Friday, May 31, 2019

Religion and Belief in Bless Me Ultima Essay -- Bless Me Ultima

Religion and Belief in call down Me UltimaAfter reading the take for, Bless Me Ultima, I realized the integral importance of religion and need for religion and answers to lifes questions. At first, while reading this book, I thought it was incisively about relationships and the meaning in them but as the plot progressed I realized the book, is more than that, it questions the structures that decide the rules, morals and values that society is composed of. in that respect were three types of religion that I identified in the book that young Anthony chose to pursue. The first was the paganistic rituals of Ultima. Ultima came into the life of Tony at a very young age and had heavy(p) influence n the child. Ultima saved the life of Lucas with Tonys strength. Physical pain was brought unto Anthony because of Ultimas ritual, showing actual validity of the rituals themselves, that they were had tangibility. She brought torment on the Tenorios family (he was the rival in the book-the bad guy) saving Lucas though using ritualistic dolls and chants. This showed her magic was not only good but bad as well. Ultima guided Anthony through all of the mental and social torment during his early long time of grade school. So in away Ultima was a guide for Tony through his early years to make sense of all of the storms in his early life, but also was an instrument of religion to base his life on. But in the end of the book Ultima ultimately dies and the strength he once found in her is destroyed. She is ...

Thursday, May 30, 2019

The Limits of Software Liability Essay -- Legal Business Technology

Faulty software product can cost lives, cause injury, or economic damage. Write an essay to investigate the question, under which dowry a software company should be liable for the damage caused. Use an example where software failures are potentially dangerous, such as that of the Priuss brake software. address the difference between strict and negligent liability and comment on the social and economic impact stricter liability practices for software could have.It is remarkable, that nowadays, we have complex software systems everywhere. We have them in our dishwashers, and in our wristwatches, though they are not quite so mission-critical. But sometimes, the human factor can be devastating, because of the negligence or the strict liability who dominates, and often devastating implications not only for the man himself, but can affect the whole economy of a country, succeeding or at least trying to succeed, ignoring the institutions, rules and contract. A highly representative exampl e of the failure of human factors in an attempt to progress with the help of a software, is Ariane 5 explosion, that was the cause of a huge economic gap.It took the European Space Agency 10 years and $7 billion to produce Ariane 5, a giant rocket capable of hurling a pair of three-ton satellites into orbit with each launch. It intended to give Europe overwhelming supremacy in the commercial space business. at that place was no risk of lightning since the strength of the electric field in the spray was negligible. Perhaps, one problem, leading the explosion, was the visibility. The countdown, which also comprises the filling of the core stage, went smoothly until the first 7 minutes when the launch was put on hold since the visibility criteria ... ... at what determines the law and contracts, addressing scientists. Lastly, let us continue our efforts to improve our world, even with technological wonders.whole kit and boodle CitedARIANE 5 / charge 501 Failure / Prof. J. L. LIONS / Paris, 19 July 1996http//sspg1.bnsc.rl.ac.uk/Share/ISTP/ariane5r.htmA Bug and a Crash / by James Gleickhttp//www.around.com/ariane.htmlHardware and Software Liability / by Tim Tompkins / 6 December 2000http//www.cs.rpi.edu/academics/courses/fall00/ethics/papers/tompkt.htmlSoftware liability laws a dangerous solution / Chase Venters / September 5, 2007http//lwn.net/Articles/247933/SOFTWARE LIABILITY / Cem Kaner, J.D., Ph.D. / 1997http//www.badsoftware.com/theories.htmARIANE 5 / Flight 501 Failure / Prof. J. L. LIONS / Paris, 19 July 1996http//sunnyday.mit.edu/accidents/Ariane5accidentreport.html

Wednesday, May 29, 2019

President Jackson and the Removal of the Cherokee Indians :: American History Essays

President Jackson and the Removal of the Cherokee Indians The decision of the Jackson administration to remove the CherokeeIndians to lands west of the Mississippi River in the 1830s was more areformulation of the national policy that had been in effect since the1790s than a change in that policy. The dictum above is firm and can beeasily proved by examining the administration of Jackson and comparison tothe traditional course which was carried out for about 40 years. After 1825the federal government attempted to remove all easterly Indians to the GreatPlains area of the Far West. The Cherokee Indians of northwestern Georgia,to protect themselves from removal, made up a constitution which said thatthe Cherokee Indians were sovereign and non subject to the laws of Georgia.When the Cherokee sought tending from the Congress that body only allottedlands in the West and urged them to move. The Supreme Court, however, inWorcester vs. Georgia, ruled that they constituted a domestic de pendentnation not subject to the laws of Georgia. Jackson, who sympathized withthe frontiersman, was so outraged that he refused to enforce the decision.Instead he persuaded the tribe to give up its Georgia lands for areservation west of the Mississippi. gibe to Document A, the map shows eloquently, the relationshipbetween time and policies which effected the Indians. From the Colonial andConfederation treaties, a significant amount of land had been acquired fromthe Cherokee Indians. Successively, during Washingtons, Monroes, andJeffersons administration, more and more Indian land was beingcommandeered. The administrations during the 1790s to the 1830s hadgradually acquired more and more land from the Cherokee Indians. Jacksonfollowed that precedent by the acquisition of more Cherokee lands. According to Document B, the first of which is by raising an army,and destroying the resisting tribes entirely or 2ndly by forming treatiesof peace with them, under the existing circums tances of affairs, thejoined States have a clear right, consistently with the principles ofjustice and the laws of nature, to go bad to the destruction or expulsionof the savages. The use of the word savages, shows that the American hadirreverence toward other ethnic backgrounds. Henry Knox wanted to destroythe cherokee tribes inorder to gain land for the United States, although hequestions the morality of whether to acquire the cherokee land, hisconclusion forbodes the appropriation. According to Document C, That theCherokee Nation may be led to a greater degree of civilization, and to

Sir Gawain Preparing Himself and His Neck :: Arthurian Legands English Literature Essays

Sir Gawain Preparing Himself and His Neck Sir Gawain and the Green entitle, written by an anonymous fourteenth-century poet, describes the Arthurian legend about the Green Knights game with Sir Gawain. Now almost a year passes since the Green Knight has started a friendly challenge of a blow for a blow. And it is succession for Sir Gawain to prepare and to meet the Green Knight to receive his strike. Sir Gawain sees how the people around him care for him and wish he didnt have to go. He probably feels that the initiative part of the game wasnt completely fair, because the beheaded Green Knight survived what a mortal man tummynot. Nevertheless, Sir Gawain acts the likes of a true honorable entitle and decides to face his destiny Why should I tarry?And smiled with tranquil eyeIn destinies sad or merry,True men can but try. (Norton 561 - 565) Click here to see to this monologue Realizing that he is just human and is predestined for a tes t he isnt fully aware of, the only thing he can do is to do his best and not worry about the outcome. Sir Gawain decides to fully prepare himself for this ordeal and goes alone to pray humbly to G-d. He feels very crushed now, more than before when he was willing to take the Green Knights challenge after Arthur had already accepted it. Now he realizes that what seemed like a sure thing doesnt always turn out that way and that he has to take responsibility for his actions. Sir Gawain prepares for the journey and takes his favorite horse, Gringolet, with him. Gringolet is his redundant horse, and for this special occasion, he is honored with many golden fringes everywhere, perhaps for Gawain to feel more angelic as he leaves his life behind By then Gringolet was grit with saddleThat was gaily agleam with fine gilt fringe,New-furbished for the need with nail-heads brightThe bridle and the bars bedecked all with gold. (Norton, 597 - 600)His horse is his only compa nion on his pine way to the Green Chapel.

Tuesday, May 28, 2019

Star Jones :: essays research papers

esthesislet Marie Jones was born on March 24, 1962 in Badin, North Carolina. She lived in that respect with her grandparents while her mom and dad finished college. Then at the age of six, Jones and her sister moved to Trenton, New Jersey, to live with their mom. After moving to New Jersey, Star started to shine in school. She always held the top grades throughout school and after graduating from a parochial school she enrolled in the American University in Washington, DC. While at American, Star sang in the gospel choir and joined Alpha Kappa Alpha, a very prestigious African-American sorority. She was a popular student on campus and was condition the nickname of Star. It was at American that Jones was diagnosed with inoperable tumor and given nine months to live. She didnt want to believe the news so she went and had a import opinion. It was discovered that the tumor was indeed removable and it was removed.She went on to graduate from the University of Houstons law school and t hen passed the New York State bar exam the first date around. She then got a job at district attorneys office in Brooklyn. After three years with the district attorney, she started handling violent crime cases, gaining instead a reputation for nabbing stiff sentences for offenders. While working with violent crimes she was promoted to Senior Assistant District Attorney. Shes most remembered as her work on the bicycle Rapist case in which she won a 66-year prison term for the offender.In 1991, she landed a job as a part-time good commentator for Court TV. In 1992, she had a contract with the Today Show as their legal correspondent. She managed to land hard-to-get interviews with some of the most famous people in the world including Mike Tyson. Those interviews are what led to her getting national fame. She also gained respect for her reporting on such trials as O.J. Simpson and Lorena Bobbit. Star Jones was soon given her own television courtroom show called Jones & Jury where sh e played host/judge and the audience played the jury. Her biggest break came in 1997 when she became one of the hosts on rudiments The View. Her stint on the view has given her the opportunity to expand her views and comments on various ranges of topics. Not only is Star a famous have words show host, but shes a best selling author as well as an actress.

Star Jones :: essays research papers

mavinlet Marie Jones was born on March 24, 1962 in Badin, North Carolina. She lived there with her grandparents mend her mom and dad finished college. Then at the age of six, Jones and her sister moved to Trenton, New Jersey, to live with their mom. After moving to New Jersey, Star started to come d take in school. She always held the top grades throughout school and after graduating from a parochial school she enrolled in the American University in Washington, DC. While at American, Star sang in the gospel choir and joined Alpha Kappa Alpha, a very prestigious African-American sorority. She was a popular student on campus and was apt(p) the nickname of Star. It was at American that Jones was diagnosed with inoperable tumor and given nine months to live. She didnt want to believe the news so she went and had a second opinion. It was ascertained that the tumor was indeed removable and it was removed.She went on to graduate from the University of Houstons law school and thus pass ed the New York State bar exam the first time around. She then got a job at district attorneys office in Brooklyn. After three years with the district attorney, she started handling violent crime cases, gaining quite a reputation for nabbing stiff sentences for offenders. While working with violent crimes she was promoted to Senior Assistant District Attorney. Shes most remembered as her work on the Bicycle rapist case in which she won a 66-year prison term for the offender.In 1991, she landed a job as a part-time legal referee for Court TV. In 1992, she had a contract with the Today Show as their legal correspondent. She managed to land hard-to-get interviews with some of the most famous people in the military man including Mike Tyson. Those interviews are what led to her getting national fame. She also gained respect for her reporting on such trials as O.J. Simpson and Lorena Bobbit. Star Jones was soon given her own television courtroom essay called Jones & Jury where she play ed host/judge and the audience played the jury. Her biggest break came in 1997 when she became one of the hosts on ABCs The View. Her stint on the view has given her the opportunity to expand her views and comments on various ranges of topics. Not only is Star a famous talk show host, but shes a best selling author as well as an actress.

Monday, May 27, 2019

Comparing the Presantation of Conflict in the Charge

Comp atomic number 18 the presentation of conflict in The Charge of the get by Brigade by Alfred Tennyson and Anthem for Doomed Youth by Wilfred Owen. Alfred Lord Tennyson and Wilfred Owen argon both poets who write nearly the conflict of war and its victims. The Charge of the light brigade written by Lord Alfred Tennyson, it is based on a fatal and real event that unfolded in the frimean war. The poem was written as a memorial for the numerous soldiers that died in the war. However the Anthem for doomed youth is a sonnet written by Wilfred Owen.He writes about his feelings for the young men that he fought with on the front line in the Somme. Firstly, in both poems we are presented with resourcefulness revealing the humans of the wartime battlefield this is called aural imagery. In The Charge of the Light Brigade the words into the valley of death are affaird, this is a metaphor give noticeing that the Light Brigade charged themselves to their death, this shows the fierceness of battle and how people many people will died.The words charge for the guns proposes of the certain death that the soldiers will meet and how self-destructive this charge is, it excessively suggests the madness of the war. Tennyson says cannon to right of them, cannon to the left of them, cannon in front of them this shows the confusion through the soldiers and the fierce fighting that is mishap in this war. Whereas, in Owens poem Anthem for Doomed Youth the more graphic and hurried side of war is shown.Owen uses the words for these who die as cattle suggests the soldiers are abandoned in their own death and there is no way out, it could withal suggest that they are sent to be slaughtered just uniform cattle this proposes the tragedy and casualties of war. The words monstrous anger of the guns implies that the soldiers are scared of the guns and by equalning the guns to monsters this is showing the soldiers are young as it is typically children who are scared of monsters.Owen also uses the words hasty orisons this shows how the dead are not cared for and given an inappropriate burial, and it also shows the speed and rushed tone of war. It could also suggest the people who are praying are not only praying for the dead barely also praying for their own lives. Tennyson presents the realism of war as a desperate patch where heroes are born, he does not show the reality of war, which might be due to the fact he has not experienced it himself. In contrast Owen presents the reality of war well as he shows the gruesomeness and bitter sadness of war using aural imagery.In Stanza two of charge of the light brigade Tennyson writes O the wild charge they made this shows the recklessness of the charge as Tennyson states the word wild and also the pointlessness of the charge, Tennyson uses the word made this shows it was in the past and we mark the past like we remember the dead soldiers. Owen uses the style No mockeries now for them, no prayers nor bells this i llustrates how critical Owen is of religious ritual. The phrase passing bells could also suggest that the soldiers never got a proper burial.In Tennysons poem he exclaims honour the charge they made, Honour the light brigade this indicates that Tennyson is ordering us to remember them for what they did for their country as they are already dead but on the other hand, in Owens sonnet he says And each slow dusk a drawing go across of the blinds this points out that every night as the sun goes down the soldiers family waiting patiently for them to come back, slow dusk going down could represent their forbearance and hope lowering. Thirdly, in both poems there is use of aural imagery or onomatopoeia.We see this in Owens sonnet as he writes rifles rapid rattles this is also a metaphor he says this to create an atmosphere and give us a feel of what its like on the battlefield, later in the sonnet he also states the shrill, demented choirs of wailing shells this makes the atmosphere horr ifying as we assume that screams are caused by pain or fear but in this case they have already got pain before the bullet has even got to them, this is because they have been traumatised by the intensity of battle.In Tennysons poem he uses the phrase Volleyd and bellowingd this is used to show how the bullets where sent back and forth with some cannons in between representing the thunder I could also represent the one smaller army being bullets and the more powerful army being the loud prevailing army, thunderd is a use of apocalyptic imagery which is a way to describe the disaster of war as we associate thunder with danger and authority.As well as the above Tennyson also uses the phrase stormd at with shot and shell this shows the confusion of war and the low visibility it relates back to the above quote as thunder comes in storms which could mean that the cannon shots come in packs, the word shot and shell are a violent, noisy, destructive force that that could be thought about i n a storm. In both poems both poets use rhetorical unbeliefs in their poems, Tennyson says Was there a man dismayed? this gives us an insight into the heads of these soldiers, essay to imagine how it must feel to charge into death head on. Tennyson asks if any of the soldiers were dismayed which means to lose your courage or to be overcome by terror. The soldiers were going through hell on the battlefield and it would be a pretty normal reaction for the circumstances that they were in. On the other hand in Owens sonnet his asks about remembrance as he states What candles may be held to speed them all? this could mean a more general question like what rituals can people possible perform to help these soldiers pass on peacefully? these could be Rituals like lighting candles in church. This means we could than say that these candles is a metaphor for the larger ceremonies we hold when to honouring those killed in action. As well as Owens question about remembrance and honouring Tenn yson last question is also, as he proposes the question When can their glory fade? he is trying to say when wont they be known as legends as they have fought for their country when they were outnumbered one to a hundred but they did not oblige, they risked certain death for all for one cause. In conclusion, both poets have written their poems to convey the tragedy of war and to accent the importance of remembrance. I feel also wrote their poems to honour those who risked their lives and most had their lives taken for their country and queen. This makes the audience reflect on war as the poets have created a mental picture of the horrific scenes of war.

