Wednesday, September 11, 2019

The Bottom of the Pyramid Essay Example | Topics and Well Written Essays - 1750 words

The Bottom of the Pyramid - Essay Example Prahalad together with Hart have put forward an opinion that the largest part of the economic market, the fourth and the often forgotten tier has long been hidden in the depths of the marketplace. This tier has never been acknowledged as potential generators of wealth and as a source of innovation by research and development entities (2002). However, this often forgotten, bottom of the social hierarchy, fourth sector has its own set of treasures (Bendell 2005, Viscio and Pasternack 1996). The poor have within them the basic cultural knowledge for innovation and their knowledge of environmental sustainability is quite intimate (Pralahad and Hart 2002). Hence a more full-fledged engagement of this sector within the economy both as producers and consumers will result to a responsible society, marketing strategies that are culturally perceptive and overall will yield a healthy economy. Through these yields the fourth sector might even realize their importance as a generator of wealth, wh ich will naturally lead to their self-determination and empowerment. By harnessing these yields, the fourth tier can very much realize successes similar to those of India and China, opines Prahalad and Hart. However, here it can be argued that if cultural knowledge is valued as intellect, then the fourth sector holds key only for a more integrated world economy with greater participation and products and services that are innovative and ecologically safe, economies that can avoid the mistakes generally made by the developed countries. This argument that the fourth sector holds the key to economic development and social transformation has been countered on several levels, especially by Rost, Ydren and Gustaffen (2006). Most of the points that have been illuminated in these counter arguments have been matters of definition. Moreover the trio, assert that the poor may simply be unwilling or lack the resources to accomplish the transformational business model, put forward by Dr.

Tuesday, September 10, 2019

Socrates and Euthyphro Essay Example | Topics and Well Written Essays - 500 words - 4

Socrates and Euthyphro - Essay Example The definition is erroneous as it fails to integrate the holistic description of holiness. Notably, other righteous deeds reveal a positive aspect of holiness than punishing offenders. On noticing this error, Socrates challenges him to elucidate a broader and better meaning of sanctity that is inclusive. After his realization of his mistake, lack of logical consistency, in the first definition, Euthyphro offers an updated version of his description that focuses on holiness from a godly point of view. In particular, he says that holiness is what the God approves. Therefore, â€Å"then  what is dear to the gods is holy,  and what is not dear to them is unholy†Ã‚  (pg.6, 5). Unfortunately, his explanation lacks clarity as it projects an assumption that gods agree on all things and disagree on nothing. Having noticed the fallacy, Socrates asks if the gods always agree on all things. At this point, Euthyphro realizes his mistakes and acknowledges that Gods offer a different opinion on various issues leading to quarrels amongst themselves. Consequently, Socrates gives him another him another chance to provide an improve definition of holiness. In his third attempt to define holiness, Euthyphro describes piety as what is loved by all the gods. Specifically, he asserts that the Holy is what all the gods love, and whatever the gods hate, is unholy. He states that  Ã¢â‚¬Å"the holy is what all the gods love,  and that the opposite,  what all the gods hate is unholy† (pg.10. 3). Similarly, the logical fallacy appears, as he does not offer a comprehensive explanation for defining the true nature of consecration. Notably, his description lacks an essential element of what makes something holy. Having noticed the logical inconsistency, Socrates challenged Euthyphro to substantiate if something is holy because the gods approve it, or the holiness of something makes the gods approve

Monday, September 9, 2019

Bunn-O-Matic Coffee Maker Research Paper Example | Topics and Well Written Essays - 1000 words

Bunn-O-Matic Coffee Maker - Research Paper Example Upon discussing the importance of marketing concept over the profitability of Bunn-O-Matic, this essay will focus on identifying the company’s target market for Bunn-O-Matic Coffee Maker by conducting market segmentation. Eventually, the rationale behind the target marketing strategy used by Bunn-O-Matic will be thoroughly explained. Increasing the company’s sales and profitability is the main goal of Bunn-O-Matic. Given that each individual have their own specific needs and wants, the study of marketing should be focused on allowing the company to address these concerns. Some products could satisfy the specific need of consumers. Included in the study of marketing mix or the 4 P’s known as price, product, promotion (marketing communication), and place (distribution); the product preferences of Bunn-O-Matic’s target consumer can be guided by marketing variables such as the product value, cost, customer(s) satisfaction, and market distribution (Kotler & Armstrong, 1997, p. 52; McCarthy & Perreault, 1993, p. 46). The study of marketing is a very broad subject that aims to improve the company’s financial performance not only through selling and advertisements but also in finding ways to develop and establish a good relationship with the target customers. Therefore, it is wrong to believe that the study of marketing is focused only on selling and advertising. It is easier for Bunn-O-Matic to identify its target market by dividing the consumers into subgroups (Roger, 2005, p. 15). For Bunn-O-Matic coffee makers, dividing the consumers into subgroups is possible by developing specific market segment of consumer characteristics related to demographic, psychographic, and geographic factors (Kotler, 2000, p. 8, 263). Demographic segmentation examines a wide-range of variables including age, size of family, family life cycle, gender, income, occupation, educational attainment, religion, race, generation, nationality, and social class of

