Saturday, November 30, 2019

Long Project Design Essay Example

Long Project Design Essay The database will be made in Microsoft Access. The other option is to use is to use Microsoft Excel to do the database but it wouldnt allow me to do a relational database. I need a relational database so that information doesnt need to be entered over and over again like what Michael has to do at the moment. I also looked at various advantages for using Access, which Ive stated below. Furthermore, making a database will accomplish the criteria of being efficient and being able to be used over many years. To meet the needs of the user for an effective solution to his problems, I will need to make a database system that has forms, reports and queries. Additionally, I will also need to make mail merged letters for him. The forms are to solve his organisation problems and time wasting for editing, searching etc. The queries and reports are to solve his time wasting problem in finding things for himself and for customers. My solution will also have to fulfil all of Mr. Longs desires and all of the performance criteria. For my database, I will have the fields: ID, first name, surname, address, telephone number, and date of birth for the Customers table. This is so that it is clear and the different bits of information is organised. The logo will be given to me by Mr. Long. It represents the travel agency so people can easily recognise it. This is also one of the desires Michael had. Part of the performance criteria is to have 4 different tables to store information in. For the Destinations table, I will have the fields: Destination ID, Destination, Airline, and Airport. I think this is enough details for the different destinations and the only ones that are needed. For the Hotels table, I will put the fields: Hotel ID, Name, Address, and Hotel Grade. Furthermore, for the bookings table, I will put the fields: Bookings ID, Departure Date, Departure Time, Arrival Date, Arrival Time, Customer ID, Destination ID, and Hotel ID. This is because the information on customers, hotels and destinations will be linked to the bookings table through relationships. This way, the data doesnt have to be entered all the time. This is an automated process which is one of the performance criterions. The field I use will also fulfil some performance criterions. We will write a custom essay sample on Long Project Design specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Long Project Design specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Long Project Design specifically for you FOR ONLY $16.38 $13.9/page Hire Writer One of the criterions is to have tables linked so that it is a relational database. For the relationships, the customers, destinations and hotels tables will all be linked to the bookings table. The Customers ID field from the Customers table will link with the Customer ID field on the booking table. The Destination ID field on the Destinations table will link with the Destinations ID field on the Bookings table. And finally, the Hotel ID from the Hotels table will be linked to the Hotel ID in the bookings table. That performance criteria will now be achieved. For every one of the tables, a form will be made for it. This is because the user wants to be able to access data quickly and easily. By making a form, the information can be accessed, searched, edited, created and deleted easily and quickly. That desire will be achieved. Also, forms can be user friendly with the use of buttons which will make it easy to use. This was one of the desires. For all the forms, I will use the same background to give it a consistent and professional design. Michael desired this. I will also include the company logo to make the forms recognisable. The forms will display all the fields of the table so every bit of information is available for the user to see. I will also make buttons for the user to easily use to the system because it was one of the desires. This way, the user only needs to click on the buttons on the forms for their processes to be carried out. The buttons and logo will be at the same place for each of the forms. The bookings form will be a sub-form within a form. This is so that information on all of the other tables can be displayed in the bookings form. Furthermore, all of the forms can be reused by updating the information on them. By editing the information in the forms, the information in the tables will also be changed so the data will always be up to date. On all of the forms, I will have the Previous record and Next record button. This is because it will make it easier for the user to browse through the records that are there. Also, I will include the print and undo record buttons so the user can print a record and undo one at the click of a button. Furthermore, I will add save record, add record, search record, run word, run excel, close form and delete record buttons. This will save the user time because all they have to do is click the button instead of going through menus after menus. The run word and run excel button are just in case the user needs to access those programs for things such as calculating prices in excel or writing a simple letter in word. Furthermore, for the Destination form, I will also include a Print Destination Report button because Mr Long wants to be able to print a holiday list and I think the button will be able to save him time doing so. It will also solve the problem of photocopying flights to give to customers which is time consuming. Additionally, I will include a Print Hotels Report button on the Hotels form so it can be quickly printed and given to customers. I will also include Luxor Hotels, Cairo Hotels and Hong Kong Hotels buttons so that when a customer enquires about hotels in the countries that theyre interested in, the user can pull up that information with ease. The buttons themselves will open hotel queries that I will make. I will put all the buttons and logo on the forms in the same place so theres a consistent design. I will make a hotels query for each country that is on offer so that the user can quickly get hotels for a particular country rather than going through a list and picking out the relevant ones that are wanted. I will also make a customers query template because Mr Long would like to be able to enter an area and all his customers in that area will come up. I will show Mr Long how to change my template query in the user guide. Also, I will make a query template for destinations so that the user is able to find all the flights available to a particular destination. The instructions for doing this will also be in the user guide. Because Mr. Long wants to know all the customers that are born before 01/01/1955, I will make a query for customers who are born before 01/01/1955 because it needs to be known so that it can be merged with the letter Mr. Long wants to send out. All of these queries can be reused because only the criteria in the queries need to be changed. A main menu will be made where there will be buttons that, when clicked, will open the other forms. This will make my database system easier to use. The main menu will have the same background as the other forms. It will contain a Customers, Hotels, Destinations and Bookings button. I will need to add the logo in it as well. The name of the travel agency will also need to be put on so that it is easily recognised. These will fulfil some of Mr. Longs desires. To make the heading, I will use Microsoft Word. I will choose the font Palace Script MT. After that I will copy it over to paint. In paint, I will fill the surrounding with turquoise. When