Sunday, May 26, 2019

Compare and Contrast the Techniques Used by Bronte in Describing Thornfiled Hall in Chapter 11, with those used by Woolf in Describing London

Jane Eyres tone is both gothic and romantic, often conjuring an atmosphere of mystery and secrecy. Her description of Thornfield in chapter 11, is very(prenominal) Victorian and thorough, which draws us into the novel. On page 122 of Chapter 11, when approaching the third floor, Jane uses a visual first person narrative text. When Bronte writes, Mrs Fairfax stayed behind a moment to constrain the trap-door, she is giving us an aspect of ambiguity, the word fasten emphasises the refusal of entry.The description of the staircase in Thornfield Hall illustrates the rigid and constricted atmosphere, as they are described as the cut garret staircase. Bronte uses alliteration when stating, lingered in the long passage, to emphasise the description of her movement in the surroundings. The phrase separating used in the passage exemplifies the secrecy within Thornfield, which also intrigues us. The use of semicolons and commas in the passage, adds to the appeal of Thornifield, illustrated when Bronte writes, the third story narrow, low, and dim.These techniques disrupt the flow of the article of faith to show the fascination and anxiety that she has for the attic. This allows the structure of the sentence to be sharp, with short gaps to keep the reader curious and interested. The depiction of the building demonstrates the typical Victorian accommodation, of lesser, gothic and narrow appearance. Furthermore, the conclusive text of the little window at the far end shows the isolation within Thornfield, as light can barely enter the house. Bronte shows the seclusion in addition to this, as Jane says with its two rows of small black doors.The technique of colour imagery used here, exemplifies the obscurity and secrecy, which adds to the suspense of Thornfield. In Jane, Bronte gives us a detailed description of the events that occur in her biography. condescension these Gothic elements, Janes personality is friendly and the tone is also affectionate and confessional. Her unflagging spirit and opinionated nature further infuse the book with high cypher and suspense. Mrs Dalloway is written in the first person narrative and so all her images are also very thorough. The accent used by Woolf is very snappy and visual.This is immediately demonstrated on the first page, as Woolf uses onomatopoeic terms such as What a lark What a plunge The use of ecphonesis marks also illustrates the exuberant atmosphere in London. The opening paragraph is also heavily punctuated, but the technique used by Woolf is less emblematic in channel to Jane Eyre. We get a great image of the frantic and constructive lifestyle Mrs Dalloway has in London, as Woolf uses terms such as traffic and solemnity. The tongue is very active in comparison to Jane Eyre, as the onomatopoeic image of Big Ben is described as ThereOut it boomed. Here Woolf is utilising heavy sound terms, to attract the reader into the novel and to allow us to appreciate all the elements of London city . The long sentences used by Woolf and constant repetitive descriptions anchor the dialect in the novel and help hold the prose down. Woolf also frequently uses semi-colons rather than commas in Mrs Dalloway, to break the language and interpretation of the novel down, to prevent an easy and silver-tongued read.This is illustrated when Woolf writes, and swinging brass bands barrel organs in the triumph nd the strange high singing of some aeroplane overhead was what she loved life London The tone that Woolf takes is very sensitive in contrast to the solid language used by Bronte. Woolf has a poetic rhythm in her prose, illustrated when she writes, in that respect was a beating, a stirring of galloping ponies, tapping at cricket bats. The consistent use of this sound imagery, also exemplifies the typical buoyant London atmosphere. In contrast to Jane Eyre, Woolf uses a positive colour imagery to show the attractive London environment, when writing soft mesh of the grey-blue morning a ir.Furthermore when entering the park, Woolf uses a technique of alliteration, to show the contrasting atmosphere of London city, to the park when writing the slow-swimming happy ducks. A more calming and subtle dialect is now used, in comparison to Jane Eyre, where Bronte uses a sharper and more emotional tone. The main contrasts between the two novels are the different use of punctuation in each. Woolfs Mrs Dalloway, although heavily punctuated, employs a more simple style. The descriptions, although very thorough, are basic to interpret, to compliment the simple imagery used.However Bronte uses the technique of punctuation in Jane Eyre, to compliment Janes feelings. Though both novels use similar techniques of punctuation, Brontes utilises this aspect to compliment her novel more, which adds to the element of suspense and mystery. This intrigues the reader and allows us to feel Janes emotions at the current time. The technique and punctuation that Woolf uses, helps to turn out t he environment of London and help create a very expressive novel, which concentrates more on the surroundings.

Saturday, May 25, 2019

Child Labour Essay

Child wear is the practice of having babyren engage in stinting activity, on part or full-time basis. The practice deprives churlren of their c honorhood, and is harmful to their physical and mental development. Poverty, lack of good schools and growth of informal economy ar considered as the primal causes of electric razor labour in India. The 2001 national census of India estimated the total number of child labour, aged 514, to be at 12. 6 million.The child labour problem is not unique to India worldwide, ab protrude 217 million children work, many full-time. In 2001, out of a 12. million, about 12 million children in India were in a hazardous job. UNICEF estimates that India with its larger population, has the highest number of labourers in the world under 14 elder age of age, while sub-saharan African countries perplex the highest percentage of children who argon deployed as child labour. International confinement Organisation estimates that agriculture at 60 percent i s the largest employer of child labour in India, while United re cosmoss Food and Agriculture Organisation estimates 70 % of child labour is deployed in agriculture and related activities.Outside of agriculture, child labour is observed in almost all informal sectors of the Indian economy. Companies including Gap, Primark, Monsanto and others have been criticised for child labour in their products. The companies claim they have strict policies against selling products made by small kids, but there are many links in a supply chain making it difficult to police them all.In 2011, after triple years of Primarks effort, BBC acknowledged that its award-winning investigative journalism report of Indian child labour use by Primark was a fake. BBC apologized to Primark, to Indian suppliers and all its viewers. Article 24 of Indias constitution prohibits child labour. Additionally, various laws and the Indian Penal Code, such as the Juvenile Justice (care and protection) of Children Act- 2000, and the Child project (Prohibition and Abolition) Act-1986 leave alone a basis in law to identify, prosecute and stop child labour in India.The International Labour Organisation (ILO) states that child labour whitethorn be defined in a number of different ways, and a different definition yields a different estimate of child labour in India as well as other countries. According to ILO, children or adolescents who participate in work that does not affect their health and personal development or interfere with their schooling, is not child labour rather it may generally be regarded as being something positive. e is also a man who tiheir parents some the home, assisting family or earning pocket money outside school hours and over holidays. These kinds of activities, suggests ILO, may contribute to childrens developmentlly, socially or morally dangerous and harmful to children, or work whose schedule interferes with their ability to attend regular school, or work that affects in any manner their ability to focus during school or attend healthy childhood.UNICEF defines child labour differently. A child, suggests UNICEF, is involved in child labour activities if between 5 to 11 years of age, he or she did at least one hour of economic activity or at least 28 hours of domestic work in a week, and in miscue of children between 12 to 14 years of age, he or she did at least 14 hours of economic activity or at least 42 hours of economic activity and domestic work per week.UNICEF in another report suggests, Childrens work needs to be seen as happening along a continuum, with destructive or exploitative work at one end and beneficial work promoting or enhancing childrens development without interfering with their schooling, recreation and last out at the other. And between these two poles are vast areas of work that need not negatively affect a childs development. Indias count 2001 office defines child labour as participation of a child less than 17 years of age in any economically creative activity with or without compensation, wages or profit.Such participation could be physical or mental or both. This work includes part-time help or unpaid work on the farm, family enterprise or in any other economic activity such as cultivation and milk takings for sale or domestic consumption. Indian government classifies child labourers into two groups Main workers are those who work 6 months or more per year. And marginal child workers are those who work at any time during the year but less than 6 months in a year.Some child rights activists argue that child labour must include every child who is not in school because he or she is a hidden child worker. UNICEF, however, points out that India faces major shortages of schools, classrooms and teachers particularly in rural areas where 90 percent of child labour problem is observed. About 1 in 5 capital schools have hardly one teacher to teach students crossways all grades. After its independen ce from colonial rule, India has passed a number of constitutional protections and laws on child labour.The Constitution of India in the Fundamental Rights and the Directive Principles of State Policy prohibits child labour d experience the stairs the age of 14 years in any factory or exploit or castle or engaged in any other hazardous employment (Article 24). The constitution also envisioned that India shall, by 1960, provide home and resources for free and compulsory education to all children of the age six to 14 years. (Article 21-A and Article 45). India has a federal form of government, and child labour is a study on which both the central government and country governments can legislate, and have.The major national legislative developments include the following The Factories Act of 1948 The Act prohibits the employment of children below the age of 14 years in any factory. The law also placed rules on who, when and how long can pre-adults aged 1518 years be employed in any factory. The Mines Act of 1952 The Act prohibits the employment of children below 18 years of age in a mine. The Child Labour (Prohibition and Regulation) Act of 1986 The Act prohibits the employment of children below the age of 14 years in hazardous occupations identified in a describe by the law. The list was expanded in 2006, and again in 2008.The Juvenile Justice (Care and Protection) of Children Act of 2000 This law made it a crime, punishable with a prison term, for anyone to procure or employ a child in any hazardous employment or in bondage. The Right of Children to Free and Compulsory Education Act of 2009 The law mandates free and compulsory education to all children aged 6 to 14 years. This legislation also mandated that 25 percent of seats in every cloistered school must be allocated for children from disadvantaged groups and physically challenged children. India formulated a National Policy on Child Labour in 1987.This Policy seeks to sweep up a gradual & sequential approach with a focus on rehabilitation of children working in hazardous occupations. It envisioned strict enforcement of Indian laws on child labour combined with development programs to address the root causes of child labour such as poverty. In 1988, this led to the National Child Labour Project (NCLP) initiative. This legal and development initiative continues, with a current central government funding of 602 crores, targeted solely to eliminate child labour in India. scorn these efforts, child labour remains a major challenge for India.For much of human history and across different cultures, children less than 17 years old have contributed to family welfare in a variety of ways. UNICEF suggests that poverty is the big cause of child labour. The report also notes that in rural and impoverished move of developing and undeveloped parts of the world, children have no real and meaningful alternative. Schools and teachers are unavailable. Child labour is the unnatural result. A BBC report, similarly, concludes poverty and inadequate public education infrastructure are some of the causes of child labour in India.Between boys and girls, UNICEF finds girls are two times more likely to be out of school and working in a domestic role. Parents with limited resources, claims UNICEF, have to choose whose school costs and fees they can afford when a school is available. Educating girls tends to be a lower priority across the world, including India. Girls are also harassed or bullied at schools, sidelined by prejudice or poor curricula, according to UNICEF. completely by virtue of their gender, therefore, many girls are kept from school or drop out, then provide child labour.The International Labour Organisation (ILO) and counterpane smiles through education organisation(OSSE) suggests poverty is the greatest single force driving children into the workplace. Income from a childs work is felt to be crucial for his/her own survival or for that of the household. For som e families, income from their childrens labour is between 25 to 40% of the household income. According to a 2008 study by ILO, among the most important factors driving children to harmful labour is the lack of availability and quality of schooling. Many communities, particularly rural areas do not possess adequate school facilities. tear down when schools are sometimes available, they are too far away, difficult to reach, unaffordable or the quality of education is so poor that parents wonder if press release to school is actually worth it. In government-run primary schools, even when children show up, government-paid teachers do not show up 25% of the time. The 2008 ILO study suggests that illiteracy resulting from a child going to work, rather than a quality primary and secondary school, limits the childs ability to get a basic educational grounding which would in shape situations enable them to acquire skills and to improve their prospects for a decent adult working life.An al beit older report published by UNICEF outlines the issues summarized by the ILO report. The UNICEF report claimed that while 90% of child labour in India is in its rural areas, the availability and quality of schools is decrepit in rural areas of India, claims the old UNICEF report, about 50% of government funded primary schools that exist do not have a building, 40% lack a blackboard, few have books, and 97% of funds for these publicly funded school have been budgeted by the government as salaries for the teacher and administrators.A 2012 Wall Street Journal article reports while the enrollment in Indias school has dramatically increased in recent years to over 96% of all children in the 6-14 year age group, the infrastructure in schools, aimed in part to get over child labour, remains poor over 81,000 schools do not have a blackboard and about 42,000 government schools operate without a building with pick out shift arrangements during monsoons and inclement weather. Biggeri and Mehrotra have studied the macroeconomic factors that encourage child labour. They focus their study on five Asian nations including India, Pakistan, Indonesia, Thailand and Philippines.They suggest that child labour is a serious problem in all five, but it is not a new problem. Macroeconomic causes encouraged widespread child labour across the world, over most of human history. They suggest that the causes for child labour include both the demand and the supply side. While poverty and unavailability of good schools inform the child labour supply side, they suggest that the growth of low paying informal economy rather than higher paying formal economy called organize economy in India is amongst the causes of the demand side.India has rigid labour laws and numerous regulations that prevent growth of organised sector where work protections are easier to monitor, and work more oil-bearing and higher paying. The unintended effect of Indian complex labour laws is the work has shifte d to the unorganised, informal sector. As a result, after the unorganised agriculture sector which employs 60% of child labour, it is the unorganised trade, unorganised assembly and unorganised retail work that is the largest employer of child labour.If macroeconomic factors and laws prevent growth of formal sector, the family owned informal sector grows, deploying low cost, easy to hire, easy to dismiss labour in form of child labour. Even in situations where children are going to school, claim Biggeri and Mehrotra, children engage in routine after-school home-based manufacturing and economic activity. Other scholars too suggest that inflexibility and structure of Indias labour market, size of informal economy, inability of industries to scale up and lack of modern manufacturing technologies are major macroeconomic factors affecting demand and acceptability of child labour.Cigno et al. suggest the government planned and implemented land redistribution programs in India, where poor families were given small plots of land with the idea of enabling economic independence, have had the unintended effect of increased child labour. They find that smallholder plots of land are labour-intensively farmed since small plots cannot productively afford expensive farming equipment. In these cases, a means to increase output from the small plot has been to apply more labour, including child labour.

