Saturday, August 31, 2019
Stimulation Review
University of Phoenix Material Simulation Review Paper Review the Analyzing Financial Indicators for Decision Making simulation. Prepare a formal 1,050- to 1,400-word paper describing the decisions you made in the simulation. Specifically address the following: Financial Accounting from a Cardiac Care Hospitalââ¬â¢s Perspective â⬠¢ Bridge a working capital shortage. â⬠¢ Evaluate funding options for acquiring medical equipment. â⬠¢ Evaluate funding options for capital expansion. Phase I: Capital Shortage â⬠¢ Which cost-cutting options did you select? Why? â⬠¢ Which loan option did you select? Why? â⬠¢ What was the outcome of your decision? Phase II: Funding Options for Equipment Acquisition â⬠¢ Which cost-effective equipment selections did you make? Why? â⬠¢ What was the outcome of your decision? Phase III: Funding Options for Capital Expansion â⬠¢ Which source of funding did you select? Why? â⬠¢ What was the outcome of your selection? Summary and Conclusions â⬠¢ What did you learn from this simulation? â⬠¢ What would you do differently if you performed the simulation again? How will you apply what you learned at your current or future job? Support your ideas, analysis, and conclusions with references to scholarly external sources, such as the texts and journal articles. 1. Individual Assignment: Simulation Review â⬠¢ Resource: University of Phoenix Material: Simulation Review Paper and SIMULATIONS: Analyzing Financial Indicators for Decision Makingà Review the Simulation Review Paper docume nt located in the materials section in Week Four on the student Web site. Review the grading criteria located in Week Four on your student website. â⬠¢ Review the Simulation Review Paper and the Analyzing Financial Indicators for Decision Making documents located on the student website. â⬠¢ Write a 1,050- to 1,500-word summary of your choices and the reasons for your choices. â⬠¢ Format your summary consistent with APA guidelines. http://www. oppapers. com/essays/Simulation-Review-Paper/530452? topic
Computer Hardware Essay
I. LECTURE OVERVIEW Foundation Concepts: Computer Hardware, reviews trends and developments in microcomputer, midrange, and mainframe computer systems; basic computer system concepts; and the major types of technologies used in peripheral devices for computer input, output, and storage. Computer Systems ââ¬â Major types of computer systems are summarized in Figure 13.2. A computer is a system of information processing components that perform input, processing, output, storage, and control functions. Its hardware components include input and output devices, a central processing unit (CPU), and primary and secondary storage devices. The major functions and hardware in a computer system are summarized in Figure 13.9 Microcomputer Systems ââ¬â Microcomputers are used as personal computers, network computers, personal digital assistants, technical workstations, and information appliances. Like most computer systems today, microcomputers are interconnected in a variety of telecommunications networks. This typically includes local area networks, client/server networks, intranets and extranets, and the Internet. Other Computer Systems ââ¬â Midrange computers are increasingly used as powerful network servers, and for many multiuser business data processing and scientific applications. Mainframe computers are larger and more powerful than most midsize computers. They are usually faster, have more memory capacity, and can support more network users and peripheral devices. They are designed to handle the information processing needs of large organizations with high volumes of transaction processing, or with complex computational problems. Supercomputers are a special category of extremely powerfu l mainframe computer systems designed for massive computational assignments. II. LEARNING OBJECTIVES Learning Objective â⬠¢ Identify the major types, trends, and uses of microcomputer, midrange and mainframe computer systems. â⬠¢ Outline the major technologies and uses of computer peripherals for input, output, and storage. â⬠¢ Identify and give examples of the components and functions of a computer system. â⬠¢ Identify the computer systems and peripherals you would acquire or recommend for a business of your choice, and explain the reasons for your selections. III. LECTURE NOTES Section 1: Computer Systems: End User and Enterprise Computing INTRODUCTION All computers are systems of input, processing, output, storage, and control components. Technology is evolving at a rapid pace, and new forms of input, output, processing, and storage devices continue to enter the market. Analyzing City of Richmond and Tim Beaty Builders We can learn a lot about innovative business uses of PDAs from this case. Take a few minutes to read it, and we will discuss it (See City of Richmond and Tim Beaty Builders in Section IX). TYPES OF COMPUTER SYSTEMS -[Figure 13.2] There are several major categories of computer systems with a variety of characteristics and capabilities. Thus, computer systems are typically classified as: â⬠¢ Mainframe computers â⬠¢ Midrange computers â⬠¢ Microcomputers These categories are attempts to describe the relative computing power provided by different computing platforms or types of computers therefore, they are not precise classifications. Some experts predict the merging or disappearance of several computer categories. They feel that many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks of microcomputers and servers. Most recently, someà industry experts have predicted that the emergence of network computers and information appliances for applications on the Internet and corporate intranets will replace many personal computers, especially in large organisations and in the home computer market. MICROCOMPUTER SYSTEMS Microcomputers are the smallest but most important categories of computers systems for business people and consumers. They are also referred to as personal computers (or PCs). The computing power of current microcomputers exceeds that of the mainframe computers of previous generations at a fraction of their cost. They have become powerful-networked professional workstations for use by end users in business. Microcomputersà categorised by size 1. Handheld 2. Notebook 3. Laptop 4. Portable 5. Desktop 6. Floor-standing Microcomputersà categorised by use 1. Home 2. Personal 3. Professional 4. Workstation 5. Multi-user Systems Microcomputersà categorised by special purpose 1. Workstation Computers 2. Network Servers 3. Personal Digital Assistants Workstation Computers ââ¬â some microcomputers are powerful workstationà computers (technical work stations) that support applications with heavy mathematical computing and graphics display demands such as computeraided design (CAD) in engineering, or investment and portfolio analysis in the securities industry. Network Servers ââ¬â are usually more powerful microcomputers that co-ordinate telecommunications and resourceà sharing in small local area networks (LANs), and Internet and intranet websites. This is the fastest growing microcomputer application category. Network Computers: â⬠¢ Network Computers (NCs) are a major new microcomputer category designed primarily for use with the Internet and corporate intranets by clerical workers, operational employees, and knowledge workers with specialised or limited computing applications. In-between NCs and full-featured PCs are stripped-down PCs known as NetPCs or legacy-free PCs. NetPCs are designed for the Internet and a limited range of applications within a company. Examples are: Dellââ¬â¢s Webpc, Compaqââ¬â¢s IPaq, HPââ¬â¢s e-PC, and eMachineââ¬â¢s eOne. Network computers (also called thin clients) are low-cost, sealed, networked microcomputers with no or minimal disk storage. Users of network computers depend primarily on Internet and intranet servers for their operating system and web browser, Java-enabled application software, and data access and storage. Main attractions of network computers over full-featured PCs are their low cost to: â⬠¢ Purchase â⬠¢ Upgrade â⬠¢ Maintenance â⬠¢ Support Other benefits to businesses include: â⬠¢ Ease of software distribution and licensing â⬠¢ Computing platform standardisation â⬠¢ Reduced end user support requirements â⬠¢ Improved manageability through centralised management and enterprisewide control of computer network resources. Information Appliances The market is offering a number of gadgets and information appliances that offer users the capability to perform enable host of basic computational chores. Examples of some information appliances include: â⬠¢ Personal Digital Assistants ââ¬â (PDAs) are designed for convenient mobile communications and computing. PDAs use touch screens, pen-based handwriting recognition, or keyboards to help mobile workers send and receive E-mail, access the Web, and exchange information such as appointments, to-do lists, and sales contacts with their desktop PCs or web servers. â⬠¢ Set-top boxes and video-game consoles that connect to home TV sets. These devices enable you to surf the Web or send and receive E-mail and watch TV programs or play video games at the same time. â⬠¢ Wireless PDAs and cellular and PCS phones