that is done, I will copy it over to my main menu. I am going to create forms for each of the tables. The font for my forms will need to be clear and easy to read so it will prevent Michael and his staff from reading anything wrong. Also, Ill make the database user friendly so the end user, Michael Long and his staff wouldnt have any troubles to get the hang of it. On the database, the fields must have the correct type of data. For example, the field First name must have the type of data: text. This will minimise the mistakes being entered because you wouldnt be able to put a date of birth in a first name field. The colour of the database will need to be according to the end users preference and I will make a questionnaire to find out a little more about Mr Longs preferences. For the DOB field, I will need to put a validation on it to stop the user from putting in any future dates. This will minimise incorrect data being entered. I will also add queries to allow the user to access certain information quickly as speed is highly wanted . I will also need to put a password onto the database or tell Michael how to do it himself to stop strangers from accessing the database. I need to do this because Michael requested some sort of security system. In my Analysis, I stated that my database should be able to give print outs for the customers on flights and hotels available. To do this, I will need to make reports on the destinations and hotels available so they can be printed off and given to customers. The reports will all have the same style design (corporate) to make it easily recognisable and associated with this business. I am also going to make a customers report because Mr. Long wants to be able to print a destinations, hotels and a customers list. All these reports can be reused because whenever a piece of information in changed in any of the forms or tables, the reports are automatically updated. I am going to make mail merged letters in Microsoft Word because Mr. Long wants an easier and more efficient way of sending letters. For the mail merge letters, I am going to put: Lees Holidays at the top of the letter. Then I am going to put the logo on the top left of the page. This is so that when the customers receive the letter; they will know who its from straight away. I am then going to insert the date on the right hand side so that every time the letter is needed, the date on the letter is automatically changed. This is another automated process which makes it easier for the user to use. I will also make a margin on the left, running all the way down the page. In the margin, I will have the name of the owner, the address, the telephone number and the fax number. After that, I will include the fields: Customer ID, First Name, Surname, Address, Area and Telephone using the mail merge help feature. Then I will write up the contents of the letter talking about the special offer Mr. Long is offering. At the bottom of the letter, I will put Mr. Longs signature. He requested this. The font of the letter will be Papyrus and the font size will be 10. All of this will fulfil the performance criteria for the mail merge letters. These mail merge letters are reusable because the template can be used over and over again. The query just needs to be changed and then the mail merge letters will change. I will make a first draft of the database a show it to Mr Long so he can give me some feedback about it. He will also be able to give me any preferences that he would like to have such as the layout the functions of the buttons. Why Microsoft Access is suitable for this project: Before I use Microsoft Access to actually build the tables, forms, and other objects that will make up the database, it is important to take time to design my database. Whether I am using a Microsoft Access database or a Microsoft Access project, good database design is the keystone to creating a database that does what you want it to do effectively, accurately and efficiently. In Access, I am able to: * Make queries to filter information * Make sub forms to display information in related forms * Make command buttons to link to other forms and carry out tasks for the user * Make a main menu for my travel agency database * Make validations to stop wrong DOB from being entered and to stop wrong departure date being entered Why Microsoft Word is suitable for this project: 1) Input text include fields and relevant addresses 2) Merge text from databases include information the customer requests 3) Importing and editing pictures make the letter look interesting and provide any information only pictures can give. 4) Use colour make the letter look more attractive and interesting 5) Use clip art make the letter look more professional 6) Font, font size and colour make the letter look more professional and interesting. Also, make certain important information stand out more. 7) Add borders make the letter look more professional. I will draw the design of my on forms and tables a piece of A4 paper. After I have done all this, I will test it to see if it works properly. Also, I will need to decide on the colours I will use for the database and see if the colours are acceptable to the client. The colours the client wants should be used for the background and the name of the travel agency. Testing When I have finished the database, I will carry out this test and give it to someone else to do just to double check it to see if I missed anything. I will need to check that: All the hotels, customers and destinations are correct recheck to see if there are any mistakes or missing pieces of data The validations to see if it comes up when an inappropriate date is entered enter a future date for the DOB field and see what happens, enter past date for the Departure Date field and see what happens Command buttons to see if they work properly click on each button and see if the right process is carried out The password works correctly entering the password and seeing if the database opens after All the queries give the correct results carrying out the queries myself All the results of the DOB query goes onto the mail merge letters check the query results and letters All the desires and performance criteria has been fulfilled check the performance criteria and desires and then seeing if my solution has done all of this The end user is happy with the solution asking Mr. Long User Feedback Questionnaire 1) Do you like the current colour of the database? If not, please state the colour desired. Yes No, change to _____________ 2) Is the database easy to use? Yes No 3) Are you happy with the logo and name or do you want me to change the sizes and positions? Yes, happy No, change it 4) Are you happy with the way the letter looks? Yes No 5) Would you like more buttons on the forms? Yes No 6) Are there any particular queries you would like me to make? Yes No 7) Are there any other additional things you need the database to have or do? If so, please state on the lines below. ____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ User Feedback: Having showed my initial design to Mr. Long and giving him my questionnaire, he has provided me with the following input to improve the design and layout, making it more user-friendly and appropriate to his needs. * Take off the current plain colour background and change it to a photo * Change it to a nice photo that is blue because his favourite colour is blue * Make the logo bigger on the forms and put it at the bottom of the forms * Make more buttons on the forms to make it even easier to use * Stretch out the bookings sub-form a bit more so he doesnt need to scroll much

