American Heart Association ‘s ( AHA ) recommendation for maintain musculus strength, balance and falls bars in 2007. This protocol is planned to better musculus strength and balance among high hazard community aged people for falls. The same instructions with some differences are recommended by research workers in New Zealand in Otago survey. Intervention group will have 12 hebdomads exercising preparation in presence of their household attention givers. The first session after randomisation for intercession group will be held in client ‘s place to teach participant and his/her attention giver how to make the exercisings. Since there is no demand for any excess device, all the exercising can be demonstrated in a client ‘s ain place. The plan is non separately tailored, but will be done separately at place. In add-on to face to confront instruction, participants will be given a pictural brochure of all preparation exercising. They will be instructed how to utilize the preparation brochure. A flexible timetable ( harmonizing to participants ‘ penchant ) in a log book will be arranged for the topics to apportion 40-50 proceedingss for exercising three times a hebdomad. Each session consists of a 5-10 proceedingss warm-up, 30 minute strength preparation, and 5-10 minute cool-down preparation. They will be in structed to follow sequences of the preparation as warm up, exercising and cool down.What would the sample size be, taking into considerations attrition rates etc. Decidedly 30 is non plenty. Cells will be empty.In most of old intercessions sample size is less than 70 ( Kameide et al 2009 ) . However, in this survey random sampling will be applied to delegate participants ( N=100 ) into intercession and control groups. The survey is planned to enroll at least 50 topics in each groups. To increase the homogeneousness of the participants all participants will be recruited from abode of urban countries.You are trusting to beg aid from carers? ? ? How would you specify carers? Issue of gender, live-in? ? ? ?A Since, a big figure of community aged people in Iran are illiterate and are non able to enter their exercising in log books, this survey will inquire for aid of a attention giver. Care givers will be recruited from participant ‘s interested close female household member. All attention givers will be recruited from household members who are populating with their parents or able to see them often at their place ( at least one time every other twenty-four hours for one hr ) . They will be tested for wellness literacy to be able to make full in the log books. To guarantee homogeneousness of attention givers, they will be recruited from female household members, between 18 to 50 old ages old, able to see the participant freely and are willing to assist the participant. Both participant and attention giver should accept and subscribe the informed consent to be involved in research procedure. The chief function of household member attention giver is to supervise the participant during exercising and record the exercising in logbook. Furthermore, they can name the research worker to inquire any inquiry about any likely job in any phase of the survey.AimsThis survey is planned to look into the relationship between muscular strength to hazard of autumn among community dweller aged people. To accomplish this aim, the following specific ends are followed: To depict the topics ‘ muscular strength, self-efficacy, fright of falls and balance before and after intercession To analyze the relationship between topics ‘ muscular strength and hazard of falls before and after intercession To analyze the relationship between topics ‘ background variables, muscular strength, self-efficacy and fright of falls before and after intercessionConceptual ModelThis survey will be conducted based on a modern biologic theory called â€Å" wear and tear † theory and Orem ‘s self-care theory. In this survey the wear and tear theory is used to explicate why muscular strength and balance deteriorates during old ages. Orem ‘s self-care theory is utilized to explicate how self-care through exercising can keep and better an old individual ‘s ability for balance and cut down the hazard of falls. Furthermore, Bandura ‘s self-efficacy explains the moderating function of self-efficacy between muscular strength, fright of falls and balance to hazard of falls among aged people.Proposed conceptual modelBackgroundAgeGenderMarital StatusEducationMental positionSeleniumChronic DiseasesMedicineHealth literacyADL/IADLSelf-rated Health( IV )Muscular StrengthFear of FallsSelf-Efficacy( DV )Falls Hazard( Balance )