Thursday, October 31, 2019

Research methods in the social scinces Assignment

Research methods in the social scinces - Assignment Example The researcher states that he term brute means â€Å"criminal.†3 The researcher even states that these images are very hard to change even if the African American society members try their best to operate in an opposite manner to the way they are depicted. In order to conduct this study, information regarding those prisoners who were released from different jails of the region of Florida was obtained and a questionnaire was used to identify the factors related to the returning offenders. The questionnaire comprised of several factors including the age as well as the gender of the inmate. The researchers identified that probability of inmates returning back to jail was â€Å"33.9%.†5 The researchers further identified that the leading factors that were closely related to the increase in recidivism rate were â€Å"serious crime in inmate history and custody.†6 The researcher states that the data for this research was collected through the means of a â€Å"telephone survey.†7 The collected data was interpreted by the researchers in order to identify the changes in the public opinion regarding the changes in the climatic conditions. The researcher even used the data to interpret whether these changes in opinion occur due to changes in season or not. For this purpose, previous year’s data was compared to recent data. The data was collected in a primary manner as the researchers directly contacted the sample through phone calls in order to obtain their responses for a questionnaire. The researcher states that the data was collected through â€Å"individual household.†8 The researcher states that â€Å"65% of Americans reported that there is solid evidence of climate change.†9 Furthermore the researchers figured out that 26% of the surveyed population did not believe that the earth was becoming warmer. Borick, Christopher, And Barry Rabe. (2012). Fall 201 1 National Survey Of American Public Opinion On Climate Change. Brooking - Quality.

Tuesday, October 29, 2019

I Believe that Everone Needs Some Breathing Space Essay

I Believe that Everone Needs Some Breathing Space - Essay Example This world belonged to me alone where I did not want anyone else to be. I helped me get out of the real world stress. I used to construct my world by writing down substantial events that I felt strongly about and, thus, I used to capture everything I felt about in my words. I have always felt that no matter how much we want to be with people, there still exists a distinct part of ours that wants its secrecy - a part that wants to remain as our secret part of life with ourselves. I remember whenever I used to come home from school, my mother was always curious about how my day passed. She would just not be satisfied by monosyllabic replies. She always wanted the entire day’s details. It was her insistence on sharing my day's routine with her that made me feel like I mattered a lot to her and that she always wanted to make sure that I was not facing any problems. However, I soon realized that even though I tried to tell her everything about how my day passed, there still were so me substantial details that I just wanted to leave out in my conversation with her. Having said that there are certain details of my life which I do not want to share with anyone else, it only stands to reason that those details are either too personal, embarrassing or painful, which is why I would rather keep them to myself than reveal them to anyone else. Back in A’ Levels I was elected as the House Captain and had the responsibility of leading my house of around 250 people to victory. During the time of elections, some of my very good friends turned against me and the stress I faced was unbearable. I use to come home after hours of football practice and endless days of fights about which I never felt like talking to anyone at all. Even though I knew my parents, siblings and some friends only wanted to make sure that I was all right I just wanted to lock myself up and sort out my problems myself. Many people tell me that that is just the way I am and it does not mean that e very person on earth has certain things which he wants to keep to himself. I understand that there are people who find solace in confiding in people, yet something deep inside tells me that everybody wants some alone time, some details which they want to keep to themselves. Some time back I broke up with my best friend. We had been friends for over four years and shared quite a lot of things with each other. With the passage of time, however, we grew distant and to the best of my knowledge, the reason was that both of us became too demanding. I wanted her to tell me if something was bothering her, to share everything with me and that probably just started suffocating her. In an attempt to strengthen our friendship, I lost her completely and that is when I realized that may be I just pushed her beyond her limits. I feel that we all feel the need to belong to someone, but the belongingness should not turn into suffocation and this is what reinstates my belief that everyone wants some personal space. My sister broke up with her boyfriend and when I asked her for a reason she said that he was getting way too possessive. That was surprising for me since I thought my sister was the sort of person who would cherish a relationship in which her boyfriend would be possessive about her, but it turned out otherwise. It has been

