Tuesday, November 26, 2019
Crusades on America essays
Crusades on America essays The Crusades was a very important set of holy wars that went from 1095 to 1250. Pope Urban II, who set to conquer the holy land and regain the birthplace of Christ to the Christendom, started these important sets of wars. When the Christian army arrived at the Middle East, they were met by not only the great Turkish general Saladin, but also harsh weather conditions in which the heavy armor of Western Europe was useless. The wars dragged on and the Christendom only gained a small amount of territory, only to lose it again by 1250. The Crusades not only had an impact on European society, but a wake up call to the fact that if more land was wanted, then they would have to search westward. Many Things resulted from the Crusades; first, the crusades bettered the European Economy. The Crusades affected the economy by increasing trade within Europe from outside realms and creating new markets for new goods from different places. Goods such as spices, silk, and cotton brought a new luxury to the Europeans, transforming the dull and bland food into zestier food with spices and giving people more things to wear other than cotton. Most notably, Italy, prospered from the new trade controlling the Mediterranean trade from outside of Europe. This newfound wealth in Italy lead to making other nations jealous, which pushed other countries to exploring uncharted lands and alternate trade routes. Perhaps the most profound effect the crusades had on the history of America was the push for other nations to establish new trade routes and to find new lands to colonize. Since the Italians had the Mediterranean passage to the Middle East to themselves, Prince Henry the Navigator sought to find new ways to get to the Middle East. They found out that the fastest way to get to the Middle East was to go around the cape of Africa. With Portugals success in finding new trade routes, the neighboring Spanish felt that it was ti ...
Saturday, November 23, 2019
Ubaidian Culture and the Roots of Mesopotamia
Ubaidian Culture and the Roots of Mesopotamia The Ubaid (pronounced ooh-bayed), sometimes spelled Ubaid and referred to as Ubaidian to keep it separate from the type site of el Ubaid, refers to a time period and a material culture exhibited in Mesopotamia and adjacent areas which predate the rise of the great urban cities. The Ubaid material culture, including ceramic decorative styles, artifact types and architectural forms, existed between about 7300-6100 years ago, over the vast Near Eastern region between the Mediterranean to the Straits of Hormuz, including parts of Anatolia and perhaps the Caucasus mountains. The geographic spread of Ubaid or Ubaid-like pottery, a pottery style which has black geometric lines drawn on a buff-colored body, has led some researchers (Carter and others) to suggest that a more accurate term might be Near Eastern Chalcolithic black-on-buff horizon rather than Ubaid, which implies that the core area for the culture was southern Mesopotamia- el Ubaid is in southern Iran. Thank goodness, so far theyre holding off on that. Phases While there is widespread acceptance of the chronological terminology for Ubaid ceramics, as you might expect, dates are not absolute across the entire region. In southern Mesopotamia, the six periods span between 6500-3800 BC; but in other regions, Ubaid only lasted between ~5300 and 4300 BC. Ubaid 5, Terminal Ubaid begins ~4200 BCUbaid 4, once known as Late Ubaid ~5200Ubaid 3 Tell al-Ubaid style and period) ~5300Ubaid 2 Hajji Muhammad style and period) ~5500Ubaid 1, Eridu style and period, ~5750 BCUbaid 0, Ouelli period ~6500 BC Redefining the Ubaid "Core" Scholars are hesitant today to re-define the core area from which the idea of Ubaid culture spread out because the regional variation is so extensive. Instead, at a workshop at the University in Durham in 2006, scholars proposed that the cultural similarities seen across the region developed from a vast inter-regional melting pot of influences (see Carter and Philip 2010 and other articles in the volume). Movement of the material culture is believed to have spread throughout the region primarily by peaceable trade, and various local appropriations of a shared social identity and ceremonial ideology. While most scholars still suggest a Southern Mesopotamian origin for black-on-buff ceramics, evidence at Turkish sites such as Domuztepe and Kenan Tepe is beginning to erode that view. Artifacts The Ubaid is defined by a relatively small set of characteristics, with a significant degree of regional variation, due in part to differing social and environmental configurations across the region. Typical Ubaid pottery is a high-fired buff body painted in black, the decorations of which become simpler over time. Shapes include deep bowls and basins, shallow bowls and globular jars. Architectural forms include a freestanding tripartite house with a T-shaped or cruciform central hall. Public buildings have a similar construction and a similar size, but have external facades with niches and buttresses. The corners are oriented to the four cardinal directions and sometimes are built top platforms. Other artifacts include clay disks with flanges (which might be labrets or ear spools), bent clay nails which were apparently used to grind clay, Ophidian or cone-headed clay figurines with coffee-bean eyes, and clay sickles. Head-shaping, modification of childrens heads at or near birth, is a recently-identified trait; copper smelting at XVII at Tepe Gawra. Exchange goods