Tuesday, December 31, 2019

Finance Budgeting Example For Free - Free Essay Example

Sample details Pages: 6 Words: 1730 Downloads: 1 Date added: 2017/06/26 Category Finance Essay Type Argumentative essay Level High school Topics: Budget Essay Did you like this example? Budgeting, if not used effectively, can result in underperformance, corruption and even the failure of the organisation. Budgeting has been used as a method of coordination and control but when left unregulated it can result in the very worst kind of opportunistic behaviour. As a result there have been a number of developments in budgeting, such as the rolling budget and benchmarking performance. It is dependent on the organisation which method of budgeting is optimal. Traditionally budgeting has been used by organisations as an accounting tool to plan and control the activities within an organisation or rather The quantitative expression of a plan of action and an aid to the coordination and implementation of the plan (Bhimani et al, 2008, p935). In relation to planning managers are expected to forecast sales, profit, and capital expenditure (Hope and Fraser 2003). This information is then analysed by executive managers and the forecasts of all the different d epartments within the organisation are coordinated and adapted to create a final budget. These budgets are usually set for a short period of time, usually a year, and are set months before the time the budget start date. It is therefore a good way for managers to communicate as these budgets would supposedly identify any potential problems within the departments and plan to action them in the next budget. For example potential bottle necking whereby a department uses more resources than it produces. It also allows each department to understand where it lies in the coordination of the organisation. When a budgeted target is fixed management is evaluated in relation to whether or not they have met the target which provides a measure of control. Managers are directly responsible for the performance of the activities they coordinate and monitor. If managers meet the target they will be rewarded, however if they fail it will reflect badly on their performance, this system provides mot ivation. It also allows for authorised expenditure so departments do not have to seek permission for purchasing which saves time. Each year the budget can be reviewed and modified in order to better suit the actual performances and to allocate resources more effectively. On the surface the idea of traditional budgets seems an effective way to coordinate and monitor an organisation, in reality it can lead to underperformance, corruption and even failure of the organisation. Managers are set a target with the incentive of a bonus so if the target is reached their priority will be to meet the target. As the target has a deadline they will aim to meet the goal irrespective of the long term affect on the organisation. Targeting can lead to a reduction in quality of goods and services. For example if a furniture store set their sales team a target and they could sell to customers on credit they may sell furniture to customers who may be unable to pay back the credit. But the short term results are what matters in terms of bonuses not the long term credibility of the customers. If managers are unable to meet the short term target managers may manipulate results in order to receive a higher bonus in the next period rather that not receive the bonus two periods in a row (Big Bath Theory, Jensen, 2003, p387). As a result it will be difficult for an organisation to have the information required to set an accurate budget in future as a result the communication benefits are reduced. Managers may also manipulate information in order that the target will be set lower than they are capable of achieving and so there is no pressure to work at maximum capacity (Slack Budget). Budgeting therefore promotes manipulation of information by creative accounting, and a reduction in the quality of performance of departments. Traditional budgeting is very inflexible and in times of turbulence of an economy or market it is not easily adapted. Targets are set sometimes months befor e a time period begins and then fixed for the entire period. As there is no way to predict the changes in the state of the economy or particular changes of circumstances within a market traditional budgets do not allow for these changes. Traditional budgets are also very time consuming absorbing up to 30% of management time (Hope and Fraser 2003) this man power has a cost as every time a fixed budget has to be revised resources are allocated away from other activities. It is also time consuming to negotiate and coordinate a new budget with all the departments in the organisation and by the time a revised budget is agreed it could be too late for it to be effective. Budgets were intended as a way for executives to stay close to customer information and adapt accordingly. However this time consuming nature results in any change being made redundant and the manipulation of information, leading to false information, would result in the wrong changes being implemented. As budgets are fixed it prevents innovation as for innovation to be undertaken in traditional budgeting an organisation will need to be worked into the budget before hand so innovation is stifled. The obsession with the detail makes it difficult for an organisation to adapt when necessary to the changing circumstances within the environment they operate. In the cases of the budgets over estimating authorised expenditure managers will use every penny they have been allocated so as to keep the same expenditure in the next budget. In contrast Kaizen budgeting could be incorporated whereby the budget explicitly incorporates continuous improvement during the budget period into the resultant budget numbers. (Bhimani et al 2008) As a result the role of traditional budgeting must be abolished and a more modern type of budgeting should be adopted. One of these ideas is the idea of a rolling budget whereby a budget is produced every three months and covers a set period of time typically between 5-8 qu arters (p112 Hope and Fraser 2003). These types of budget eliminate the problem of a fixed dead line so in manipulating performance statistics, so as to reach the target at the end of the year, managers would instead have an incentive to continue performance continuously. Each year two further budgets could be provided to managers one showing the four year plan and one a ten year plan, for example (p112 Hope and Fraser 2003). This would promote long term planning as opposed to short term manipulation of performance. This type of budget is a lot quicker to put together due to its nature and will also be capable of adapting to environmental turbulences relatively quickly. Kaplan and Norton (1992) created the Balance Scorecard as a measure of performance where it not only concentrate on financial dimensions of performance but also take into account non-financial ones. This is achieved through incorporation of customer, Leaning and growth, and internal efficiency perspectives. (Ciesl ak and Kalling 2007 p3). Benchmarking is another option where key performance indicators (KPI) are used to compare the work of an individual, or section of the organisations. These benchmarks can be set against peers within the same organisation or peers of a competitor organisation. In this case the comparison is relative rather than set and so the focus is shifted from short term goals of the firm to long term improvement and performance of individuals and their department (Drew 1997). The benchmarks are set on process, product/services and strategy (Drew 1997). The information required to improve efficiency lies with the employees and so innovation is able to emerge as more responsibility is given to the workers. Communication is restored and the time taken on setting out a budget is reduced as the aim is not to achieve a target but to get the best result. Jensen (2003) would argue that the source of the loss of integrity is the managerial hierarchy and so decentralisation cou ld be a solution. This decentralisation can be achieved by giving more power to the workers in the form of participating in budget setting (Hofstede 1968 the game of budgetary control p175). This can act as a source of motivation as the workers will feel empowered rather than suppresses by the target setting focus on figures rather than quality. This can also act as a source of learning for both ends of the hierarchy. Stewart (1990) argued that the decentralisation of debt equity was another way to motivate the workers. While there is a very negative perception of the traditional role Marginson and Ogden (2004) for the benefits of traditional marketing. Managers welcomed the certainty created by the combination of clear goals and well-specified objectives and a performance evaluation system that was tightly focused on how successfully those objectives have been achieved (Marginson and Ogden 2004 p436). It is also worth considering the cost of implementing such changed, as organis ations will have to retrain their workers and reorganise the system (Jensen, 2003, p403). As a result organisations must assess the costs and benefits to their specific organisation before abandoning traditional budgeting entirely. Traditional budgeting in small firms could still be effective. In conclusion the full benefit of abolishing traditional budgeting is dependent entirely on how effectively an organisation implements new developments. While developments such as rolling budgets and benchmarking solve some of the problems there is a cost of introducing them. Therefore traditional budgeting should not be abolished entirely in all organisations but instead careful consideration should be taken in deciding what should be implemented and how this should be done. References Bhimani, A, C. T. Horngren, S. M. Datar and G. Foster, 2008. Management and Cost Accounting. Essex. Pearson Education Limited. Hope, J. And R. Fraser. 2003. Who needs Budgets? Harvard Business Review. 81(2). pp. 108-115. Jensen, M. C., 2003. Paying People to Lie: the Truth about Budgeting Process. European Financial Management. 9(3). pp. 379-406 Kaplan, R. S. And D. P. Norton. 1992. The Balanced Scorecard-Measures That Drive Performance. Harvard Business Review. 70(1). pp. 71-79. Cieslak, K. and T. Kalling. 2007. Reasons behind contemporary use of budgets.NNF conference, 9-11 August 2007, Bergen. Lund University, Sweden: pp1-6. Drew, S. A. W. 1997. From Knowledge to Action:Impact of Benchmarking on the Organizational Performance. Long Range Planning. 30(3). pp. 427-441. Great Britain. Elsevier Science Ltd. Hofstede, G. H. 2001. The Game of Budgetary Control. London. Routledge. Stewart, G. B. 1990. Remaking the Public Corporation from Within. Harvard Business Review. 68(4). pp. 126-137. Marginson, D. and S. Ogden. 2005. Coping with ambiguity through the budget: the positive effects of budgetary targets on managers budgeting behaviour. Accounting, Organizations and Society. 30. pp. 435-456. Don’t waste time! Our writers will create an original "Finance Budgeting Example For Free" essay for you Create order