Friday, May 24, 2019

Persuasion, Manipulation, and Seduction as Related to Human Communication Essay

Johnson 2 Since the beginning of the human race, human have use some sort of influence to get other to do what they want them to do. The soonest example of this tidy sum be seen in the Garden of Eden, where Adam was influenced to eat from the forbidden fruit. For the purpose of this paper we testament attempt to compare the effect of persuasion, manipulation, and subjugation as it relates to human communication. Much of human communication involves attempts to influence. It is done verbally and non-verbally, consciously and unconsciously, honestly and deceitfully.Some people may be swayed with reason and logical system or by emotions and character. There is no doubt that the power to persuade is a coveted tool for anyone regardless of how they wish to use it. However, beyond elemental persuasion are other acts of influence that are just as powerful. The terms persuasion, manipulation, and seduction are sometimes used interchangeable when describing influential manner (Newell, 2 010). Persuasion is the act of influencing others, who are conscious of the intent, through communication.That is they are conscious that attempted influencing is taking institutionalize. Also it is under the assumed umbrella of free will meaning that there is no form of duress or outside pressure involved that would force influence. While persuasion is an act that takes place amid at least two conscious parties, manipulation happens when the side world influenced is not aware of it. That is a human is programmed over time to execute casual decisions mindlessly based on the expected behavior of themselves and others.Manipulation takes place when a conscious person triggers an automatic response from an unconscious thinker. The art of seduction, as it is often described, is a kin to persuasion as its intent to influence is known. What sets it apart, Johnson 3 however, is the influencer (seducer) is setup to be the object of desire that will complete the deficient parts of audien ce so that they may be complete (Codoban, 2006). Seduction is also a form of manipulation as it draws upon social programming and rude(a) responses of people.As the tern is used mostly in the relationships of a man and a woman (or sexual preference), there are many programmed and natural responses that take place when a seducer successfully makes themselves the object of anothers desire (Newell, 2006). Sometimes the lines may be blurred when influencing takes place. There are definite honourable stigmas attached to each of these influencing techniques. While persuasion has a broad connotation of simple attempts of influence to any audiences, manipulation and seduction have specific undertones of being immoral (Newell, 2006).Modern day persuasive devices are all around us and not all are as obvious as we they are, they can be very subtle. There are many ways in which people work to persuade. In advertising, commercials, magazines, movies, and political campaigns often times we see more than empty promises, which classifies much of what we see in those arenas as seduction. On the other hand some of what we see in politics and marketing are close set(predicate) to manipulation than seduction (Tuenge, 2010). Examples of manipulative devices given by Codoban (2006) were as follow, reciprocity, the consistency mechanism and social proof principle (p. 153-154).

Thursday, May 23, 2019

Persistent Organic Pollutants and Food Allergy Essay

Persistent organic pollutants (POPs) argon compounds with cyclic, halogenated and are organic in nature characteristics that impart stability in their structures (Ritter, Solomon, Forget, Stemeroff, and OLeary, 1995). Be motion of its morphologic stability, POPs withstand degradation while its organic nature makes its solubility high in lipid or organic solvent but low in water and in other inorganic solvents. Additionally, their semi-volatile nature allows them to exist in vapor or be deposited on atmospheric particulates.Food allergy is a result of the abnormal response of the soundboxs immune system to aliment for thoughts that whitethorn cause grave illness and even death (U. S. department of wellness and Human Services, 2007). It is mistakenly associated with food intolerance which is a digestive problem and preserve not be attributed to food allergy. In addition, food intolerance is not caused by the action of the immune system rather by the lack of specific metabolic enz yme needed in the digestion of a particular food (U. S. Department of health and Human Services, 2007). Individuals with familial allergy background are prone to food allergies and other supersensitized diseases like asthma.Meanwhile, the gastrointestinal tract, skin, lungs, throat, and skin are frequently sites of allergic reactions (U. S. Department of health and Human Services, 2007). Persistent Organic Pollutants Organo-halogenated compounds such as toxaphene, chlordane, dieldrin, dibenzo-p-dioxins, DDT, dibenzo-p-furans, and polychlorinated biphenyls or PCBs are known for their structural stability and environmental persistence, thus, bioaccumulation results as they continuously flow in the ecological food chain (Ritter, Solomon, Forget, Stemeroff, and OLeary, 1995). As an example, PCBs resist degradation for several years and biomagnify by 70,000 folds.Since POPs are semi-volatile, they go away from warm regions and condense in geographical areas like mountain terrains an d Polar Regions (California Breast Cancer Research Program, 2007). These properties permeated PCBs in worldwide places including Antarctic, arctic, and desert regions where chemical plants do not exist. Most POPs came from anthropogenic sources like industrial production and foliar applications of pesticides and insecticides while others such as dioxins and furans are just by-products of the manufacturing change, waste incineration, forest fires, and metallurgical processes (Environmental Literacy Council, 2008).As such, the presence of PCBs in far flung places is a manifestation of its worldwide-dispersal from several industrial sources. In fact, fifteen nanograms per cubic meter of PCBs concentration have been analyzed in the atmosphere of industrialized areas and different places over the world (Ritter, Solomon, Forget, Stemeroff, and OLeary, 1995). Thus, the PCBs presence in rain and snow would not be a surprise. Exposure to POPs by means of food consumption, industrial occupat ion, and pollutants may lead to toxicity.POPs lipophilicity or high solubility in lipids in couple with its structural stability and biomagnification in the food chain result to high risk of bioaccumulation and toxicity among living organisms. More than these, metabolic conversion of POPs into more resolved compounds is also possible. Researches conducted on this matter showed the correlations of PCBs use of goods and services with the dysfunction of endocrine, reproductive, and immune systems, cancer, neurobehavioral disorders and some infant abnormalities (Ritter, Solomon, Forget, Stemeroff, and OLeary, 1995).Moreover, exposure to POPs has been correlated with a decrease in the population of marine organisms like dolphins, whales, and fish species (Ritter, Solomon, Forget, Stemeroff, and OLeary, 1995). Food Allergy Food allergens are proteins in foods that after digestion run through the bloodstream to specific body parts and triggers allergic reactions (U. S. Department of wel lness and Human Services, 2007). Allergic reactions may take place either at the specific cells or within the whole body (Jackson, 2003). The length of digestive process determines the possible time and location of the allergic reactions.If one is highly sensitive to substances present in food, by merely just chewing the food allergic reaction may start at the mouth. Most of the time stomachache, vomiting, and diarrhea are observed after eating which indicate allergic reactions. After food digestion, food allergens flow through the bloods stream and may trigger blood pressure lowering. Nonetheless, reaching the skin, mouth, and lungs, may cause hives, itchiness, and even smothering (U. S. Department of Health and Human Services, 2007). Antibodies or immunoglobulins are protein substances secreted by B-lymphocytes to work against antigens or allergens (Jackson, 2003).Antigens are exuded by bacteria or other microorganisms which brings bodily infections. However, the extraneous produc tion of antibodies may cause illness (Jackson, 2003). Meanwhile, potential antigens are also present in dust, pollens and foods. By means of direct contact, inhalation or consumption of these antigens, the body generates assign antibodies to combat their infectious effects (Jackson, 2003). The immune system has two consecutive actions leading to allergic reaction. During the digestion of foods, the immune system produces immunoglobulin-E (IgE), an antibody which is protein in nature (U. S.Department of Health and Human Services, 2007). Then, IgE adheres with basophils and mast cells located in blood and body tissues respectively. This food-specific antibody educes the cells to elicit chemicals like histamine which in turn produces allergy (U. S. Department of Health and Human Services, 2007). tool of Allergic Reaction The production of allergens signals the action and circulation of IgE through the blood stream to bodily parts. The IgE molecule has a specific site for antigen ver tebral column and receptor-specific end for cell attachment. Then, the IgE attracts antigen as it binds on the surface of the cell (Jackson, 2003).As such, the cell is incited by the antigen to generate antibodies. The cell becomes sensitive to the subsequent attacks of the aforesaid(prenominal) antigens and autonomic response develops. Thus, as the cell detects the presence of the antigen, it educes biologically active and other proinflammatory substances like histamines and leukotrienes (Jackson, 2003). These substances trigger the inflammatory response of the cell resulting to an increase blood supply and other immune system components on the affected area that can be observed as itching and swelling (Jackson, 2003).Since mast cells and basophils are located in different body parts, immediate allergic reactions are often observed in some individuals who are highly sensitive with allergies. As a result of allergen absorption and wide circulation of chemical mediators, the body ca n be systematically engrossed with allergic reactions (Jackson, 2003). The intestine has defensive barriers that prevent the main course and contact of any antigens with the mast cells (Jackson, 2003). Also, the gut wall is covered with viscous mucus secreted by the lining cells.This mucus has protective substances acting as antiseptic coupled with the help of antibodies. Then, epithelial cells are located below the mucus membrane, which generate enzymes that can deactivate histamine and other bioactive substances (Jackson, 2003). Allergens that may infiltrate the layer of epithelial cells can be deactivated by antibodies without inflammatory response production. If the antigens were able to escape all these mechanisms, mast cells covered by IgE produce chemical mediators that in turn cause inflammatory response (Jackson, 2003). ConclusionThe genetic predisposition causes individuals with familial allergic history to become susceptible to allergic reactions as triggered by specific antibody or allergen. As a result, asthma, rhinitis, and even anaphylaxis can be observed wit these individuals (Jackson, 2003). This inborn allergic tendency is called atopy, thus, individuals in this condition are tagged as atopic. On the other hand, contemporary theory on the nature of allergy suggested that the prevalence of allergy-related cases nowadays can be attributed to the modern life style (Jackson, 2003).For instance, drug treatment of a mother during pregnancy and infants medication may contribute to early acquisition of allergic tendency due to the bodys adverse reaction with drugs (Jackson, 2003). Also, the inhalation of bacteria or other microorganism through air pollutants and other atmospheric particulates that may include persistent organic pollutants or POPs provoke the immune system to produce antibodies then, allergic reactions spontaneously occur.