Sunday, October 27, 2019

E-Commerce in Fashion

E-Commerce in Fashion Background E-commerce is in fashion so many companies of all sizes and types are reviewing their sales strategies.   Consideration is being given to either (or both) selling to other businesses electronically (B2B) or selling directly to individual customers over the Internet (B2C).   Many companies are failing to live up to expectations, with problems such as poor website design making ordering difficult, website failure (crashes) from overload or because they were incomplete, failure to confirm the order, subsequent out-of-stock, failure to deliver on time. The Project Brief You, as the project manager, are to plan a project for a Triangle software house to develop an online Hotel Management system for an international hotel chain.   The project is scheduled to start on6thof July 2010. The project should have the following options Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. From the Project Managers point of view, an e-commerce project is no different from any other project.   You need a framework to plan resources and budget; you must set the plan against an appropriate calendar; and you need to ensure that you include the managerial and quality-related tasks that will help the project manager succeed. You need to plan how the project should be initiated.   However, your initiation plan should be presented in sufficient detail for someone else to manage it.   You are not expected to have all the answers at this stage; part of the skill of project planning is to ensure that you put the tasks in place to find out what is unknown and to manage the obvious risks. Task 1 (a) As the Project Manager, you are expected to decide on the following: 1. The tasks required to carry out the project aim for at least 10-15 tasks.   Traditional File System (SDLC-System Development Life Cycle) Strategic Study Business study Feasibility study Requirement analysis Requirement Specification Logical system specification Logical Design Physical Design Coding Testing Implementation Maintenance Paste out Relate Traditional File System steps to Hotel management system Case Study. We use Traditional File System for Hotel management systemto develop their system. Strategic study: Project Manager goes to the Hotel study the current system; after he understood what the system that they need to develop is what they technology must use to develop the hotel. Business study:- Project Manager prepare a document project initiation document this will give the general   definition for the developing system   that document shown to the hotel managing director we get the approval to proceed the development the new system. Feasibility study: These step uses to traditional file system how to feasible for hotel computerizes Economical, Technical Operational, even the developing system is most modern if end users are working within difficulty that system isnt operational but this system is not difficulty use. Cost effective ways and ensuring that the investment can be recovered and realize the benefits with allocated budget. The technology needed is available and can be integrated with the other systems of the organization. Deciding how the new system going to fit the current operational system and whether its operationally acceptable. Checking whether the new project is violating law both local and international Requirement analysis: Firstly we interview Hotel managing Director asked question about the current system what they want to include their system to computerize ..,.   Investigating forms and documents which are very useful to determine system data flows and transactions Identifying the outputs by investigating below reports, Hourly report Daily report Monthly report Yearly report Then Checking latest updated procedure manuals and user manuals To study user activities and to concentrate on how it is being handle. Interviewing and supervisor level users to gather opinions about the efficiency about the system, determine the needs of the users that to be in the new system, more specific details about the system. Producing and arranging online Questionnaires for all operational users who are going to use the system. By this can gather information from all the people who are going to have direct contact with the system. Planning formal observation sessions at 3 main hotels, specially the reception area And closely observing the activities performed by the users. And observing customer inquiries reservation process etc Studying a subset documents or subset of the activity in the area in order to get an impression of the whole activity or document set .it is useful to verify findings from interviews or the above discussed techniques. Requirement Specification: How the new computer system should be working this is a kind of the document which clearly specifies the requirement of the users. Use :- Entity Relationship Diagram (ERD)    Data Flow Diagram (DFD). Logical system specification:- This hotel computerize system   include several logical specification there are may be several technical option that could be adapted which are capable of delivering the requirement in this stage system analysis first design define what those technical options and then the help of manager select the most suitable option. Logical Design: This step we design a dialog design initial interface are design Update process that change on the line system data and Enquiry process concern the interaction of useful information from system data.(we should involve the hotel manager very strongly specially dialog design influence how to system looks and behave to its users) Physical Design: This step we design program design database design (ERD map into database components), this stage provides all the information required by the programmer. Coding: We use language is Visual Basic for coding.(First programmer code will be written in short pieces that outlines simple as well-defined program function.) Testing:- we tested correctness testing, performance testing ,reliability and recovery testing then security testing stress testing usability testing, unit and integration testing external function testing ,system testing, regression testing, acceptance testing, installation testing, completion testing, test documentation.(   discover and rectify errors below steps are planned to be done) Implementation:- This stage involve preparation of the target side and making the environment the network here the hotel new system to target environment will done and prepare in the user manual and training the hotel worker for the New system.| System will be installed shared in 4 computers which will be networked [LAN] (Configuration with I7 processors, 4 GB Ram..) With all required software. 2. Decide on appropriate task dependencies and state durations of them. Task Duration (1= 1 day)Reference Strategic study 1 A Business study 1   B Feasibility study 1 C Technical Feasibility2 Operational Feasibility1 Legal FeasibilityParallel with Op Feasibility(1) Economical Feasibility3 Requirement analysis D (Forms and documents)1 (Reports)1 (Procedureuser manuals)1 Interview-(Management level)3 Interview-(Supervisor level)3 (Questionnaires)1 (Observation)2 (Subset documentsactivity)1 Requirement specification 3 E Logical system specification 2F Logical design 10 G Physical design 20H Coding 5 I Testing J (Unit) 5 (Integrated) 1 (System)1 (User)2 DebuggingParallel with testing(8)K Implementation L (Installation)2 (User Training)2 (Parallel Running)7 MaintenanceContinues until phase out.M Total Duration81 -The explained tasks in task 1 are shortened and listed down above, under task name. -The Duration 1 is equals to 1 day. -Maintenance starts after implementing the project until phase out. -Total days for the project is 87-(81- planned days, and balances 6 days are to manage risks during the project period. (Table1.1) 3. Create an Activity Net work Diagram with respect to your identified tasks,AND must be given using a standard Tool such as MS Project or MS Visio Critical path- A   B C D E F G H I J   L MS Project Output (b)There are many elements in a typical project plan. One such element is the   Introduction which briefly describes the objectives of the project and the constraints, which affect project management. Prepare such introduction for this project using reasonable assumptions. List and explain with a sentence each other contents of a typical project plan. I am Nadeeshani and Im appointed as a project manager to develop this online hotel Management system for an international hotel chain by the triangle software house. The project is based on upgrading the existing system as an online system along with these main functions, Room reservations for guests The options to add other services like restaurant use, bar use, gym use, etc The system which has the ability to obtain inquires from the guests and the ability to give them an answer/feedback, for example for the customer queries like availability of rooms, reservations and guest list, etc. And to get all the above updates and inquiries from the parties and to maintain the records in the system We hope to start the project on 6Th of July 2010 and we were going to be finished in September 30th 2010 (3 month) period. On that project running period we are considering Saturdays Sundays as working days. We hope to finished this project 26Th of September 2010. The project has run 87 days but we are planning to be completed within 82 days rest 5 days we are planning to do collecting unanticipated problems complete the project report however we will make sure to complete this project in this 87 days period. This is the project plan how we are going to do the project. I hope the committee members will do their best to complete the project. The quality of the system will be maintained throughout the project by regular progress checking and progress monitoring. The project has been run through the 13 stages. Strategic study Business study Feasibility study Requirement analysis