Monday, December 23, 2019

Hydraulic Fracturing Research Paper - 1756 Words

Around the world, countries are dependent on oil and more often than not, foreign oil. The U.S. is at a time where they believe buying foreign oil supports terrorism and hurts our economy. Shale formations deep underground that spread all over the U.S. have been found to contain natural gas. This includes the Marcellus Shale formation and the Utica Shale formation, which can be found all throughout New York State and down the East Coast (Hydro-Fracking pg.1). To get at this abundance of gas underground, hydraulic fracturing was invented, but this new method of gas extraction safe for the environment and for the people around it? Numerous reports have been given on the dangerous affects of hydraulic fracturing. One such†¦show more content†¦pg. 1) â€Å"In a July 19 letter to ten oil and gas producers – including BP, Chesapeake Energy, and ExxonMobil – the lawmakers requested information on the companies’ hydraulic fracturing operations and on possible h uman impacts. According to a subcommittee staff memo, the hydraulic fracturing companies ‘do not track whether the wells they fracture are located in underground sources of drinking water (Hobson Penn.).† Another problem that we know exists with hydraulic fracturing is the contamination of the water, the ground, and the air around the sites (Goldman pg. 2). It has been shown that â€Å"†¦residents living near the hydraulic fracturing sites are increasingly worried that the drilling process might be contaminating their well water, polluting streams, and releasing toxic gases into the air (Hobson).† Water sources, as well as the soil, are often polluted from flowback fluid and from production brine (Hydro-Fracking pg.4). Flowback fluid is â€Å"the contaminated fluid that returns to the surface during the drilling process, and is estimated to be between 9% - 35% of the fluids injected duringShow MoreRelatedRenewable Energy Sources For Energy1540 Words   |  7 Pagesa process called hydraulic fracturing, or â€Å"fracking.† But this energy source is highly polarizing, with strong advocates and detractors. While there are many who believe hydraulic fracturing should not be used in the quest for natural resources, the process has a relatively low impact on the environment, and the shale gas that it produces has the potential to change the energy landscape for the better. Contrary to what environmental activists say, hydraulic fracturing is an inherently safeRead MoreFracking And Its Early Technological Advancements1564 Words   |  7 Pages â€Æ' Contents Introduction 1 What is Hydraulic Fracking? 2 The Roberts Torpedo, 1864 3 Kelpper Well No. 1, 1947 5 Hydrafrac, 1949 6 The Growth of Hydrafrac, 1949 - 1954 8 Introduction Hydraulic fracking (‘Fracking’) dominates the US oil and gas industry. Although it is currently a politically dividing topic due to environmental concerns (United States Environmental Protection Agency, 2010), the concept behind fracking has been around for over 150 years (Roberts, 1866), and has beenRead MoreMicrobial Communities Associated with Hydraulic Fracturing Background Information Microbial600 Words   |  3 PagesMicrobial Communities Associated with Hydraulic Fracturing Background Information Microbial communities have been observed around wells that were created using hydraulic fracturing. Shale beds, like the Barnett Shale in Texas, are believed to be sterilized due to the thermogenic origin of the gas formations. â€Å"The gas in the shale is entirely of thermogenic origin and was generated during heating events that resulted in temperatures of up to 150  °C (Montgomery et al., 2005). These temperatures areRead MoreFracking : Fracking And Fracking1524 Words   |  7 Pages Hydraulic Fracturing Research Paper Hydraulic Fracturing (also commonly known as fracking) is a process used to extract natural gasses deep within the earth. This is done by drilling vertically into the ground until the desired depth; then drilling horizontally; and pumping millions of gallons of water, sand, and other chemicals into the drill at a high pressure to create fissures through which the gas can escape. Currently, hydraulic fracturing is extensively used in the United States in orderRead MorePublic Health and Hyudraulic Fracturing1476 Words   |  6 PagesThis paper explores the process and potential effects of hydraulic fracturing in a public health framework. It defines the relationship between hydraulic fracturing and public health by presenting the pathways and nature of contamination. It concludes by examining the potential effects contaminants may have on the human populations as well as offering recommendations for future studies and analysis. Pathways of Contamination It is believed that the potential health consequences of hydraulicRead MoreWater Contamination Caused By Hydraulic Fracturing1505 Words   |  7 PagesDue to Hydraulic Fracturing in Pennsylvania Natural gas is a fossil fuel that plays a critical role in the demand and supply of energy in the United States. It is considered to be a clean burning transition fuel. Compared to coal and oil, natural gas combustion does not generate as much pollution and is therefore considered an ideal partner for renewable energy resources. Natural gas is extracted from shale formations underground that require horizontal drilling and hydraulic fracturing – â€Å"hydrofracking†Read MoreThe Effects Of Hydraulic Fracturing On The American Economy1398 Words   |  6 Pages Hydraulic fracturing can be very beneficial to the American economy. While beneficial, it has proven to be very harmful. As studies show, fracturing is using an absurd amount of water to complete these wells. Not only is the amount of water usage detrimental to our water supply, but oil companies are showing no signs of slowing down. On top of the high water usage, fracturing is physically crippling our environment with the injected fluids. With over 600 different types of chemicals added intoRead MoreThe Economic Report On Fracking, Is It Worth It?1465 Words   |  6 Pagesand natural gas prices rose and fell based on OPEC’s and other large oil and natural gas producers’ production and pricing decisions. Beginning in 2005, things began to change in the US oil and natural gas industry. New technology called hydraulic fracturing or â€Å"fracking† made it possible to extract oil and natural gas from geological formations (shale) that had previously been though t to be too difficult and too costly to mine and process (Figure 1). Used in 9 out of 10 natural gas wells in theRead MoreFracking Is A Dangerous Process That Should Be Banned Immediately1328 Words   |  6 PagesHydraulic Fracturing (fracking) is the process of drilling into the ground and pumping sand, water, and fracking fluid at high pressures in order to extract natural shale gas that was previously unattainable. This process comes with environmental issues: the chemicals from the fracking fluid can contaminate nearby drinking water wells and harm the citizens of that area. Despite the fact that there have been several contaminated drinking water cases reported, there is little being done about thisRead MoreNatural Gas Is A Clean Burning Transition Fuel1141 Words   |  5 Pagesgas is extracted from shale formations underground that require horizontal drilling and hydraulic fracturing – â€Å"hydrofracking† or â€Å"fracking†. This drilling and extractio n method is currently considered a global widespread issue due to the rapid increase in the amount of new gas wells that threatens the quality of water around the source (Entriken, Evans-White, Johnson Hagenbuch, 2011). Hydraulic Fracturing is a process where high-pressure fracking fluids are forced into rich shale to extract natural