and wired telephone-based appliances that can send and receive E-mail and access the Web. Computer Terminals Computer terminals are undergoing a major conversion to networked computer devices. For example: â⬠¢ Dumb terminals are keyboard/video monitor devices with limited processing capabilities, to intelligent terminals, which are modified networked PCs, network computers or other microcomputer-powered network devices. Intelligent terminals can perform data entry and some information processing tasks independently. â⬠¢ Networked terminals which may be Windows terminals that are dependent on network servers for Windows software, processing power, and storage, or Internet terminals, which depend on Internet or intranet website servers for their operating systems and application software. â⬠¢ Transaction terminals are a form of intelligent terminal. Uses can be found in banks retail stores, factories, and other work sites. Examples are ATMââ¬â¢s, factory production recorders, and POS terminals. MIDRANGE COMPUTER SYSTEMS Midrange computers, including minicomputers and high-end network servers, areà multi-user systems that canà manage networks of PCs and terminals. Characteristics of midrange computers include: â⬠¢ Generally, midrange computers are general-purpose computers that are larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframes. â⬠¢ Cost less to buy, operate, and maintain than mainframe computers. â⬠¢ Have become popular as powerful network servers to help manage large Internet websites, corporate intranets and extranets, and client/server networks. â⬠¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. â⬠¢ Data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. â⬠¢ First became popular as minicomputers for scientific research, instrumentation systems, engineering analysis, and industrial process monitoring and control. Minicomputers could easily handle such uses because these applications are narrow in scope and do not demand the processing versatility of mainframe systems. â⬠¢ Serve as industrial process-control and manufacturing plant computers and they play a major role in computeraided manufacturing (CAM). â⬠¢ Take the form of powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications. â⬠¢ Are used as front-end computers to assist mainframe computers in telecommunications processing and network management. â⬠¢ Can function in ordinary operating environments (do not need air conditioning or electrical wiring). â⬠¢ Smaller models of minicomputers do not need a staff of specialists to operate them. MIDRANGE COMPUTER APPLICATIONS Serve as industrial process-control and manufacturing plant computers. Play a major role in computer-aided manufacturing (CAM). Serve as powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications Serve as front-end computers to assist mainframe computers in telecommunications processing and network management. Midrange Computer as Network Server: â⬠¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. â⬠¢ Other applications, like data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. â⬠¢ Serve as powerful network servers to help manage large Internet web sites, corporate Intranets and extranets, and client/server networks MAINFRAME COMPUTER SYSTEMS Mainframe computers are large, fast, and powerful computer systems. Characteristics of mainframe computers include: â⬠¢ They are physically larger and more powerful than micros and minis. â⬠¢ Can process hundreds of millions of instructions per second (MIPS). â⬠¢ Have large primary storage capacities. Main memory capacity can range from hundreds of megabytes to many gigabytes of primary storage. â⬠¢ Mainframes have slimmed down drastically in the last few years, dramatically reducing air-conditioning needs, electronic power consumption, and floor space requirements, and thus their acquisition and operating costs. â⬠¢ Sales of mainframes have increased due to cost reductions and the increaseà in applications such as data mining and warehousing, decision support, and electronic commerce. Mainframe Computer Applications: â⬠¢ Handle the information processing needs of major corporations and government agencies with many employees and customers. â⬠¢ Handle enormous and complex computational problems. â⬠¢ Used in organisations processing great volumes of transactions. â⬠¢ Handle great volumes of complex calculations involved in scientific and engineering analyses and simulations of complex design projects. â⬠¢ Serve as superservers for the large client/server networks and high-volume Internet web sites of large companies. â⬠¢ Are becoming a popular business-computing platform for data mining and warehousing, and electronic commerce applications. Supercomputer Systems: The term supercomputer describes a category of extremely powerful computer systems specifically designed for scientific, engineering, and business applications requiring extremely high-speeds for massive numeric computations. Supercomputer Applications: â⬠¢ Used by government research agencies, large universities, and major corporations. â⬠¢ Are used for applications such as global weather forecasting, military defence systems, computational cosmology and astronomy, microprocessor research and design, large scale data mining, large time-sharing networks, and so on. â⬠¢ Use parallel processing architectures of interconnected microprocessors (which can execute many instructions at the same time in parallel). â⬠¢ Can perform arithmetic calculations at speeds of billions of floating-point operations per second (gigaflops). Teraflop (1 trillion floating-point operations per second) supercomputers, which use advanced massively parallelà processing (MPP) designs of thousands of interconnected microprocessors, are becoming available. â⬠¢ Purchase price for large supercomputers are in the $5 million to $50 million range. Mini-supercomputers: The use of symmetric multiprocessing (SMP) and distributed shared memory (DSM) designs of smaller numbers of interconnected microprocessors has spawned a breed of mini-supercomputer with prices that start in the hundreds of thousands of dollars. TECHNICAL NOTE: THE COMPUTER SYSTEM CONCEPTS ââ¬â [Figure 13.9] As a business professional, you do not need a detailed technical knowledge of computers. However, you do need to understand some basic facts and concepts about computer systems. This should help you be an informed and productive user of computer system resources. A computer is a system, an interrelated combination of components that perform the basic system functions of input, processing, output, storage, and control, thus providing end users with a powerful information-processing tool. Understanding the computer as a computer system is vital to the effective use and management of computers. A computer is a system of hardware devices organised according to the following system functions: â⬠¢ Input. Examples of some input devices of a computer system include: 1. Keyboards 2. Touch Screens3. Light Pens 4. Electronic Mice 4. Optical Scanners 5. Voice Input They convert data into electronic machine-readable form for direct entry or through a telecommunications network into a computer system. Processing. The central processing unit (CPU) is the main processing component of a computer system. (In microcomputers, it is the main microprocessor). One of the CPUââ¬â¢s major components is the arithmetic-logic unit (ALU) that performs the arithmetic and logic functions required in computer processing. Components of the CPU include: 1. Control Unit 2. Arithmetic-Logic Unit 3. Primary Storage Unit Output. Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users. Examples of output devices include: 1. Video Display Units 2. Audio Response Units 3. Printers Storage. The storage function of a computer system is used to store data and program instructions needed for processing. Storage devices include: 1. Primary Storage Unit (main memory) 2. Secondary Storage Devices (magnetic disk and tape units, optical disks) Control. The control unit of a CPU interprets computer program instructions and transmits directions to the other components of the computer system. Computer Processing Speeds: Operating speeds of computers are measured in a number of ways. For example: â⬠¢ Milliseconds ââ¬â Thousands of a second. Microseconds ââ¬â Millionths of a second. Nanoseconds ââ¬â Billionth of a second Picosecond ââ¬â Trillionth of a second Other terminology used includes: Teraflop ââ¬â used by some supercomputers MIPS ââ¬â Million instructions per second Megahertz (MHz) ââ¬â Millions of cycles per second Gigahertz (GHz) ââ¬â Billions of cycles per second Clock Speed ââ¬â used to rate microprocessors by the speed of their timing circuits and internal clock. Section II: Computer Peripherals: Input, Output, and Storage Technologies INTRODUCTION A computer is just a high-powered ââ¬Å"processing boxâ⬠without peripherals. Your personal computing needs will dictate the components you choose for our particular computing needs. Analyzing United Technologies and Eastman Kodak We can learn a lot about the business value of consolidating computer operations and systems from this case. Take a few minutes to read it, and we will discuss it (See United Technologies and Eastman Kodak