Requirement specification Logical system specification Logical design Physical design Coding, Testing Debugging Implementation Maintenance These stages are planned in a greater level of detail. (These plans are used to track progress on a week by week basis through regular progress monitoring.) These stages are also separated into sub tasks basically contains the lowest details. It will specify activities down to a daily level. This will be created in parallel with the above mentioned stage plans. And the monitoring and tracking will be on daily basis. As a project manager I hope we will be finished the project with less errors I believe you all are will be do your best. Clearly indicated whose responsible for what in the project, clearly shown what the project is to deliver, why and for whom and by making the project that can easily understand by everyone, mainly on time and within budget My motivation is to completely utilize my accumulated experience and knowledge to the fullest extent possible and making this projects a success. Task 2 (a) Explain what are your typical responsibilities as a Software Project   Manager in managing any type of software project and your typical tasks A software project manager has the overall responsibility for the successful initiation, planning, execution and closure of a project. A successful Project Manager must simultaneously manage the four basic elements of a project: resources, time, money, and most importantly, scope. All these elements are interrelated. Each must be managed effectively. All must be managed together if the project, and the project manager, is to be a success. Resources People, equipment, material Time Task durations, dependencies, critical path Money Costs, contingencies, profit Scope Project size, goals, requirements This title is used in the construction industry, architecture, information technology and many different occupations that are based on production of a product or service. The project manager must possess a combination of skills including an ability to ask penetrating questions, detect unstated assumptions and resolve interpersonal conflicts as well as more systematic management skills. The role of the project manager encompasses many activities including :-Planning and Defining Scope, Activity Planning and Sequencing, Resource Planning, Developing Schedules, Time Estimating, Cost Estimating, Developing a Budget, Controlling Quality, Managing Risks and Issues, Creating Charts and Schedules, Risk Analysis, Benefits Realization, Scalability, Interoperability and Portability Analysis,Documentation,Team Leadership, Strategic Influencing, Customer Liaison. As a software project manager my typical tasks in managing a software project will be below. Manage the production of the required product. Direct and motivate the project team. Plan and monitor the project. Manage business and project risks. Responsible for change control. Report the true progress report and stage assessment to the steering committee. Prepare the end project report. Responsible for project administration. Responsibility Matrix In a large project, there may be many people who have some role in the creation and approval of project deliverables. Sometimes this is pretty straightforward, such as one person writing a document and one person approving it. In other cases, there may be many people who have a hand in the creation, and others that need to have varying levels of approval. The Responsibility Matrix is a technique used to define the general responsibilities for each role on a project. The matrix can then be used to communicate the roles to the appropriate people associated with the team. This helps set expectations, and ensures people know what is expected from them. On the matrix, the different people, or roles, appear as columns, with the specific deliverables in question listed as rows. Then, use the intersecting points to describe each persons responsibility for each deliverable. Ex: (Table 2.1) A Approves the deliverable R Reviews the deliverable (and provides feedback). C Creates the deliverable (could be C (1) for primary, C (2) for backup). Usually there is only one person who is responsible for creating a deliverable, although many people may provide input. I Provides input N Is notified when a deliverable is complete M Manages the deliverables (such as a librarian, or person responsible for the document repository) In the table above, the Requirements Management Plan is created by the project manager, approved by the sponsor and client managers, and reviewed by the project team and analysts. The purpose of the matrix is to gain clarity and agreement on who does what, so you can define the columns with as much detail as makes sense. For instance, in the above example, the Project Team could have been broken into specific people or the person responsible for creating the Data Model could have been broken out into a separate column. After the matrix is completed, it should be circulated for approval. If it is done in the Project Charter process, it can be an addendum to the Project Charter. If it is created as a part of the initial Analysis Phase, it should be circulated as a separate document. Examples of responsibility codes are as follows. Our project may define different codes, as long as you explain what they mean so that people know what the expectations are for them. References http://www.lifecyclestep.com/open/407.0LifecycleRoles.htm (b) Briefly explain how you are going to manage the risk in the above project. Risk management is the process of analyzing exposure to risk and determining how to best handle such exposure. The project is planned to be a continuous process throughout the project until completion and considered in two main parts, the risk analysis part and the risk management part. I have planned to run risk management as below, At the start of the project, as a part of the decision of whether to undertake the project And at every end stage assessments Risk management includes the following activities Planning how risk management will be held in the particular project. Plan should include risk management tasks, responsibilities, activities and budget. Assigning risk officer a team member other than a project manager who is responsible for foreseeing potential project problems. Typical characteristic of risk officer is a healthy skepticism. Maintaining live project risk database. Each risk should have the following attributes: opening date, title, short description, probability and importance. Optionally risk can have assigned person responsible for its resolution and date till then risk still can be resolved. Creating anonymous risk reporting channel. Each team member should have possibility to report risk that he foresees in the project. Preparing mitigation plans for risks that are chosen to be mitigated. The purpose of the mitigation plan is to describe how this particular risk will be handled what, when, by who and how will be done to avoid it or minimize consequences if it becomes a liability. Summarizing planned and faced risks, effectiveness of mitigation activities and effort spend for the risk management. As an analyzing tool to assist in the risk management process, Decision tree is used to analyze the risks, Because the explanation for the result is easily described by simple graph in a simply understandable way which can be combined with other decision techniques as well. Important details can be generated based on its alternatives, probabilities, costs and their preferences for outcomes. First after analyzing the possible risks by identifying, Estimating the effectiveness by comparing the likelihood with the impact of a risk and finally evaluating by confirming that they are in correct sequence and the cross checking with the risk reduction options assessing the acceptable level of each other. We select the most suitable risk management approach for each risk and a detailed plan of action which confirms its goals will be prepared by discussing with members. The risk management consist four main activities and below tasks will be completed at the end of each part. Planning-: Most appropriate selection will be selected for each risk and a detailed plan of action which confirms its desirability and objectives will be developed. Sometimes this activity may proceed in parallel with risk evaluation.  §Resourcing-: This will identify and assign the necessary resources to do the work and will confirm that the revised plan is feasible and cost effective.  §Controlling-: This will make sure that the execution of the plan is having the desired effect on the risk. This will ensure the management of the risk process will apply effectively and it will modify the plan where it necessary.  §Monitoring-: This will check the stages of the risk and also check that the counted measures are happening effectively. During monitoring, if it feels that the risk management plan is ineffective, then we can go back to the risk analysis part. When managing the risks these below features will be considered mainly, Factors that need to continue correctly, threats, systemic risks for the successful delivery project and benefits, risks to the business, risks for the customers and suppliers, risks of unexpected outputs and success of the international hotel chain. This is how I have planned to manage the risk, which can happen during a process and which will effect with a negative result to the process in the project. Task 3 Configuration Management is an essential part of a project. In a large project Configuration librarian plays a major role. Configuration management (CM) is the detailed recording and updating of information that describes an enterprises hardware and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices. Special configuration management software is available. When a system needs hardware or software upgrade, a computer technician can accesses the configuration management program and database to see what is currently installed. The technician can then make a more informed decision about the upgrade needed. An advantage of a configuration management application is that the entire collection of systems can be reviewed to make sure any changes made to one system do not adversely affect any of the other systems Configuration management is also used in software development, where it is called Unified Configuration Management (UCM). Using UCM, developers can keep track of the source code, documentation, problems, changes requested, and changes made. (a) Briefly out line some configuration items in the project given in the scenario. Manage the configuration: Hotel Management systemPlan what is required and how it will be achieved Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. (Use a Configuration Management Plan (Project Quality Plan) Identify components of the final product Use Defining and Analyzing Products (PL2) to create a Configuration Item Record Use unique identifiers for each product and each version: Project Product Type Product Name Product Version. Control changes to baseline products by using change authority Submit products to the Configuration Librarian to put under configuration control Release (issue) products and/or copiesS Product Status Account to record and report product information Report the status of products from the Configuration Librarian Verify product integrity Perform product configuration audits by the Configuration Librarian Perform project audits by Project Assurance. In the above hotel management system developing project at each stage end as an output as below final deliverables will be reported. 1st stage -Strategic study -information technology strategy will be produced. 2nd stage Business study -project initiation document. 3th stage Feasibility study- Feasibility report. 4th stage -Requirement analysis- the gathered exact requirements of the users to develop  Ã‚  Ã‚   the system will be produced as Requirement analysis report 5th stage -Requirement specifications-the requirements will be produced in a diagrammatic way and a wordy report. 6th stage Logical system specification -the mapped business and technical aspects of the system will be produced. 7th stage Logical design- interface design will be produced. 8th stage -Physical design -the database design and program design using miniature specifications like pseudo codes, flowcharts, structure diagrams, etc will be produced. 9th stage -Coding- the written program which is written with a programming language will be produced. 10th stage -Testing -testing report. 11th stage -Debugging-debugging report. 12th stage -Implementation- the released version of the system in the target environment. 13th stage -Maintenance-reports regarding the changes carried out throughout the system after the implementation. (b) Give a statement of the configuration librarians responsibilities. Configuration Librarian is the guardian of all the master copies of the projects products.   Ã‚   The role will be also to look after change control on behalf of the project manager. Purpose   : Custodian and guardian of all master copies of the projects products Receives, baselines and releases (issues) products Updates the product status and informs the Project Manager Maintains the Issue Log. The major tasks of the configuration librarian are summarized as follows:- To control the receipt, identification, storage and issues of all project products To provide information on the status of all products To number, record, store and distribute change control documents The specific responsibilities of the configuration librarian are as follows:- Assist the project manager to prepare the configuration management plan Create libraries at other storage areas to hold products Assist in the identification of products Create configuration item description records Hold the master copies of all project products Maintain the change control records Assist in conducting configuration audits Liaise with other configuration librarians where products required by the project are common to other systems (c) Briefly outline what are the things that we must consider in change control of Project Management. In this hotel management system development, will develop several documents that include all the importance issues regarding to   the development but sometime these document may need to be changed due to various reasons, when doing this changers it has to be done by stranded procedures its called ChangeControl . The change control document is the formal way into this projects any enquiry of a complaint or request, it can be raised by anyone associated with hotel project about anything such as:- A new function occurrence A frailer of a product In meeting some aspect of the user requirement Because of a possible misunderstand A problem with the planning A frailer of communication The change control mainly it has recharge control document such as:- Question document (when a question occurs about a change) It will be submitted to the configuration library and the configuration librar E-Commerce in Fashion E-Commerce in Fashion Background E-commerce is in fashion so many companies of all sizes and types are reviewing their sales strategies.   Consideration is being given to either (or both) selling to other businesses electronically (B2B) or selling directly to individual customers over the Internet (B2C).   Many companies are failing to live up to expectations, with problems such as poor website design making ordering difficult, website failure (crashes) from overload or because they were incomplete, failure to confirm the order, subsequent out-of-stock, failure to deliver on time. The Project Brief You, as the project manager, are to plan a project for a Triangle software house to develop an online Hotel Management system for an international hotel chain.   The project is scheduled to start on6thof July 2010. The project should have the following options Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. From the Project Managers point of view, an e-commerce project is no different from any other project.   You need a framework to plan resources and budget; you must set the plan against an appropriate calendar; and you need to ensure that you include the managerial and quality-related tasks that will help the project manager succeed. You need to plan how the project should be initiated.   However, your initiation plan should be presented in sufficient detail for someone else to manage it.   You are not expected to have all the answers at this stage; part of the skill of project planning is to ensure that you put the tasks in place to find out what is unknown and to manage the obvious risks. Task 1 (a) As the Project Manager, you are expected to decide on the following: 1. The tasks required to carry out the project aim for at least 10-15 tasks.   Traditional File System (SDLC-System Development Life Cycle) Strategic Study Business study Feasibility study Requirement analysis Requirement Specification Logical system specification Logical Design Physical Design Coding Testing Implementation Maintenance Paste out Relate Traditional File System steps to Hotel management system Case Study. We use Traditional File System for Hotel management systemto develop their system. Strategic study: Project Manager goes to the Hotel study the current system; after he understood what the system that they need to develop is what they technology must use to develop the hotel. Business study:- Project Manager prepare a document project initiation document this will give the general   definition for the developing system   that document shown to the hotel managing director we get the approval to proceed the development the new system. Feasibility study: These step uses to traditional file system how to feasible for hotel computerizes Economical, Technical Operational, even the developing system is most modern if end users are working within difficulty that system isnt operational but this system is not difficulty use. Cost effective ways and ensuring that the investment can be recovered and realize the benefits with allocated budget. The technology needed is available and can be integrated with the other systems of the organization. Deciding how the new system going to fit the current operational system and whether its operationally acceptable. Checking whether the new project is violating law both local and international Requirement analysis: Firstly we interview Hotel managing Director asked question about the current system what they want to include their system to computerize ..,.   Investigating forms and documents which are very useful to determine system data flows and transactions Identifying the outputs by investigating below reports, Hourly report Daily report Monthly report Yearly report Then Checking latest updated procedure manuals and user manuals To study user activities and to concentrate on how it is being handle. Interviewing and supervisor level users to gather opinions about the efficiency about the system, determine the needs of the users that to be in the new system, more specific details about the system. Producing and arranging online Questionnaires for all operational users who are going to use the system. By this can gather information from all the people who are going to have direct contact with the system. Planning formal observation sessions at 3 main hotels, specially the reception area And closely observing the activities performed by the users. And observing customer inquiries reservation process etc Studying a subset documents or subset of the activity in the area in order to get an impression of the whole activity or document set .it is useful to verify findings from interviews or the above discussed techniques. Requirement Specification: How the new computer system should be working this is a kind of the document which clearly specifies the requirement of the users. Use :- Entity Relationship Diagram (ERD)    Data Flow Diagram (DFD). Logical system specification:- This hotel computerize system   include several logical specification there are may be several technical option that could be adapted which are capable of delivering the requirement in this stage system analysis first design define what those technical options and then the help of manager select the most suitable option. Logical Design: This step we design a dialog design initial interface are design Update process that change on the line system data and Enquiry process concern the interaction of useful information from system data.