Sunday, December 15, 2019

The History Of Why Photovoltaics Environmental Sciences Essay Free Essays

Energy security is one of the major challenges confronting world in the twenty-first century. It has been cited that about 20 % of the planetary population do non hold entree to electricity [ 1 ] . In add-on, it is predicted that the planetary ingestion of electricity will increase by about 50 % by 2035 [ 2 ] . We will write a custom essay sample on The History Of Why Photovoltaics Environmental Sciences Essay or any similar topic only for you Order Now For a sustainable hereafter, fulfilling the demand for energy should be accompanied with the decrease of CO2 emanations [ 3 ] by energy systems. Consequently, this brings about concerns in sing fossil fuels based systems as an option for fulfilling the turning energy demand. Renewable energy beginnings have been considered as being the solution for this uprising energy demand. Of recent, these systems have gained a batch of popularity and the energy coevals from renewables have been predicted to duplicate from 2010 to 2035 [ 2 ] . Harmonizing to some anticipations, renewables have the potency of catering for about one tierce of entire planetary electricity coevals by 2035 [ 1 ] . Photovoltaics ( PV ) is a rapid-growing market in the field of renewable energy, and this tendency is expected to go on in the close hereafter [ 4 ] [ 5 ] . Solar Energy is the most abundant and most every bit distributed renewable energy beginning worldwide. As such, PV can be considered as a major and the most promising renewable energy beginning. The advantages of PV over the conventional energy beginnings are listed below: PV systems are environmentally friendly ( C emanation free ) Solar energy has, by far, the highest natural and proficient potencies even for today ‘s engineering PV warrants long-run, care free, quiet and dependable year-round operation It can be operated as a grid connected system [ 6 ] or as an off grid system, supplying electricity even in stray parts [ 5 ] [ 7 ] Of class, these systems are accompanied with a few reverses. Main disadvantages of the PV are listed below: Large country demand Electricity coevals is limited to daytime ( it can non run at dark ) The cost of electricity generated from a PV system is still non comparable with fossil fuels, which indicates a trust on strong governmental policies [ 8 ] PV systems are classified into three depending on the photoactive stuff used and the degree of commercial adulthood: first-generation solar cells ( Crystalline Silicon ( c-Si ) ) , second-generation solar cells ( Thin Film Solar Cells ( TFSC ) ) and 3rd coevals solar cells ( Concentrating PV ( CPV ) , organic PV and fresh constructs ) . In general, an overpowering per centum of solar cells are fabricated from Si. First coevals solar cells dominate the current PV market with a portion of over 80 % of the entire PV market [ 5 ] [ 9 ] . However, 2nd coevals solar cells ( TFSC ) promise the highest possible for low cost fabrication and dependable energy beginning [ 5 ] [ 10 ] . Besides that, c-Si deficit which begun in 2005 and lasted through 2008 forced the industry to look for options, therefore the market for Thin Film PV begun to turn quickly [ 9 ] . Advantages of TFSC over wafer based solar cells are listed below: As the thickness of the semiconducting material bed is much dilutant in TFSC compared to wafer based solar cells, the recombination losingss are much less The fabrication cost of TFSC is well lower than that of wafer based solar cells [ 10 ] TFSC provides us with wider choice of stuffs compared to wafer based solar cells [ 10 ] , therefore bespeaking flexibleness of TFSC compared to c-Si solar cells However, surveies indicate that even with all these advantages the laterality of the c-Si solar cells will still stay for the coming 10 to 20 old ages unless a sudden addition in TFSC efficiencies is achieved in the close hereafter [ 9 ] , [ 11 ] . Undoubtedly, low efficiencies along with debasement over clip ( decrease in power end product ) are considered as the most influential drawbacks in the development of TFSC [ 5 ] , [ 10 ] . Surveies have shown that the levelized cost of the electricity ( LCOE ) generated by PV systems are extremely dependent on PV faculty efficiency [ 12 ] , therefore increasing the efficiency of PV systems has become an active country of research. Amorphous Si ( a-Si ) is one of the widely used stuffs in TFSC [ 9 ] , [ 13 ] . However, a-Si solar cells suffer from low efficiencies [ 14 ] which can be attributed to its set spread non being close to the optimal value ( around 1.4 electron volt ) . Besides, the thickness of the photoactive stuff in TFPV is normally really low which has a effect of take downing its light soaking up capablenesss. Extensive work on PV cells has besides been carried out over the old ages with a focal point on new stuffs and cell constellations [ 15-17 ] . Driving efficiencies up and/or cut downing cost, by technology stuffs for optimal belongingss and constellations have been the chief purpose of such researches ( ref ) . For illustration, a well-known agencie s of bettering the efficiency of a-Si TFSC is to replace a-Si with a semiconducting material like Gallium arsenide ( GaAs ) or Indium phosphide ( InP ) that has a close optimal bandgap [ 13 ] , [ 14 ] , [ 15 ] . Another attack is to implement a multi-junction solar cell [ 13 ] , [ 14 ] , [ 18 ] . However, besides those options, it is besides possible to better efficiency by heightening the light pin downing possible inside the cell [ 19-23 ] . The latter option is the chief focal point for this research. [ 1 ] IEA, â€Å" World Energy Outlook 2012, † 2012. [ 2 ] EIA, â€Å" Annual Energy Outlook 2012, † 2012. [ 3 ] G. Doucet, â€Å" Deciding the Futureaˆ? : Energy Policy Scenarios to 2050, † 2007. [ 4 ] IEA PVPS, â€Å" Trends in photovoltaic applications, † Survey study of selected IEA states between 1992 and 2011, 2012. [ 5 ] IRENA, â€Å" Solar Photovoltaics, † Renewable Energy Technologies: Cost Analysis Series, vol. 1, no. 4, 2012. [ 6 ] M. a. Eltawil and Z. Zhao, â€Å" Grid-connected photovoltaic power systems: Technical and possible problems-A reappraisal, † Renewable and Sustainable Energy Reviews, vol. 14, no. 1, pp. 112-129, Jan. 2010. [ 7 ] W. Hoffmann, â€Å" PV solar electricity industry: Market growing and position, † Solar Energy Materials and Solar Cells, vol. 90, no. 18-19, pp. 3285-3311, Nov. 2006. [ 8 ] N. Johnstone, I. Hascic, and D. Popp, â€Å" Renewable energy policies and technological invention: Evidence based on patent counts, † Environmental and Resource Economics, 2008. [ 9 ] A. Jager-Waldau, â€Å" Thin Film Photovoltaics: Markets and Industry, † International Journal of Photoenergy, vol. 2012, no. two, pp. 1-6, 2012. [ 10 ] S. Hegedus, â€Å" Thin movie solar faculties: the low cost, high throughput and various option to Si wafers, † aˆÂ ¦ in photovoltaics: research and applications, pp. 393-411, 2006. [ 11 ] R. Swanson, â€Å" A vision for crystalline Si photovoltaics, † aˆÂ ¦ in photovoltaics: Research and Applications, pp. 443-453, 2006. [ 12 ] X. Wang, L. Kurdgelashvili, J. Byrne, and A. Barnett, â€Å" The value of faculty efficiency in take downing the levelized cost of energy of photovoltaic systems, † Renewable and Sustainable Energy Reviews, vol. 15, no. 9, pp. 4248-4254, Dec. 2011. [ 13 ] R. W. Miles, â€Å" Photovoltaic solar cells: Choice of stuffs and production methods, † Vacuum, vol. 80, no. 10, pp. 1090-1097, Aug. 2006. [ 14 ] M. A. Green, K. Emery, Y. Hishikawa, W. Warta, and E. D. Dunlop, â€Å" Solar cell efficiency tabular arraies ( version 40 ) , † no. version 40, pp. 606-614, 2012. [ 15 ] J. Peet, J. Y. Kim, N. E. Coates, W. L. Ma, D. Moses, a J. Heeger, and G. C. Bazan, â€Å" Efficiency sweetening in low-bandgap polymer solar cells by treating with methane series dithiols. , † Nature stuffs, vol. 6, no. 7, pp. 497-500, Jul. 2007. [ 16 ] F. Report, â€Å" Hybrid Nanorod-Polymer Solar Cell Hybrid Nanorod-Polymer Solar Cell Final Report, † no. August, 2003. [ 17 ] I. Gur, N. A. Fromer, M. L. Geier, and A. P. Alivisatos, â€Å" from Solution, † vol. 310, no. October, pp. 462-465, 2005. [ 18 ] M. Bosi and C. Pelosi, â€Å" The Potential of III-V Semiconductors as Terrestrial Photovoltaic Devices, † no. June 2006, pp. 51-68, 2007. [ 19 ] D. Zhou and R. Biswas, â€Å" Photonic crystal enhanced light-trapping in thin movie solar cells, † Journal of Applied Physics, vol. 103, no. 9, p. 093102, 2008. [ 20 ] J.-Y. Chen, â€Å" Improvement of photovoltaic efficiency utilizing 3D photonic-crystal enhanced light caparison and soaking up, † Physica E: Low-dimensional Systems and Nanostructures, vol. 44, no. 1, pp. 43-48, Oct. 2011. [ 21 ] M. Wellenzohn and R. Hainberger, â€Å" Light caparison by backside diffraction grates in Si solar cells revisited, † vol. 20, no. January, pp. 2208-2212, 2012. [ 22 ] S. B. Mallick, M. Agrawal, and P. Peumans, â€Å" Optimum visible radiation pin downing in ultra-thin photonic crystal crystalline Si solar cells, † vol. 18, no. 6, pp. 300-305, 2010. [ 23 ] X. Sheng, J. Liu, I. Kozinsky, A. M. Agarwal, J. Michel, and L. C. Kimerling, â€Å" Efficient light pin downing construction in thin movie Si solar cells, † 2010 35th IEEE Photovoltaic Specialists Conference, pp. 001575-001576, Jun. 2010. How to cite The History Of Why Photovoltaics Environmental Sciences Essay, Essay examples