include lapis lazuli, turquoise, and carnelian. Stamp seals are common at some sites such as Tepe Gawra and Degirmentepe in northern Mesopotamia and Kosak Shamai in northwest Syria, but not apparently in southern Mesopotamia. Shared Social Practices Some scholars argue that decorated open vessels in the black-on-buff ceramics represent evidence for feasting or at least the shared ritual consumption of food and drink. By Ubaid period 3/4, region-wide the styles became simpler from their earlier forms, which were highly decorated. That may signify a shift towards communal identity and solidarity, a thing also reflected in communal cemeteries. Ubaid Agriculture Little archaeobotanical evidence has been recovered from Ubaid period sites, except for samples recently reported from a burned tri-partite house at Kenan Tepe in Turkey, occupied between 6700-6400 BP, within the Ubaid 3/4 transition. The fire that destroyed the house resulted in the excellent preservation of nearly 70,000 specimens of charred plant material, including a reed basket full of well-preserved charred materials. Plants recovered from Kenan Tepe were dominated by emmer wheat (Triticum dicoccum) and two-rowed hulled barley (Hordeum vulgare v. distichum). Also recovered were smaller amounts of triticum wheat, flax (Linum usitassimum), lentil (Lens culinaris) and peas (Pisum sativum). Elites and Social Stratification In the 1990s, Ubaid was considered a fairly egalitarian society, and it is true that social ranking is not very apparent in any Ubaid site. Given the presence of elaborated pottery in the early period, and public architecture in the later, however, that doesnt seem very likely, and archaeologists have recognized subtle cues which appear to support the subdued presence of elites even from Ubaid 0, although its possible that elite roles might have been transitory early on. By Ubaid 2 and 3, there is clearly a shift in labor from decorated single pots to an emphasis on public architecture, such as buttressed temples, which would have benefited the entire community rather than a small group of elites. Scholars suggest that might have been a deliberate action to avoid ostentatious displays of wealth and power by elites and instead highlight community alliances. That suggests that power depended on alliance networks and control of local resources. In terms of settlement patterns, by Ubaid 2-3, southern Mesopotamia had a two-level hierarchy with a few large sites of 10 hectares or larger, including Eridu, Ur, and Uqair, surrounded by smaller, possibly subordinate villages. Ubaid Cemetery at Ur In 2012, scientists at the Penn Museum in Philadelphia and the British Museum began joint work on a new project, to digitize C. Leonard Woolleys records at Ur. Members of the Ur of the Chaldees: A Virtual Vision of Woolleys Excavations project recently rediscovered skeletal material from Urs Ubaid levels, which had been lost from the record database. The skeletal material, found in an unmarked box within Penns collections, represented an adult male, one of 48 interments found buried in what Woolley called the flood layer, a silt layer some 40 feet deep within Tell al-Muqayyar. After excavating the Royal Cemetery at Ur, Woolley sought the earliest levels of the tell by excavating an enormous trench. At the bottom of the trench, he discovered a thick layer of water-laid silt, in places as much as 10 feet thick. The Ubaid-period burials had been excavated into the silt, and beneath the cemetery was yet another cultural layer. Woolley determined that in its earliest days, Ur was located on an island in a marsh: the silt layer was the result of a great flood. The people buried in the cemetery had lived after that flood and were interred within the flood deposits. One possible historic precursor of the Biblical flood story is thought to be that of the Sumerian tale of Gilgamesh. In honor of that tradition, the research team named the newly rediscovered burial Utnapishtim, the name of the man who survived the great flood in the Gilgamesh version. Sources Beech M. 2002. Fishing in the Ubaid: a review of fish-bone assemblages from early prehistoric coastal settlements in the Arabian gulf. Journal of Oman Studies 8:25-40. Carter R. 2006. Boat Antiquity 80:52-63. remains and maritime trade in the Persian Gulf during the sixth and fifth mllennia BC. Carter RA, and Philip G. 2010. Deconstructing the Ubaid. In: Carter RA, and Philip G, editors. Beyond the Ubaid: Transformation and integration in the late prehistoric societies of the Middle East. Chicago: Oriental Institute. Connan J, Carter R, Crawford H, Tobey M, Charrià ©-Duhaut A, Jarvie D, Albrecht P, and Norman K. 2005. A comparative geochemical study of bituminous boat remains from H3, As-Sabiyah (Kuwait), and RJ-2, Ras al-Jinz (Oman). Arabian Archaeology and Epigraphy 16(1):21-66. Graham PJ, and Smith A. 2013. A day in the life of  Antiquity 87(336):405-417.an Ubaid household: archaeobotanical investigations at Kenan Tepe, south-eastern Turkey. Kennedy JR. 2012. Commensality and labor in terminal Ubaid northern Mesopotamia. Journal for Ancient Studies 2:125-156. Pollock S. 2010. Practices of daily life in fifth millennium BC Iran and Mesopotamia. In: Carter RA, and Philip G, editors. Beyond the Ubaid: transformation and integration in the late prehistoric societies of the Middle East. Chicago: Oriental Institute. p 93-112. Stein GJ. 2011. Tell Zeiden 2010. Oriental Institute Annual Report. p 122-139. Stein G. 2010. Local identities and interaction spheres: Modeling regional variation in the Ubaid horizon. In: Carter RA, and Philip G, editors. Beyond the Ubaid: transformation and integration in the late prehistoric societies of the Middle East. Chicago: Oriental Institute. p 23-44. Stein G. 1994. Economy, ritual, and power in Ubaid Mesopotamia. In: Stein G, and Rothman MS, editors. Chiefdoms and . Madison, WI: Prehistory Press.Early States in the Near East: The Organizational Dynamics of Complexity