in Section IX). PERIPHERALS Peripherals are the generic name for all input, output, and secondary storage devices that are part of a computer system. Peripherals depend on direct connections or telecommunications links to the central processing unit of aà computer system. Thus, all peripherals are online devices, that is, separate from, but can be electronically connected to and controlled by, a CPU. This is the opposite of off-line devices, which are separate from and not under the control of the CPU. INPUT TECHNOLOGY There has been a major trend toward the increased use of input technologies that provide a more natural user interface for computer users. More and more data and commands are being entered directly and easily into computer systems through pointing devices like electronic mice and touch pads, and technologies like optical scanning, handwriting recognition, and voice recognition. POINTING DEVICES Keyboards are still the most widely used devices for entering data and text into computer systems. However, pointing devices are a better alternative for issuing commands, making choices, and responding to prompts displayed on your video screen. They work with your operating systemââ¬â¢s graphical user interface (GUI), which presents you with icons, menus, windows, buttons, bars, and so on, for your selection. Examples of pointing devices include: â⬠¢ Electronic Mouse ââ¬â A device used to move the cursor on the screen, as well as to issue commands and make icon and menu selections. â⬠¢ Trackball ââ¬â A device used to move the cursor on the display screen. Pointing Stick ââ¬â A small buttonlike device, sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Touchpad ââ¬â A small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Touch Screens ââ¬â A device that accepts data input by the placement of a finger on or close to the CRT screen. PEN-BASED COMPUTING Pen-based computing technologies are being used in many hand-held computers and personal digital assistants. These small PCs and PDAs contain fast processors and software that recognises and digitises handwriting, hand printing, and hand drawing. They have a pressure-sensitive layer like a graphics pad under their slatelike liquid crystal display (LCD) screen. A variety of penlike devices are available: Digitizer Pen ââ¬â A photoelectronic device that can be used as a pointing device, or used to draw or write on a pressure-sensitive surface of a graphics tablet. Graphics Tablet ââ¬â A device that allows an end user to draw or write on a pressure-sensitive tablet and has their handwriting or graphics digitised by the computer and accepted as input. SPEECH RECOGNITION SYSTEMS Speech recognition and voice response (in their infancy) promise to be the easiest method of data entry, word processing, and conversational computing, since speech is the easiest, most natural means of human communication. Speech recognition systems analyse and classify speech or vocal tract patterns and convert them into digital codes for entry into a computer system. Early voice recognition products used discrete speech recognition, where you had to pause between each spoken word. New continuous speech recognition (CSR) software recognises controlled, conversationally paced speech. Examples of continuous speech recognition software include: â⬠¢ NaturallySpeaking by Dragon Systems â⬠¢ ViaVoice by IBM â⬠¢ VoiceXpress by Lernout & Hauspie â⬠¢ FreeSpeech by Philips Areas where speech recognition systems are used include: â⬠¢ Manufacturers use it for inspection, inventory, and quality control â⬠¢ Airlines and parcel delivery companies use it for voice-directed sorting of baggage and parcels â⬠¢ Voice activated GPS systems are being used in advanced car design â⬠¢ Physicians use it to enter and printout prescriptions â⬠¢ Gemmologists use it to free up their hands when inspecting and grading precious stones â⬠¢ Handicapped individuals use voice-enabled software to operate their computers, e-mail, and surf the World Wide Web. Speaker-independent voice recognition systems allow a computer to understand a few words from a voice it has never heard before. They enable computers to respond to verbal and touch-tone input over the telephone. Examples include: â⬠¢ Computerized telephone call switching â⬠¢ Telemarketing surveys â⬠¢ Bank pay-by-phone bill-paying services â⬠¢ Stock quotations services â⬠¢ University registration systems â⬠¢ Customer credit and account balance inquiries OPTICAL SCANNING Optical scanning devices read text or graphics and convert them into digital input for a computer. Optical scanning enables the direct entry of data from source documents into a computer system. Popular uses of optical scanning include: â⬠¢ Scanning pages of text and graphics into your computer for desktop publishing and web publishing applications. â⬠¢ Scan documents into your system and organize them into folders as part of a document management library system for easy reference or retrieval.à There are many types of optical scanners, but they all employ photoelectric devices to scan the characters being read. Reflected light patterns of theà data are converted into electronic impulses that are then accepted as input into the computer system. Optical scanning technology known as optical character recognition (OCR) can read special-purpose characters and codes. OCR scanners are used to read characters and codes on: à Merchandise tags Product labels Credit card receipts Utility bills Insurance premiums Airline tickets Sort mail Score tests Process business and government forms Devices such as handheld optical scanning wands are used to read OCR coding on merchandise tags and other media. Many business applications involve reading bar code, a code that utilises bars to represent characters. One common example is the Universal Produce Code (UPC) bar coding that you see on packages of food items and many other products. OTHER INPUT TECHNOLOGIES Magnetic stripe technology is a familiar form of data entry that helps computers read credit cards. The dark magnetic stripe on the back of such cards is the same iron oxide coating as on magnetic tape. Smart cards that embed a microprocessor chip and several kilobytes of memory into debit, credit, and other cards are popular in Europe, and becoming available in the United States. Digital cameras and digital video cameras enable you to shoot, store, and download still photos or full motion video with audio into your PC. Magnetic ink character recognition (MICR) is machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. OUTPUT TECHNOLOGIES Computers provide information in a variety of forms. Video displays and printed documents have been, and still are, the most common forms of output from computer systems. But other natural and attractive output technologies such as voice response systems and multimedia output are increasingly found along with video displays in business applications. VIDEO OUTPUT Video displays are the most common type of computer output. Most desktop computers rely on video monitors that use cathode ray tube (CRT) technology. Usually, the clarity of the video display depends on the type of video monitor you use and the graphics circuit board installed in your computer. A high-resolution, flicker-free monitor is especially important if you spend a lot of time viewing multimedia on CDs or the Web, or complex graphical displays of many software packages. The biggest use of liquid crystal displays (LCDs) is to provide a visual display capability for portable microcomputers and PDAs. LCD displays need significantly less electric current and provide a thin, flat display. Advances in technology such as active matrix and dual scan capabilities have improved the color and clarity of LCD displays. PRINTED OUTPUT After video displays, printed output is the most common form of output displays. Most personal computer systems rely on inkjet or laser printers to produce permanent (hard copy) output in high-quality printed form. Printed output is still a common form of business communications, and is frequently required for legal documentation. â⬠¢ Inkjet printers ââ¬â Spray ink onto a page one line at a time. They are popular, low-cost printers for microcomputer systems. They are quiet, produce several pages per minute of high-quality output, and can print both black-and-white and high-quality colour graphics. Laser Printers ââ¬â Use an electrostatic process similar to a photocopying machine to produce many pages per minute of high-quality black-and-white output. More expensive colour laser printers and multifunction inkjet and laser models that print, fax, scan, and copy are other popular choices for business offices. STORAGE TRADE-OFFS Data and information need to be stored after input, during processing, and before output. Computer-based information systems rely primarily on the memory circuits and secondary storage devices of computer systems to accomplish the storage function. Major trends in primary and secondary storage methods: â⬠¢ Progress in very-large scale integration (VLSI), which packs millions of memory circuit elements on tiny semiconductor memory chips, are responsible for continuing increases in the main-memory capacity of computers. â⬠¢ Secondary storage capacities are also expected to escalate into the billions and trillions of characters, due primarily to the use of optical media.