Sunday, September 8, 2019

Staffing Organizations Essay Example | Topics and Well Written Essays - 1500 words - 2

Staffing Organizations - Essay Example Finally the strategy should have sufficient flexibility to adjust in case there needs to be made a drastic change pertaining to the feedback the project receives. The recruitment process starts with in the most reachable circle. Spread the word. The most workable way to start off in spreading the word is by accumulating information from the closest ring of people around. (Suchecki, Paul M.J) Circulating the information through friends and family is a great method to find workers initially. They can provide feedback if there are any people who would be interested to work at the small business. The work force that comes through acquaintances would be more helpful and trustable towards a novice owner. Recruiting through family, friends, clubs, activity and sports groups that you are a part of is a practical step to begin with. While recruiting young students would generally be a priority among starting businesses, recruiting a couple of experienced workers should also be considered as an option. It may be harder to with experienced workers as a beginner but their experience will only resonate in the scheme of events once such a staff starts working. It would also serve as a continuous training and inspiration as the staff would have someone professional working in the field to look up to. The recruitment should be done keeping into view the audience for the shop. If the shop is near a high school targeting teenagers, the staff might as well be capable of catering to such an audience. If the shop is by the roadside targeting ordinary passerby the recruitment must be done accordingly. Customer satisfaction should be kept in mind at this point in time as well. Since the stakes of the business depend largely on the comfort of the consumer. After the onset it would also interesting to develop a theme for the shop as it would further streamline the kind of selection I want to make in the upcoming years. If the theme has

Saturday, September 7, 2019

A Risk Management Proposal Assignment Example | Topics and Well Written Essays - 2500 words

A Risk Management Proposal - Assignment Example Risk evaluation is also extremely important in order to minimize the occurrence of risks. The two widely used methods of risk evaluation include subjective and objective methods. Many people from different departments are involved in the process of risk management who oversee different phases of the project risk management. If case of construction industry, people included in the process of risk management are project risk manager, risk management team, project risk custodians, risk profile owners, and team members of the project. Project risk manager provides the risk management strategy to the team in order to manage the risks associated with the project. The project management team collects necessary information required for the purpose of risk management. The risk profile owners allocate the responsibility of the risks to the concerned staff. The custodians of the risk oversee and consolidate the risks within a particular risk category. The project team members provide the necessary information regarding risks to the project profile owners and the risk management team. The phases of the risk management process include establishment of context for risk management, communication of risk management, risk identification, risk analysis, risk evaluation, risk treatment, and monitoring and reviewing of the risk. Emaar is a Public Joint Stock Company whose motive is to provide the people with high standard life styles. Emaar is a Dubai based Construction Company and has been working successfully since 1997. Emaar Construction Company competes in various areas related to construction industry. These areas include building beautiful homes, master planned communities, various construction projects, and providing the customers with full range of high life style requirements. The risk occurs when the client asks for a change in the design of the building at a later stage by commenting that the design document was not shown