Thursday, November 21, 2019
Optimization of Pore Pressure Prediction for Effective Well Planning Thesis
Optimization of Pore Pressure Prediction for Effective Well Planning - Thesis Example The outcome of this research to reduce the deficiency of knowledge which has been correlated to the well planning and well drilling endeavors which have been previously completed. The latest technologies will be applied in regards to methods and paradigms of the forecasting of the fracture gradient and the forecasting of the pore pressure. The most effective practices in the estimation of pore pressures from the seismic velocity information will be applied. The most effective methods which are used in the industry with regards to the approximation of the formation pressure will be explored. A great deal of the information which is collected in the discipline of well planning is derived from the well production crews. This thesis will incorporate a data base of information in addition to the information which is derived from a survey of the well production crews in order to validate the hypothesis. The well production crews are the initial source of information from which the cond itions of the wells are derived. This thesis will also incorporate a database of information which is pressure directed from a diverse number of wells with different characteristics. These wells are found in deep water, offshore, swampland and the Niger Delta environment. The data which is collected from the oil well production crews will be applied in order to ascertain the best practices for effective well drilling and maintenance.
Tuesday, November 19, 2019
The relationship between teenager and their family Essay
The relationship between teenager and their family - Essay Example Data from the NSFG suggest that female adolescents born to intact families face a lower risk of early sexual debut while female adolescents, experiencing parental separation and multiple transitions in family structure have a higher risk of early sexual debut. Moreover, the Hong Kong case study establishes that adolescents with a dysfunction family and a poor family relationship are more likely to hazard to take drugs. Recently, the presence of strained relationships between teenagers and their parents as well as the disintegration within families demeans the influence of parental or family advice on teenagers. This forces teenagers to trust their peers, which coerces them to adopt immoral and unethical behaviors like drug and substance abuse and early sexual intercourse. It is clear that the increase in the strength of youths peer relationships demeans the interaction between teenagers and their families. Notably, cognitive and emotional maturity affects the quality of peer relationships that changes during adolescence. As teenagers seek to assert their individuality and independence, they derive frequent conflict between teens and their parents (Oswalt, 2014). However, as they approach maturity, they develop mature relationships with their parents and their colleagues since they have the capacity to make important decisions about their lives. Indeed, as adolescents approach maturity, they no longer depend on family social support since their colleagues develop the capacity to offer emotional support and comfort and sensible advice (Oswalt, 2014). A three years study by Dr. McGues group assesses the relationship dimensions conflict with parents and perceived warmth of the relationship with parents at age 11 and then again at age 14 (aboutkidshealth, 2010). The study established a decline in the perceived quality of relationships between
Sunday, November 17, 2019
Good teacher Essay Example for Free
Good teacher Essay If I were to describe one of my teachers that I have had throughout these years, the one who I considered a good teacher is my present English teacher. The reasons why I would like to characterize my English teacher are various. Firstly, she’s well to take responsibility. She came to teach punctually. Especially, she always keeps in touch with us to try hard to study by her homework for every day. She speaks English fluently, and her voice is so loud that can make students in the class easy to listen. Actually, when we tired, she always tells jokes that always keep us smiling. Secondly, she’s been teaching for long time, so she’s got many experiences. I like the way she pronounce clearly. Moreover, I could say she is a good explainer but she also gives her best in order to help students to improve their knowledge in English. She likes to correct us each time we make mistakes both in pronunciation and grammar. Thirdly, she’s a work hard teacher. She always do a research more new documents for the students to easy to get understand. And she also got some music lyrics, puzzle, or any other to relax at the weekend or after exam. Sometimes, she looks strong-mined to make us to try hard to study but I know that inside shes very kind, polite and honest. In conclusion, I can say that, her lectures are well organized, interesting and her methods of teaching us demonstrate the desirable teaching method for our use. I thought that I’m very lucky that I’ve met a very good teacher like her.