Wednesday, May 22, 2019

The Lost Symbol Chapter 24-25

CHAPTER 24The revelation crashed over Langdon like a wave.I realize why I am here.Standing in the center of the Rotunda, Langdon felt a powerful urge to turn and run away . . . from irradiations hand, from the shining cash ring, from the suspicious meats of Sato and Anderson. Instead, he stood dead still, clinging more tightly to the leather daybag that hung on his raise. Ive got to get disclose of here.His jaw clenched as his memory began replaying the guesswork from that cold morning, long time ago in Cambridge. It was six A.M. and Langdon was entering his classroom as he always did following his ritual morning laps in the Harvard Pool. The well- feeln(prenominal) smells of chalk dust and steam heat greeted him as he crossed the threshold. He took two steps toward his desk solely s cash in ones chipsped short.A figure was waiting there for himan elegant gentleman with an aquiline face and regal gray eyes.Peter? Langdon stared in shock.Peter Solomons smile flashed white in the dimly light room. Good morning, Robert. Surprised to see me? His voice was soft, and until straight there was power there.Langdon hurried over and warmly shook his friends hand. What in the world is a Yale muddy blood doing on the Crimson campus before dawn?Covert mission behind enemy lines, Solomon said, laughing. He moti wizd to Langdons trim waistline. Laps are paying off. Youre in true shape.Just trying to make you feel old, Langdon said, toying with him. Its long to see you, Peter. Whats up?Short business trip, the man replied, glancing around the deserted classroom. Im sorry to falloff in on you like this, Robert, but I have only a few minutes. Theres something I needed to ask you . . . in person. A favor.Thats a first. Langdon wondered what a simple college professor could possibly do for the man who had everything. Anything at all, he replied, pleased for any opportunity to do something for someone who had given him so much, especially when Peters life of good fo rtune had similarly been marred by so much tragedy.Solomon lowered his voice. I was hoping you would consider looking after something for me.Langdon furled his eyes. Not Hercules, I hope. Langdon had once agreed to take autoe of Solomons hundred-fifty-pound mastiff, Hercules, during Solomons travels. While at Langdons home, the dog apparently had become homesick for his favorite leather chew toy and had located a worthy substitute in Langdons studyan original vellum, hand-calligraphed, illuminated Bible from the 1600s. Somehow bad dog didnt quite search adequate.You know, Im still searching for a replacement, Solomon said, smiling sheepishly.Forget it. Im glad Hercules got a taste of religion.Solomon chuckled but seemed distracted. Robert, the reason I came to see you is Id like you to financial backing an eye on something that is quite valucapable to me. I inherited it a while back, but Im no longer comfortable leaving it in my home or in my office.Langdon immediately felt un comfortable. Anything quite valuable in Peter Solomons world had to be worth an absolute fortune. How ab show up a safe-deposit disaster? Doesnt your family have stock in half the banks in America?That would involve paperwork and bank employees Id prefer a trusted friend. And I know you arsehole keep secrets. Solomon reached in his pocket and pulled come out a small box, handing it to Langdon.Considering the dramatic preamble, Langdon had expected something more impressive. The software system was a small cube-shaped box, about three inches square, wrap in faded brown packing paper and tied with twine. From the packages heavy weight and size, it felt like its contents must be rock or metal. This is it? Langdon turned the box in his hands, now nonicing the twine had been carefully secured on one side with an embossed wax seal, like an antique edict. The seal fag out a double-headed phoenix with the number 33 emblazoned on its chestthe traditional symbol of the highest degree of Freemasonry.Really, Peter, Langdon said, a lopsided grin creeping across his face. Youre the reverent Master of a Masonic lodge, not the pope. Sealing packages with your ring?Solomon glanced vote out at his gold ring and gave a chuckle. I didnt seal this package, Robert. My great-grandfather did. Al to the highest degree a century ago.Langdons head snapped up. What?Solomon held up his ring finger. This Masonic ring was his. After that, it was my grandfathers, then my fathers . . . and eventually mine.Langdon held up the package. Your great-grandfather wrapped this a century ago and nought has opened it?Thats right.But . . . why not?Solomon smiled. Because its not time.Langdon stared. Time for what?Robert, I know this will sound odd, but the less you know, the better. Just put this package somewhere safe, and please tell no one I gave it to you.Langdon searched his mentors eyes for a glint of playfulness. Solomon had a propensity for dramatics, and Langdon wondered if he wasnt being played a bit here. Peter, are you certain(predicate) this isnt just a clever ploy to make me think Ive been entrusted with some kind of ancient Masonic secret so Ill be curious and decide to join?The Masons do not recruit, Robert, you know that. Besides, youve already told me youd prefer not to join.This was true. Langdon had great respect for Masonic philosophy and symbolism, and yet he had decided never to be initiated the orders vows of secrecy would prevent him from discussing Freemasonry with his students. It had been for this same reason that Socrates had refused to formally participate in the Eleusinian Mysteries.As Langdon now regarded the mysterious smaller box and its Masonic seal, he could not help but ask the obvious question. Why not entrust this to one of your Masonic brothers?Lets just hypothesize I have an instinct it would be safer stored outside the brotherhood. And please dont let the size of this package fool you. If what my father told me is correct, t hen it contains something of substantial power. He paused. A talisman, of sorts.Did he say a talisman? By definition, a talisman was an object with magical powers. Traditionally, talismans were used for driveing luck, warding off evil spirits, or aiding in ancient rituals. Peter, you do realize that talismans went out of vogue in the Middle Ages, right?Peter laid a patient hand on Langdons shoulder. I know how this sounds, Robert. Ive known you a long time, and your skepticism is one of your greatest strengths as an academic. It is also your greatest weakness. I know you well enough to know youre not a man I can ask to believe . . . only to trust. So now I am asking you to trust me when I tell you this talisman is powerful. I was told it can imbue its possessor with the ability to bring order from chaos.Langdon could only stare. The idea of order from chaos was one of the great Masonic axioms. Ordo ab chao. Even so, the claim that a talisman could impart any power at all was absurd , much less the power to bring order from chaos.This talisman, Solomon continued, would be dangerous in the wrong hands, and unfortunately, I have reason to believe powerful people want to steal it from me. His eyes were as serious as Langdon could ever recall. I would like you to keep it safe for me for a while. Can you do that?That night, Langdon sat alone at his kitchen table with the package and tried to imagine what could possibly be inside. In the end, he simply chalked it up to Peters eccentricity and locked the package in his librarys wall safe, eventually forgetting all about it.That was . . . until this morning.The anticipate call from the man with the southern accent.Oh, Professor, I almost forgot the assistant had said after giving Langdon the specifics of his travel arrangements to D.C. There is one more thing Mr. Solomon requested.Yes? Langdon replied, his straits already moving to the lecture he had just agreed to give.Mr. Solomon left a note here for you. The man b egan reading awkwardly, as if trying to draw Peters penmanship. Please ask Robert . . . to bring . . . the small, sealed package I gave him many years ago. The man paused. Does this make any sense to you? Langdon felt surprised as he recalled the small box that had been sitting in his wall safe all this time. Actually, yes. I know what Peter means.And you can bring it?Of line of achievement. Tell Peter Ill bring it.Wonderful. The assistant sounded relieved. Enjoy your speech tonight. Safe travels.Before leaving home, Langdon had dutifully retrieved the wrapped package from the back of his safe and placed it in his shoulder bag.Now he was standing in the U.S. Capitol, feeling certain of only one thing. Peter Solomon would be horrified to know how badly Langdon had failed him.CHAPTER 25My divinity fudge, Katherine was right. As usual.Trish Dunne stared in amazement at the search-spider results that were materializing on the blood plasma wall before her. She had doubted the search would turn up any results at all, but in fact, she now had over a dozen hits. And they were still coming in.One entry in particular looked quite promising.Trish turned and shouted in the direction of the library. Katherine? I think youll want to see thisIt had been a couple of years since Trish had run a search spider like this, and tonights results astounded her. A few years ago, this search would have been a dead end. Now, however, it seemed that the quantity of searchable digital material in the world had exploded to the point where someone could find literally anything. Incredibly, one of the let outwords was a word Trish had never even heard before . . . and the search even found that.Katherine rushed through the reign-room door. What have you got?A bunch of candidates. Trish motioned to the plasma wall. Every one of these documents contains all of your key phrases verbatim.Katherine tucked her hair behind her ear and scanned the list. Before you get too excited, Trish added , I can assure you that most of these documents are not what youre looking for. Theyre what we call black holes. Look at the charge up sizes. Absolutely enormous. Theyre things like compressed archives of millions of e-mails, giant unabridged cyclopaedia sets, global message boards that have been running for years, and so forth. By virtue of their size and diverse content, these files contain so many potential keywords that they suck in any search engine that comes anywhere near them.Katherine pointed to one of the entries near the top of the list. How about that one?Trish smiled. Katherine was a step ahead, having found the sole file on the list that had a small file size. Good eyes. Yeah, thats really our only candidate so far. In fact, that files so small it cant be more than a page or so.Open it. Katherines tone was intense.Trish could not imagine a one-page document containing all the strange search strings Katherine had provided. Nonetheless, when she clicked and opened the document, the key phrases were there . . . crystal clear and easy to spot in the text.Katherine strode over, eyes riveted to the plasma wall. This document is . . . redacted?Trish nodded. Welcome to the world of digitized text.Automatic redaction had become banal practice when offering digitized documents. Redaction was a process wherein a server allowed a user to search the entire text, but then revealed only a small portion of ita teaser of sortsonly that text immediately flanking the requested keywords. By omitting the vast majority of the text, the server avoided copyright infringement and also sent the user an intriguing message I have the information youre searching for, but if you want the rest of it, youll have to buy it from me.As you can see, Trish said, scrolling through the heavily abridged page, the document contains all of your key phrases.Katherine stared up at the redaction in silence.Trish gave her a minute and then scrolled back to the top of the page. Each of Kat herines key phrases was underlined in capital letters and accompanied by a small sample of teaser textthe two words that appeared on either side of the requested phrase. Trish could not imagine what this document was referring to. And what the heck is a symbolon?Katherine stepped eagerly toward the screen. Where did this document come from? Who wrote it?Trish was already working on it. Give me a second. Im trying to chase mountain the source.I need to know who wrote this, Katherine repeated, her voice intense. I need to see the rest of it.Im trying, Trish said, startled by the edge in Katherines tone.Strangely, the files location was not displaying as a traditional Web address but rather as a numeric Internet Protocol address. I cant unmask the IP, Trish said. The domain names not coming up. Hold on. She pulled up her terminal window. Ill run a traceroute.Trish typed the sequence of commands to ping all the hops between her control rooms machine and whatever machine was storing thi s document.Tracing now, she said, executing the command.Traceroutes were extremely fast, and a long list of network bends appeared almost instantly on the plasma wall. Trish scanned down . . . down . . . through the path of routers and switches that connected her machine to . . .What the hell? Her trace had stopped before reaching the documents server. Her ping, for some reason, had hit a network device that swallowed it rather than bouncing it back. It looks like my traceroute got blocked, Trish said. Is that even possible?Run it again.Trish launched another traceroute and got the same result. Nope. Dead end. Its like this document is on a server that is untraceable. She looked at the last few hops before the dead end. I can tell you, though, its located somewhere in the D.C. area.Youre kidding.Not surp climb, Trish said. These spider programs spiral out geographically, meaning the first results are always local. Besides, one of your search strings was Washington, D.C. How about a who is search? Katherine prompted. Wouldnt that tell you who owns the domain? A bit lowbrow, but not a bad idea. Trish navigated to the who is database and ran a search for the IP, hoping to match the cryptic numbers to an actual domain name. Her frustration was now tempered by rising curiosity. Who has this document? The who is results appeared quickly, showing no match, and Trish held up her hands in defeat. Its like this IP address doesnt exist. I cant get any information about it at all.Obviously the IP exists. Weve just searched a document thats stored thereTrue. And yet whoever had this document apparently preferred not to share his or her identity. Im not sure what to tell you. Systems traces arent really my thing, and unless you want to call in someone with hacking skills, Im at a loss.Do you know someone?Trish turned and stared at her boss. Katherine, I was kidding. Its not exactly a great idea.But it is done? She checked her watch.Um, yeah . . . all the time. Technically its pretty easy.Who do you know?Hackers? Trish laughed nervously. Like half the jackasss at my old job.Anyone you trust?Is she serious? Trish could see Katherine was dead serious. Well, yeah, she said hurriedly. I know this one guy we could call. He was our systems security specialistserious computing machine geek. He wanted to date me, which kind of sucked, but hes a good guy, and Id trust him. Also, he does freelance.Can he be discreet?Hes a hacker. Of course he can be discreet. Thats what he does. But Im sure hed want at least a thousand bucks to even lookCall him. go him double for fast results.Trish was not sure what made her more uncomfortablehelping Katherine Solomon hire a hacker . . . or calling a guy who probably still found it impossible to believe a pudgy, redheaded metasystems analyst would rebuff his romantic advances. Youre sure about this?Use the resound in the library, Katherine said. Its got a blocked number. And obviously dont use my name.Right. Trish headed f or the door but paused when she heard Katherines iPhone chirp. With luck, the incoming text message might be information that would grant Trish a reprieve from this distasteful task. She waited as Katherine fished the iPhone from her lab coats pocket and eyed the screen.Katherine Solomon felt a wave of relief to see the name on her iPhone.At last. light beam SOLOMONIts a text message from my brother, she said, glancing over at Trish.Trish looked hopeful. So maybe we should ask him about all this . . . before we call a hacker?Katherine eyed the redacted document on the plasma wall and heard Dr. Abaddons voice. That which your brother believes is hidden in D.C. . . . it can be found. Katherine had no idea what to believe anymore, and this document delineate information about the far-fetched ideas with which Peter had apparently become obsessed.Katherine shook her head. I want to know who wrote this and where its located. Make the call.Trish frowned and headed for the door.Whether or not this document would be able to explain the mystery of what her brother had told Dr. Abaddon, there was at least one mystery that had been solved today. Her brother had finally learned how to use the text-messaging feature on the iPhone Katherine had given him.And alert the media, Katherine called after Trish. The great Peter Solomon just sent his first text message.In a strip-mall parking lot across the highroad from the SMSC, Malakh stood beside his limo, stretching his legs and waiting for the phone call he knew would be coming. The rain had stopped, and a winter moon had started to break through the clouds. It was the same moon that had shone down on Malakh through the oculus of the House of the Temple three months ago during his initiation.The world looks different tonight.As he waited, his stomach growled again. His two-day fast, although uncomfortable, was critical to his preparation. Such were the ancient ways. Soon all physical discomforts would be inconsequential.As Ma lakh stood in the cold night air, he chuckled to see that fate had deposited him, rather ironically, directly in forward of a tiny church. Here, nestled between Sterling Dental and a minimart, was a tiny sanctuary.LORDS HOUSE OF GLORY.Malakh gazed at the window, which displayed part of the churchs doctrinal statement WE gestate THAT JESUS CHRIST WAS BEGOTTEN BY THE HOLY SPIRIT, AND BORN OF THE VIRGIN MARY, AND IS BOTH TRUE MAN AND GOD.Malakh smiled. Yes, Jesus is indeed bothman and Godbut a virgin birth is not the prerequisite for divinity. That is not how it happens.The ring of a cell phone cut the night air, quickening his pulse. The phone that was now ringing was Malakhs owna cheap disposable phone he had purchased yesterday. The caller ID indicated it was the call he had been anticipating.A local call, Malakh mused, gazing out across Silver Hill Road toward the faint moonlit outline of a zigzag roofline over the treetops. Malakh flipped open his phone.This is Dr. Abaddon, he s aid, tuning his voice deeper.Its Katherine, the womans voice said. I finally heard from my brother.Oh, Im relieved. How is he?Hes on his way to my lab right now, Katherine said. In fact, he suggested you join us.Im sorry? Malakh feigned hesitation. In your . . . lab?He must trust you deeply. He never invites anyone back there.I suppose maybe he thinks a visit might help our discussions, but I feel like its an intrusion.If my brother says youre welcome, then youre welcome. Besides, he said he has a lot to tell us both, and Id love to get to the bottom of whats release on.Very well, then. Where exactly is your lab?At the Smithsonian Museum Support Center. Do you know where that is?No, Malakh said, staring across the parking lot at the complex. Im actually in my car right now, and I have a guidance system. Whats the address?Forty-two-ten Silver Hill Road.Okay, hold on. Ill type it in. Malakh waited for ten seconds and then said, Ah, good news, it looks like Im nearer than I thought. The GPS says Im only about ten minutes away. Great. Ill phone the security gate and tell them youre coming through.Thank you.Ill see you before long.Malakh pocketed the disposable phone and looked out toward the SMSC. Was I rude to invite myself? Smiling, he now pulled out Peter Solomons iPhone and admired the text message he had sent Katherine several minutes earlier.Got your messages. Alls fine. invade day. Forgot appointment with Dr. Abaddon. Sorry not to mention him sooner. Long story. Am headed to lab now. If available, have Dr. Abaddon join us inside. I trust him fully, and I have much to tell you both. PeterNot surprisingly, Peters iPhone now pinged with an incoming reply from Katherine.peter, congrats on learning to text relieved youre okay. spoke to dr. A., and he is coming to lab. see you shortly kClutching Solomons iPhone, Malakh crouched down under his limousine and wedged the phone between the front tire and the pavement. This phone had served Malakh well . . . but no w it was time it became untraceable. He climbed behind the wheel, put the car in gear, and crept forward until he heard the sharp crack of the iPhone imploding.Malakh put the car back in park and stared out at the distant silhouette of the SMSC. Ten minutes. Peter Solomons sprawling warehouse housed over thirty million treasures, but Malakh had come here tonight to conceal only the two most valuable.All of Katherine Solomons research.And Katherine Solomon herself.