Friday, December 6, 2019

Green Day - Time of Your Life (Good Riddance) free essay sample

When prompted about a song that was important to me in high school, one song in particular comes to mind: â€Å"Good Riddance (Time of Your Life)† by Green Day. Almost anyone who has contemplated the length and depth of life can relate to this gentle song with its slow, almost yearning tone and deep lyrics. To me, â€Å"Good Riddance (Time of Your Life)† is a timeless ballad that never fails to comfort me in times of change and confusion. This song should be included in the â€Å"History of Popular Music, 1950-Present† course, not only because its deviation from normal punk rock epitomizes the struggle that Green Day faced in order to find its own sound, but also because Green Day has influenced a number of artists and epitomizes pop punk at the beginning of the 21st century. To me, Green Day’s music is pure nostalgia; every melody has latched on to a memory, bringing my awkward pre-teen years to the forefront of my recollection. Even now, I can vividly recall Google-ing as many words as I could remember from a catchy song I had heard on the radio of the school bus. A simple search for an incoherent string of words led me to the song â€Å"When I Come Around† by Green Day, which I fell in love with from the very first chord. From there, I began to search aimlessly on YouTube for more of these great songs, eventually becoming quite an avid Green Day fan myself. Green Day is an American punk rock band that was made famous by guitarist and lead singer Billy Joe Armstrong, bassist and backup singer Mike Dirnt, and drummer Tre Cool. The band originated in California, where all three band members were raised. Green Day was formed in 1987 and signed to Lookout! Records in 1988. Formerly known as Sweet Children, the band adopted the name Green Day due to their affection for marijuana. Green Day’s debut studio album, 39/Smooth, was released on April 13th, 1990 through Lookout! Records; this is the only studio album with the original drummer, John Kiffmeyer. Although it maintained relative success in the underground punk rock scene, Green Day did not experience commercial success until the release of Kerplunk, their second studio album through Lookout! Records, on January 17th, 1992. Kerplunk highlighted Billy Joe Armstrong’s raw and witty lyrics, as well as the band’s seamless rhythm, catchy choruses, and memorable riffs. Many avid fans of Green Day characterize this album as â€Å"old Green Day†, due to the magnitude of mainstream popularity of later albums; some even go as far as to say that the classification of Green Day’s genre changed as their sound did, shifting from their punk rock roots and becoming a more mainstream pop punk rock band. Astoundingly, Kerplunk has gone on to be one of the best selling independently released albums of all time. Due to their unexpected commercial success, selling 1,000,000 copies domestically and 4,000,000 worldwide, the band inevitably realized that they had reached their practical capacity with Lookout! Records. As a result, they signed with Reprise Records and released their third studio album, Dookie, in 1994. Luckily for Green Day, Dookie also became a commercial success with aid from extensive MTV airplay. The band went on to perform in many prestigious lineups such as Lollapalooza and Woodstock ’94. With Green Day’s growing reputation and popularity, Dookie was eventually promoted to diamond status. The album even went on to win the Grammy Award for Best Alternative Album as well as nine MTV Music Video Awards including Video of the Year. Because of the band’s widespread popularity, many questioned whether Green Day’s musical style truly represented â€Å"punk rock†. Among these accusations was the fact that Green Day was a supposedly punk rock band with a major record label, an ironic twist on the anarchy and independence that so many punk rock bands represent. Billy Joe Armstrong actually commented on the group’s status as a punk rock band by saying â€Å"†¦we’re this big band now. We’ve made a lot of money. We’re not punk rock anymore†¦ You can take us out of a punk rock environment, but you can’t take the punk rock out of us†. Although some avid punk rockers may argue that Green Day is not a true punk rock band, it is indisputable that Green Day created popular music that received high ratings. Green Day, along with several other bands such as The Offspring, Sublime, Rancid, and Blink-182, is widely credited for bringing the attention of mainstream popularity to punk rock in the United States, benefiting punk rock in the end regardless of technical musical classification. These bands characterized the pop punk of the mid to late 1990s. Although pop punk music has waned throughout the years, but its culture is still ubiquitous in many venues from the Vans Warped Tour to the Bamboozle Festival. Kerplunk and Dookie were responsible for the financial success of Green Day; after taking a brief hiatus, the band recorded Nimrod, which deviated from its normal styles of music. As an album, it demonstrated how Green Day had matured, but not completely lost it Nimrod was composed of a variety of different songs influenced by ska, surf rock, and punk rock, as well as the acoustic ballad – â€Å"Good Riddance (Time of Your Life)†. Thinking back, I cannot remember the music that I listened to before I began listening to Green Day; it was Green Day that sparked my general interest in music, engendering the passionate musician that I am today. I connect especially with the song â€Å"Good Riddance (Time of Your Life)† off of the album Nimrod. This ballad begins with an acoustic guitar intro followed with vocals by Billy Joe Armstrong. He describes a common situation in life that almost everybody can relate to. â€Å"Another turning point; a fork stuck in the road. Time grabs you by the wrist, directs you where to go. † The word choice used establishes a sense of connection between the artist and the audience, both of which have encountered the futility of fighting time and its direction; it is a timeless dilemma that we all face. â€Å"So make the best of this test and don’t ask ‘Why? ’† Billy Joe Armstrong proposes that the solution to the melancholy we face from leaving something or someone behind is to simply make the best of the situation that one is in without questioning it. He advises that one should cherish the moment as well as the good times one has had, and then move on to the next chapter of one’s life. â€Å"It’s not a question, but a lesson learned in time. It’s something unpredictable, but in the end is right. I hope you had the time of your life. † When Armstrong says â€Å"it†, he is referring to the question â€Å"why? † previously stated. The chorus of the song is composed of the last two lines, which soon became the mantra of my being. He is essentially saying that instead of going through life repeatedly asking â€Å"why? †, one should just take things as they come to figure out â€Å"why? †. At the end of the chorus, Billy Joe Armstrong expresses his hope and assurance that the audience will â€Å"have the time of their lives†, purely from their optimistic mindsets. The song demonstrates the cycles of life and how they tend to repeat themselves, based on our perception and experiences. I believe that the main point Billy Joe Armstrong is trying to get across to his audience is that the mindset we have in life is often the only control we have over the magnitude our contentment; the fickle nature of life allows us to take the guesswork out of life, leaving mindless comfort. Whenever I had a doubt in life, whether it was about sports, girls, or college, I would just listen to this song to remind myself about the uselessness of fighting what has already happened. Through this song, I have come to realize that the quality of one’s life is merely the result of how one perceives the events and environment surrounding him or her; the richest man is not the one with the most possessions, but the one who cherishes life the most. I admit that this was a very difficult concept to grasp during my tender pre-teen years. However, as I grew and matured, the lyrics became more and more relatable, proving just how timeless this song truly is.

Friday, November 29, 2019

Magna Deca free essay sample

Jim Sherwood, the marketing manager of a consumer goods company called Magna Deca had his attention caught by direct marketers that were working with the continuously growing home fitness equipment market. Jim’s company focused mainly on marketing through traditional channels. However he was eager to get into direct response marketing and felt they had found an appropriate product to do so. Magna Deca had acquired an at-home physical fitness gym that sold at less than $500. 00. If the market was there, Magna Deca was ready to test it out and see what direct response marketing would do. With that said, a direct response advertising firm was hired to come up with a test direct marketing plan. The plan that was suggested includes simultaneous testing of four positioning concepts and five magazines from five different media groupings at the same time. The names of 20,000 subscribers of five different magazines were to be rented and one quarter of each of these 20,000 subscribers sets were to be exposed to one of four positioning concepts. We will write a custom essay sample on Magna Deca or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A decision was made that a test program would be run under the name Personal Fitness System. In order to test both media and the message, 5,000 subscribers from each magazine would be mailed a lead generation piece that would be built around each of the four positioning themes. These themes are contained in the following headlines for four different self-mailers: 1. $500 won’t pay for much medical care, but it could buy a lifetime of better health. 2. You don’t have to spend hours jogging to get the exercise you really need. . Give your family the benefit of a complete $40,000 gym for less than $500 4. The Million Dollar Body for less than $500 Yes, I think that the Family gym is a viable direct response product because it is targeting entire families at once. By encouraging a healthy, fit family, this gives the buyer more reasoning to purchase the equipment in order to not only benefit themselves but their family as well. Motivations for buying a family gym would be: $There is no traveling time to the gym People feel more comfortable exercising in the privacy of their own home if they dislike the gym atmosphere $Family gym would be much less expensive than gym memberships for the entire family $A family gym is convenient in the fact that you can exercise whenever the time is right for you $Family gym could become an activity to spend quality time and stay active with family members This relates to positioning because it sets the family gym apart from main competition which would be an actual gym facility. The motivations and attributes of the family gym give meaningful and beneficial reasons to the consumer on why the family gym is more convenient choice than gym facilities to the consumer. The combination of attributes would also allow the company to position for competitive advantage. The media that the company is using is magazines. I think that all of the choices for magazines to position the concepts in are viable to targeting men and possibly their family members when looking at the family gym aspect. Business week using the health improvement, alternative to jogging and family gym positioning concepts. Playboy could be associated with any of the concepts Sports Illustrated using body building and health improvements Mechanics Illustrated could use all concepts Time using health improvements, alternative to jogging and family gym concepts 4. Amor effective way of approaching this situation would be if the company chose the most effective magazine that would fit best with one of the positioning concepts and place all

Monday, November 25, 2019

The Ruby Ridge Catastrophe essays

The Ruby Ridge Catastrophe essays Federal agents in body armor and black ninja uniforms, armored cars crashing up hillsides, even the fabled helicopters of militia nightmares Ruby Ridge had all the elements of a paranoid fantasy, with the difference that it was stamped in real flesh and blood. In the 11- day standoff, Weavers wife was shot dead as she held their 10-month-old daughter in her arms. A day earlier his 14-year-old son and a U.S. Marshal had been killed (Lacayo, 1995). But who was Randy Weaver? What kind of horrible criminal was he to deserve armed federal agents rushing on his house and family? And why isnt there a happy ending to this story? Randy Weaver was a 44-year old ex-Green Beret. He lived in a cabin in the woods of Ruby Ridge with his wife, Vikki, son, Sammy, and daughters, Sara, Rachael, and Elisheba. Randy also had his young friend, Kevin Harris, staying with him and his family. Randy and his family were subsistence hunters and farmers. They had a generator to produce electricity, but they had no televisions or radios. The Weaver family liked to keep things simple and keep to themselves. In October of 1989, Randy Weaver sold two sawed-off shotguns that were under the legal length to a friend. This friend turned out to be an undercover BATF agent (Bureau of Alcohol, Tobacco, and Firearms). Several months after Randy had sold these illegal shotguns, two BATF agents with an offer approached him. The offer was to be an informant for the BATF agency or be charged and go to jail. Randy refused the offer and about seven months later he was indicted on illegal weapons sale. He was then arraigned and told to reappear in court in February of 1991. Randy did not return to court; he returned to his mountain. A warrant was then issued for the arrest of Randy Weaver for failure to appear in court and for the sale of illegal firearms. These were the vicious crimes of the horrible crimi...