à Storage Trade-offs: Speed, capacity, and cost relationships. â⬠¢ Note the cost/speed/capacity trade-offs as one moves from semiconductor memories to magnetic media, such as magnetic disks and tapes, to optical disks. â⬠¢ High-speed storage media cost more per byte and provide lower capacities. â⬠¢ Large capacity storage media cost less per byte but are slower â⬠¢ Semiconductor memories are used mainly for primary storage, though they are sometimes used as high-speed secondary storage devices. â⬠¢ Magnetic disk and tape and optical disk devices are used as secondary storage devices to greatly enlarge the storage capacity of computer systems. â⬠¢ Most primary storage circuits use RAM (random access memory) chips, which lose their contents when electrical power is interrupted â⬠¢ Secondary storage devices provide a more permanent type of storage media for storage of data and programs. Computer Storage Fundamentals: [Figure 13.20] Data is processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the computerââ¬â¢s circuitry in the media it uses. This is called a ââ¬Å"two-stateâ⬠or binary representation of data, since the computer and media can exhibit only two possible states or conditions ââ¬â ON (1) or OFF (0). Computer storage elements: â⬠¢ Bit ââ¬â is the smallest element of data, (binary digit) which can have a value of zero or one. The capacity ofà memory chips is usually expressed in terms of bits. Byte ââ¬â is the basic grouping of bits that the computer operates as a single unit. It typically consists of 8 bits and is used to represent one character of data in most computer coding schemes (e.g. 8 bits = 1 byte). The capacity of a computerââ¬â¢s memory and secondary storage devices is usually expressed in terms of bytes. ASCII (American Standard Code for Information Interchange) EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced: EB SEE DICK Storage capacities are frequently measured in: Kilobyte = 1,000 bytes Megabyte = 1,000,000 bytes Gigabyte = 1,000,000,000 bytes Terabyte = 1,000,000,000,000 bytes Petabyte = 1,000,000,000,000,000 bytes Exabyte = 1,000,000,000,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes Yottabyte = 1,000,000,000,000,000,000,000,000 bytes Direct and Sequential Access â⬠¢ Direct Access ââ¬â Primary storage media such as semiconductor memory chips are called direct access or random access memories (RAM). Magnetic disk devices are frequently called direct access storage devices (DASDs). The terms direct access and random access describe the same concept. They mean that an element of data or instructions can be directly stored and retrieved by selecting and using any of the locations on the storage media. They also mean that each storage position (1) has a unique address and (2) can be individually accessed in approximately the same length of time without having to search through other storage positions. Sequential Access ââ¬â sequential access storage media such as magnetic tape do not have unique storage addresses that can be directly addressed. Instead, data must be stored and retrieved using a sequential or serial process. Data are recorded one after another in a predetermined sequence on a storage medium. Locating an individual item of data requires searching much of the recorded data on the tape until the desired item is located. SEMICONDUCTOR MEMORY The primary storage (main memory) on most modern computers consists of microelectronic semiconductor memory circuits. Plug-in memory circuit boards containing 32 megabytes or more of memory chips can be added to your PC to increase its memory capacity. Specialized memory can help improve your computerââ¬â¢s performance. Examples include: â⬠¢ External cache memory of 512 kilobytes to help your microprocessor work faster â⬠¢ Video graphics accelerator cards with 16 megabytes of RAM are used for faster and clearer video performance â⬠¢ Removable credit-card-size and smaller ââ¬Å"flash memoryâ⬠RAM cards provide several megabytes of erasable direct access storage for PDAs or hand-held PCs. Some of the major attractions of semiconductor memory are: â⬠¢ Small size â⬠¢ Fast speed â⬠¢ Shock and temperature resistance One major disadvantage of most semiconductor memory is: â⬠¢ Volatility ââ¬â Uninterrupted electric power must be supplied or the contents of memory will be lost (except withà read only memory, which is permanent). There are two basic types of semiconductor memory: â⬠¢ Random Access Memory (RAM) ââ¬â these memory chips are the most widely used primary storage medium. Each memory position can be both read and written, so it is also called read/write memory. This is a volatile memory. â⬠¢Ã Read Only Memory (ROM) ââ¬â Non-volatile random access memory chips are used for permanent storage. ROM can be read but not erased or overwritten. Instructions and programs in primary storage can be permanently ââ¬Å"burned inâ⬠à to the storage cells during manufacturing. This permanent software is also called firmware. Variations include PROM (programmable read only memory) and EPROM (erasable programmable read only memory), which can be permanently or temporarily programmed after manufacture. MAGNETIC DISK STORAGE These are the most common forms of secondary storage for modern computer systems. Thatââ¬â¢s because they provide fast access and high storage capacities at a reasonable cost. Characteristics of magnetic disks: â⬠¢ Disk drives contain metal disks that are coated on both sides with an iron oxide recording material. â⬠¢ Several disks are mounted together on a vertical shaft, which typically rotates the disks are speeds of 3,600 to 7,600 revolutions per minute (rpm) â⬠¢ Access arms between the slightly separated disks to read and write data on concentric, circular tracks position electromagnetic read/write heads. â⬠¢ Data are recorded on tracks in the form of tiny magnetized spots to form the binary digits of common computer codes. â⬠¢ Thousands of bytes can be recorded on each track, and there are several hundred data tracks on each disk surface, which provides you with billions of storage positions for software and data. Types of Magnetic Disks There are several types of magnetic disk arrangements, including disk cartridges as well as fixed disk units. Removable disk devices are popular because they are transportable and can be used to store backup copies of your data off-line for convenience and security. Floppy Disks, or magnetic disks, consist of polyester film disks covered with an iron oxide compound. A single disk is mounted and rotates freely inside a protective flexible or hard plastic jacket, which has access openings to accommodate the read/write head of a disk drive unit. The 3-1/2-inch floppy disk, with capacities of 1.44 megabytes, is the most widely used version, with a newer Superdisk technology offering 120 megabytes of storage. Hard Disk Drives combine magnetic disks, access arms, and read/write heads into a sealed module. This allows higher speeds, greater data-recording densities,à and closer tolerances within a sealed, more stable environment. Fixed or removable disk cartridge versions are available. Capacities of hard drives range from several hundred megabytes to many gigabytes of storage. RAID Storage Disk arrays of interconnected microcomputer hard disk drives have replaced large-capacity mainframe disk drives to provide many gigabytes of online storage. Known as RAID (redundant arrays of independent disks), they combine from 6 to more than 100 small hard disk drives and their control microprocessors into a single unit. Advantages of RAID disks include: â⬠¢ Provide large capacities with high access speeds since data is accessed in parallel over multiple paths from many disks. â⬠¢ Provide fault tolerant capability, since their redundant design offers multiple copies of data on several disks. If one disk fails, data can be recovered from backup copies automatically stored on other disks. â⬠¢ Storage area networks (SANs) are high-speed fibre channel local area networks that can interconnect many RAID units and share their combined capacity through network servers for many users. MAGNETIC TAPE STORAGE Magnetic Tape is still being used as a secondary storage medium in business applications. The read/write heads of magnetic tape drives record data in the form of magnetised spots on the iron oxide coating of the plastic tape. Magnetic tape devices include tape reels and cartridges in mainframes and midrange systems, and small cassettes or cartridges for PCs. These devices serve as slower, but lower cost, storage to supplement magnetic disks to meet massive data warehouse and other business storage requirements. Other major applications for magnetic tape include long-term archival storage and backup storage for PCs and other systems. OPTICAL DISK STORAGE Optical disk storage involves technology, which is based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. â⬠¢Ã CD-ROM ââ¬â A common type of optical disk used on microcomputers. They are used for read only storage. Storage is over 600 megabytes per disk. This is equivalent to over 400 1.44-megabyte floppy disks or 300,000 double-spaced pages of text. Data