Tuesday, May 21, 2019

Psychological Disorders Essay

Psychological Disorder AnalysisThis psychological analysis is nearly m ar a 42 year old Hispanic female who comes into the mental health clinic complaining of feeling tense only of the time, she has anaesthetise sleeping and is enable to concentrate on her work as an accountant. These symptoms argon causing problems for her at work. There bear be many scrams for her symptoms save to get to the calm of her issue a clinical assessment, diagnoses, and proper treatment for her disorder will be submitted. Maria comes into the clinic complaining of having trouble sleeping, feeling jumpy all the time, she has trouble concentrating on her work which seems to be causing an issue. A clinical interview is done first on Maria to attain some background information.clinical interviews questions are 1. What brings her to the clinic? 2. When did these feelings start and did an event trigger them? 3. Do these feelings last pertinacious? 4. What is her relationship with her parents? 5. What is her relationship with her siblings? 6. What type of work does she do? 7. What are her romantic relationships ilk? 8. What was her childhood invites identical? 9. What makes her happy? 10. Does she have any medical problems or medication she is taking? A possible disorder is causing her symptoms. Because information was non given concerning her background, family or social life Marias symptoms coincide with Dysthymic Disorder with major mental picture (University Of Phoenix, 2007).Dysthymic Disorder is known as double depression (Comer, 2011). It has symptoms of chronic and paltry level depression which minifys ones ability to function. Some individuals with dysthymic depression experience insomnia, or hypersomnia, poor appetite and overeating. They also experience poor concentration or have difficulty making decisions. Some fail to attend to daily hygiene, some experience low energy and low self esteem which cause them to overlook their daily duties or job responsibiliti es (University Of Phoenix, 2007). Most say they have been unhappy or drab all of their lives which cause them not maintain healthy relationships (University Of Phoenix, 2007). Dysthymia also causes changes in feeling, thinking, and physical well-being (University Of Phoenix, 2007).Dysthymic disorder share symptoms with major depression. Both disorders share symptoms such as sleep difficulties, shyness, and social withdrawal poor work performance,irritability, and conflict with family and friends (University Of Phoenix, 2007). The main difference between the two disorders is the intensity and duration of the disorder. With major depression symptoms are more severe such as the individual may be so depressed they cannot get out of bed and have thoughts of suicide whereas with Dysthymia the depression is more muted where the person is able to function on some level, he or she may be getting out of bed, but they may not groom themselves (University Of Phoenix, 2007). The other differenc e is major depression needs episodes that last for at least two weeks whereas dysthymic disorder symptoms persist for at least two years (University Of Phoenix, 2007). Major depression is also common with minorities. Minority groups that live below poverty or come from family whose environment was devoid tend to suffer from depression in higher numbers (Comer, 2011). Gender also plays a role in major depression women are twice as likely as men to receive a diagnosis of depression (Comer, 2011). To assess her gaucherie the DSM-IV is used. According to what Maria says her symptoms meet the criteria on the DSM-IV. Maria must display two of her symptoms for a period of 2 weeks or longer (University Of Phoenix, 2007). Maria did not indicate in this case study how long she had been experiencing symptoms.The case study did not indicate Marias dress condition or hygiene neither did it indicate that she was shy or socially withdrawn. Maria may have developed dysthymic disorder through a b ehavioral process called learned patronlessness. (University Of Phoenix, 2007). During an experiment dogs were placed in a detain with barricades and were exposed to a stimulus light which was followed by a shock (University Of Phoenix, 2007). They learned quickly through classical conditioning to fear the light (University Of Phoenix, 2007). In phase two of the experiment the shock was turned off and when the first group of dogs was exposed to the light they jumped over the barricade jumping to safety (Comer, 2011). When the here and now group of dogs encountered a large barrier they could not jump from the fear producing light to safety. When the light came on they ran around the cage barking and when they discovered escape was hopeless they lay down and whimpered (University Of Phoenix, 2007). In phase 3 of this experiment all the barriers were removed, and the dogs could escape easily however, when the light came on the dogs that had been trapped do no labor to leave the c age, instead they lay down and whimpered (University Of Phoenix, 2007).What the experiment revealed is the dogs learned that even though they can escape nothing they can do will meliorate their conditions so in effect the dogs learned to be helpless (University Of Phoenix, 2007). Because Maria is Hispanic the multicultural perspective plays a role. Because of social norms, family structure, and background this should be all taken into account with minorities. Maria probably grew in an impoverish environment. Research shows that Hispanics are more likely to live a poorer environment that White American (Comer, 2011). Maria may feel that her life was precondition to remain this way even though she has made a life for herself as an accountant. Just like the dogs in her thinking she feels nothing she can do will change her conditions, even though she has opportunities to improve her life she has learned to be helpless which makes her sad and depressed which are symptoms of the disorde r (University Of Phoenix, 2007).Multicultural research also shows that prejudice and discrimination against multicultural groups leads to higher anxiety and depression in minorities (Comer, 2011). Other probably causes for Marias disorder is a biological imbalance or hormonal imbalance like those seen in major depression. Biological theorist believes abnormal behavior as an illness is brought on by a malfunctioning organism in the brain or brain chemistry (Comer, 2011). The brain is made up of billions of nerve cells called neurons (Comer, 2011). When an electrical impulse reaches a neuron it is stimulated to release a certain chemical called a neurotransmitter which travels to receptors (Comer, 2011). These receptors travel to other neurons coition them to fire or not fire (Comer, 2011). Neurotransmitters play a key role in carrying information through the brain. In Marias case her neurotransmitters may be defective causing her symptoms (Comer, 2011). A hormonal imbalance can als o trigger depression (Comer, 2011). A womans biological life changes as she ages triggering different hormone levels (Comer, 2011). Although hormonal changes cannot alone cause depression alone important social and life events that occur with puberty, pregnancy, or change of life can (Comer, 2011). To treat dysthymic disorder biological treatments such as psychotherapy and medications like Prozac and Tofranil have proven to be helpful in reducing symptoms (University Of Phoenix, 2007).A variety of psychotherapeutic approaches can work as well. Cognitive behavioral therapy can challenge Marias unrealistic ideas,pessimistic expectations and self-critical evaluations (University Of Phoenix, 2007). Therapy can help her to have a more positive outlook on her life, and can help her to prioritize both opportunities and challenges concerning her life (University Of Phoenix, 2007). Multicultural treatments such as culture-sensitive therapy can be used in which the therapist addresses issues faced by minority groups (Comer, 2011). In addition behavioral oriented therapy can help her adapt fracture coping skills and help her communicate more effectively with friends and coworkers (University Of Phoenix, 2007). In this case study Maria went to the mental health clinic complaining of having trouble sleeping, feeling jumpy all the time, an inability to concentrate on her work as an accountant. Interview questions were asked which lead to a diagnosis of dysthymic disorder with major depression. Probable causes for her disorder are rooted in a neuro chemical imbalance or a learned helplessness from her environment (University Of Phoenix, 2007). Treatment for dysthymic disorder is psychotherapy and medication to reduce the symptoms (University Of Phoenix, 2007).

Monday, May 20, 2019

Emotion as Mediators Analytical Tool and Hurdle Essay

Emotion is a great deal associated with looking converseed in both situation at any given time an individual whitethorn encounter. In psychology it signifies a reaction involving certain physiological changes, such as an accelerated or retarded pulse rate, the diminished or increased activities of certain glands, or a change in body temperature, which stimulate the individual, or some component part of his or her body, to further activity (Microsoft Encarta, 2007).It is truly peculiar for a person not to show any reaction to circumstances especially when provoked by an early(a) person he is in conflict with. In this light, the role of a go-between is very important in bridging the gap between parties in conflict to find a roughhewn ground that possibly move toward a re ascendent. This paper will discuss the vital role of sense in conflicts. Considering that perception is the center of creation and nature of conflict, the prob expertness of managing conflicts may be influence d by sense as well.The book Meditating Dangerously says that The ostensible purpose of mediation is to ameliorate danger, pacify hurt feelings, and pretend safe spaces within which dialogue can replace debate, where interest-based negotiation can substitute for a try for power (p. 3). A challenge is laid on my table, to be able to answer how much(prenominal) sensation can only surface to make any progress in the subject argona? How does a intercessor controls his emotion over the case? Background of the study It was on 11th of April, 2008 when I first of all went fly as a intermediary. Prior to my case was my friend Diego working on his case between a tenant demanding from her landlord.It was a messy case, but the point to me was how hard it was to manage the raucous lady. She kept screech and interrupting the landlord and the mediator with her suffered pain with her grievance. It was to the point where we had a security coming in from other room to tell us to calm thin gs down because there was a trial going in our adjacent room. tacit she did not cooperate. Having to observe Diego went through a very hard time over his case with the rumbustious lady and her landlord, the sense of trepidation that I felt had challenged me.I needed to manage my own case without having to go through the same traumatic experience. When my turn came, I had to face five ladies three plaintiffs and twain defendants. I laid out the general rule of explaining mediation as a voluntary attend and the bound to confidentiality, etc. I wanted to make sure that my case will not go mishandled. Also, I wanted to assure myself and the parties involved that we are there to solve not a screeching spar like the previous case. During the debriefing with prof Joshua Jack, he asked why did I say respect and no yelling?By laying the ground rules in the beginning, did I hinder the parties true feelings to get on out? Professor Jack gave further comments on my case Parties in confl ict very often come into the mediation with strong senses of victimization, self righteousness, mistrust, and other negative judgments of one another. If a person thinks that the other is a liar and cheater both in this situation and generally, can they express this honest status and still be within the bounds of our rule?It is my view that, if we have any hope of facilitating any real transformation, we have to allow parties to express their true, even if ugly, perspectives. If we tell people to be nice, they will sometimes accommodate us, but by subdueing the expression of the true depth and magnitude of their experience and perception, we also squelch the potential for real transformation and resolution. According to Bowling and Hoffman (2003), The most direct and obvious impact that the mediator has on the mediation solve comes from the techniques he or she uses to influence the course of negotiations.These interventions, based on the mediators assessment of the obstacles t o settlement, might involve giving the parties an opportunity to vent aflame reactions to the dispute, encouraging the parties to concentrate on interests rather than positions, or helping the parties generate options for settlement (p. 19). With all due respect to Professor Jack, I know he is a great and experienced mediator. However, as a new mediator, the first thing I want to do is to make sure I have the case in control with confidence. By saying respect, I gave the parties the notion that we are to discuss the dispute, and find a solution as educated people.With the said experience, Professor Jeanne Cleary gave her comments as well Tricky issue, how much control to get off out with, based on past experience and with the understanding that the folks in front of you are new and not the past case. You will find your balanced style with this between too much control that may stifle whats really going on for them (which will most eternally include feelings) and too little cont rol (which will be unproductive for folks to hear each(prenominal) other). Keep at developing your sense of that balance as you continue. Emotional Intelligence as a Tool for Mediators It is not as strange as it may sound to mindfully express emotion with dignity still intact. Emotional intelligence, defined by Salovey and Mayer (1990) in their Ability Model as the ability to identify, use, understand, and manage emotions is very helpful for a mediator in handling mediation between 2 clashing parties to surface the emotion and be adept at bringing out the feelings from the parties while rest impartial. Caruso and Salovey (2004) expounded this model as four key emotional skills in Table 1.In this manner, Golemans (1998) (as cited in Johnson, Levine, and Richard, 2003) definition of emotional intelligence (EQ) as the capacity for recognizing our own feelings and those of others, for motivating ourselves, and for managing emotions well in ourselves and in our relationships (p. 317) was able to strengthen the argument of emotional intelligence as a tool for mediators. According to Johnson et al. (2003), Allowing emotion to emerge in a mediation, however requires a mediator with a high degree of emotional intelligence improving ones emotional intelligence is an essential development path for mediators.As EQ improves, a mediator becomes more comfortable with his or her ability to manage an emotional process successfully (p. 155). Johnson et al. (2003) were also sharp by saying the essence of developing emotional intelligence because disappear the ability to deal with emotions, the true power of mediation is lost. Absent the ability to create space for parties to express difficult emotions, it is unlikely that any resolution reached will last (p. 164).