Friday, September 6, 2019

Ecommerce in Bangladesh Essay Example for Free

Ecommerce in Bangladesh Essay 1. Introduction When Electronic commerce, commonly known as ecommerce, is the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the at least at one point in the transactions life-cycle, although it may encompass a wider range of technologies such as email, mobile devices and telephones as well. Electronic commerce is generally considered to be the sales aspect of ebusiness [1]. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions The main areas of e-commerce are following: i. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to Government (B2G) iv. Government to Business (G2B) 2. Objectives Our objectives are following: i. To define e-commerce and describe how it differs from ebusiness. ii. To identify and describe the unique features of ecommerce technology and discuss their business significance. iii. To describe the major types of e-commerce. iv. To discuss the origins and growth of e-commerce. v. To explain the evolution of e-commerce from its early years to today. vi. To identify the factors that will define the future of ecommerce. vii. To describe the major themes underlying the study of ecommerce. viii. To identify the major academic disciplines contributing to e-commerce and understand design of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. Volume 2 Issue 2, February 2013 www.ijsr.net 150 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited application and use of B2C e-commerce .This field is not yet much developed in Bangladesh. There are many reasons behind it one simple reason this country is not so developed and most of its citizens are poor and uneducated. It is quit natural that there are few customers who is willing and can shop in internet. It will take years to be developed this sector in bd. The telecommunication infrastructure any country affect the Internet services directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, different sector in Bangladesh, overview of implementation stage of e-commerce in Bangladesh. And there is some problem such as: low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specifically t he Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The buyers/ importers gain a clear advantage when the Internet gives them access to the global market, by which they can compare prices across regions, find out whether prices vary by order fragmentation, get awareness about substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well portrayed in the cyber world through websites and portals. Like buyers, sellers also benefit from increased and more efficient access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led growth. With the rising forces of globalization, it is becoming increasingly important that the private sector, particularly the export sectors are well prepared to meet the requirements and expectations of the importers and also stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming particularly important for Bangladeshi export sectors –one, whether businesses are automating their internal processes with these of ICTs to become increasingly efficient and competitive in a global context, and two, whether businesses have effective presence and participation in the cyber world. International organizations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) [2] have, over the last several years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also develo ped rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different Sector in Bangladesh Despite being a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerging as day-to-day business tools. These positive indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online Shopping iv. Web Hosting, Domain v. Online cards, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet services are presently available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be dependent on their willingness and ability to use this medium as well as that of the buyers of final products and the sellers of intermediate goods and services. Figure 1 depicts the three dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent within Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists [3]. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the country’s exports. A significant volume of B2G is also possible, as the government remains the biggest spender. Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in figure 3.2 in the year of 2000 e-commerce business is 11440 million taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast but in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka. Figure 2. E-commerce growth in Bangladesh 4. Methodologies The methodologies of our survey are given below: 4.1 Identification of scope of study 151 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identification of the project topic where studies was carried out to obtain enough information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss with group member about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in different sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients Some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to shopping cart, created user account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different types, t he product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth based on time, data on e-commerce revenue based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and code review of e-commerce site We reviewed the main technologies involved in ecommerce site, which include php sessions, catalog technology, server technology (hardware and software). We also reviewed credit card transaction and shopping cart checkout process. 4.6 Interviews to find what people think about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product detail, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There is a one home page, wish list, acco unt, shopping cart, and product list and checkout option. Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entity–relationship diagram using Chens notation is shown in Figure 4. 5. Technical Design of E-Commerce Site The technical design of e-commerce site include database structure, database schema, table structure, php session, shopping cart, e-r diagram, and credit card transaction. Figure 4. A sample entity–relationship diagram using Chens notation In software engineering, an entity–relationship model (ER model for short) is an abstract [4] and conceptual representation of data. Entity–relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often 152 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 a relational database, and its requirements in a top-down fashion. Diagrams created by this process are called entity– relationship diagrams or ER diagrams. Using the three schema approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The conceptual ER model normally defines master reference data entities that are commonly used by the organization. Developing an enterprise-wide conceptual ER model is useful to support documenting the data architecture for an organization. A conceptual ER model may be used as the foundation for one or more logical data models. The purpose of the conceptual ER model is then to establish structural metadata commonality for the master data entities between the set of logical ER models. The conceptual data model may be used to form commonality relationships between ER models as a basis for data m odel integration. A logical ER model does not require a conceptual ER model especially if the scope of the logical ER model is to develop a single disparate information system. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined [5]. The details of each data entity are developed and the entity relationships between these data entities are established. The logical ER model is however developed independent of technology into which it will be implemented. One or more physical ER models may be developed from each logical ER model. The physical ER model is normally developed be instantiated as a database. Therefore, each physical ER model must contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the structur al metadata into a database management system as relational database objects such as database tables, database indexes such as unique key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The first stage of information system design uses these models during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), mapped to a logical data model, such as the relational model; this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks: Entities, Relationships, and Attributes The building blocks: entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key. Figure 5. The building blocks: entities, relationships, and attributes An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entiti es can be thought of as nouns. Examples: a computer, an employee, a song, a mathematical theorem. A relationship captures how entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: owns relationship between a company and a computer, supervises relationship between an employee and a department [6], performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized in Volume 2 Issue 2, February 2013 www.ijsr.net 153 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entity–relationship model and captures its linguistic aspect. Entities and relationships can both have attributes. Examples: an employee entity might have a Social Security Number (SSN) attribute; the proved relationship may have a date attribute. Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entitys primary key. Entity–relationship diagrams dont show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example: a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her l unch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and Cardinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship marriage and its two roles husband and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the (same) marriage. These words are nouns. That is no surprise; naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new terminology but then applied it to their own old ideas. Thus the lines, arrows and crows-feet of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly misunderstood other important concepts. In particular, it b ecame fashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models assume information content that can readily be represented in a relational database. They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. Some authors have extended ER modeling with constructs to represent change, an approach supported by the original author; an example is Anchor Modeling. An alternative is to model change separately, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 Table Structure In relational databases and flat file databases, a table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations; although there is the difference in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the actual data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154 correspond to just 1 of the 14 different modeling techniques offered by UML. Another limitation: ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating pre-existing information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie [7] and Liu could not find a single instance of entity–relationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this lack of use on the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entity–relationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a blueprint of how a database will be constructed (divided into database tables). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between parts of the schema. All constraints are expressible in the same language. A database can be considered a structure in realization of the database language. The states of a created conceptual schema are transformed into an explicit mapping, the database schema. This describes how real world entities are modeled i n the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of theory in predicate calculus. A model of this â€Å"theory† closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the same database language. In a relational database [8], the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphical depiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships). Figure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example: The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. Work in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schema’s example is shown in figure 8. Table 1: Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context Boston Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE TEST LDG Volume 2 Issue 2, February 2013 www.ijsr.net 155 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include: tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages. Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries. Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application [9]. When you are working with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one problem: the web server does not know who you are and what you do because the HTTP address doesnt maintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted after the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session managem ent in terms of performance and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156 Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively logging the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform some of the functions described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the navigation area Shopping carts are written in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP [10] software, where FTP stands for File Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The amount of the sale is either hand-entered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their acquiring bank. . v. The acquiring bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the acquiring bank. vii. The acquiring bank processing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the auth orizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performs what is called an interchange for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12. Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. Steps involved in a normal credit card transaction: i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card. Figure 12. Credit card transaction 6. Conclusion Electronic commerce or e-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 commerce has grown tremendously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic payment issues. The problems identified in this Project are: Security problem, Confusing checkout process, Customers can’t find products, Customers can’t touch and fell a product, No sales staff means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed: Merchant needs to ensure the platform employs strong encryption for payment processing and customer data retention. E-commerce platform should always have a visible running total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all tran slation to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and Technology (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, Computer Networks, Computer Networks and Data Security, Compiler, Theory of Computations, etc. My several papers Published in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, Department of CSE, University of Information Technology Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and Wireless Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN, UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals. References [1] http://en.wikipedia.org/wiki/Electronic_commerce [2] Tkacz, Ewaryst; Kapczynski, Adrian (2009), Springer, P. 255 [3] Online Today, The Electronic Mall. CIS/compuserve nostalgia. Http://www.gsbrown.org/compuserve/electronic-mall1984-04/. [4] http://www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. [5] http://techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion [6] Miller, Holmes E. And Engemann, Kurt J. (1996); A methodology for managing information-based risk; Information Resources Management Journal; 9:2; 17-24 [7] http://www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 [8] http://www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html [9] http://www.startupsmart.com.au/mentor/michaelfox/2011-02-03 Authors Profile Md. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh. Volume 2 Issue 2, February 2013 www.ijsr.net