are recorded as microscopic pits in a spiral track, and are read using a laser device. Limitation: Recorded data cannot be erased â⬠¢Ã CD-R ââ¬â (Compact disk recordable) is another optical disk technology. It enables computers with CD-R disk drive units to record their own data once on a CD, and then be able to read the data indefinitely. Limitation: Recorded data cannot be erased â⬠¢Ã CD-RW ââ¬â (CD-rewritable) optical disk systems have now become available which record and erase data by using a laser to heat a microscopic point on the diskââ¬â¢s surface. In CD-RW versions using magneto-optical technology, a magnetic coil changes the spotââ¬â¢s reflective properties from one direction to another, thus recording a binary one to zero. A laser device can then read the binary codes on the disk by sensing the direction of reflected light. â⬠¢Ã DVD ââ¬â (Digital Video Disk or Digital Versatile Disk) can hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. The large capacities and high- quality images and sound of DVD technology are expected to eventually replace CD-ROM and CD-RW technologies for data storage, andà promise to accelerate the use of DVD drives for multimedia products that can be used in both computers and home entertainment systems. â⬠¢ DVD-ROM is beginning to replace magnetic tape videocassettes for movies and other multimedia products. â⬠¢ DVD ââ¬â RAM is being used for backup and archival storage data and multimedia files. Business Applications One of the major uses of optical disks in mainframe and midrange systems is in image processing, where longterm archival storage of historical files of document images must be maintained. Mainframe and midrange computer versions of optical disks use 12-inch plastic disks with capacities of several gigabytes, with up to 20 disks held in jukebox drive units. WORM ââ¬â (Write Once, Read Many) versions of optical disks are used to store data on the disk. Although data can only be stored once, it can be read an infinite number of times. One of the major business uses of CD-ROM disks for personal computers is to provide a publishing medium for fast access to reference materials in a convenient, compact form. These include: â⬠¢ Catalogs â⬠¢ Directories â⬠¢ Manuals â⬠¢Ã Periodical abstracts â⬠¢Ã Part listings â⬠¢Ã Statistical databases of business activity and economic activity Interactive multimedia applications in business, education, and entertainment using CD-ROM and DVD disks. Optical disks have become a popular storage medium for image processing and multimedia business applications and they appear to be a promising alternative to magnetic disks and tape for very large mass storage capabilities for enterprise computing systems. However, rewritable optical technologies are still being perfected. Also, most optical disk devices are significantly slower and more expensive (per byte of storage) than magnetic disk devices. So optical disk systems are not expected to displace magnetic disk technology in the near future for most business applications. IV. KEY TERMS AND CONCEPTS ââ¬â DEFINED Binary Representation: Pertaining to the presence or absence of electronic or magnetic ââ¬Å"signalsâ⬠in the computerââ¬â¢s circuitry or in the media it uses. There are only two possible states or conditions ââ¬â presence or absence. Central Processing Unit (CPU): The unit of a computer system that includes the circuits that controls the interpretation and execution of instructions. In many computer systems, the CPU includes the arithmetic-logic unit, the control unit, and primary storage unit. Computer System: Computer hardware as a system of input, processing, output, storage, and control components. Thus a computer system consists of input and output devices, primary and secondary storage devices, the central processing unit, the control unit within the CPU, and other peripheral devices. Computer Terminal: Any input/output device connected by telecommunications links to a computer. Digital Cameras: Digital still cameras and digital video cameras enable you to shoot, store, and download still photos or full-motion video with audio in your PC. Direct Access: A method of storage where each storage position has a unique address and can be individually accessed in approximately the same period of time without having to search through other storage positions. Information Appliance: Devices for consumers to access the Internet. Laptop Computer: A small portable PC. Liquid Crystal Displays (LCD): Electronic visual displays that form characters by applying an electrical charge to selected silicon crystals. Magnetic Disk Storage: Data storage technology that uses magnetised spots on metal or plastic disks. Magnetic Disk Storage ââ¬â Floppy Disk: Small phonograph record enclosed in a protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability for microcomputer systems. Magnetic Disk Storage ââ¬â Hard Disk Secondary storage medium; generally nonremovable disks made out of metal and covered with a magneticà recording surface. It holds data in the form of magnetised spots. Magnetic Disk Storage ââ¬â RAID Redundant array of independent disks. Magnetic disk units that house many interconnected microcomputer hard disk drives, thus providing large, fault tolerant storage capacities. Magnetic Ink Character Recognition (MICR): The machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. Magnetic Stripe: A magnetic stripe card is a plastic wallet-size card with a strip of magnetic tape on one surface; widely used for credit/debit cards. Magnetic Tape: A plastic tape with a magnetic surface on which data can be stored by selective magnetisation of portions of the surface. Mainframe Computer: A larger-size computer system, typically with a separate central processing unit, as distinguished from microcomputer and minicomputer systems. Microcomputer: A very small computer, ranging in size from a ââ¬Å"Computer on a chipâ⬠to a small typewriter-size unit. Microprocessor: A semiconductor chip with circuitry for processing data. Midrange Computer: Larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframe computer systems. Minicomputer: A small electronic general-purpose computer. Network Computer: A new category of microcomputer designed mainly for use with the Internet and Intranets on tasks requiring limited or specialised applications and no or minimal disk storage. Network Server: A type of midrange computer used to co-ordinate telecommunications and resource sharing and manages large web sites, Intranets, extranets, and client/server networks. Network Terminal: A terminal that depends on network servers for its software and processing power. Off-line: Pertaining to equipment or devices not under control of the central processing unit. Online: Pertaining to equipment or devices under control of the central processing unit. Optical Character Recognition (OCR): The machine identification of printed characters through the use of light-sensitive devices. Optical Disk Storage: Technology based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. Optical Disk Storage ââ¬â CD-ROM: An optical disk technology for microcomputers featuring compact disks with a storage capacity of over 500 megabytes. Optical Disk Storage ââ¬â CD-R: Compact disk recordable (CD-R) enables computers with CD-R disk drive units to record their own data once on a CD, than be able to read the data indefinitely. Optical Disk Storage ââ¬â CD-RW: Compact disk rewritable (CD-RW) enables computers with CD-RW disk drive units to record and erase data by using a laser to heat a microscopic point on the diskââ¬â¢s surface. Optical Disk Storage ââ¬â DVD: Digital video disk or digital versatile disk (DVD) enables computers with DVD disk drive units to hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. Optical Disk Storage ââ¬â WORM Disk: Optical disk that allows users to write once, read many times. Optical Scanning: Using a device (scanner) that scans characters or images and generates their digital representations. Pen-Based Computing: Tablet-style microcomputers that recognise hand-writing and hand-drawing done by a pen-shaped device on their pressure sensitive display screens. Peripheral Devices: In a computer system, any unit of equipment, distinct from the central processing unit, that provides the system with input, output, or storage capabilities. Personal Digital Assistant: Handheld microcomputer devices, which are designed for convenient mobile communications and computing. Pointing Devices: Devices, which allow end users to issue commands or make choices by moving a cursor on the display, screen. Pointing Device ââ¬â Electronic Mouse: A small device that is electronically connected to a computer and is moved by hand on a flat surface in order to move the cursor on a video screen in the same direction. Buttons on the mouse allow users to issue commands and makeà responses or selections. Pointing Device ââ¬â Pointing Stick: A small buttonlike device sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Pointing Device ââ¬â Touchpad: Is a small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Pointing Device ââ¬â Trackball: A roller device set in a case used to move the cursor on a computerââ¬â¢s display screen. Primary Storage: The main (or internal) memory of a computer. Usually in the form of semiconductor storage. Printers: Devices that produce hard copy output such as paper documents or reports. Secondary Storage: External or auxiliary storage device that supplements the primary storage of a computer. Semiconductor Memory: Microelectronic storage circuitry etched on tiny chips of silicon or other semiconducting material. Semiconductor Memory ââ¬â RAM: Also known as main memory or primary storage; type of memory that temporarily holds data and instructions needed shortly by the CPU. RAM is a volatile type of storage. Semiconductor Memory ââ¬â ROM: Also known as firmware; a memory chip that permanently stores instructions and data that are programmed during the chipââ¬â¢s manufacture. Three variations on the ROM chip are PROM, EPROM, and EEPROM. ROM is a nonvolatile form of storage. Sequential Access: A sequential method of storing and retrieving data from a file. Smart Cards: Cards such as debit and credit cards, which have an embedded microprocessor chip and several kilobytes of memory. Speech Recognition: Direct conversion of spoken data into electronic form suitable for entry into a computer system. Promises to be the easiest, most natural way to communicate with computers. Storage Capacity Elements: Units used for storage capacity and data: bits, bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB). Storage Capacity Elements ââ¬â Bit: A contraction of ââ¬Å"binary digitâ⬠. It can have the value of either 0 or 1. Storage Capacity Elements ââ¬â Byte: A sequence of adjacent binary digits operated on as a unit and usually shorter than a computer word. In many computer systems, a byte is a grouping of eight bits that can represent one alphabetic or special character or can be ââ¬Å"packedâ⬠with two decimal digits. Storage Capacity Elements ââ¬â Kilobyte (K or KB): When referring to computer storage capacity it is equivalent to 2 to the 10th power, or 1,014 in decimal notation. Storage Capacity Elements ââ¬â Megabyte (MB): One million bytes. More accurately, 2 to the 20th power, 1,048,576 in decimal notation. Storage Capacity Elements ââ¬â Gigabyte (GB): One billion bytes. More accurately, 2 to the 30th power, or 1,073,741,824 in decimal notation. Storage Capacity Elements ââ¬â Terabyte (TB): One trillion bytes. More accurately, 2 to the 40th power, or 1,009,511,627,776 in decimal notation. Storage Media Trade-offs: The trade-offs in cost, speed, and capacity of various storage media. Supercomputer: A special category of large computer systems that are the most powerful available. They are designed to solve massive computational problems. Time Elements: Units used for measuring processing speeds: milliseconds, microseconds, nanoseconds, and picoseconds. Time Elements ââ¬â Millisecond: A thousandth of a second. Time Elements ââ¬â Microsecond: A millionth of a second. Time Elements ââ¬â Nanosecond: One billionth of a second. Time Elements ââ¬â Picosecond: One trillionth of a second. Touch-Sensitive Screen: An input device that accepts data input by the placement of a finger on or close to the CRT screen. Transaction Terminals: Terminals used in banks, retail stores, factories, and other work sites that are used to capture transaction data at their point of origin. Examples are point-of-sale (POS) terminals and automated teller machines (ATMs). Video Output: Video displays are the most common type of computer output. Volatility: Memory (such as electronic semiconductor memory) that loses its contents when electrical power is interrupted. Wand: A handheld optical character recognition device used for data entry by many transaction terminals. Workstation: A computer terminal or micro- or minicomputer system designed to support the work of one person. Also, a highpowered computer to support the work of professionals in engineering, science, and other areas that require extensive computing power and graphics capabilities. V. DISCUSSION QUESTIONS Do you agree with the statement: ââ¬Å"The network is the computerâ⬠? à What trends are occurring in the development and use of the major types of computer systems? Do you think that network computers (NCs) will replace personal computers (PCs) in business applications? Are networks of PCs and servers making mainframe computers obsolete? à Whatà trends are occurring in the development and use of peripheral devices? Why are those trends occurring? When would you recommend the use of each of the following: à Network computers NetPCs Network terminals Information appliances in business applications What processor, memory, magnetic disk storage, and video display capabilities would you require for a personal computer that you would use for business purposes? à What other peripheral devices and capabilities would you want to have for your business PC?
Friday, August 30, 2019
Border and Coastal Security
Intellectual property theft is a broad term, which encompasses many actions directed towards intellectual property, including trademark counterfeiting, digital piracy, theft of trade secrets, copyright violation and any form of intellectual property infringement. Actual IP theft involves copyrighted works, patented inventions, and many other things. Despite their intangible nature, they can be stolen in their entirety. Simply put: when a pirate steals a sound recording, a computer program, or the chemical composition of a pharmaceutical ââ¬â he has stolen the product.The pirated product may or may not have the quality of the legitimate product, but the inventiveness, the creativity, and the research costs that make the product unique have been stolen. Technological advances have made actual theft the fastest-growing type of commercial counterfeiting. With the advent of digital technology, pirates can make actual copies of computer software, recorded music, and motion pictures wit h no loss of quality in successive generations of copies.In contemporary context, copyrights are suffering the greatest losses, in part because of the many new products that have been invented, CDs, DVDs, flash discs and many other products, and because of advances in the means of distribution. Although IP theft, particularly, trademark counterfeiting, was widespread in China throughout the 1990s, the trade dispute that was investigated by the U. S. Trade Representative in 1994-1996 involved works protected by copyright: sound recordings, computer software, and motion pictures.The distribution of works protected by copyright has been revolutionized by the invention of cable television, which involves satellite transmission, and by the Internet, which can involve the digital transmission of copyrighted works such as computer programs, video games, and sound recordings. Previously, the piracy of copyrighted works required the possession of a legitimate product in a fixed or tangible f orm (i. e. , a book or a music cassette), but these technological advances in the commercial distribution of copyrighted works have offered new avenues for product piracy in intangible form (i.e. , cable programming). Cable piracy, also called signal theft, involves the actual theft of copyrighted material. The cable pirate, who hooks up illegally, is stealing television programming, which is protected by copyright. In the United States, an estimated one in four cable viewers does so illegally; the problem is worse outside the United States, where entire countries engage in signal theft. The ultimate triumph of digital technology is the Internet, where everyone is connected to a cyber universe by computer, DSL modem or broadband.The Internet offers perhaps the ultimate avenue for a counterfeiter, who can e-mail a pirated computer program or music recording anywhere in the world, and keep his identity a secret. The adequate enforcement of IP violations is probably the most effective way to prevent infringement of intellectual property rights. Since from commercial standpoint intellectual property usually represents the core of any business, the IP violations result in enormous financial losses for the companies and threaten the existence of businesses overall.For instance, according to figures presented by the U. S. Department of Justice, companies suffered $250 Billion in IP Theft in 2004 (CypherTrust, 2005), therefore, it is evident that the further enforcement directed towards IP theft should be continued. 