Thursday, November 14, 2019
Essay example --
Pada dasarnya ilmu hubungan internasional adalah segala hal yang berhubungan dengan batasan negara. Dan segala interaksi tersebut berhubungan dengan kerjasama dan juga konflik. Fokus dari ilmu hubungan internasional yaitu mempelajari tentang penyebab - penyebab dan kondisi - kondisi yang menciptakan kerjasama keluar batas negara. Kerjasama dapat tercipta sebagai akibat dari adaptasi perilaku aktor-aktor dalam mengantisipasi, merespon, hingga berkonflik. Kerjasama dapat dijalankan dalam suatu prosesi perundingan yang diadakan secara langsung. Proses perundingan dapat saja tidak berlangsung ketika aktor – aktor di dalamnya sudah saling mengerti satu sama lainnya. Menurut James dan Robert Pfaltzgraff kerjasama dapat didefinisikan sebagai rangkaian hubungan - hubungan yang tidak berdasarkan pada kekerasan dan paksaan serta sudah disahkan secara hukum. Contohnya dalam sebuah organisasi yang beranggotakan negara – negara di dunia ini yaitu PBB dan Uni Eropa. Aktor-aktor di dalam negara membangun hubungan kerjasama melalui suatu rezim internasinal dan organisasi internasional, yang dapat ...
Tuesday, November 12, 2019
Consequences of Phobia in Edgar Allan Poe’s The Tell-Tale Heart Essay
â€Å"The Tell-Tale Heart†, is a thrilling short story by Edgar Allan Poe. It is about the narrator’s attempt to convince us that he is not crazy, just have keen senses as we realize when he says: â€Å"Why will you say that I am mad? The disease had sharped my senses†(The Tell- Tale Heart, p. 44). He tries to persuade us of his innocence and his sanity telling how he was able to kill an old man, proprietor of the house where he lives, with a good planning and craftiness. The story shows how the eyes of the old man were like the eyes of a vulture, how it disturbed the narrator, and how it made him paranoid. Every night he enters in the bedroom of the old man in order to get rid of those eyes, however he always keeps himself paralyzed when he realizes that the old man’s eyes are closed. We notice the narrator couldn’t commit such a crime in this situation when he says â€Å"I found the eye always closed; and so it was impossible to do the work; for it was not the old man who vexed me, but his Evil Eye†(The Tell- Tale Heart, p. 5). One night, the old man sat down on the bed and began to call him, but he had no reaction. The sight of the old man’s eyes starts to terrify him. The narrator begins to hear the sound of the old man’s heart accelerated and thinks the neighbors are listening to it too, so he smothers the old man under his bed. He opens up some planks in the living room floor and buries the old man there. Now everything is clean. However the old man’s scream waked up a neighbor, and three police officers arrived at the house. Afraid of being arrested, the narrator invites them to come and shows that everything is fine and that the old man wasn’t in town. He offers a drink and the police officers sit in the room, and they keep satisfied with the manners of the narrator: â€Å"My manner had convinced them. I was singularly at ease†(The Tell- Tale Heart, p. 47). But the narrator begins to hear the heartbeat of the old man again, so he decides to confess to the police and asks them to take the body away from the house, and so the story ends. Analyzing the short story â€Å"The Tell-Tale Heart†, Lisa Fritscher reaches some conclusions about the narrator, such as he is really paranoid, with the words â€Å"He is constantly convinced something about the old man is out to get him – first the eye and then the heart. †The narrator’s paranoia is first embraced by the obstinacy of the narrator with the eyes and when it ends, he becomes obstinate by the heart beating. There are strong reasons to think the narrator is really paranoid. In addition, Lisa brings a new idea to our eyes, the fact that our narrator has a phobia of the eyes of the old man. The old man probably has an eye disease called cataract and Lisa goes on to state that the narrator’s phobia would not have been enough reason for murder and adds â€Å"Clearly the narrator suffers from deep mental health issues beyond a simple phobia. †Summing up, we can conclude saying that the Poe’s short story is electrifying and for those who suffer of phobia, it can cause different reactions. With his writing that makes us always on the verge of taking scares, it makes us think of our fears and phobia in a frightening and very exciting way.