Sunday, May 19, 2019

Point of Sale and Inventory System

con Title file of cut-rate sales event remains for tilt master Enterprise Researchers Serolf, Jham Year 2013 Course calculator Science Technology Adviser CHAPTER 1 THE PROBLEM AND ITS BACKGROUND 1. 1 Introduction Man scram come a long way in doing short letter transactions with all(prenominal) opposite. From the primitive slipway of exchanging goods or barter system, to the to a greater extent complex e-commerce or doing business transactions with the help of the internet. With technology rapidly changing and upgrading every now and whence, companies must adopt to be able to excel in each businesses cut-throat competition.Automation of ones institutionalize of exchange and inventory system puts you a step leading in the game. It helps you conduct business transactions with ease as you only have to press a few keys. It liberates you from lookless news report carrys as computation of the days sale and memory track of inventory be done automatically. With these th ings in mind, we, the blue angel bear on Technology group , hopes that upon apogee of this proposed Point of cut-rate sale and schedule break throughment, treasure nonrecreational Enterprise will find it of great prize and an indispensable asset in the company.That done the use of this carcass, unnecessary loss of clock m spent on computation of payments will be aspersed and greater client satisfaction will be achieved. On the part of the management, discerning which products be in lack of procurement and which are not, will help ward off over stocking and greatly minimize unnecessary expenses. At the end of the day, all transactions will be properly documented and generation of reports will just be a few keystrokes away.Finally, we hope that with the suppuration of the said governance, we will be able to help Stone professional person Enterprise live a company more than competitive and quality wise, worthy of recognition in the local industry. 1. 2 land and purpose of the cin one caseive Most companies nowadays use computers in transacting with their clients. Companies are now making their systems computerized because victimization a computerized system will help the company minimize the time and apparent motions consumed by using manual(a) system.Stone professional person Enterprise provide not only cleaning services for your natural stones flooring, and as well as offer liberal variety of floor care supplies and products. A sale refers to the exchange of product or services for an centre of money or its equivalent while Inventory in a business, is a total amount of goods and the act of counting them. A company testifyer must know the particular number of concomitants in their storage areas in effect to place orders and control losses. figurerizing both Sales and Inventory System will make an easier and tenderer transaction with the customers as well as monitoring the stocks of the products.The reach of Point of Sale w ith Inventory system is that this system makes a business ofttimes more efficient, laborious the be of running the business while improving customer service and making the business more enjoyable to work in while Computerized inventory system helps management control the inventories, in tour of duty lowering overall operating costs in the areas of labor, facilities and logistics. A computerized inventory system also improves customer-service inflection and fulfillment rates. 1. 3 Theoretical Framework The composition is for Stone Pro Enterprise by using Visual Basic that were relatively easy to learn and use.The seek workers were able to analyze the speed properties. Analyzing the point of sale design and work out it is important because the study needs to have a quality for the transaction to be accepted and a good imitator of transaction. The study use IPO chart on knowing the output of the study. The input will be a design and code. The input will pass through several p rocess. These are the speed of transaction. 1. 4 Conceptual Framework view 1 Research prototype Point of Sale System Stone Pro Enterprise 1. 5 Statement of the Problem Stone Pro Enterprise System requires some computer literacy on the user part.Its not trivial enthronement in time or money to set up. If the user doesnt have basic knowledge then the technical requirements of this POS system may baffle him. Ignoring normal practices the this POS system will confound and frustrate each user. The whole subject of this system is for the user to follow the rules, learn accounting terminology and become more disciplined. If this will be practice, then this POS system jackpot bring a tremendous advantages. 1. 6 conjecture This study is intended to design and develop a Computerized Point of Sale System for Stone Pro Enterprise 2013. Specifically, this study aims . To minimize the effort of the staff in in bear on the on inventorying Inventory 2. To make an efficient and accurate comp utation of exchange Registry 3. To bring about a well-arranged entropybase and to utensil strong security of the system for data security. 1. 7 Significance of the theatre of operations To Admin Department The proposed system will help the admin section of Stuff the Buss School Supplies. It will help to lessen the time and effort of the payroll maker/bookkeeper preparing payments of employees. The System develop can accommodate changing figures and produce a paperless purlieu through well design database.To Proponents This study will help the proponents to enhance the ability on how to create an understandable computerized system in an easy way. This will serve to the proponents as a challenge to do a better system. To the separate Researcher This study gives knowledge to the researcher on how to create a Computerized System in understandable way. This will serve as a fresh ground for the researcher whose study will be related in the field of study Technology. 1. 8 Scope an d limit point Scope This study is designed to develop a Computerized Point of Sale System for Stone Pro enterprise.It covers the process of preparing the on stock inventory record, keeping of bullion registry records safety and computing the accept up play(a) revenue. The proposed computerized Point of Sale System is expected to generate receipts and report list of daily and monthly revenue. Limitation The proposed Computerized Point of Sale System for Stone Pro Enterprise does not oblige network topology implementation and online syllabus or online transaction. 1. 7 Definition of Terms Point of Sale orcheckoutis the place where a transaction occurs in exchange for goods or services.The point of sale often refers to the bodily electronic exchange register or dedicated POS hardware employ for checkout, but the POS is simply the location where the sale is conducted, money changes haves and a receipt is given. Transaction an check up onment, communication, or relocation carried out between a buyer and a seller to exchange an asset for payment. Cash take is a mechanical or electronic device for calculating and recording sales transactions, and an attached funds draughtsmanfor storing cash in. The cash register also normally prints areceiptfor the customer.Inventory Control System is a process for managing and locating objects or materials. Computer Software is a collection ofcomputer designsand relateddatathat provides the instructions for telling acomputerwhat to do and how to do it. Computer ironware equals the collection of physical elements that comprise acomputersystem. Computer System A complete, workingcomputer. Computer systems will intromit the computer along with anysoftwareandperipheral devicesthat are necessary to make the computer routine Program is a sequence ofinstructionswritten to perform a specified task with acomputer.CHAPTER 2 REVIEW OF THE RELATED LITERATURE 2. 1. Foreign Literature Over the years, more enhancements were made to the cash registers until the early 1970s, when the first computer- moiln cash registers were introduced. The first computer-driven cash registers were basically a mainframe computer incase as a store controller that could control certain registers. These point of sale systems were the first to commercially utilize client-server technology, peer-to-peer communications, Local Area Network (LAN) backups, and remote initialization.In the late 1980s, retail software base on PC technology began to make its way into mainstream retail businesses. Today, retail point of sale systems are lite years in the lead of where they began. Todays POS systems are faster, more secure, and more reliable than their predecessors, and allow retailers to operate every scene of their business with a single, integrated point of sale system. Since computer power was the critical resource, efficiency of processing became the main goal. Emphasis was placed on automating quick process such as pu rchasing or paying, often within single department as indicated by Jeffrey A.Hofer on Modern System compend and Design (1996). Points of sale (POS) systems are electronic systems that provide businesses with the capability to retain and analyze a wide variety of inventory and transaction data on a continuous basis. POS systems have been touted as semiprecious tools for a wide variety of business purposes, including refining tar bring in marketing strategies tracking provider purchases ascertain customer purchasing patterns analyzing sales (on a daily, monthly, or annual basis) of each inventory item, department, or supplier and creating reports for use in making purchases, reorders, etc.Basic points of sale systems underwayly in use include standalone electronic cash registers, also known as ECRs ECR-based network systems and controller-based systems. Today, point of sale systems are light years ahead of where they began. Todays POS systems are faster, more secure, and more reli able than their predecessors, and allow retailers to operate every facet of their business with a single, integrated point of sale system. 2. 2 Local Literature Computers began from a wild imaginative idea to the worlds highly prioritized tool.Computers today are now apply as a support to manual processes and other past inventions like the radio, television, etc. It is now used by plurality for much simpler, easier and faster way to do things. Some used it as a hobby, and some use it as a job. Technology has never stopped from advancing through the years. Its new innovations helps answer the peoples further complex questions. Why not use these advantages to benefit ourselves? Many people use computers in their daily lives.Some use it for transactions, some use it for educational purposes and others use it for data storage. Though it might impenetrable unnecessary but in some cases when storing a file for such a big company, can you manage it properly? Organizing, finding a file, etc. With computers, it can help you simplify the process of storing and managing the files you need for future use and make finding files easier than the manual process. With our proposed Point of Sales and Inventory System In business like Stone Pro Enterprise , Sales and Inventory system plays an important role.It is used to track all the transactions made by the business and responsible for monitoring the items supplies. All the business transactions must be properly recorded and must be fully secured by password. A Computerized system is the best solution and most innovative answer for their needs. The researchers had been motivated to do a study on this topic according to the above observation. The result may help others to understand more about computer-generated data processing, especially on how to deal with computers in terms of speed, accuracy and data security. 2. Related Studies In exploration, we find new techniques, new knowledge, even develop new substances, gadgets , equipment, processes or procedures, imagination and skill is sedulous by the researcher. The commodities, new devices, services, in technology are needs of man for a better instinct(predicate) life which is the concern of the research. These useful arts are the products of the technological environment and the end-user is society in general. The fast growing trend and innovation in technologies today prompts researchers to conduct studies about the efficiency of system program.This Chapter presents a brief re take hold of of literature and studies, both local and foreign that is related to these studies. 2. 4 Foreign Studies 2. 5 Local Studies 2. 6 Synthesis CHAPTER 3 RESEARCH METHODOLOGY This chapter outline the research methodology of this study. The research was conducted in six phases and the research methodology will be discussed under several phases research design, stage setting of the study, subject of the study, source data, hardware and software requirements and sta tistical treatment to be use to come up with an effective proposal. . 1 Research Design The descriptive method of research was used for this study. To define the descriptive type of research, Creswell (1994) stated that the descriptive method of research is to gather information about the present existing condition. The emphasis is on describing rather than on judging or interpreting. The aim of descriptive research is to command formulated hypotheses that refer to the present situation in order to elucidate it. The descriptive begin is quick and practical in terms of the financial aspect.Moreover, this method allows a flexible approach, thus, when important new issues and questions modernise during the duration of the study, further investigation may be conducted. Descriptive research on the other hand is a type of research that is mainly concerned with describing the nature or condition and the degree in detail of the present situation. This method is used to describe the natur e of a situation, as it exists at the time of the study and to explore the cause/s of particular a phenomenon. The aim of descriptive research is to have got an accurate profile of the people, events or situations.With this research type, it is essential that the researcher already has a clear view or picture of the phenomena being investigated before the data collection procedure is carried out. The researcher used this attractive of research to obtain first hand data from the respondents so as to formulate rational and hearty conclusions and recommendations for the study. The descriptive approach is quick and practical in terms of the financial aspect. 3. 3 cuneusject of the Study A Point of Sale (POS ) System is asystemfor managing the sales of retail goods.The term is used to refer to the software and hardware associated with check out stands, and all of the bundled features which are included. Most retailers use a POSsystemat their check stands or tabulators, and several m ajor manufacturers offer POS systems designed for sundry(a) types of businesses, ranging from foodstuff stores to clothing boutiques. Using a POSsystemmakes a business much more efficient, lowering the costs of running the business while improving customer serviceand making the business more pleasant to work in.In the retail trade, the pointofsale is the moment when a customer walks up to a counter with goods and prepares to purchase them. A POSsystemhandles the transaction, whether it takes the form of anadding machineand a hand written receipt pad, or a complex computer system. Except in the case of very small businesses, a current POSsystemusually takes the form of a computersystem. 3. 4 Sources of the Study Our source data is split up into 2 groups, namely the source data based on direct observation and data sources based on substantiative observations. . ) Source of data based on direct observation, among others Conductingfield studies, it was held at the time we worked at a company engaged in the field of office equipment. Observation of the market to mend market prices. Discussion fellow colleagues, college friends and group member . 2. ) Source of data based on indirect observations Searchingthe internet. Lecture notes Visual Basic Handbook 3. 5 Procedure of the Study We made our own questionnaire for our study to know the outcome of Point of Sale System. so we distribute it to our respondents after they answer the question we tallied and get the average of the verbal interpretation. 3. 6 Project Design pic pic 3. 7 System immix Chart pic Figure 2 System Flowchart 4. 