(we should involve the hotel manager very strongly specially dialog design influence how to system looks and behave to its users) Physical Design: This step we design program design database design (ERD map into database components), this stage provides all the information required by the programmer. Coding: We use language is Visual Basic for coding.(First programmer code will be written in short pieces that outlines simple as well-defined program function.) Testing:- we tested correctness testing, performance testing ,reliability and recovery testing then security testing stress testing usability testing, unit and integration testing external function testing ,system testing, regression testing, acceptance testing, installation testing, completion testing, test documentation.(   discover and rectify errors below steps are planned to be done) Implementation:- This stage involve preparation of the target side and making the environment the network here the hotel new system to target environment will done and prepare in the user manual and training the hotel worker for the New system.| System will be installed shared in 4 computers which will be networked [LAN] (Configuration with I7 processors, 4 GB Ram..) With all required software. 2. Decide on appropriate task dependencies and state durations of them. Task Duration (1= 1 day)Reference Strategic study 1 A Business study 1   B Feasibility study 1 C Technical Feasibility2 Operational Feasibility1 Legal FeasibilityParallel with Op Feasibility(1) Economical Feasibility3 Requirement analysis D (Forms and documents)1 (Reports)1 (Procedureuser manuals)1 Interview-(Management level)3 Interview-(Supervisor level)3 (Questionnaires)1 (Observation)2 (Subset documentsactivity)1 Requirement specification 3 E Logical system specification 2F Logical design 10 G Physical design 20H Coding 5 I Testing J (Unit) 5 (Integrated) 1 (System)1 (User)2 DebuggingParallel with testing(8)K Implementation L (Installation)2 (User Training)2 (Parallel Running)7 MaintenanceContinues until phase out.M Total Duration81 -The explained tasks in task 1 are shortened and listed down above, under task name. -The Duration 1 is equals to 1 day. -Maintenance starts after implementing the project until phase out. -Total days for the project is 87-(81- planned days, and balances 6 days are to manage risks during the project period. (Table1.1) 3. Create an Activity Net work Diagram with respect to your identified tasks,AND must be given using a standard Tool such as MS Project or MS Visio Critical path- A   B C D E F G H I J   L MS Project Output (b)There are many elements in a typical project plan. One such element is the   Introduction which briefly describes the objectives of the project and the constraints, which affect project management. Prepare such introduction for this project using reasonable assumptions. List and explain with a sentence each other contents of a typical project plan. I am Nadeeshani and Im appointed as a project manager to develop this online hotel Management system for an international hotel chain by the triangle software house. The project is based on upgrading the existing system as an online system along with these main functions, Room reservations for guests The options to add other services like restaurant use, bar use, gym use, etc The system which has the ability to obtain inquires from the guests and the ability to give them an answer/feedback, for example for the customer queries like availability of rooms, reservations and guest list, etc. And to get all the above updates and inquiries from the parties and to maintain the records in the system We hope to start the project on 6Th of July 2010 and we were going to be finished in September 30th 2010 (3 month) period. On that project running period we are considering Saturdays Sundays as working days. We hope to finished this project 26Th of September 2010. The project has run 87 days but we are planning to be completed within 82 days rest 5 days we are planning to do collecting unanticipated problems complete the project report however we will make sure to complete this project in this 87 days period. This is the project plan how we are going to do the project. I hope the committee members will do their best to complete the project. The quality of the system will be maintained throughout the project by regular progress checking and progress monitoring. The project has been run through the 13 stages. Strategic study Business study Feasibility study Requirement analysis Requirement specification Logical system specification Logical design Physical design Coding, Testing Debugging Implementation Maintenance These stages are planned in a greater level of detail. (These plans are used to track progress on a week by week basis through regular progress monitoring.) These stages are also separated into sub tasks basically contains the lowest details. It will specify activities down to a daily level. This will be created in parallel with the above mentioned stage plans. And the monitoring and tracking will be on daily basis. As a project manager I hope we will be finished the project with less errors I believe you all are will be do your best. Clearly indicated whose responsible for what in the project, clearly shown what the project is to deliver, why and for whom and by making the project that can easily understand by everyone, mainly on time and within budget My motivation is to completely utilize my accumulated experience and knowledge to the fullest extent possible and making this projects a success. Task 2 (a) Explain what are your typical responsibilities as a Software Project   Manager in managing any type of software project and your typical tasks A software project manager has the overall responsibility for the successful initiation, planning, execution and closure of a project. A successful Project Manager must simultaneously manage the four basic elements of a project: resources, time, money, and most importantly, scope. All these elements are interrelated. Each must be managed effectively. All must be managed together if the project, and the project manager, is to be a success. Resources People, equipment, material Time Task durations, dependencies, critical path Money Costs, contingencies, profit Scope Project size, goals, requirements This title is used in the construction industry, architecture, information technology and many different occupations that are based on production of a product or service. The project manager must possess a combination of skills including an ability to ask penetrating questions, detect unstated assumptions and resolve interpersonal conflicts as well as more systematic management skills. The role of the project manager encompasses many activities including :-Planning and Defining Scope, Activity Planning and Sequencing, Resource Planning, Developing Schedules, Time Estimating, Cost Estimating, Developing a Budget, Controlling Quality, Managing Risks and Issues, Creating Charts and Schedules, Risk Analysis, Benefits Realization, Scalability, Interoperability and Portability Analysis,Documentation,Team Leadership, Strategic Influencing, Customer Liaison. As a software project manager my typical tasks in managing a software project will be below. Manage the production of the required product. Direct and motivate the project team. Plan and monitor the project. Manage business and project risks. Responsible for change control. Report the true progress report and stage assessment to the steering committee. Prepare the end project report. Responsible for project administration. Responsibility Matrix In a large project, there may be many people who have some role in the creation and approval of project deliverables. Sometimes this is pretty straightforward, such as one person writing a document and one person approving it. In other cases, there may be many people who have a hand in the creation, and others that need to have varying levels of approval. The Responsibility Matrix is a technique used to define the general responsibilities for each role on a project. The matrix can then be used to communicate the roles to the appropriate people associated with the team. This helps set expectations, and ensures people know what is expected from them. On the matrix, the different people, or roles, appear as columns, with the specific deliverables in question listed as rows. Then, use the intersecting points to describe each persons responsibility for each deliverable. Ex: (Table 2.1) A Approves the deliverable R Reviews the deliverable (and provides feedback). C Creates the deliverable (could be C (1) for primary, C (2) for backup). Usually there is only one person who is responsible for creating a deliverable, although many people may provide input. I Provides input N Is notified when a deliverable is complete M Manages the deliverables (such as a librarian, or person responsible for the document repository) In the table above, the Requirements Management Plan is created by the project manager, approved by the sponsor and client managers, and reviewed by the project team and analysts. The purpose of the matrix is to gain clarity and agreement on who does what, so you can define the columns with as much detail as makes sense. For instance, in the above example, the Project Team could have been broken into specific people or the person responsible for creating the Data Model could have been broken out into a separate column. After the matrix is completed, it should be circulated for approval. If it is done in the Project