Thursday, November 21, 2019

'Sound business models are a necessary component in a healthy Essay

'Sound business models are a necessary component in a healthy visualarts ecology and essential for most publicly funded organi - Essay Example In essence, a business model is greater than the financial transactions of an organisation recorded and presented in its financial statements. A business model provides a clear description of the rationale of how an organisation crates, captures and delivers value. In conducting business, sound business models are a necessary component in the visual arts ecology and most publicly funded organisations. However, there has been a widespread belief that numerous business models in the context of visual arts are relatively weak and have a high possibility of facing reduced funding with time. This beliefs have been backed by available research suggesting the same. Most organisations in the visual arts sector are characterised by undercapitalisation and holding reserves that are too little to support investment and growth and to cushion the organisation during times of crisis (Oakes & Oakes 2012, p.59). In most visual arts organisations, assets are never fully exploited and increased level of activity often translates into increase costs while visitors remain a relatively unexploited source of income. Within the visual arts ecology, there is minimal understanding of what a sound business model is and what it does for an organisation. This indicates the generally lower levels of business skills and understanding within the sector. Despite this, there is, however, a shared ground as to what a good business model should be like. The challenge arises in translating the shared opinion into tangible action. From a total business perspective, the culture depicted in visual art of individualism and a somewhat traditional leaning towards the values of the economic world. This may be problematic as it is difficult to be exemplary in something that you do not have high regard of or have full comprehension of. Business models relating to the visual arts sector and publicly funded organisations are somewhat technical and attention has to be paid to the detail in order to stipulate a viable and sustainable plan for the long run (Townley& Cooper, 1998, p.66). For example key aspects such as free entry into the visual arts organisations can be a blessing but will pose technical business challenges. This is explained by the fact, revenue is not generated directly from customers, let alone the contribution to overheads or surpluses. As a result, increased level of activity would lead to a disproportionate increase in costs compared to the revenues generated. In light of this, the business models drawn up for the visual arts ecology should focus on secondary revenue generating activities in order to supplement their lack of a direct source of revenue and enhance their operational sustainability. In formulating business models in the publicly funded visual arts sector, the key question still remains â€Å"what is a sustainable business model in the visual arts sector?† When creating a good business plan for the not-for-profit sector, key factors need to be p ut into consideration including the mission, the fiduciary perspective, the customer perspective, internal perspective and the growth and learning potential. In

Wednesday, November 20, 2019

Hybrid Cultures and the Hermetically Sealed Cultures Essay

Hybrid Cultures and the Hermetically Sealed Cultures - Essay Example Huntington views the Arab world as being primarily 'sealed' because it avoids the advances and the cultural hybrid elements of democratic countries. According to his view, there is a certain core collective of nations who try to derive their power by opposing western influences and define their own place in an increasingly diverse world. Barber's more capitalistic interpretation understanding of global imperialism is in direct contrast to Huntington's view. He believes America is a hybrid country that is "democratic", even though it is aggressive toward countries that exercise their own sovereignty as 'sealed' cultures. The primary foundation for Huntington's argument on the "clash of civilizations" after the Cold War is that there is not a single country to which American allied nations could rally against in a bi-polar construct. Huntington's perspective is based on American bias on the danger that Communism posed through the Soviet Union as an example of the new Arab threat: During the Cold War global politics became bipolar and the world divided into three parts. A group of mostly wealthy and democratic societies, led by the United States, was engaged in a pervasive ideological, political, economic, and, at times, military competition (Huntington, ,p.21). The criterion for this belief is based on the American view that the conflict with the Soviet automatically created a situation in which they became the two dominant forces and the rest of the countries allied themselves on either side based on whether they followed a capitalist or communist ideology. However, America's identity as a democratic society with immense wealth that had to subdue poorer communist societies is often generalized through Huntington's "triumphalist" view of American domination. In fact, the harshly undemocratic nature of American hegemony in Latin America and other nation states presents a stark contrast to the idealized discourse of freedom and liberty that Huntington defines in the conflict between American and the Soviet Union. This fact is over-generalized in Huntington's view and supports a deliberately biased superiority of western civilization over the rest of the world before 1991. The first basis of Huntington's theory on Muslim culture as to the historicity of violence that was founded in its early beginnings does not hold ground considering that Judaism and Christianity also propounded the use of "the sword" to fight with one another and also against other religions. Surely, the comment made by George Bush about a "Crusade" against Muslim terrorism reveals the age-old Christian tradition of using military force in the name of Christ (Ford para.2). Although Huntington likes to compare Christ's seeming passivity to his enemies in the Christian faith, the United States (as a Christian nation) has certainly gone against the dictates of Christ's message by attacking Iraq without any evidence of WMDS. Similarly, the hollowness of the hybrid foundation for western

Monday, November 18, 2019

This is am african history class, you can choose the topic Research Paper

This is am african history class, you can choose the topic - Research Paper Example They are responsible for leading scientific and intellectual breakthroughs in history. The world, in general, owes the Islam community a debt. In terms of industrialisation, the Islam played an intricate role in the process. They also had a central position to play in the evolution of the philosophical enterprise in the world. This paper will explain how these revolutions shaped the world. In the past, it was easy for scholars, mathematicians, economists, and researchers to draw their inspiration from Islam (Huff 73). Islam worked to open up the minds and hearts of everyone in the world. In thought and study, many scholars can attribute their success to the Islam faith and its growth and spread. It is believed that the Islam community in the late seventeenth century drew their philosophical strength from the Greek. This means that, the introduction of many inventions, for example, the telescope led to the growth of the Western curiosity on the influence of Greco-Islam revolutions. Th e West had a number of inventions and scientific breakthroughs. However, they did not draw their inspiration from anywhere as many civilisations did. Many individuals around the world believe that there was no scientific or intellectual breakthrough in the Islamic world. This is because, most of them believe that all that is Islam developed as a result of the Greek heritage. Without it, many believe that Islam would not have an avenue to exist on its own. Others also believe that, the Arabs cold not identify what the ancient hieroglyphics in their presence meant. This is not until the coming of a European who explored the ancient language and drew conclusions from his research (Abu-Rabi 145). The introduction of foreigners makes the issue of Muslims being intellectually capable of making strides in the world debatable. What these critics do not seem to comprehend is the fact that, every civilisation brings forth diverse worldviews on diverse matters. In the field of optics, the Musl im and Arab community have made significant strides (Huff 79). The most revered thing about the Muslim faith is the belief they exhibit the necessary aspects of knowledge and wisdom in life. This makes them refuse the influence brought on by many education and religious influences from around the world. The fear of foreign influences pushes them to create their own understanding on issues, which pertain to many aspects of life. Islam focuses on regulating the philosophical attitude of the world. This is by overarching the philosophy of embracing mankind regardless of their faith and cultural background. No faith in the world claims that taking another life in the name of religion is justified, and Islam is not the first. Islam embraced the power of science, even when Christianity shunned and condemned the likes of Galileo for the assumptions he made about the earth. This laid the basis for the growth and development of philosophy and science among the Islam community (Huff 81). In A frica, intellectual revolution opened doors for the much needed economic change. Islam can be the perfect ground to lay this intellectual foundation. With the political changes, it is possible to have many channels created by the Western world in the third world countries. In Africa, for instance, the introduction of madrasa ensured that children learned the importance of the different fields in the world. The European and African enlightenment was brought on by the light that Islam shone