2) Fully discuss Executive Order 13133. How can the use or misuse of the Internet affect the economy? Executive Order 13133 attempts to create new ways to censor Internet content, establish control over Internet transactions and prevent Internet fraud.The core of the Order is embedded in three tasks put before the Working group, namely define how effective Federal regulation is in investigation and prosecution of unlawful conduct that involves the use of t he Internet, what technology tools, capabilities, or legal authorities needed for effective investigation and prosecution of unlawful conduct that involves the use of the Internet, and finally and what tools and capabilities exist to educate and empower parents, teachers, and others to prevent or to minimize the risks from unlawful conduct that involves the use of the Internet.In other words, Executive Order 13133 aims to accomplish an extremely challenging task of Internet regulation. From the critical standpoint, Internet regulation is a hardly achievable mission, because unlike many other phenomena, Internet has no geographic boundaries, and thus it does not have formal geographical jurisdiction upon it. On the other hand, Internet exhibits the line of unlawful, unethical and fraudulent practices, which should be either heavily regulated or banned.It includes child pornography, illegal distribution of copyrighted materials, such as books, CDs, DVDs, Mp3s, computer software, etc a nd illegal credit card transactions cased by identity theft. Practically, the misuse of Internet results in significant financial losses for the national economy in several ways, namely due to numerous copyright infringement instances, fraudulent credit card transactions and losses coming from unrealized revenues.According to Forrester Research, an estimated $15 billion in E-commerce revenues for 2001 were unrealized because of consumers' concerns about their privacy, while 61 percent of Internet users in the United States reported that they do not purchase online because of privacy concerns (Hemphill, 2001:51). Therefore, the task put for the working group in Executive Order 13133 is practically challenging, but still necessary from security, financial and ethical viewpoints.References Intellectual Property Theft Has Never Been Easier (2005). CypherTrust, Inc. Available at < http://www. ciphertrust. com/resources/articles/articles/intellectual. php> Retrieved on June 7, 2006 Hemphi ll, T. A. (2001). Identity Theft: A Cost of Business? Business and Society Review, 106 (1): 51-63
Thursday, August 29, 2019
Analysis of the Problems of XYZ Company Assignment
Analysis of the Problems of XYZ Company - Assignment Example Herein, it should be noted that the XYZ Company is a well-known company in the food manufacturing industry. The company is having the number of employees working in it. There are several departments within the company. However, the information technology department needs some improvement for that this Yardstick report will provide the solution. In order to improve the information technology security system to keep the confidential information of the company in safe hands, it is necessary that the IT security system should be strong enough. For this, it is possible that the XYZ Company can hire other security service provider company that can help to upgrade their IT security system. As there are different types of risks involved such as the hacker attack, lack of physical security, and risks from internal employees (Whitman & Mattord, 2010). Therefore, a strong IT security system can be the best solution for the XYZ Company. The internal employees are responsible to keep the information confidential. However, to keep the information confidential from vendors it is necessary that the employees use software and never share their passwords with any other person. Moreover, it can be said that the associated threats and vulnerabilities can be dealt with the help solutions such as training programs, control, and monitoring system, checklist, and daily basis reports. For all these services, there are many agencies that are developing specific software for the companies. There are few top agencies that are offering these services. In order to select the final service provider for the company, it must be the best in the field of information technology to the organizations and advises best in the business and provide the best security to the systems. Thus, the XYZ Company is seeking the best network security policy and procedure.
Wednesday, August 28, 2019
Breach of Confidentiality Essay Example | Topics and Well Written Essays - 2000 words
Breach of Confidentiality - Essay Example It is intended to make sure that a person in possession of confidential information only uses it for purposes for which it was transmitted to him in the first place. The law of confidence can - as opposed to copyright, which is only concerned with the protection of the form in which information, idea or thought is expressed - protect the content of the information, idea or thought. The main function of the law of confidentiality, or an action for breach of confidence, is the prevention of the illegitimate use of confidential information by a recipient of information. A good conceptual springboard to the understanding of the justification for the protection extended to those items which fall within the ambit of confidence, is the notion that something which people are prepared to pay for must be worth protecting and therefore ought to be protected. However, the courts will only enforce properly identified rights that fall within recognised categories known to law. Some of the items that are protected under the law of confidence are those which do not consist of any specific intellectual property rights under patent, design and copyright or even trade marks law. Traditionally, this has been classified into personal information, governmental secrets and trade secrets. (Catherine Colston and Kirsty Middleton Modern Intellectual Proprty Law 2nd Edition) Obviously, the information, in order to receive the protection of the law, must be confidential. To be such, it must not be something which is public property or knowledge. Therefore, information which is in the public domain cannot be confidential. However confidential the circumstances of communication, there can be no breach of confidence in revealing to others something which is already common knowledge. For example, an employer cannot restrain his ex-employee from revealing a secret process to his new employer if that secret process has already been patented by the employer prior to the revelation by the ex-employee, for it is by then already in the public domain (Mustad v Dosen [1963] RPC 41). All that is required, however, is relative, and not absolute (as in the case of a patent specification, where novelty is required) secrecy. The information must be information the release of which the owner believes would be injurious to him or of advantage to his rivals and others. The owner must believe the information is confidential or secret, i.e. not already in the public domain. The owner's believe must be reasonable. The information must be judged in the light of the usage and practices of the particular industry concerned. On the other hand, it is equally clear that the mere fact of the publication of information does not detract
Tuesday, August 27, 2019
Define Groupthink Essay Example | Topics and Well Written Essays - 500 words
Define Groupthink - Essay Example In groupthink consensus overrides common sense and inhibits the urge to present critique, unpopular opinion or alternatives to whatever is viewed as the commonly agreed ground (Wikipedia, 2013). In groupthink the urge to remain loyal to the team and maintain cohesion makes the team members to desist from raising alternative solutions or controversial issues. As a result, independent thinking, uniqueness in thought and individual creativity are lost at the expense of cohesion and loyalty to the group. The eventual outcome is poor problem solving and decision-making. The failed team dynamics of the ââ¬Å"in-groupâ⬠presents illusions that the appropriate decisions have been attained. Therefore the ââ¬Ëin-groupââ¬â¢ greatly overrates their decision-making abilities, and excessively downplays the decision-making ability of the ââ¬Ëout-groupââ¬â¢ or opponents. As such, team members tend to think or feel that they are more inclined to making the right decisions and offer better ideas and solutions than people from without the group. This happening often hinders the reception of contribution of ideas from non-group members or other groups (Wikipedia, 2013). This source uses the Swissair collapse and the Bay of Pigs Invasion as examples of events in which groupthink was at play when they took place. In the corporate sector suboptimal and ineffective decision-making may negatively impact on the good performance of any company and cause significant losses. Swissair had been a successful airline to the extent that at times it was referred to as the ââ¬ËFlying Bank (Hermann & Rammal, 2010).ââ¬â¢ However, during this period of success the airline had two symptoms of groupthink (Wikipedia, 2013). These symptoms included the belief in group morality and invulnerability. Additionally, before the collapse fiasco the airlineââ¬â¢s board was significantly reduced and people with expertise were eliminated. The board reduction action contributed to groupthink by leaving behind only
Monday, August 26, 2019
SPSS Analsis for Corporate social performance and results description Assignment - 1