Charter process, it can be an addendum to the Project Charter. If it is created as a part of the initial Analysis Phase, it should be circulated as a separate document. Examples of responsibility codes are as follows. Our project may define different codes, as long as you explain what they mean so that people know what the expectations are for them. References http://www.lifecyclestep.com/open/407.0LifecycleRoles.htm (b) Briefly explain how you are going to manage the risk in the above project. Risk management is the process of analyzing exposure to risk and determining how to best handle such exposure. The project is planned to be a continuous process throughout the project until completion and considered in two main parts, the risk analysis part and the risk management part. I have planned to run risk management as below, At the start of the project, as a part of the decision of whether to undertake the project And at every end stage assessments Risk management includes the following activities Planning how risk management will be held in the particular project. Plan should include risk management tasks, responsibilities, activities and budget. Assigning risk officer a team member other than a project manager who is responsible for foreseeing potential project problems. Typical characteristic of risk officer is a healthy skepticism. Maintaining live project risk database. Each risk should have the following attributes: opening date, title, short description, probability and importance. Optionally risk can have assigned person responsible for its resolution and date till then risk still can be resolved. Creating anonymous risk reporting channel. Each team member should have possibility to report risk that he foresees in the project. Preparing mitigation plans for risks that are chosen to be mitigated. The purpose of the mitigation plan is to describe how this particular risk will be handled what, when, by who and how will be done to avoid it or minimize consequences if it becomes a liability. Summarizing planned and faced risks, effectiveness of mitigation activities and effort spend for the risk management. As an analyzing tool to assist in the risk management process, Decision tree is used to analyze the risks, Because the explanation for the result is easily described by simple graph in a simply understandable way which can be combined with other decision techniques as well. Important details can be generated based on its alternatives, probabilities, costs and their preferences for outcomes. First after analyzing the possible risks by identifying, Estimating the effectiveness by comparing the likelihood with the impact of a risk and finally evaluating by confirming that they are in correct sequence and the cross checking with the risk reduction options assessing the acceptable level of each other. We select the most suitable risk management approach for each risk and a detailed plan of action which confirms its goals will be prepared by discussing with members. The risk management consist four main activities and below tasks will be completed at the end of each part. Planning-: Most appropriate selection will be selected for each risk and a detailed plan of action which confirms its desirability and objectives will be developed. Sometimes this activity may proceed in parallel with risk evaluation.  §Resourcing-: This will identify and assign the necessary resources to do the work and will confirm that the revised plan is feasible and cost effective.  §Controlling-: This will make sure that the execution of the plan is having the desired effect on the risk. This will ensure the management of the risk process will apply effectively and it will modify the plan where it necessary.  §Monitoring-: This will check the stages of the risk and also check that the counted measures are happening effectively. During monitoring, if it feels that the risk management plan is ineffective, then we can go back to the risk analysis part. When managing the risks these below features will be considered mainly, Factors that need to continue correctly, threats, systemic risks for the successful delivery project and benefits, risks to the business, risks for the customers and suppliers, risks of unexpected outputs and success of the international hotel chain. This is how I have planned to manage the risk, which can happen during a process and which will effect with a negative result to the process in the project. Task 3 Configuration Management is an essential part of a project. In a large project Configuration librarian plays a major role. Configuration management (CM) is the detailed recording and updating of information that describes an enterprises hardware and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices. Special configuration management software is available. When a system needs hardware or software upgrade, a computer technician can accesses the configuration management program and database to see what is currently installed. The technician can then make a more informed decision about the upgrade needed. An advantage of a configuration management application is that the entire collection of systems can be reviewed to make sure any changes made to one system do not adversely affect any of the other systems Configuration management is also used in software development, where it is called Unified Configuration Management (UCM). Using UCM, developers can keep track of the source code, documentation, problems, changes requested, and changes made. (a) Briefly out line some configuration items in the project given in the scenario. Manage the configuration: Hotel Management systemPlan what is required and how it will be achieved Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. (Use a Configuration Management Plan (Project Quality Plan) Identify components of the final product Use Defining and Analyzing Products (PL2) to create a Configuration Item Record Use unique identifiers for each product and each version: Project Product Type Product Name Product Version. Control changes to baseline products by using change authority Submit products to the Configuration Librarian to put under configuration control Release (issue) products and/or copiesS Product Status Account to record and report product information Report the status of products from the Configuration Librarian Verify product integrity Perform product configuration audits by the Configuration Librarian Perform project audits by Project Assurance. In the above hotel management system developing project at each stage end as an output as below final deliverables will be reported. 1st stage -Strategic study -information technology strategy will be produced. 2nd stage Business study -project initiation document. 3th stage Feasibility study- Feasibility report. 4th stage -Requirement analysis- the gathered exact requirements of the users to develop  Ã‚  Ã‚   the system will be produced as Requirement analysis report 5th stage -Requirement specifications-the requirements will be produced in a diagrammatic way and a wordy report. 6th stage Logical system specification -the mapped business and technical aspects of the system will be produced. 7th stage Logical design- interface design will be produced. 8th stage -Physical design -the database design and program design using miniature specifications like pseudo codes, flowcharts, structure diagrams, etc will be produced. 9th stage -Coding- the written program which is written with a programming language will be produced. 10th stage -Testing -testing report. 11th stage -Debugging-debugging report. 12th stage -Implementation- the released version of the system in the target environment. 13th stage -Maintenance-reports regarding the changes carried out throughout the system after the implementation. (b) Give a statement of the configuration librarians responsibilities. Configuration Librarian is the guardian of all the master copies of the projects products.   Ã‚   The role will be also to look after change control on behalf of the project manager. Purpose   : Custodian and guardian of all master copies of the projects products Receives, baselines and releases (issues) products Updates the product status and informs the Project Manager Maintains the Issue Log. The major tasks of the configuration librarian are summarized as follows:- To control the receipt, identification, storage and issues of all project products To provide information on the status of all products To number, record, store and distribute change control documents The specific responsibilities of the configuration librarian are as follows:- Assist the project manager to prepare the configuration management plan Create libraries at other storage areas to hold products Assist in the identification of products Create configuration item description records Hold the master copies of all project products Maintain the change control records Assist in conducting configuration audits Liaise with other configuration librarians where products required by the project are common to other systems (c) Briefly outline what are the things that we must consider in change control of Project Management. In this hotel management system development, will develop several documents that include all the importance issues regarding to   the development but sometime these document may need to be changed due to various reasons, when doing this changers it has to be done by stranded procedures its called ChangeControl . The change control document is the formal way into this projects any enquiry of a complaint or request, it can be raised by anyone associated with hotel project about anything such as:- A new function occurrence A frailer of a product In meeting some aspect of the user requirement Because of a possible misunderstand A problem with the planning A frailer of communication The change control mainly it has recharge control document such as:- Question document (when a question occurs about a change) It will be submitted to the configuration library and the configuration librar