Saturday, November 16, 2019

Advantages And Disadvantages Of Using A Pointer Computer Science Essay

Advantages And Disadvantages Of Using A Pointer Computer Science Essay Write advantages and disadvantages of using pointer. How the concept of pointers is useful in the implementation of data structures? A pointer allows a function or a program to access a variable outside the preview function or a program ,using pointer program can access any memory location in the computers memory. 2)since using return statement a function can only pass back a single value to the calling function, pointers allows a function to pass back more than one value by writing them into memory locations that are accessible to calling function. 3)Use of pointer increases makes the program execution faster 4)using pointers, arrays and structures can be handled in more efficient way. 5) without pointers it will be impossible to create complex data structures such as linked list , trees, and graphs. Disadvantages of pointers:- 1)we can access the restricted memory area. 2) Pointers require one additional dereference, meaning that the final code must read the variables pointer from memory, then read the variable from the pointed-to memory. This is slower than reading the value directly from memory. 3). If sufficient memory is not available during runtime for the storage of pointers, the program may crash When setting up  data ststructures  like  lists,  queues  and trees, it is necessary to have pointers to help manage how the structure is implemented and controlled.Pointers and Structures can be used to build data structures that expand and shrink during execution examples stack queues,trees etc.While pointer has been used to store the address of a variable,it more properly applies to data structures whose interface explicitly allows the pointer to be manipulated as a memory address.Because pointers allow largely unprotected access to memory addresses. 2). Elaborate the concept of Fixed block storage allocation and Buddy system in dynamic memory management. Sol. Fixed block storage allocation:- This is the simplest storage maintenance method. Here each block is of the same size. The size is determined by the system manager. Here the memory manager maintain a pointer AVAIL which points a list of non contiguous memory blocks. A user program communicate with the memory manager by means of two function GETNODE(NODE) and RETURNNODE(PTR).The procedure GETNODE is to get a memory block to store data of type NODE. This procedure when invoked by a program returns a pointer to first block in the pool of restorage. The AVAIL then points to the next block.If avail=NULL it indicates no more memory is available for allocation. Similarly whenever a memory block is no more required it can be returned to the memory bank through a procedure RETURN NODE(). Buddy system:- It is the another storage management system which restricts the size of blocks to some fixed set of sizes. These blocks of restricted sizes are maintained in a linked list. Whenever a request for a block of size N comes, the number M the smallest of the fixed sizes but equal to or largest than N, is determined and a block of size M is allocated if available on the list. If not available then a larger block if available is split into two sub-blocks known a s buddies. Each of them are also of fixed sizes and the process is repeated until a block of size M is produced. for example , if k=1 and Fo=8, then the block sizes are 8,16,32,64,128,à ¢Ã¢â€š ¬Ã‚ ¦. THAT is ,the block sizes are successive powers of 2; and the buddy system based on such fixed sizes is called binary buddy system. 3.)Differentiate between static memory allocation and dynamic memory allocation. Illustrate various memory management functions Sol. In case of static storage management scheme , the net amount of memory required for various data for a program is allocated before the starting of the execution of a program once memory is allocated, it neither can be extended nor can be returned to the memory bank for the use of other programs at the same time. On the other hand dynamic storage management schemes allows user to allocate and deallocate as per necessity during the execution of programs. The static storage allocation is easy to implement and efficient from execution point of view .Here all variables those are required for a program is allocated during compile time this is why static storage allocation is a compile time phenomena. In this each subprogram/subroutine of a program is compiled separately and the space required for them is reserved till the execution of the program. On the other hand dynamic memory allocation , space for memory variables is allocated dynamically that is as per the current demand during the execution. When a subprogram is invoked space for it is allocated and space is returned when the subprogram completes its execution. Thus , the space required to run a program is not fixed as in static allocation, rather it varies as program execute. Various memory management functions:- 1)malloc():-The malloc function dynamically allocates memory from heap.The prototype for malloc() function is Void *malloc(size_t size); 2)calloc():- The calloc() function dynamically allocates memory automatically initializes the memory to zeroes. The prototype for calloc() function is Void *calloc(size_t nitems , size_t size); It takes two arguments . The first argument is the number of elements and the second argument is the size of each element. 3) realloc():- The realloc() function changes the size of previously dynamically allocated memory with malloc(), calloc(), realloc() functions.The prototype for realloc() function is Void *realloc(void *block, size_t size); It takes two argument . the first argument is the pointer to the original object and the second argument is the new size of the object. 4.)Write different ways to manage records in memory Sol.) Since records may contain non homogeneous data, the elements of a record cannot be stored in an array . Some programming languages such as PASCAL and COBOL do have record structures built into the language. Suppose a programming language does not have available the hierarchical structures that are available in PASCAL and COBOL . Assuming the record contains non homogeneous data , the record may have to be stored in individual variables , one for each of its elementary data items. On the other hand one wants to store an entire file of records, such a file may be stored in memory as a collection of arrays that is, where elements in different arrays with the same subscript belonging to the same record. Part-B 1.)Illustrate the use of array of pointers and pointers to an array Sol.) An array of pointers is that for eg if we have array of 10 int pointers ie int *a[10] then each element that which is stored in array are pointed by pointers. here we will have ten pointers. In pointer to an array for eg int(*a)[10] here all the elements that is all the ten elements are pointed by a single pointer. int *a[10]:-array of pointers. consider one array int b[10]={1,2,3,4,5,6,7,8,9,0};so elements will be stored in addresses .now this address are stored in array of pointers.thats int *a[10]={b+0,b+1,b+2,b+3,b+4,b+5,b+6,b+7,b+8,b+9};means a+0=address of value 1 is the first element of int *a[](first element of int b[10])and so on. while int(*a)[10]:-here a is an pointer to an array containing 10 integers. suppose int b[10]; then a=b[10]; this will give element of int b[10] array thats b[0];and so on but in case of two dimensional array first we have to allocate base address of respective one dimensional array and base address of element of one dimensional array then only we can use pointer to an array. Give example to show the use of far pointer and dangling pointer problems Sol.) A far pointer uses both the segment and the offset address to point to a location in memory   The far pointer can point to any location in memory. . Far pointers have a size of 4 bytes . They store both the segment and the offset of the address the pointer is referencing. A far pointer has an address range of 0 1M bytes. A far pointer can be incremented and or decremented Only the offset of the pointer is actually incremented or decremented. The segment is never incremented by the arithmetic operators.On the other hand Dangling pointers are the pointers that do not point tao a valid object of the appropriate type. These pointers arise when an object is deleted or deallocated,without modifting the value of the pointer so that pointer stll points to the memory location of deallocated memory .As the system may reallocate the previously freed memory to another process ,if the original program then derefrences the dangling pointer,results in bugs or errors as the memory may contain com pletely different data.   Consider the following example { char *cp = NULL; { char c; cp = &c; }    /* cp is now a dangling pointer */ } Solution to dangling pointer: char *cp = malloc ( A_CONST ); free ( cp ); /* cp now becomes a dangling pointer */ cp = NULL; /* cp is no longer dangling */ Differentiate between linked list and arrays in terms of representations, traversal and searching. Sol.) 1)In case of array traversing is used visiting all elements in an array while to traverse a single linked list we mean to visit every node in the list starting from first node to last node. 2).Searching operation in an array is applied to search an element interest in an array.It is a process of finding the location of given element in an array.The search is said to be successful if the given element is found.there are two types of search operation : Linear search Binary search If the array elements are in random order then one have to use linear search technique and if the array elements are sorted then it is preferable to choose binary search technique.While in case of linked list only linear searching is possible.This is one of the limitation of linked lists as there is no way to find the location of the middle element of the list. can we perform binary search in linked list ,if no then illustrate the reason. Sol.) No, we cannot perform binary search in linked list because there is no way Of indexing the middle element in the list. With a sorted linear array we can apply a binary search whose running time is proportional to log2n. On the other hand a binary search algorithm cannot be applied to a sorted linked list, since there is no way of indexing the middle element in the list. This property is one of the main drawbacks in using a linked list as a data structure.

Wednesday, November 13, 2019

Invisible Man Essay: Race, Blindness, and Monstrosity -- Invisible Ma

Race, Blindness, and Monstrosity in Invisible Man      Ã‚  Ã‚   I'd like to read Ralph Ellison's Invisible Man as the odyssey of one man's search for identity.   Try this scenario: the narrator is briefly an academic, then a factory worker, and then a socialist politico.   None of these "careers" works out for him.   Yet the narrator's time with the so-called Brotherhood, the socialist group that recruits him, comprises a good deal of the novel.   The narrator thinks he's found himself through the Brotherhood.   He's the next Booker T. Washington and the new voice of his people.   The work he's doing will finally garner him acceptance.   He's home.    It's a nice scenario, but the narrator realizes his journey must continue when Jack, the leader of the Brotherhood:    'Now see here,' he began, leaping to his feet to lean across the table, and I spun my chair half around on its hind legs as he came between me and the light, gripping the edge of the table, sputtering and lapsing into a foreign language, choking and coughing and shaking his head as I balanced on my toes, set to propel myself forward; seeing him above me and the others behind him as suddenly something seemed to erupt out of his face . . ."   (Ellison, Invisible Man, 409).    The careful bureaucracy gives way to rage; he regresses, spitting and swearing in a foreign tongue, leaning forward as if to attack the narrator.   And the eruption?   Jack is a Cyclops, the one-eyed mythological giant of terror and lawlessness:    I stared into his face, feeling a sense of outrage.   His left eye had collapsed, a line of raw redness showing where the lid refused to close, and his gaze had lost its command.   I looked from his face to the glass, thinking he's disem... ...Citizen is a rowdy drunk that no one listens to.   Yet Jack is a brother, or, as Invisible Man puts it, the great white father.   He's not such an easy enemy to defeat, and the problem won't just go away.   The map of racism, blindness, and monstrosity that Ellison draws is incomplete because the monster is never defeated.   Perhaps this too is characteristically American.   Ellison's evolved Cyclops has staying power.   He's grown resistant to the hero's tricks and, though blind, he will thrive.   Ellison's Odysseus is doomed to wander longer than eleven years.    [1] This is the Gaelic word for "nonsense".    Works Cited Ellison, Ralph.   Invisible Man.   New York: Random House, New American Library, 1952. Homer.   The Odyssey, translated Richmond Lattimore.   New York: Harper Collins, 1991. Joyce, James.   Ulysses.   New York: Random House, 1990.   