Sunday, November 10, 2019
Computer Software Essay
Q1.What are the main types of software? What are the advantages of open-source software? Describe the decision making process of acquiring application software. Q2.â€Å"In the end, information system is recognized only as a foundation for human judgment, insight and inventiveness†. Discuss. What are different types of controls and audits required for an information system? Q3.What is computerized maintenance management? Explain the conceptual model through which the maintenance function can achieve its objectives on a sustained basis. Q4.â€Å"Excel is a versatile spreadsheet package. It can do wonder for accountants†. Explain. Q5. What do you understand by Artificial Intelligence? What are the factors that highlighted the need of developing AI? What are the goals of AI. Q1.What are the main types of software? What are the advantages of open-source software? Describe the decision making process of acquiring application software. Main Types of Software Programming Software: This is one of the most commonly known and popularly used types of computer software. These software come in the form of tools that assist a programmer in writing computer programs. Computer programs are sets of logical instructions that make a computer system perform certain tasks. The tools that help programmers in instructing a computer system include text editors, compilers and interpreters. Compilers translate source code written in a programming language into the language which a computer understands (mostly the binary form). System Software: It helps in running computer hardware and the computer system. System software refers to the operating systems; device drivers, servers, windowing systems and utilities. System software helps an application programmer in abstracting away from hardware, memory and other internal complexities of a computer. An operating system provides users with a platform to execute high-level programs. Firmware and BIOS provide the means to operate hardware. Application Software: It enables the end users to accomplish certain specific tasks. Business software, databases and educational software are some forms of application software. Different word processors, which are dedicated to specialized tasks to be performed by the user, are other examples of application software. Malware: Malware refers to any malicious software and is a broader category of software that are a threat to computer security. Adware, spyware, computer viruses, worms, trojan horses and scareware are malware. Computer viruses are malicious programs which replicate themselves and spread from one computer to another over the network or the Internet.. Adware: Adware is software with the means of which advertisements are played and downloaded to a computer. Programmers design adware as their tool to generate revenue. They do extract user information like the websites he visits frequently and the pages he likes. Advertisements that appear as pop-ups on your screen are the result of adware programs tracking you. But adware is not harmful to computer security or user privacy. The data it collects is only for the purpose of inviting user clicks on advertisements. Inventory Management Software: This type of software helps an organization in tracking its goods and materials on the basis of quality as well as quantity. Warehouse inventory management functions encompass the internal warehouse movements and storage. Inventory software helps a company in organizing inventory and optimizing the flow of goods in the organization, thus leading to improved customer service. Utility Software: Also known as service routine, utility software helps in the management of computer hardware and application software. It performs a small range of tasks. Disk defragmenters, systems utilities and virus scanners are some of the typical examples of utility software. Data Backup and Recovery Software: An ideal data backup and recovery software provides functionalities beyond simple copying of data files. This software often supports user needs of specifying what is to be backed up and when. Backup and recovery software preserve the original organization of files and allow an easy retrieval of the backed up data. Advantages of open source software Usually, the first perceived advantage of open source models is the fact that open source software is made available gratis or at a low cost. But this characteristic is not exclusive to open source software, and several proprietary software products are made available in similar ways (a prominent case could be Microsoft’s Internet Explorer). What really distinguishes open source software from software available without fee is the combination of effects due to the characteristics discussed in section 3.1. All of them combined produce a synergistic impact which is the cause of the real advantages of the open source model. Let us provide some more detail on how do these characteristics turn into advantages The right to redistribute modifications and improvements to the code, and to reuse other open source code, permits all the advantages due to the modifiability of the software to be shared by large communities. This is usually the point that differentiates open source software licences from â€Å"nearly free†ones. In substance, the fact that redistribution rights cannot be revoked, and that they are universal, is what attracts a substantial crowd of developers to work around open source software projects. The right to use the software in any way. This, combined with redistribution rights, ensures (if the software is useful enough), a large population of users, which helps in turn to build up a market for support and customization of the software, which can only attract more and more developers to work in the project. This in turn helps to improve the quality of the product, and to improve its functionality. Which, once more, will cause more and more users to give the product a try, and probably to use it regularly. The decision making process of acquiring Application Software Applications are made available in line with business requirements. This process covers the design of the applications, the proper inclusion of application controls and security requirements, and the development and configuration in line with standards. This allows organisations to properly support business operations with the correct automated applications. Control over the IT process of Acquire and maintain application software that satisfies the business requirement for IT of aligning available applications with business requirements, and doing so in a timely manner and at a reasonable cost by focusing on ensuring that there is a timely and cost-effective development process is achieved by: †¢ Translating business requirements into design specifications †¢ Adhering to development standards for all modifications †¢ Separating development, testing and operational activities and is measured by †¢ Number of production problems per application causing visible downtime †¢ Percent of users satisfied with the functionality delivered  | Q2.