Thursday, September 5, 2019

The Scarlet Letter Book Report

The Scarlet Letter Book Report 1. What is the book about? This book is about a woman named Hester Prynne, who committed adultery with a successful clergyman named Reverend Arthur Dimmesdale. Hester Prynne was already married to an older doctor, who later called himself Roger Chillingworth. Hester and Reverend Dimmesdales daughter was the little Pearl. Hester Prynne was punished to stand on the scaffold with the scarlet letter AÂ on her bosom and tell everyone who the father of the baby was. Hester refused to say the name of the father and was mocked by everyone and was humiliated in public. Everyone viewed her as a terrible woman who had done unaccepted things and was supposed to be killed. Hester was not put to death however, but was imprisoned in a bad state. The baby girl was crying and the jailor called a doctor to come and examine them. The doctor that the jailor brought was Roger Chillingworth. He calmed the baby and her mother with pills and had a talk with Hester, his wife. Chillingworth told Hester that if she kept the secret t hat he is her husband, then he will not harm her or the baby. Hester agreed, but refused to tell him who the father of the baby was. Chillingworth was very upset and told her that he will find out who the father was and torture and punish him. After a while, Hester and her baby were set free, but Hester decided to stay in New England and wore the scarlet letter Aevery day and was isolated by the people there. Hester acted very nicely toward other people after she was let go. After seven years, Hester and Pearl, who had grown to be an intelligent young girl, met Mr. Dimmesdale and Chillingworth. At that time, Mr. Dimmesdales health was very terrible and Chillingworth was his doctor. Hester found out that Mr. Dimmesdale was tortured by the guilt in his heart for the past seven years, while Hester lived a fairly good life with her daughter. Chillingworth and Dimmesdale were living together and were thought to be friends. Instead, Chillingworth was revenging against Dimmesdale everyday without noticed by Dimmesdale that he was the husband of Hester. One day when Dimmesdale and Hester met in a forest alone with the little Pearl, they talked about leaving everything behind and going to Europe, where no one knows them, and start a new life and Hester told him that Chillingworth is her husband, who lived with him every day and trying to take a revenge against him. On the Election Day, Dimmesdale gave a great sermon. After that, he went to the scaffold along with Hester and Pearl. He told the public that he was the father and died on there. 2. What was interesting about the plot and the characters? Hester Prynne committed adultery with the pastor, Dimmesdale, and when she was asked by Mr. Dimmesdale, who the father of the child was, she remained silent. Pearl, the child of Hester Prynne, always saw her mother with the scarlet letter Aon her bosom, and did not want to get closer to her mother when Hester without the scarlet letter called her in the forest. Reverend Arthur Dimmesdale was a preacher and was thought by everyone that he was holy and honored by everyone, but actually, he was the one who committed adultery, which was not tolerated by the people and was supposed to be killed. Roger Chillingworth, Hesters husband, came to the prison and gave Hester a pill for the child and herself to calm them down and make them feel better, but she refused to take them at first and doubting that her husband was going to take revenge. Mr. Dimmesdale lived with Roger Chillingworth for so long and never knew that Chillingworth was taking revenge on him and torturing him everyday and thoug ht that Chillingworth was his friend. Hester and Chillingworth talked in the woods that they were going to leave New England and move to Europe, where no one knows them, but on the Election day, Chillingworth confessed his sin and died on the scaffold. 3. What insights might you get from the book? There is no secret that can be kept forever, especially when the secret is something that you did wrong and felt guilty about. You will be tortured everyday by the feeling of guilt and it would make you feel much better after you confess what you have done wrong. It was wrong to lie in order to reach success in your life. Revenge is very powerful; it can change a person completely. Revenge does you nothing but make other people and your lives miserable, but love can make everyone happy. A mistake you make in your life is not going to ruin your life unless you cant walk out of the shadow of your mistake. If you change the way you act, other people will feel it and have different opinions about you. Guilty feelings will eventually make you sick and have bad health. You cannot stay healthy with guilt in your heart. 4. Did you like the authors style of writing? No, I dont like the authors style of writing, because its too old English and I cannot really understand it fully. I have a hard time understanding the way sentences were written and it takes me a long time to get through a page. The dialogues were not present day speech, which makes it hard for me to get what they mean. We dont normally speak like that. They order of the words are sometimes rearranged, and I need to read it in the way that I may understand them. The author used too many words that I dont know. I dont like to read what I have a hard time understanding every sentence. I want to enjoy reading the book instead of trying to figure out what every sentence mean. I dont like the writing style of the author who uses English that I have trouble understand. I dont like how the scarlet letter was written. 5. Did you like the book? Why or why not? No, I dont like the book, because it takes me too long to finish the book and I dont actually understand what the story is about. The dialogues were so hard to understand and I am not familiar with the uses of the words in the book. The author uses too many words to describe a simple thing, person, or setting. The story is too wordy with too many unnecessary words. I have trouble understand more than ninety percent of the story. I dont get what the author trying to express most of the time. The words are very difficult for me to understand. The way of speaking is completely different from what I have learned. Even the words that the child spoke were so hard to understand. I felt like I am not educated enough to read and understand this thought provoking book. The more I read; the more confusion I get. I thought I am reading an English book, but I am like reading a foreign language book. I dont like this book.