Monday, November 11, 2019

Computers and Digital Basics

1: Computers and Digital Basics TRUE/FALSE 3. Facebook and Twitter are examples of social networking options. F 6. An operating system is an example of application software. F 7. Because of increased versatility, a videogame console is now considered a personal computer. f 8. The purpose of a server is to serve computers on a network. T 9. In the binary number system, 2 is used to represent the value 2. F 10. The number 9 can be considered a character. T 11. Because most digital devices are electronic, bytes take the form of electrical pulses. F 13.A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch. T 14. An interpreter converts and executes one statement at a time. T 15. The op code specifies the data. F 16. The operand is a command word for an operation. F 17. All computers are case sensitive. F 18. Trojans are computer programs that seem to perform one function while actually doing something else. T 1 9. To assure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday. F 20.You should always use a different password for every account. F MODIFIED TRUE/FALSEIf False, change the underlined work to make it True!1. Digital technology has made it easy to produce copies of music with no loss of quality from the original. _________________________2. Free source projects promote copying, free distribution, peer review, and user modifications. Open3. An area where data can be left on a permanent basis is memory. storage4. The set of instructions that tells a computer how to carry out processing tasks is a computer program. _________________________ 5. Minicomputers were used for small businesses. ________________________6. A(n) supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. mainframe7. The term server can refer to a combination of hardware and sof tware. _________________________8. A(n) mainframe specializes in compute-intensive problems. supercomputer9. A light switch is like a(n) analog device. digital10. DIPs and PGAs are both shapes of integrated circuits. _________________________11. The results of statements that have been compiled are called object code. _________________________12. A set of machine language instructions for a program is called source code. machine 13. The ALU uses registers to hold data that is being processed. _________________________14. A(n) keylogger is a form of malicious code. _________________________15. A(n) account manager stores user IDs with their corresponding passwords and automatically fills in login forms. passwordMULTIPLE CHOICE1. Digital electronics use electronic ____ to represent data. a. circuits c. transistors b. switches d. components2. Key factors in making electronic devices increasingly smaller and less expensive include ____. . transistors c. both a and b b. integrated circui ts d. neither a nor b3. The first digital computers were built during World War II for ____. a. census taking c. communication b. code breaking d. troop placement4. Initially sales were slow for the personal computer because of ____. a. price c. lack of software b. size d. lack of availability5. In 1982, the percentage of households that had a computer was fewer than ____ percent. a. 10 c. 50 b. 30 d. 706. A global computer network originally developed as a military project is the ____. a. World Wide Web c. Wide-area network b. Internet d. Local-area network7. ____ allow members to post comments and questions that can be read and responded to by others. a. E-mail lists c. Chat groups b. Bulletin boards d. Social networks8. ____ are where people exchange typed messages in real time. a. E-mail lists c. Chat groups b. Bulletin boards d. Online social networks9. ____ provide a space for interacting with friends or friends of those friends. a. E-mail lists c. Chat groups b. Bulletin boar ds d. Online social networks10. A group of computers linked by wired or wireless technology is a(n) ____. a. network c. cyberspace . Web d. Internet11. The ____ is a collection of linked documents, graphics, and sounds. a. network c. cyberspace b. Web d. Internet12. ____ is a term that refers to entities that exist largely within computer networks. a. Web c. WWW b. Internet d. Cyberspace13. ____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices. a. Digitization c. Scanning b. Digital conversion d. Rasterization14. Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product. a. volution c. convergence b. rotation d. diversification15. More than ____ percent of cameras sold today are digital. a. 80 c. 90 b. 85 d. 9916. Digital imaging has had an effect in the following areas: ____. a. medicine c. photo processing b. video d. all of the above17. ___ _ tools cloak a person’s identity online. a. Anonymizer c. ID free b. Free ID d. Cloaking18. A computer is a multiple purpose device that can do all of the following EXCEPT ____. a. store data c. accept input b. process data d. think independently19. In a computer, most processing takes place in ____. a. memory c. he CPU b. RAM d. the motherboard20. An electronic component that can be programmed to perform tasks is a ____. a. CPU c. transistor b. microprocessor d. none of the above21. A named collection of data that exists on a storage medium is known as (a) ____. a. memory c. file name b. file d. none of the above22. An area of a computer that temporarily holds data waiting to be processed is ____. a. CPU c. storage b. memory d. a file23. A set of computer programs that helps a person carry out a task is ____. a. an operating system c. application software b. system software d. Windows24.A set of computer programs that helps a computer monitor itself and function more effici ently is ____. a. a software suite c. application software b. system software d. processing software25. The master controller for all activities that take place within a computer is ____. a. application software c. the operating system b. system software d. the CPU 26. A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual. a. personal computer c. ALU b. mainframe d. server27. An ordinary personal computer that is connected to a network is a ____. a. mainframe c. server . workstation d. console28. A powerful desktop computer used for high-performance tasks is a ____. a. mainframe c. server b. workstation d. console29. A compute-intensive problem runs on a ____. a. server c. supercomputer b. mainframe d. super PC30. Data becomes ____ when it is presented in a format that people can understand and use. a. information c. graphs b. processed d. presentation31. The type of data where text, numbers, graphics, sound, and video have been c onverted into discrete digits as represented in the accompanying figure is ____. a. information c. digital b. analog d. none of the above32. The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____. a. information c. digital b. analog d. none of the above33. The binary number 10 represents ____ in the decimal number system. a. 1 c. 10 b. 2 d. 10034. The type of code that uses only seven bits for each character is ____. a. ASCII c. EBCDIC b. Extended ASCII d. all of the above35. The type of code that uses eight bits for each character is ____. a. ASCII c. EBCDIC b. Extended ASCII d. all of the above36. Digital devices can use ____ as a code to represent character data. . ASCII c. EBCDIC b. Extended ASCII d. all of the above37. You might represent ____ using character codes. a. color dots c. Social Security numbers b. bank balances d. none of the above38. Data transmission speeds are typically expressed as ____. a. bits c . hertz b. bytes d. none of the above39. Storage is typically expressed as ____. a. bits c. hertz b. bytes d. none of the above40. 1,024 bytes is a ____. a. kilobyte c. gigabyte b. megabyte d. terabyte41. 1,048,576 bytes is a ____. a. kilobyte c. gigabyte b. megabyte d. terabyte42. 1,073,741,824 bytes is a ____. a. kilobyte c. igabyte b. megabyte d. terabyte43. A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____. a. integrated circuit c. microchip b. computer chip d. all of the above44. The accompanying figure represents two types of chip carriers. The one on the left is a ____. a. PGA c. PID b. DIP d. GAP45. The accompanying figure represents two types of chip carriers. The one on the right is a ____. a. PGA c. PID b. DIP d. GAP46. The ____ houses all essential chips and provides connecting circuitry between them. a. system board c. circuit board b. ousing board d. chip board47. C, BASIC, COBOL, and Java are examples of ____ programmi ng languages. a. low-level c. system b. computer d. high-level48. The human-readable version of a program is called ____. a. source code c. human code b. program code d. system code49. A(n) ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file. a. compiler c. converter b. interpreter d. instruction50. A(n) ____ converts and executes one statement at a time. a. compiler c. converter b. interpreter d. instruction51. A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____. a. compiler code c. machine code b. interpreter code d. instruction set52. ____, as shown in the accompanying figure can be directly executed by the processors’s circuitry. a. Machine sets c. Programming language b. Machine language d. none of the above53. The ____ is a command word for an operation such as add, compare, or jump. a. op code c. ALU b. operand d. instruction code54. The ____ from an instruction specifies the data. a. op code c. ALU b. operand d. instruction code55. The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure. a. instruction pointer c. ALU b. RAM d. control unit56. As shown in the accompanying figure, the ____ fetches each instruction. a. RAM c. ALU b. instruction pointer d. control unit57. The accompanying figure represents the instruction cycle. The first step is Box A and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer58. The accompanying figure represents the instruction cycle. The second step is Box B and represents the ____. a. etch instruction c. execute instruction b. interpret instruction d. increment pointer59. The accompanying figure represents the instruction cycle. The third step is Box C and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. incremen t pointer60. The accompanying figure represents the instruction cycle. The fourth step is Box D and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer61. In terms of an authentication protocol, the phrase ‘something a person knows’ refers to ____. a. a password c. biometrics b. n ID card d. none of the above62. A ____ is a series of characters that becomes a person’s unique identifier. a. PIN code c. user ID b. password d. all of the above63. In terms of an authentication protocol, the phrase ‘something a person possesses’ could refer to ____. a. a password c. biometrics b. an ID card d. none of the above64. In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____. a. password c. biometric device b. ID card d. none of the above65. A problem a hacker can cause after breaking into your computer include(s) ____. a. applying for credit in your n ame c. pply for a mortgage using your data b. sending embarrassing e-mails d. all of the above66. A term which can refer to a person who manipulates computers with malicious intent is a ____. a. black hat c. hacker b. cracker d. all of the above67. A ____ attack uses password-cracking software. a. brute force c. phishing b. sniffing d. cracker68. ____ intercepts information sent over computer networks. a. Brute force c. Phishing b. Sniffing d. Cracking69. A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____. a. brute force c. phishing b. sniffing d. cracking70. Password management functions include all of the following EXCEPT ____. a. generating passwords c. providing password strength b. tracking passwords d. recording keystrokes Case-Based Critical Thinking Questions Case 1-1 Karen is trying to get organized and one of her issues is that she doesn’t know what kind of devices correspond to her needs.71. Karen need s an appointment book and is considering one that is digital. For this one piece of equipment, she does not want the device to do anything except maintain her calendar. You suggest she consider a ____. a. PDA c. handheld computer b. smart phone d. BlackBerry72. After you and Karen talk a little longer, she recognizes that she might need a device that in addition to her appointment book will have features such as e-mail, Web access, a built-in camera, and GPS. You suggest she consider a(n) ____. a. iPod c. handheld computer b. regular PDA d. CPU73. If Karen were looking for a device that in addition to voice communications, offers full qwerty keypad, text messaging, e-mail, Web access, removable storage, camera, FM radio, digital music player, and software options for games, financial management, personal organizer, GPS and maps, she might consider a(n) ____. a. regular PDA c. andheld computer b. smart phone d. iPod Case-Based Critical Thinking Questions Case 1-2 Mike and Andre are d iscussing how quickly technology changes. They are discussing how it seems devices are merging to create new products especially in the technology field. They understand this is a process called convergence.74. An example of an old form of convergence is a ____. a. clock radio c. television b. cell phone d. microwave oven75. A great example of convergence in modern technology is ____. a. clock radio c. television b. cell phones d. HD-TV76. A barrier to the rapid deployment of many products resulting from convergence is ____. . rare technology breakthroughs c. people aren’t ready b. legal issues d. both b and c Case-Based Critical Thinking Questions Case 1-3 Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help.77. Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code. You tell him it is so that ____. a. the code is ready to execute b. you can prevent the introduction of new errors c. you can put it on a chip d. one of the above78. Jim knows that a collection of preprogrammed activities is an instruction set. He wants to know what an instruction set is designed to do. You tell him it is designed to ____. a. carry out a particular task b. allow programmers to use them in creative ways for multiple tasks c. limit the number of tasks the computer can perform d. allow the program to run on multiple machines79. Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____. a. an op code and operand c. basic instructions, such as add b. a series of 0s and 1s d. ll of the above80. When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add. He wants to know where the result of the add goes. You tell him it goes to ____. a. the ALU c. the accumulator b. another register d. the printerCOMPLETION1. An ongoing process of social, political, and economic change brought about by digital technology is the digital revolution.2. At the consumer level, probably the most significant force driving research into fast computers and more sophisticated graphics processing is computer gaming.3.The potential downside of convergence is quality.4. The expectation that a person’s information will not be collected or divulged without permission is confidentiality.5. The ownership of certain types of information, ideas, or representations is intellectual property.6. Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries is globalization.7. A term that refers to the gap between people who have access to technology and those who do not is the digital divide.8. Symbols that represent facts, objects, and ideas are data.9. The manipulati on of data is called processing.10. The concept that a series of instructions for a computing task can be loaded into memory is called a stored program.11. Any software or digital device that requests data from a server is referred to as a(n) client.12. The type of computer that is considered one of the fastest in the world is a(n) supercomputer.13. A special-purpose microprocessor that is built into the machine it controls is a(n) microcontroller.14. The term that refers to the form in which data is stored, processed, and transmitted is data representation.15. In the accompanying figure, the type of sound wave indicated by A is analog.16. In the accompanying figure, as indicated by B, the sound wave has been sliced into samples and so has been digitized.17. Eight bits is a(n) byte.18. A machine language instruction has two parts, the op code and the operand.19. Identifying a person by personal attributes such as fingerprints or retinal patterns is called biometrics.20. Hackers can guess your password by stepping through a dictionary. This process is called a dictionary attack.