Friday, October 25, 2019

Indian Women Writers :: Literature Writing Middle Eastern Papers

Indian women writers A world of words, lost and found: a brief overview of women's literature in India from the 6th century BC onwards The Vedas cry aloud, the Puranas shout; "No good may come to a woman." I was born with a woman's body How am I to attain truth? "They are foolish, seductive, deceptive - Any connection with a woman is disastrous." Bahina says, "If a woman's body is so harmful, How in the world will I reach truth?" Much of the world's literature has been dominated by a canon that nearly dismissed women's writing more than two centuries ago. The counter-canons that have emerged as the result of this exclusion have helped to establish women's writing in mainstream culture, but still in some ways fail to acknowledge women's literature coming from non-white countries. This essay is an attempt to highlight some of the works produced by women in India over the ages. Although India has a history of ancient civilisations such as the Harappa and Mohenjodaro, and of matrilineal societies in the south, no written records of women's literary prowess exists predating the 6th century BC. The emergence of the first body of poetry by women in India could be attributed to the advent of Buddhism. Perhaps it was the freedom offered by the religion, the way of life it offered to women, and the principle of equality that it propagated which allowed women to pen their thoughts for the first time. Buddhism offered women the opportunity to break away from the restrictions of home life, a major factor in the rise of Indian women's literature in the early 6th century BC. The earliest known anthology of women's literature in India has been identified as those belonging to the Therigatha nuns, the poets being contemporaries of the Buddha. One of these, Mutta, writes, So free am I, so gloriously free, free from three petty things - from mortar, from pestle and from my twisted lord. [Tharu and Lalita p.68] Mutta's works, translated from Pali, offer an explanation through their interpretation. Religious escapism was the only way out for many women who were frustrated with a life inside the home. They chose to join the Buddhist sangha (religious communities) in their attempts to break away from the social world of tradition and marriage. Thus emerged poems and songs about what it meant to be free from household chores and sexual slavery. Although the early forms of writing addressed the issue of personal freedom, the poetry that followed later was a celebration of womanhood and sexuality.