â€Å"In the end, information system is recognized only as a foundation for human judgment, insight and inventiveness†. Discuss. What are different types of controls and audits required for an information system? Information system, an integrated set of components for collecting, storing, processing, and communicating information. Business firms, other organizations, and individuals in contemporary society rely on information systems to manage their operations, compete in the marketplace, supply services, and augment personal lives. For instance, modern corporations rely on computerized information systems to process financial accounts and manage human resources; municipal governments rely on information systems to provide basic services to its citizens; and individuals use information systems to study, shop, bank, and invest. Information systems controls To ensure secure and efficient operation of information systems, an organization institutes a set of procedures and technological measures called controls. Information systems are safeguarded through a combination of general and application controls. General controls apply to information system activities throughout an organization. The most important general controls are the measures that control access to computer systems and the information stored there or transmitted over telecommunications networks. General controls include administrative measures that restrict employee access to only those processes directly relevant to their duties. As a result, these controls limit the damage that any individual employee or employee impersonator can do. Fault-tolerant computer systems installed in critical environments, such as in hospital information systems or securities marketplaces, are designed to control and isolate problems so that the system can continue to function. Application controls are specific to a given application and include such measures as validating input data, regularly archiving copies of various databases, and ensuring that information is disseminated only to authorized users. The effectiveness of an information system’s controls is evaluated through an information systems audit. It is a part of a more general financial audit that verifies an organization’s accounting records and financial statements. Information systems are designed so that every financial transaction can be traced. In other words, an audit trail must exist that can establish where each transaction originated and how it was processed. Aside from financial audits, operational audits are used to evaluate the effectiveness and efficiency of information systems operations. Q3.What is computerized maintenance management? Explain the conceptual model through which the maintenance function can achieve its objectives on a sustained basis. Computerized maintenance management system (CMMS) is also known as enterprise asset management and computerized maintenance management information system (CMMIS). A CMMS software package maintains a computer database of information about an organization’s maintenance operations, i.e. CMMIS – computerized maintenance management information system. This information is intended to help maintenance workers do their jobs more effectively (for example, determining which machines require maintenance and which storerooms contain the spare parts they need) and to help management make informed decisions (for example, calculating the cost of machine breakdown repair versus preventive maintenance for each machine, possibly leading to better allocation of resources). CMMS data may also be used to verify regulatory compliance. CMMS packages may be used by any organization that must perform maintenance on equipment, assets and property. Some CMMS products focus on particular industry sectors (e.g. the maintenance of vehicle fleets or health care facilities). Other products aim to be more general. CMMS packages can produce status reports and documents giving details or summaries of maintenance activities. The more sophisticated the package, the more analysis facilities are available. Many CMMS packages can be either web-based, meaning they are hosted by the company selling the product on an outside server, or LAN based, meaning that the company buying the software hosts the product on their own server. The conceptual model through which the maintenance function can achieve its objectives on a sustained basis are used to manage simple or complex facilities, from a single building to a complete campus. They can also be used to manage the maintenance program for a grouping of equipment such as a fleet of vehicles. The systems are very versatile since most are in modular form for the various maintenance functions and can be customized to fit the particular application. Whatever system or set of modules are selected for use, careful consideration needs to be given to Functional Requirements and a sound deployment plan. The CMMS must meet the needs, constraints, and opportunities of the business and be implemented in a way that users will welcome the technology and have a vision for the benefits it brings. Proper configuration, testing, and training cannot be over emphasized when bringing a new CMMS or upgrading an existing system to an organization. Q4.