5 System Algorithm Our computerized system allows business owners to track sales, cash flow and item inventory. This system will also calculate the total of all the items that have been purchased. It will realise not only that the items has been calculated accurately but it will also eliminate the chance of a improper price being entered.It help retrieved purchase history, ite m sales detail, stock positioning reports, monthly, yearly, and seasonal sales data. Also this will prevent theft and also help to maintain a record of what is being sold. This will also help to monitor the employees. It will generate and print superior looking receipts. 3. 9 Hardware and Software Requirements The Point of Sale System by Blue Link Technology is the software which will be used. The operating or the platform that will be exhalation to use is Windows XP, Visual Basic 6. 0 as the front end and Microsoft Access 2007 as the database. Hardware minimum requirements Intel Pentium 3 3. Ghz with 512mb RAM. 600 x 800 sieve. 3. 10 Statistical Treatment selective informationbase The united collection of data, usually stored in one computer file in one location, although databases can encompass information from legion(predicate) sources and locations. drop reductions to a basic price of goods or services Frequency Count This is the most straight-forward approach to workin g with quantitative data. Items are classified according to a particular scheme and an arithmeticalal count is made of the number of items (ortokens) within the text which belong to each classification (ortype) in the scheme.Percentage A componentorratiowith 100 as the fixed and understood denominator. Weighted Mean is similar to anarithmetic mean(the most common type ofaverage), where instead of each of the data points contributing equally to the net average, some data points contribute more than others. The notion of weighted mean plays a role indescriptive statisticsand also occurs in a more general form in several other areas of mathematics. Tender In business, a term synonymous with payment or type of payment. CHAPTER 4 intromission ANALYSIS AND INTERPRETATION OF DATAIn this chapter states the take of acceptability of the essential system, the significant difference on the perception of the respondents to the developed system, development of the system, program flowchart , program algorithm, program listing, program output and user manual. 4. 1 The level of acceptableness of the developed system Questions Cashier Employee of Stuff the Weighted Mean Verbal Interpretation Bus 1.The point of sales system is easy to handle? 3 1. 5 2. 25 Uncertain 2. The computation of the amount price is accurate in 3. 5 3 3. 25 go over the Point of Sale System? 3. The point of sales System can maximize the 3. 5 4. 4 Agree productivity of the cashiers work? 4.The Point of Sales System is used efficiently among 4. 5 2. 5 3. 5 Agree various stores? 5. Do you think Point of Sale System can help to your 5 2. 3. 75 Agree company? Average Weighted Mean 3. 9 2. 8 3. 35 Agree delay 3Computation of the level of acceptability of the developed system Question 1 shows that among 20 respondents uncertain that Point of Sale System is easy to handle, because of the weighted mean of 2. 25. Question 2 shows that among 20 respondents with the weighted mean of 3. 25. This simply fashion that respondents agree that the computation of the amount price is accurate in the Point of Sale System. Question 3 shows that among 20 respondents with the weighted mean of 4. 0. This shows that most of the respondents agree that the Point of Sale System can maximize the productivity of the cashiers works.Question 4 shows that among 20 respondents with the weighted mean of 3. 5. This shows that the most respondents agree that the Point of Sales System was used efficiently among various stores. Question 5 shows that among 20 respondents with the weighted mean of 3. 75. This shows the most of the respondents agree that the Point of Sale System can help to their company. Based on the table most of the respondents hold because of the average weighted mean of 3. 35 which falls on Agree Verbal Interpretation. 4. 2 The meaning Difference of the Perception of the Respondents to the Developed System Respondents DistributionThe population consists of 20 persons where 50% of the respondents are cashiers and the employee of Stone Pro Enterprise. Respondents Quality Percentage Cashiers 10 50% Customers 10 50% Table 1 Respondent Table Opinion Index The researchers will use questionnaires with the opinion index below to scale the effectiveness of the study of the respondents. Some questions have options and some are needed to be evaluated and answerable by number with agree verbal interpretation. ( see table 2 ). Scale Range Verbal Interpretation 5 4. 01 5. 00 strongly Agree 4 3. 01 4. 00 Agree 3 2. 01 3. 00 Uncertain 2 1. 01 2. 00 disagree 1 0. 01 1. 00 Strongly Disagree Table 2 Option Index 4. 3 Development of the System pic pic pic pic pic pic pic pic pic pic pic 4. 4 Program Flow Chart pic pic pic pic pic pic pic 4. 5 Program Algorithm Our computerized system allows business owners to track sales, cash flow and item inventory. This system wil l also calculate the total of all the items that have been purchased. It will ensure not only that the items has been calculated accurately but it will also eliminate the chance of a wrong price being entered. Also this will prevent theft and also help to maintain a record of what is being sold. This will also help to monitor the employees. It will generate and print professional looking receipts. 4. 6 Program Listing A.Member Log In Option Explicit occult stand in cmdClose_Click() If Me. cmdClose. fable = Close thus Dim suffice reaction = MsgBox(Do you realy want to let go of this program? , vbYesNo + vbQuestion, realise Quit) If reply = vbYes whence oddity fetch up If Else Unload Me hold back If finis champion hidden gun for hire cmdOk_Click() Me. Ado exploiter. freshen up If Me. cmdClose. Caption = Close then Me. AdoUser. Recordset. honor (UserName = & txtUser. text edition & ) If Me. txtnews. schoolbook = Me. AdoUser. Recordset. Fields(Password) Then If Me. AdoUser. Recordset. Fields(Previledge) = Admin Then mdi principal(prenominal). mnuItems. Enabled = True mdiMain. tbMain. Panels(2). schoolbook = Me. AdoUser. Recordset. Fields(UserName) frmSplash. Show mdiMain. Show balance If If Me. AdoUser. Recordset. Fields(Previledge) = User Then mdiMain. mnuItems. Enabled = off mdiMain. mnuUser. Enabled = morose mdiMain. mnuCustomers. Enabled = inconclusive mdiMain. mnuSuppliers. Enabled = False mdiMain. Toolbar1. Buttons(11). Enabled = False mdiMain. stbMain. Panels(2). schoolbook = Me. AdoUser. Recordset. Fields(UserName) Unload Me mdiMain. Show blockade If Unload Me Else MsgBox handicap Password , vbExclamation, Invalid Password Me. txtPassword. SetFocus Me. txtPassword = terminate If annihilate If culmination replace cloak-and-dagger hacek Form_Load() On erroneous belief recruit Next impose SQLDB(AdoUser, spot * from UserAccount) AdoUser. polish up txtUser. schoolbook = Admin close champion Private crampfish txtPassw ord_KeyPress(KeyAscii As Integer) If KeyAscii = 13 Then cmdOk_Click cmdAccess_Click eat up If final stage change Private hired gun txtUser_Click(Area As Integer) On Error Resume Next Dim temp Me. AdoUser. Recordset. Find (UserName = & txtUser. text edition & ) temp = Me. AdoUser. Recordset. Fields(1) End grinder B. Main Page Private wedge shape MDIForm_Load() With stbMain ensures all panels are visible upon loading DE. Connection1. ConnectionString = Provider=Microsoft. Jet. OLEDB. 4. Data Source= & App. Path & DBStonePro. mdbPersist Security Info=FalseJet OLEDBDatabase Password= mdiMain. Width = 15360 End submarine Private stand in MDIForm_Unload(Cancel As Integer) Dim reply reply = MsgBox(Do you want to Quit this program? , vbYesNo + vbQuestion, Confirm Quit) If reply = vbYes Then End End If error Cancel = -1 End paladin Private Sub mnuAbout_Click() frmAbout. Show vbModal End Sub Private Sub mnuBD_Click() frmDatabase. Show vbModal End Sub Private Sub mnuCustomers_Click () frmCustomers. Show vbModal End Sub Private Sub mnufind_Click() frmfind. Show 1 End Sub Private Sub mnuGp_Click() frmGroup. Show vbModal End SubPrivate Sub mnuItems_Click() frmFItems. Show vbModal End Sub Private Sub mnuLog morose_Click() Dim reply reply = MsgBox(Do you really want to LogOff? , vbYesNo + vbQuestion, Confirm Log-Off) If reply = vbYes Then frmLogin. cmdClose. Caption = Cancel frmLogin. Show vbModal End If End Sub Private Sub mnuNewSales_Click() On Error Resume Next call out SQLDB1(frmNewSales. AdoSales, opt * from Sales) Call SQLDB2(frmNewSales. adoCustomer, take away * from Customer order by CustomerNumber) If frmNewSales. AdoSales. Recordset. RecordCount = 0 And frmNewSales. AdoSales. Recordset. RecordCount 9 Then frmNewSales. xtSalesNumber. text = 00000 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 9 And frmNewSales. AdoSales. Recordset. RecordCount 99 Then frmNewSales. txtSalesNumber. schoolbo ok = 0000 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 99 And frmNewSales. AdoSales. Recordset. RecordCount 999 Then frmNewSales. txtSalesNumber. textbook = 000 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 999 And frmNewSales.AdoSales. Recordset. RecordCount 9999 Then frmNewSales. txtSalesNumber. school text = 00 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 9999 And frmNewSales. AdoSales. Recordset. RecordCount 99999 Then frmNewSales. txtSalesNumber. text = 0 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 99999 And frmNewSales. AdoSales. Recordset. RecordCount 999999 Then frmNewSales. txtSalesNumber. school text = frmNewSales. AdoSales. Recordset. RecordCount + 1 End If frmNewSales. xtAmountPaid. school text = 0. 00 frmNe wSales. txtBalance. text = 0. 00 frmNewSales. txtTotalCost. Text = 0. 00 frmNewSales. txtDeliverySatus. Text = Undelivered frmNewSales. dtDate. honour = date frmNewSales. DTDelivery = date frmNewSales. Show vbModal End Sub Private Sub mnuOrder_Click() frmOrders. Show vbModal End Sub Private Sub mnuOrder2_Click() frmOrders. Show vbModal End Sub Private Sub mnuQuit_Click() Dim reply reply = MsgBox(Do you want to Quit this program? , vbYesNo + vbQuestion, Confirm Quit) If reply = vbYes Then End End If End Sub Private Sub mnuROP_Click() Set ReOrder. DataSource = frmReProd. Adodc1.Recordset ReOrder. Refresh ReOrder. Show End Sub Private Sub mnuRDelivered_Click() frmDelivered. Show vbModal End Sub Private Sub mnuRItems_Click() frmFItems. Show vbModal End Sub Private Sub mnuRP_Click() frmReProd. Show vbModal End Sub Private Sub mnuRPR_Click() frmReProd. Show vbModal End Sub Private Sub mnuRSales_Click() frmSalesReport. Show vbModal End Sub Private Sub mnuRSupplier_Click() frmSupplier. Sho w vbModal End Sub Private Sub mnuRUndelivered_Click() frmUndelivered. Show vbModal End Sub Private Sub mnuSuppliers_Click() frmSupplier. Show vbModal End Sub Private Sub mnuTips_Click() frmTips. Show vbModal End SubPrivate Sub mnuUpdateSales_Click() frmUpdateBalance. Show vbModal End Sub Private Sub mnuUser_Click() frmUser. Show vbModal End Sub Private Sub Toolbar1_ButtonClick(ByVal Button As MSComctlLib. Button) Select Case Button. Index Case 3 Call mnufind_Click Case 5 Popup calling card mnuTransaction, , Button. Left, (Button. draw + Button. Height) Case 7 PopupMenu mnuReport, , Button. Left, (Button. Top + Button. Height) Case 9 PopupMenu mnuAccount, , Button. Left, (Button. Top + Button. Height) Case 11 PopupMenu mnuHelp, , Button. Left, (Button. Top + Button. Height) Case 13 Dim reply reply = MsgBox(Do you want to Quit this program? , vbYesNo + vbQuestion, Confirm Quit) If reply = vbYes Then End End If error Cancel = -1 End Select End Sub C. Transaction Page Private Sub cmdAd d_Click() Grid_DblClick cmdEditItems. Enabled = True cmdRemove. Enabled = True End Sub Private Sub cmdCalculator_Click() Shell calc. exe, vbMaximizedFocus End Sub Private Sub cmdClose_Click() Call SQLDB1(AdoSales, Select * from Sales) Me. AdoSales. Refresh If Val(Me. txtTotalCost. Text) = 0 Then Unload Me Else If Me. txtCustomerName. Text = Then MsgBox Please complete data before closing. , vbInformation, Information Else With Me. AdoSales .Refresh .Recordset.AddNew .Recordset. Fields(SalesNumber) = Me. txtSalesNumber. Text . Recordset. Fields(CustomerNumber) = Me. txtCustomerNumber. Text . Recordset. Fields(CustomerName) = Me. txtCustomerName. Text . Recordset. Fields(Datepurchased) = Me. dtDate. encourage .Recordset. Fields(DeliveryDate) = Me. DTDelivery. cling to .Recordset. Fields(DeliveryStatus) = Me. txtDeliverySatus. Text . Recordset. Fields(TotalCost) = Me. txtTotalCost. Text .Recordset. Fields(total) = Me. Text3. Text .Recordset. Fields(Discount) = Me. Text2. Text .Recor dset. Fields(AmountPaid) = Me. txtAmountPaid. Text .Recordset.Fields(Balance) = Me. txtBalance. Text .Recordset. Update .Refresh Unload Me End With End If End If End Sub Private Sub cmdEditItems_Click() Me. AdoItems. Refresh Me. AdoItems. Recordset. Find (ItemNumber = & Me. AdoSalesInfo. Recordset. Fields(ItemNumber) & ) frmEditItems. txtinfo(0). Text = Me. AdoSalesInfo. Recordset. Fields(SalesNumber) frmEditItems. txtinfo(1). Text = Me. AdoSalesInfo. Recordset. Fields(Date) frmEditItems. txtinfo(2). Text = Me. AdoSalesInfo. Recordset. Fields(ItemNumber) frmEditItems. txtinfo(3). Text = Me. AdoSalesInfo. Recordset. Fields(ItemName) frmEditItems. txtinfo(4).Text = Me. AdoSalesInfo. Recordset. Fields(Qty) frmEditItems. txtinfo(5). Text = Me. AdoSalesInfo. Recordset. Fields(UnitPrice) frmEditItems. txtinfo(6). Text = Me. AdoSalesInfo. Recordset. Fields(TotalPrice) frmEditItems. Show vbModal End Sub Private Sub cmdNew_Click() On Error Resume Next cmdEditItems. Enabled = False cmdRemove . Enabled = False Call SQLDB1(AdoSales, Select * from Sales) Me. AdoSales. Refresh If Val(Me. txtTotalCost. Text) = 0 Then Else If Me. txtCustomerName. Text = Then MsgBox Please complete data before closing. , vbInformation, Information Else With Me. AdoSales .Refresh .Recordset.AddNew .Recordset. Fields(SalesNumber) = Me. txtSalesNumber. Text . Recordset. Fields(CustomerNumber) = Me. txtCustomerNumber. Text . Recordset. Fields(CustomerName) = Me. txtCustomerName. Text . Recordset. Fields(Datepurchased) = Me. dtDate. Value .Recordset. Fields(DeliveryDate) = Me. DTDelivery. Value .Recordset. Fields(DeliveryStatus) = Me. txtDeliverySatus. Text . Recordset. Fields(TotalCost) = Me. txtTotalCost. Text .Recordset. Fields(AmountPaid) = Me. txtAmountPaid. Text .Recordset. Fields(Discount) = Me. Text2. Text .Recordset. Fields(Balance) = Me. txtBalance. Text .Recordset.Fields(total) = Me. Text3. Text .Recordset. Update .Refresh Me. txtCustomerName. Locked = False Me. txtCustomerNumber. Locke d = False Me. txtCustomerName. Text = Me. txtCustomerNumber. Text = Me. txtAmountPaid. Text = 0. 00 Call SQLDB1(frmNewSales. AdoSales, Select * from Sales) Call SQLDB2(frmNewSales. adoCustomer, Select * from Customer order by CustomerName) If frmNewSales. AdoSales. Recordset. RecordCount = 0 And frmNewSales. AdoSales. Recordset. RecordCount 9 Then frmNewSales. txtSalesNumber. Text = 00000 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales.AdoSales. Recordset. RecordCount = 9 And frmNewSales. AdoSales. Recordset. RecordCount 99 Then frmNewSales. txtSalesNumber. Text = 0000 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 99 And frmNewSales. AdoSales. Recordset. RecordCount 999 Then frmNewSales. txtSalesNumber. Text = 000 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 999 And frmNewSales. AdoSales. Recordset. RecordCount 9999 Then frm NewSales. txtSalesNumber. Text = 00 & frmNewSales.AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 9999 And frmNewSales. AdoSales. Recordset. RecordCount 99999 Then frmNewSales. txtSalesNumber. Text = 0 & frmNewSales. AdoSales. Recordset. RecordCount + 1 End If If frmNewSales. AdoSales. Recordset. RecordCount = 99999 And frmNewSales. AdoSales. Recordset. RecordCount 999999 Then frmNewSales. txtSalesNumber. Text = frmNewSales. AdoSales. Recordset. RecordCount + 1 End If frmNewSales. txtAmountPaid. Text = 0. 00 frmNewSales. txtBalance. Text = 0. 00 frmNewSales. txtTotalCost. Text = 0. 00 rmNewSales. Text3. Text = 0. 