Thursday, October 24, 2019

Pinnacle Manufacturing Part

Part I. c – Summary of Observations Including Assessment of Business Risk Based on the financial ratios calculated, it appears that Pinnacle Manufacturing (the â€Å"Company†) is both using up cash assets and increasing its debt. The Cash Ratio has declined each of the past three years indicating that the Company has a decreasing ability to pay its current liabilities from cash and will be required to liquidate assets to pay off current liabilities. The Current Ratio has also declined each of the last three years. In 2009, it was 218. % or 2. 186. This means that for every dollar of current liabilities the Company had $2. 18 in current assets with which to pay those liabilities. Inventory Turnover has declined from 4. 04 times per year in 2009 to 3. 78 times per year in 2011. This would seem to indicate that sales are slowing and inventory is not being sold as quickly as in prior years. This is further supported by the increasing Days to Sell Inventory number. In 2009 D ays to Sell Inventory was 90. 44 and had grown to 96. 48 days in 2011.This makes it important to assess inventory obsolescence in light of these numbers. Debt to Equity has increased significantly from 2009 to 2011. In 2009, the Debt to Equity Ratio was 70. 81%. In 2011, it had grown to 96. 48%. This might indicate that the Company does not have room to continue to borrow should it need cash to operate. If borrowing is not available as a financing tool, it is likely that the Company might need to look to its stockholders for additional cash or resort to more costly forms for financing. Gross Profit Margins have declined from 29. 1% in 2009 to 27. 5% in 2011. This ratio is helpful analytically to indicate that possible misstatements might exist in the areas of sales, COGS, A/R and inventory. As noted above there is already a negative trend in inventory for the Company. Similarly, Profit Margin for the Company has declined from 3. 77% to 2. 84% between 2009 and 2011. A decline in prof it margin can signal misstatements in various operating expense accounts and balance sheet items. It can also simply signal a declining business trend for the Company.Return on Assets shows the Company’s ability to generate a profit based on assets and equity. In 2009, the Company’s profit margin was 3. 07% and in 2011 it had fallen to 1. 91%. Overall, the Company appears to have slowing sales leading to growing inventory. The Company is increasing its debt burden to help cash flow since sales seem to be declining and inventory is growing. The profitability of the Company is declining steadily. Finally, if the Company finds itself in default of any loan covenants it will have to liquidate assets to pay its debts.Forced asset sales are never beneficial to the seller and would only exacerbate the already declining business trends of the Company. Part I. f – What Data is More Useful in Evaluating the Potential for Misrepresentations? We believe that each set of dat a has its strengths and weakness. The balance sheet data available for Pinnacle Manufacturing is extremely helpful in evaluating whether certain income statement items could be misstated. As an example, to know the trend in the asset Accounts Receivable: Trade made evaluating the income statement item Bad Debt expense easier.As a result, the financial data for the parent Pinnacle could be cross-referenced more easily. However, the subsidiary income statements allow greater detail into the business components that make up Pinnacle. A possible overstatement in one account for one of the subsidiaries could be cancelled out by a similar understatement in the in the same account for another subsidiary. When the numbers are rolled-up to the parent company, there might not be a noticeable problem in the account. As a result possible insufficient planning would result.With the subsidiary information, an audit of each corresponding account could result in a more accurate number for the paren t company. This would appear to help acceptable audit risk for the audit firm. ? Part I. g – Observations based on Accounts Receivable, Inventory and Short/Current Long-term Debt Accounts Receivable: Trade has grown in absolute dollar amount from just under $9. 6 Million in 2010 to over $14 Million in 2011. As a result, we believe it is important to look at the reasonableness of the allowance for bad debts and bad debt expense.Confirmation of balances with customers will help to uncover any discrepancies between Pinnacle and its customers about amounts owed and paid. This could impact the internal control over posting of payments at Pinnacle and whether the money is being diverted through fraud. Inventory has grown from slightly over $25 Million at year-end in both 2009 and 2010 to more than $32 Million in 2011. Growing inventory could be indicative of inventory obsolescence. Obsolete inventory would be subject to a write-down in value. We would want to explore these areas.We have identified Inventory as an area of possible misstatement for Pinnacle. Short/Current Long-term debt has increased from 2009 and 2010 levels in 2011. In 2009 and 2010, the short/current portion of long-term debt was only $41,070. In 2011 it had increased to almost $4 Million. We are concerned that a misstatement has occurred. If the amount is correct, we would want to ascertain why the sudden increase. If it is due to a scheduled one-time balloon payment being due it is less of a concern than if a loan has been accelerated due to default or failure to meet certain loan covenants.The long-term solvency of Pinnacle depends on the success of its operations to raise capital for future growth and expansion as well as its ability to make payments on its debts. If Pinnacle is in default and a loan has been called or accelerated it would negatively impact the Company’s ability to borrow in the future. ? Part I. h – Going Concern Issue We assess the likelihood that Pinnacl e is likely to fail financially in the next twelve months as low. While many of the items discussed indicate that Pinnacle has some financial problems, its current ratio is still well over 1.It might be holding some obsolete inventory but even obsolete inventory has some value to generate cash. In twelve months, if the Company does not resolve its growing inventory issues and possibly rework some of its debt deals, the decision might be different. Currently, sales are growing as is Income from operations and net income. The Company has a positive cash flow which buys it time to try to fix its underlying problems. Inattention to these details could cause us to revisit this question next year with a more dire answer.

Wednesday, October 23, 2019

Very Good

Computer Architecture and Assembly Language – Midterm 2011 1. In instruction ADC the operands can be oTwo register only oTwo register and one memory location oCF and two other operands oZF and two other operands 2. After the execution of instruction â€Å"RET† oSP is incremented by 2 oSP is decremented by 2 oSP is incremented by 1 oSP is decremented by 1 3. The extended ASCII has o64 characters o128 characters o256 characters o502 characters 4. The second byte in the word designated for screen location holds oThe dimension of the screen oCharacter position on the screen Character color on the screen oACSII code of the character 5. REP will always oIncremented CX by 1 oIncremented CX by 2 oDecremented CX by 1 oDecremented CX by 2 6. The routine that executes in response to an INT instruction is called oISR oIRS oISP oIRT 7. The iAPX888 architecture consists of _______ register. o12 o14 o16 o18 8. In the instruction â€Å"CMP AX,BX† the contents of oAX are changed oBX are changed not conformed oCX are changed oFlag register are changed 9. All the addressing mechanisms iniAPX88 return a number called ______ address. oeffective ofaulty oindirect odirect 10.The execution of the instruction â€Å"mov word [ES: DI], 0x0720† owill clear next character on screen owill print â€Å"20† at top left of the screen owill print â€Å"20† at top right of the screen owill move DI at location 0720 on the screen 11. â€Å"mov byte [num1],5† is _______ instruction. olegal oillegal ostack based omemory indirect 12. MOV instruction transfers a byte or word from which of the following source location. oDS:DI oES:SI oES:DI oDS:SI 13. The execution of the instruction â€Å"mov word [ES: 0], 0x0741† will print â€Å"A† on the screen, color of the character will be oBlack oWhite oRed oBlue 14.If AX contains FFFFh, then after execution of instruction â€Å"SAL ax, 3†, the result will be o-3 o+3 o-8 o+8 15. If the decimal number â€Å"35† is shifted by two bit to left, the new value will be o35 o70 o140 o17 16. While using STOBS, if DF=1 then oThe value of SI will be incremented by one oThe value of SI will be incremented by two oThe value of SI will be decremented by one oThe value of SI will be decremented by two 17. After the execution of STOSW, the CX will be oDecremented by 1 oDecremented by 2 oIncremented by 1 oIncremented by 2 18. The memory address always move from oprocessor to memory memory to processor omemory to peripheral operipheral to processor 19. An offset alone is not complete without osegment ocode label oindex register odata label 20. Code Segment is associated to _______ register by default. oIP oSS oBP oCX 21. Write down the procedure to clear the selective bit. (Marks: 2) 22. Why REP prefix is generally not used with LODS instruction? (Marks: 2) 23. What is difference between REPE and REPNE? (Marks: 3) 24. Describe Push and Pop with the help of an example. (Marks: 3) 25 . Explain all characteristics of SCAS instruction. (Marks: 5) 26. Describe Local Variable? (Marks: 5)