SPSS Analsis for Corporate social performance and results description - Assignment Example We can conclude that the differences between condition Means are likely due to chance and not likely due to the independent variable manipulation. We now check for significance difference in the mean social disclosure between the two groups (B2C and B2B). From the table below, the p-value for Laveneââ¬â¢s test is 0.163 (a value greater than 5% significance level, this means that the variability in the two conditions is about the same we therefore assume equal variances and use the p-value assuming equal variances. The p-value is 0.064 (a value greater than 5% significance level), we fail to reject the null hypothesis and conclude that there is no statistically significant difference between the two conditions (B2C and B2B). We can conclude that the differences between condition Means (for the employee turnover %) are likely due to chance and not likely due to the independent variable manipulation. We now check for significance difference in the mean social disclosure between the two groups (B2C and B2B). From the table below, the p-value for Laveneââ¬â¢s test is 0.026 (a value less than 5% significance level, this means that the variability in the two conditions is different we therefore assume unequal variances and use the p-value assuming equal variances. The p-value is 0.332 (a value greater than 5% significance level), we fail to reject the null hypothesis and conclude that there is no statistically significant difference between the two conditions (B2C and B2B). We can conclude that the differences between condition Means (for the community spend) are likely due to chance and not likely due to the independent variable manipulation. We now check for significance difference in the mean social disclosure between the two groups (B2C and B2B). From the table below, the p-value for Laveneââ¬â¢s test is 0.578 (a value greater than 5% significance level, this means that the variability in the two conditions is about the same we therefore assume
Sunday, August 25, 2019
Financial Markets Assignment Example | Topics and Well Written Essays - 1500 words
Financial Markets - Assignment Example Therefore, it is considerably important that shareholders and financial directors have an excellent understanding of the financial setting in which they conduct their activities. It is important to note that a strong financial environment plays a significant role in economic expansion and prosperity. The many corporations increasing funds to finance investment expenses as well as shareholders saving to gather resources for future expenses require stable financial markets. A rapid improvement in technology has also played a significant role in the expansion of financial markets. It has been made easier to make cross border transactions. The function of trust and in the financial market and institutions cannot be overemphasized. This is for the reason that transactions carried out throughout the financial markets and institutions depend on trust that everyone is up to the good of the other. It is unfortunate that much as technological development and globalization has improved the effi ciency, reports have emerged of extra-large scandals in the financial markets around the globe with the potential of crippling state or global capital raising mechanism as well as dreadful complication on the economy .Scandals in the financial markets such as; The LIBOR incident emerges as one of the worst with the potential of killing the industry. The JPMorgan incident and The Facebook initial public offer. These scandals emerge as the worst with the potential killing of the industry. The thesis of this discussion paper is based on the ââ¬Ëthe effects of technological expansion and globalization on the global financial marketsââ¬â¢ particularly in the London financial market. The following issues will be discussed in the paper. Various aspects of the financial markets such as, What it means and what it does in spurring economic growth. Observable crises within the London financial market with its associations with globalization and technological growth A summary of the key i ssues discussed. Abstract This paper discusses different aspects of financial markets. It has recognized that the strong financial environment promotes economic growth in any state. The financial market also plays a significant role in the economic environment since it enables major firms to obtain funding for facilitating investments. The development in technology, telecommunications and globalization has promoted the growth of financial markets. Indeed, the expansion has taken place in the financial markets within national boundaries and worldwide. The thesis for this paper was that much as technological progress and globalization has promoted in the financial markets, reports have also emerged showing that these instruments have also presented a crisis in equal magnitude and measure. Research in this paper has established that computer glitches have had serious consequences in the London Stock Exchange (LSE) because of network failures or technical challenges. The technical incid ents resulted in the suspension of trade for hours. Globalization has also presented varied threats and risks in the financial markets including the absence of transparency. This has increased cases of assumption among investors. In addition, the financial markets in diverse nations access information differently. This is a danger because it enhances negative choices of investment and a lack of responsiveness among the
Saturday, August 24, 2019
(pretend) Case Study reading Problem Essay Example | Topics and Well Written Essays - 1000 words
(pretend) Case Study reading Problem - Essay Example Juanââ¬â¢s parents had a little formal education back in their home town. This made Juanââ¬â¢s family unable to read or speak the English language. Although Juan was able to learn the basic English grammar and vocabulary at an elementary school based in El Salvador, this was not enough to enable him to speak the English language. Since the school is very much focused in using Spanish language in teaching, Juan was able to learn and speak the Spanish language fluently but not the English language. Based on the entrance exam, Juan received a good test results in Math but not in Science and English subject. This only shows that Juanââ¬â¢s inability to comprehend with the English language is giving him a hard time to cope with his other subjects that are using purely English instructions. Considering that Juan is an ELL student, he is not qualified to take either a remedial program or be placed in a group of students with hearing or speech problem since these two are totally different teaching-and-learning categories. Since Mrs. Bright can speak fluently not only in English but also in Spanish, she started taking Juanââ¬â¢s case as a challenge. Juan is a fast-learner and a smart student who lives near Mrs. Brightââ¬â¢s residence. This made her not consider Juanââ¬â¢s case as a serious matter. Instead, she decided to give Juan a one-on-one tutorial program as a corrective teaching strategy. Since then, Mrs. Bright had to regularly meet Juan during weekends to improve the studentââ¬â¢s ability to speak and read the English language. Upon winning Juanââ¬â¢s trust, Mrs. Bright will start to develop a reading program suitable for his case. Aiming to monitor Juanââ¬â¢s progress and development in reading, the following series of questions will be used to examine Juanââ¬â¢s personal interests and attitude towards in reading. 1. What type of books catches Juanââ¬â¢s interest in reading? Are these books the type with colourful pictures,
Friday, August 23, 2019
Discussion 1 Week 9 Impact of Government Regulation Assignment
Discussion 1 Week 9 Impact of Government Regulation - Assignment Example For Katrinaââ¬â¢s Candies, facts revealed that the decision makers are reflecting on the possibility of expansion, either through capital investment or through merger. As such, it was commendable that different sites and links were provided to assist in the review and evaluation of various options open for Katrinaââ¬â¢s Candies in their decision for potential merger in another country. At the onset, the site on export.gov provided crucial information for U.S. companies which are reflecting on exporting in other countries (Country Commercial Guide, n.d.). Since Katrinaââ¬â¢s Candies signified intentions to expand in the international market, the site could provide them with needed assistance in determining the most appropriate country in the European Union area that would give the most viable opportunity to contribute to the shareholdersââ¬â¢ wealth and profitability in the long run. The assistance could be provided in terms of research assistance on the markets to enter, as well as in determining regulatory requirements for the venture option that has been decided on. The site on ââ¬Å"Doing Business in the European Union: 2011 Country Commercial Guide for U.S. Companiesâ⬠is replete with information which includes trade regulations and standards in chapter 5 that would help organizations, like Katrinaââ¬â¢s Candies, to determine and comply with the needed regulations that would facilitate establishment of a business venture in the European market (Doing Business in the European Union: 2011 Country Commercial Guide for U.S. Companies , n.d.). Another relevant site that was mentioned about government regulations is the official website of the Federal Trade Commission (Federal Trade Commission, n.d.). The information on the site focuses on the premerger notification and reviewing the merger process. As such, for Katrinaââ¬â¢s Candies growth prospects of venturing into a
Subscribe to:
Posts (Atom)