â€Å"Excel is a versatile spreadsheet package. It can do wonder for accountants†. Explain. Excel spreadsheets are the most common and indispensable tool used by accountants, enabling them to analyse, report and share financial information. Much of this can be accomplished using only a fraction of the wealth of functions and options within the Excel program. Basic arithmetic, the SUM() function and some cell border formatting will let you produce useful models and perform some quite complex calculations. By expanding your knowledge with just a few other functions, Excel can become a much more versatile tool. Very occasionally Excel does not contain a function that you may expect, and it is necessary to combine other functions to perform tasks such as calculating weighted averages. Accountants have a professional responsibility to present accurate data. The IF() and TEXT() functions are essential for incorporating error checking messages to demonstrate that the spreadsheet models have been reconciled and are performing properly. A spreadsheet presentation gives reports a degree of unearned credibility. This is frequently ill-deserved and research shows that a high proportion of large models contain critical errors. Your spreadsheets must be well designed and thoroughly checked If you wish to be selective with your data and only perform calculations on items that meet certain criteria, both Database and Array functions are useful, but SUMPRODUCT() is the most versatile and wonderful alternative. It is able to extract all sorts of values from a table of data and can be used as an alternative to a great many functions. Graphs are a great way to present information, but keep them simple. Don’t get carried away with 3D formats which can make it difficult to read important axis values. If you update a chart on a regular basis, you are very likely to occasionally forget to manually alter any titles which contain period information. It is best to link chart titles to cell contents which can be automatically updated. A popular, modern Financial Management technique is that of balanced scorecards which often incorporate traffic light indicators. Conditional formatting for cell ranges is not only useful for highlighting exceptional or incorrect values but can be used to automatically colour cells to show good or bad performance. In order to report on tables of data with separate columns or rows for each accounting period, the OFFSET() function lets you select data for any single or cumulative period. There are numerous financial functions for performing interest and investment calculations. These can greatly simplify the long formulae previously required for things such as loan repayments – but always beware. The built in functions may perform differently to your own (textbook) formulas. They may invert the sign and show negative results where you expect positive; they may use a base period of p0 where you assume it is p1. Once you have tested the financial functions using a variety of situations and confirmed the results, they make tasks such as calculating the Net Present Value much easier. Finally, it is always helpful to make your models friendly to other users. Protecting or restricting the values that can be placed in cells will prevent unforeseen errors. Drop down boxes are a splendid way of getting values from users and hyperlinks can guide them around your models. By incorporating dates and filenames in default headers and footers, anyone can trace the source of your masterpiece. Q5. What do you understand by Artificial Intelligence? What are the factors that highlighted the need of developing AI? What are the goals of AI. Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. While there are many different definitions, AI textbooks define the field as â€Å"the study and design of intelligent agents. where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956 defines it as â€Å"the science and engineering of making intelligent machines. The field was founded on the claim that a central property of humans, intelligenceâ€â€the sapience of Homo sapiensâ€â€can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism,[8] but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science. AI research is highly technical and specialized, deeply divided into subfields that often fail in the task of communicating with each other Subfields have grown up around particular institutions, the work of individual researchers, and the solution of specific problems, resulting in longstanding differences of opinion about how AI should be done and the application of widely differing tools. The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects. General intelligence (or â€Å"strong AI†) is still among the field’s long term goals. Goals of AI: The long-term goals of AI include finding out what the world is like, understanding it, and changing it, or, in other words, a.empirical study and modelling of existing intelligent systems (mainly human beings); b.theoretical analysis and exploration of possible intelligent systems and possible mechanisms and representations usable by such systems; and c.solving practical problems in the light of (a) and (b), namely: c.1.attempting to deal with problems of existing intelligent systems (e.g., problems of human learning or emotional difficulties) and c.2.designing useful new intelligent or semi intelligent machines. Some people restrict the term `artificial intelligence’ to a subset of this wide-ranging discipline. For example, those who think of it as essentially a branch of engineering restrict it to (c.2). This does not do justice to the full range of work done in the name of AI. In any case, it is folly to try to produce engineering solutions without either studying general underlying principles or investigating the existing intelligent systems on which the new machines are to be modelled or with which they will have to interact. Trying to build intelligent systems without trying to understand general principles would be like trying to build an aeroplane without understanding principles of mechanics or aerodynamics. Trying to build them without studying how people or other animals work would be like trying to build machines without ever studying the properties of any naturally occurring object. The need to study general principles of thought, and the ways in which human beings perceive, think, understand language, etc., means that AI work has to be done in close collaboration with work in psychology, linguistics, and even philosophy, the discipline that examines some of the most general presuppositions of our thought and language. The term `cognitive science’ can also be used to cover the full range of goals specified above, though it too is ambiguous, and some of its more narrow-minded practitioners tend to restrict it to (a) and (c.1).