Saturday, November 9, 2019

UTC analysis essays

UTC analysis essays Paul Cronan and New England Telephone Company The Paul Cronan story is a depiction of Americas prejudices and the reason why employment laws are necessary. Mr. Cronan was a long-time employee of New England Telephone Company since 1973, whose sexual preferences caused him to contact Acquired Immune Deficiency Syndrome (AIDS). As a service technician, his ailment left him missing work often to gain necessary treatment. His supervisor confronted him asking for explanation as to the missed work, and even though this supervisor promised confidentiality, word quickly spread of Mr. Cronans ailment. Prejudices were evident as outlined in the case study, leaving him to fear of his safety on a daily basis. As his company illness benefits were discontinued, NET placed Mr. Cronan on Long-Term Disability, effectively terminating his employment and leaving the man with half his normal monthly income. In December of 1985, Mr. Cronan enlisted the Civil Liberties Union of Massachusetts (CLUM) to assist in filing a civil lawsuit charging violations of privacy law and discrimination against him. Through an out-of-court settlement it was agreed that Mr. Cronan could return to work and accommodations would be made at NET for his reinstatement. A walkout ensued as workers refused to enter the premises to gain work assignments. Workers filed a union grievance protesting the reinstatement as a violation of the safety and health agreement of their labor contract. Legal Issues; Weekly Issues Studied, Issues Applied to Case Employment at Will is the first subject broached this week as related to the employer and employees right to end employment. The key issue here is that it allows any employer to fire the employee at any time; as well, the employee may terminate his/her position at any time, without repercussion. The importance with this subject is that there are federal restrictions constituting illegal bases for termination; any bas...

Wednesday, November 6, 2019

Free Essays on Tragic Hero (using Hamlet)

A tragic hero is an exceptional character, who has a flaw that leads to his downfall. In most plays the tragic flaw is easy to spot. However, in Hamlet, Hamlet’s tragic flaw is not as easy to point out as some other major Shakespeare’s characters. Hamlet’s complex and deep character produces a variety of possibilities that might’ve led to his demise. However, it seems to be that his constant over rationalizing and hesitating were most prominent in leading to his death. After Hamlet’s father was killed, his world was turned upside down. He was thrusted into a whirlwind of commotion. For one, he had to live life without a man who he deeply loved. Next, his mother remarries, nearly three wakes later. To add insult to an already painful injury, the man his mother-queen married happened to be his late father’s brother. Newly crowned King Claudius did not help the situation. It appeared Hamlet’s life couldn’t get any worse. That was until he was visited by a ghost, who claimed to be his late father. Although an odd and precarious situation, Hamlet was excited. He learned that his, uncle, and now king and father, Claudius, had poisoned and killed the great King Hamlet. Before the apparition departed he called upon a favor of his son: seek revenge. Kill King Claudius. Hamlet’s initial instinct was to do this deed, and do it now. He owed it to himself and to his father. However, as if life hadn’t been rough enough for Hamlet, he quickly was brought down to earth when he realized what he had to do. Commit treason. Go against religious beliefs. These overbearing thoughts would go on to plague Hamlet throughout the play. Hamlet cannot take immediate action. He cannot just go out and kill the king. He has one shot and one shot only. He realizes this, and realizes a bunch of other gloomy prospects. First off, Hamlet is unsure about whether or not killing the king is the right thing to do. He doesn’t even have a without a ... Free Essays on Tragic Hero (using Hamlet) Free Essays on Tragic Hero (using Hamlet) A tragic hero is an exceptional character, who has a flaw that leads to his downfall. In most plays the tragic flaw is easy to spot. However, in Hamlet, Hamlet’s tragic flaw is not as easy to point out as some other major Shakespeare’s characters. Hamlet’s complex and deep character produces a variety of possibilities that might’ve led to his demise. However, it seems to be that his constant over rationalizing and hesitating were most prominent in leading to his death. After Hamlet’s father was killed, his world was turned upside down. He was thrusted into a whirlwind of commotion. For one, he had to live life without a man who he deeply loved. Next, his mother remarries, nearly three wakes later. To add insult to an already painful injury, the man his mother-queen married happened to be his late father’s brother. Newly crowned King Claudius did not help the situation. It appeared Hamlet’s life couldn’t get any worse. That was until he was visited by a ghost, who claimed to be his late father. Although an odd and precarious situation, Hamlet was excited. He learned that his, uncle, and now king and father, Claudius, had poisoned and killed the great King Hamlet. Before the apparition departed he called upon a favor of his son: seek revenge. Kill King Claudius. Hamlet’s initial instinct was to do this deed, and do it now. He owed it to himself and to his father. However, as if life hadn’t been rough enough for Hamlet, he quickly was brought down to earth when he realized what he had to do. Commit treason. Go against religious beliefs. These overbearing thoughts would go on to plague Hamlet throughout the play. Hamlet cannot take immediate action. He cannot just go out and kill the king. He has one shot and one shot only. He realizes this, and realizes a bunch of other gloomy prospects. First off, Hamlet is unsure about whether or not killing the king is the right thing to do. He doesn’t even have a without a ...

Monday, November 4, 2019

Enterotube case study Lab Report Example | Topics and Well Written Essays - 1000 words

Enterotube case study - Lab Report Example Within 3 hours the patient suffered from severe vomiting, feelings of nausea and diarrhea. He also felt consistent abdominal cramps. He had developed mild fever while being admitted. This is a clear case of food poisoning since no other symptoms are visible. No other complication developed. However since several species of bacteria can cause food poisoning it is important to accurately point out the causal microbe for proper treatment approach. In order to reach a proper diagnostic conclusion several tests needs to be conducted to accurately identify the exact species of the pathogenic bacteria responsible for causing the symptoms in the patient. The Enterotube IITM System has been used to help in identification since several evaluations have shown that the system is both simple to use and rapid for analysis of bacterial species (Martin et al, 1971, p.96).It is a pre-packaged diagnostic tool used for identification of Gram Negative bacteria in Enterobactericeae family. Even though the procedure is less reliable than conventional molecular methods yet the advantage of using this system lies in the fact that all the tests can be done simultaneously using just one single colony (Grunberg et al, 1969, p.207). After proper scoring and calculation it can be said accurately that the causal microorganism is S.aureus. S.aureus is a fairly common bacterium found o skin and in noses of even healthy individuals (CDC, 2014).The severity of the food poisoning developed depends on the amount of food ingested.This bacterium is primarily spread through food especially when food is handled under unsanitary conditions. Since patient is a growing child no medical intervention will necessary at this stage. However, rest and intake of large amounts of fluid is absolutely essential for proper

Saturday, November 2, 2019

Networking Assignment Reflection Paper Essay Example | Topics and Well Written Essays - 500 words

Networking Assignment Reflection Paper - Essay Example e is really passionate about market research, has a strong sense of responsibility, and very much knowledgeable about the situation of the different industries in the market. I believe that her professionalism enables her to generate interviewees from industry players and trade associations. Her innate passion for market research coupled with her strong sense of responsibility allows her to finish each project to the best of her ability. These values also encourage her to work amidst the difficulties in data gathering. Her interest in the market and knowledge on how it operates makes her as a credible source and enables her to giver accurate reports. Written skill is a very important requirement for her job because it enables her to communicate her knowledge about the market. The ability to make rational forecast on the market will perform is also important as it is a very crucial part of the industry reports. The capability of gathering data and analyzing them are keys to having accurate results. Compared to the interviewee, I am more comfortable in verbal communication than writing out my ideas. Being inexperienced, I am not adept in making forecasts about industries. However, I am also confident of my skills in gathering data and analyzing them. I love to do researches even though I know that I still need to learn more about judging the quality of the data and how they can be used in order to come up with rational results. I have always been interested in market research yet I am not really motivated to pursue this profession when given a chance. What I really want when I choose this interviewee is how various think-tanks like AC Nielsen come up with the market reports which they present to business organizations. Also, interviewing a market research analyst enabled me to understand her work and the important characteristics needed to excel in her career. The primary challenge when approaching an unknown professional is the fear of being rejected. Noting