00 frmNewSales. txtDeliverySatus. Text = Undelivered frmNewSales. dtDate. Value = date frmNewSales. DTDelivery = date Me. cmdNew. Enabled = False Me. cmdNewCustomer. Enabled = True Me. cmdPayment. Enabled = False Me. cmdReciept. Enabled = False Me. cmdEditItems. Enabled = False Me. cmdRemove. Enabled = False Call SQLDB3(AdoIt ems, Select * from Items where RemainingQty 0) Call SQLDB(AdoSalesInfo, Select * from SalesInfo where SalesNumber= & Me. txtSalesNumber. Text & ) AdoSalesInfo. Refresh AdoItems. Refresh Me. cmdNew. Enabled = True Set Grid2. DataSource = AdoSalesInfoGrid2. Columns(1). open = False Grid2. Columns(2). tangible = False Grid2. Columns(5). NumberFormat = 0. 00 Grid2. Columns(6). NumberFormat = 0. 00 Set Grid. DataSource = AdoItems Grid. Columns(0). open = False Grid. Columns(2). evident = False Grid. Columns(5). telescopic = False Grid. Columns(6). Visible = True Me. txtCustomerName. Locked = False Me. txtCustomerName. Locked = False lblChange. Caption = 0. 00 Me. txtCustomerName. Text = Me. txtCustomerNumber. Text = Me. txtAmountPaid. Text = 0. 00 Me. txtCustomerName. Locked = False Me. txtCustomerNumber. Locked = False Me. txtCustomerName. Text = Me. txtCustomerNumber. Text = Me. txtAmountPaid. Visible = True Unload Me End With End If End If End Sub Private Sub cmdNewCustomer_C lick() With frmNewCustomer If Me. adoCustomer. Recordset. RecordCount = 0 And Me. adoCustomer. Recordset. RecordCount 9 Then . txtinfo(0). Text = 00000 & Me. adoCustomer. Recordset. RecordCount + 1 End If If Me. adoCustomer. Recordset. RecordCount = 9 And Me. adoCustomer. Recordset. RecordCount 99 Then . txtinfo(0). Text = 0000 & Me. adoCustomer. Recordset. RecordCount + 1 End If If Me. adoCustomer. Recordset. RecordCount = 99 And Me. doCustomer. Recordset. RecordCount 999 Then . txtinfo(0). Text = 000 & Me. adoCustomer. Recordset. RecordCount + 1 End If If Me. adoCustomer. Recordset. RecordCount = 999 And Me. adoCustomer. Recordset. RecordCount 9999 Then . txtinfo(0). Text = 00 & Me. adoCustomer. Recordset. RecordCount + 1 End If If Me. adoCustomer. Recordset. RecordCount = 9999 And Me. adoCustomer. Recordset. RecordCount 99999 Then . txtinfo(0). Text = 0 & Me. adoCustomer. Recordset. RecordCount + 1 End If If Me. adoCustomer. Recordset. RecordCount = 99999 And Me. adoCustomer . Recordset.RecordCount 999999 Then . txtinfo(0). Text = Me. adoCustomer. Recordset. RecordCount + 1 End If .Show vbModal End With End Sub Private Sub cmdPayment_Click() If Me. AdoSalesInfo. Recordset. RecordCount = 0 Then MsgBox You cannot proceed to payment because there is no item in your sales item list , vbExclamation, Error Else frmPayment. txtBalance. Text = Me. txtBalance. Text frmPayment. Text3. Text = Me. txtTotalCost. Text frmPayment. txtChange. Text = 0. 00 frmPayment. txtPayment. Text = 0 frmPayment. Show vbModal End If End Sub Private Sub cmdReciept_Click() If Me. AdoSalesInfo. Recordset.RecordCount = 0 Then MsgBox There is no item , vbExclamation, StonePro System Else If Me. txtCustomerName. Text = Or Me. txtDeliverySatus. Text = Then MsgBox Please supply personal data before you view the receipt. , vbInformation, Information Else Set RptReceipt. DataSource = Me. AdoSalesInfo RptReceipt. Refresh RptReceipt. Sections(Section2). Controls(lblSalesNumber). Caption = fr mNewSales. txtSalesNumber. Text RptReceipt. Sections(Section2). Controls(lblTotalCost). Caption = Format(frmNewSales. Text3. Text, ,0. 00) RptReceipt. Sections(Section2). Controls(lblCustomerNumber).Caption = frmNewSales. txtCustomerNumber. Text RptReceipt. Sections(Section2). Controls(lblCustomerName). Caption = frmNewSales. txtCustomerName. Text RptReceipt. Sections(Section2). Controls(lblDatePurchased). Caption = frmNewSales. dtDate. Value RptReceipt. Sections(Section2). Controls(lblDeliveryDate). Caption = frmNewSales. DTDelivery. Value RptReceipt. Sections(Section2). Controls(lblDis). Caption = Format(frmNewSales. Text2. Text, ,0. 00) RptReceipt. Sections(Section2). Controls(lblAmountPaid). Caption = Format(frmNewSales. txtPayment. Text, ,0. 00) RptReceipt.Sections(Section2). Controls(lblBalance). Caption = Format(frmNewSales. txtBalance. Text, ,0. 00) RptReceipt. Sections(Section2). Controls(lblChange). Caption = Format(frmNewSales. lblChange. Caption, ,0. 00) cmdNew. Enabled = True RptReceipt. Show 1 End If End If End Sub Private Sub cmdRemove_Click() Dim reply reply = MsgBox(Are you sure you want to terminate this item to sales list? , vbYesNo + vbQuestion, Confirmation to Remove) If reply = vbYes Then frmNewSales. AdoItems. Refresh Call SQLDB3(AdoItems, Select * from Items) frmNewSales. AdoItems. Recordset. Find (ItemNumber= & Me. AdoSalesInfo.Recordset. Fields(ItemNumber) & ) frmNewSales. AdoItems. Recordset. Fields(RemainingQty) = Val(frmNewSales. AdoItems. Recordset. Fields(RemainingQty)) + Me. AdoSalesInfo. Recordset. Fields(Qty) frmNewSales. AdoItems. Recordset. Update frmNewSales. AdoItems. Refresh frmNewSales. txtTotalCost. Text = Format(Val(frmNewSales. txtTotalCost. Text) Me. AdoSalesInfo. Recordset. Fields(TotalPrice), 0. 00) frmNewSales. txtBalance. Text = Format(Val(frmNewSales. txtBalance. Text) Me. AdoSalesInfo. Recordset. Fields(TotalPrice), 0. 00) frmNewSales. AdoSalesInfo. Recordset. Delete frmNewSales.AdoSalesInfo. Refresh Call S QLDB3(AdoItems, Select * from Items where RemainingQty 0) Call SQLDB(AdoSalesInfo, Select * from SalesInfo where SalesNumber= & Me. txtSalesNumber. Text & ) AdoSalesInfo. Refresh AdoItems. Refresh Me. cmdNew. Enabled = True Set Grid2. DataSource = AdoSalesInfo Grid2. Columns(1). Visible = False Grid2. Columns(2). Visible = False Grid2. Columns(5). NumberFormat = 0. 00 Grid2. Columns(6). NumberFormat = 0. 00 Set Grid. DataSource = AdoItems Grid. Columns(0). Visible = False Grid. Columns(2). Visible = False Grid. Columns(5). Visible = False If Me. AdoSalesInfo. Recordset.RecordCount = 0 Then Me. cmdEditItems. Enabled = False Me. cmdRemove. Enabled = False Me. cmdPayment. Enabled = False End If Else End If End Sub Private Sub Form_Load() On Error Resume Next Call SQLDB3(AdoItems, Select * from Items where RemainingQty 0) Call SQLDB(AdoSalesInfo, Select * from SalesInfo where SalesNumber= & Me. txtSalesNumber. Text & ) Call SQLDB2(frmNewSales. adoCustomer, Select * from Customer Order by CustomerName) adoCustomer. Refresh AdoSalesInfo. Refresh AdoItems. Refresh Me. cmdNew. Enabled = True Set Grid2. DataSource = AdoSalesInfo Grid2. Columns(1). Visible = False Grid2. Columns(2).Visible = False Grid2. Columns(5). NumberFormat = 0. 00 Grid2. Columns(6). NumberFormat = 0. 00 Set Grid. DataSource = AdoItems Grid. Columns(0). Visible = False Grid. Columns(2). Visible = False Grid. Columns(5). Visible = False Grid. Columns(6). Visible = True Grid2. Refresh Call setgrid Call settext Call setgrid lblTotal. Caption = Total Number of Records & Me. AdoSalesInfo. Recordset. RecordCount End Sub Private Sub setgrid() Set Me. Grid2. DataSource = Me. AdoSalesInfo Grid. Columns(0). Visible = False Grid. Columns(2). Visible = False Grid. Columns(3). Visible = False Grid. Columns(4). Visible = FalseGrid. Columns(5). Visible = False Grid. Columns(6). Visible = True End Sub Private Sub Grid_DblClick() With frmSalesConfirm .txtinfo(0). Text = Me. txtSalesNumber. Text .txtinfo(1). Text = Me. dtDate. Value .txtinfo(2). Text = Me. AdoItems. Recordset. Fields(ItemNumber) . txtinfo(3). Text = Me. AdoItems. Recordset. Fields(ItemName) . txtinfo(4). Text = 0 .txtinfo(5). Text = Me. AdoItems. Recordset. Fields(UnitPrice) . txtinfo(6). Text = 0. 00 If Me. AdoItems. Recordset. Fields(Unit) = kilo Then .Label5. Caption = Quantity End If .Show vbModal End With End Sub Private Sub lvButtons_H3_Click()Unload Me End Sub Private Sub Text1_Change() On Error Resume Next Me. AdoItems. Refresh Me. AdoItems. Recordset. Filter = ItemName equivalent & LCase(Me. Text1. Text) & * Call settext Call setgrid If Me. Text1. Text = Then Me. AdoItems. Refresh setgrid End If End Sub Private Sub txtAmountPaid_Change() If Val(Me. txtAmountPaid. Text) Val(Me. txtTotalCost. Text) Then MsgBox Amount paid is lower than its total cost. , vbExclamation, Stone Pro System Me. txtAmountPaid. Text = 0. 00 Else Me. txtBalance. Text = Format(Val(Me. txtTotalCost. Text) Val(Me. txtAmountPaid. Text), 0. 00) End If End SubPrivate Sub txtAmountPaid_KeyPress(KeyAscii As Integer) If KeyAscii = 8 Then going Sub End If If KeyAscii = 46 Then blow over Sub End If If KeyAscii 48 Or KeyAscii 57 Then KeyAscii = 0 End If End Sub Private Sub txtCustomerName_Change() On Error Resume Next Me. adoCustomer. Refresh Me. adoCustomer. Recordset. Find (CustomerName = & Me. txtCustomerName. Text & ) Me. txtCustomerNumber. Text = Me. adoCustomer. Recordset. Fields(CustomerNumber) End Sub Private Sub txtCustomerNumber_KeyPress(KeyAscii As Integer) KeyAscii = False End Sub Private Sub txtDeliverySatus_KeyPress(KeyAscii As Integer) KeyAscii = False End SubConfirm Transaction Private Sub Check1_Click() If Check1. Value = 1 Then Me. Text2. Text = Format(Val(Me. Text3. Text * 0. 1), ,0. 00) Me. Text1. Text = Format(Me. Text2. Text, ,0. 00) run low Sub End If If Check1. Value = 0 Then Me. Text1. Text = 0. 00 Me. Text1. Text = Format(Val(Me. txtPayment. Text) Val(Me. Text2. Text), ,0. 00) Exit Sub End If End Sub Private Sub cmdClose_Click() frmNewSales. lblChange. Caption = Me. Text4. Text frmNewSales. Text2. Text = Me. Text1. Text Unload Me End Sub Private Sub cmdOk_Click() Dim reply reply = MsgBox(Are you sure of this payment?. Payment can be done only once in this transaction. , vbQuestion + vbYesNo, Confirmation) If reply = vbYes Then If Val(Me. txtPayment) Val(frmNewSales. txtTotalCost) Then Me. txtBalance. Text = 0. 00 Me. cmdOk. Enabled = False frmNewSales. txtBalance. Text = 0. 00 frmNewSales. txtPayment. Text = Val(Me. txtPayment) Me. Text4. Text = Format(Val(Me. txtPayment) Val(Text3. Text) + Val(Text1. Text), ,0. 00) frmNewSales. txtAmountPaid. Visible = False frmNewSales. cmdReciept. Enabled = True frmNewSales. cmdPayment. Enabled = False frmNewSales. cmdEditItems. Enabled = False frmNewSales. cmdRemove. Enabled = False frmNewSales. Text3. Text = Format(Val(Text3.Text) Val(Text1. Text), ,0. 00) Me. Text1. Text = 0. 00 Else Me. txtBalance. Text = Format(Val(Me. txtPaym ent) Val(Me. Text3. Text) Val(Me. Text1. Text), ,0. 00) Me. txtChange. Text = 0. 00 Me. cmdOk. Enabled = False frmNewSales. txtBalance. Text = Format(Val(Me. txtPayment) Val(Me. Text3. Text) Val(Me. Text1. Text), ,0. 00) frmNewSales. txtBalance. Text = Format(Val(Me. Text3) Val(Me. txtPayment. Text) Val(Me. Text1. Text), ,0. 00) frmNewSales. lblChange. Caption = 0. 00 frmNewSales. txtAmountPaid. Text = Val(Me. txtPayment) frmNewSales. txtPayment. Text = Val(Me. xtPayment) frmNewSales. cmdReciept. Enabled = True frmNewSales. cmdPayment. Enabled = False frmNewSales. cmdEditItems. Enabled = False frmNewSales. cmdRemove. Enabled = False frmNewSales. Text3. Text = Format(Val(Text3. Text) Val(Text1. Text), ,0. 00) Me. Text1. Text = Format((frmNewSales. Text3. Text), ,0. 00) frmNewSales. Text2. Text = Me. Text1. Text End If Else End If If Check1. Value = 1 Then Me. Text2. Text = Format(Val(Me. Text3. Text * 0. 1), ,0. 00) Me. Text1. Text = Format(Me. Text2. Text, ,0. 00) Exit Sub En d If If Check1. Value = 0 Then frmNewSales. Text2. Text = 0. 00 Me. Text1.Text = 0. 00 Exit Sub End If End Sub Private Sub txtPayment_Change() If Check1. Value = 1 Then Me. Text2. Text = Format(Val(Me. Text3. Text * 0. 1), ,0. 00) Me. Text1. Text = Format(Me. Text2. Text, ,0. 00) Exit Sub End If If Check1. Value = 0 Then Me. Text1. Text = 0. 00 Exit Sub End If End Sub 4. 7 Program Output pic 4. 8 User manual(a) Title Automated Sales and Inventory System of Stone Pro Enterprise Table of table of contents 1. Introduction 1. 1 System Requirements 1. 1. 1 Hardware 1. 1. 1. 1 Desktop 1. 1. 1. 2 Display 1. 1. 1. 3 Cash Drawer 1. 1. 1. 4 Receipt Printer 1. 1. 2 Software 1. 2 Convention 2. getting Started . 1 Member Log in 2. 2 Performing Transaction 3. Software Features 4. Message Boxes 5. User Interface Parts, Text boxes and Buttons 1. Introduction Most Large retail stores have migrated from the old trusty cash register to more modern computerized point of sale (POS) systems. This appli cation Guide explores computerized POS technology and provides a roadmap for Stone Pro Enterprise. 1. 1 System Requirements 1. 1. 1 Hardware If you are a computer user, youre no surmise familiar with the most common desktop peripherals the keyboard, mouse. Blue Link Technology systems are based on ordinary desktop computer and operating system . 1. 1. 1. Desktop Desktop with larger but quieter fans to minimize heat and noise. Heavy duty power supply that last longer than the standard items. Hard drive doesnt have to be in large capacity but it has to be reliable. We also want to ensure that youre using good surge protector and UPS ( battery backup) to prevent power related crashes. 1. 1. 1. 2. Display At the very least, youll need a basicmonitorat your POS to see what youre doing. Touch screenshave become a more popular and affordable option these days since they are a user favorable option that can help speed up the checkout process.Adding customer-facingandpole displayswill offe r a clearer customer experience and are a great way to promote special offers to customers while they are in line. 1. 1. 1. 3. Cash Drawer They may be the simplest peripheral in a POS system, butcash drawersare still an essential part of your system. You need to have a secure place to keep cash, checks 1. 1. 1. 4. Receipt Printer Every transaction ends with a receipt for the customer straight from areceipt printer. Having a printer go down is one of the most crippling things to any POS system. devising sure you have a printer thatll support your print volume and is easy to use is essential.Most printers are thermal based so you dont even have to deal with ribbon cartridges anymore. Just load the paper and you are back up and running Whatever your receipt size or type requirements are, theres a printer to fit your needs. There are numerous types of receipt printers, categorized like any other computer printer by its printing technology and its computer interface. 1. 1. 2. Software ThePOS softwareby Blue Link Technology is the brains of Stone Pro Enterprise POS system. 1. 2 Convention Double Click conjure up to user action Log in Window reference to user interfaceLog in Button Refer to object Enter Key Refer to Keyboard key 2. 0 Getting Started I. Daily Start-Up 1. Turn the Computer ON Press the ON/OFF button. (On top of the computer for Stone Pro Enterprise. ) WAIT. It will take a few moments but eventually Stone Pro Enterprise System and an Address hunt application will automatically start up. A desktop with icons will appear including pic A Login screen will appear pic 2. Sign on to the System a) When the Security Login screen appears, User ID = (ask for an access code to the admin assign ) unless you have been assigned something else.Password = the password you selected. It will NOT appear for security reasons. ENTER b) The Main Desktop will appear pic II. Start of Shift A. Cash commemorate Processing. 1. Press the Transaction Menu button. 2. Select TRANSACTION then NEW SALE. pic ( You are now ready to perform Cash Register Operations. ) III. End of Shift A. Clerk Out Start at the Transaction screen. Press CLOSE to Exit from the Transaction Screen. IV. End of Day In the evening you will need to 1. Leave the cash drawer open. 2. Close Stone Pro Enterprise System Main Page 3. Exit Stone Pro Enterprise System. 4.Turn off the computer. After you finish the End of Shift procedure, complete the following A. Log Off of Stone Pro Enterprise System 1. At the main Stone Pro Enterprise System desktop B. Shut Down the Computer 1. Select the Start button in the lower unexpended hand corner. 2. Select Shut Down from the list. A Shut Down Windows window will appear. 3. Select Shut Down from the drop down list. The monitor will go black and say No Sync for a bit. CHAPTER 5 FINDINGS, CONCLUSIONS AND RECOMMENDATION In this chapter states the summary of findings, conclusion and recommendation. 4. 1 Summary of FindingsPoint of Sale System for St one Pro Enterprise aims to develop an expert system that would enable the emergence of Point of Sale and maximize the capabilities. It shows how efficient accurate and well function, the point of sale compared to manual registry. 4. 2 conclusion We conclude that the research has shown that the study can be useful for the company Stone Pro Enterprise. In this study considering all the factors affecting. 4. 3 Recommendation The Researchers recommend this Point of Sale System of Stone Pro Enterprise to be used in interested establishment in improving and helping people retail their products. BIBLIOGRAPHY