Thursday, November 7, 2019
Pin the Tale on the Donkey essays
Pin the Tale on the Donkey essays Politics can be a very confusing topic. Different political parties each have different viewpoints on many different issues. On numerous occasions, leaders of the Democrat party have spoken on Saddam Husseins threat level, his capacity to make and use weapons of mass destruction, his support of terrorist organizations, and a course of action to neutralize his threat. These remarks have been made on many separate occasions by many different leaders of the Democrat party. More recently, many Democrats have been saying that they never wanted anything to do with an unjust war, and openly blame President Bush and his administration for not finding any weapons of mass destruction after the invasion of Iraq. A lot of that blame has been directed at any and all members of the Republican Party. As a Republican, I am furious at Democrats who ignore their own leaders waffling on these issues. They are merely trying to pin blame on anyone possible, and will openly change their positions on issues to do so. Support of political candidates leading up to the 2004 election is one large reason for these dramatic changes of opinion. In February 2002 Al Gore supported President Bushs choice to use force in Iraq. "Since the State of the Union, there has been much discussion of whether Iraq, Iran and North Korea truly constitute an "Axis of Evil." As far as I'm concerned, there really is something to be said for occasionally putting diplomacy aside and laying one's cards on the table. There is value in calling evil by its name. This clearly shows his support of using force as an option to remove a danger. That support of Bush was changed to harsh criticism when Gore spoke at a Howard Dean fundraiser in December 2003. "Our country has been weakened in our ability to fight the war against terror because of the catastrophic mistake that the Bush administration made in taking us into ...
Tuesday, November 5, 2019
Writing a Good Business Essay
Writing a Good Business Essay Here is a short guideline on writing a business essay. For more information contact our writers, please. A Guideline on Writing a Business Essay 1. Analyze the subject. First, it will help you to define the topic and outline. Weve got a good article to help you pick essay topics effectively. Check it out Picking Essay Topics 2. Regardless the scope of the assigned topic, point out: The subject (general sphere of investigation) The limiting words (help you to narrow the subject) Direction words (guide your actions) 3. Plan your writing. 4. Prepare the outline. 5. Develop several perspective structures for presenting the main body of the business essay. After a while, choose the most appropriate and stick to it in the course of the essay. 6. Plan the macrostructure of the essay and then build up the microstructure of every paragraph. 7. Write a detailed outline, pointing out the keywords for each part of the business essay. 8. Write the first draft of the business essay. 9. Give a critical analysis of the assembled data. You must provide reasonable proof of your arguments and support it with the specific examples. In your essay, you must cover opinions for and against the presented argument. Make sure that the subject is discussed logically throughout the business essay. 10. Proofread for punctuation and spelling errors. Our proofreading services might be useful for you.
Sunday, November 3, 2019
Political culture and public opinion, the media Essay
Political culture and public opinion, the media - Essay Example Another influential body towards the public opinion forming is the media. Through the media information about various governments, operations are made available to the citizens and thus resulting in a change in their ideas considering the information relayed. One major attribute of the "new media" age is the ability to facilitate interactions among citizens, public officials, and media personnel through communication technologies (Lasser, 2012). Citizens are now able to share their opinions and play more significant roles in political happenings and also a feel for their political existence is considered an example being call-ins in various televised news programs and thus democracy is not in a crisis. The senate’s handling of the Anita Hill controversy shows that the Congress and its members care less about the public opinion. This is due to the fact many women were shocked as Anita Hill`s allegations were not taken keenly by a Senate that was highly male
Subscribe to:
Posts (Atom)