Tuesday, November 26, 2019

How to Write a KILLER LinkedIn Profile Raffle Drawing!

How to Write a KILLER LinkedIn Profile Raffle Drawing! How to Write a KILLER LinkedIn Profile Raffle Drawing! Did you know that last week (February 9-15, 2015) was International Random Acts of Kindness Week? Neither did I, until a woman named Ann Terry Gilman from Germany purchased my LinkedIn e-book- 3 times! I wrote to Terry to find out whether she intended to purchase the book in triplicate, and she responded that no she did not, but would I please give away the two extra books to an organization in need- in honor of RAK week! Terry took the message of RAK to heart and I am happy to announce that The Essay Expert will be holding a drawing on March 1 for an organization to receive a free lifetime subscription to the PDF version of How to Write a KILLER LinkedIn Profile. If you know a job club or an educational institution that would benefit from the information in the 11th edition of How to Write a KILLER LinkedIn Profile, please send the following information to teesupport@theessayexpert.com: Name of contact person Name of organization/institution Description of the mission of the organization/institution Email address the book (and lifetime updates!) will go to We will hold a drawing for 2 winners on March 1, 2015 and the winners will be announced through my e-list! Random Acts of Kindness Life Of course now that I know last week was RAK week, I’m thinking about whether I do enough RAKs in my life. Last week, one day I brought a smoothie to a friend who is a nurse and would miss dinner that day due to working long hours. I tried a new salmon recipe. I drove to Chicago to see people in my class person instead of attending, as I usually do, on the phone. I made 50 phone calls for people to assist on the Transform Training while the other people in my group were making 15-20 calls each. I brought my teddy bear to yoga class and talked to people I would not normally have talked to. I did all these things without knowing it was RAK week! Did you perform random acts of kindness last week too? Here are some ideas: Feel free to take these ideas and run with them on any day or week of the year! When recently have you put a smile on someone’s face or contributed to a good cause? Please share about it below! And if you know of an organization who would benefit from a lifetime subscription to How to Write a KILLER LinkedIn Profile, remember to send their name, organization name, organization mission, and e-mail address to teesupport@theessayexpert.com! Category:Archived ArticlesBy Brenda BernsteinFebruary 23, 2015 1 Comment David Walker says: February 24, 2015 at 10:48 pm Dear Brenda, Contact: Melinda Organisation: Counselling @ Macquarie University Mission: The Student Counselling Team at Macquarie University has a focus on helping students go into/return to the work-place and the Team (Melinda) made it clear that LinkedIn has to be an essential and effective part of my job-seeking strategy. eMail: Counselling@mq.edu.au I purchased your eBook (.pdf) yesterday following an extensive research exercise based upon Melindas advice and I am working my way through your great guidance to update my LinkedIn profile prior to sending out job applications (Ive temporarily turned off access until I make significant (it is a re-write job) changes to that profile. Thank you for some great advice. Ive now established profile access as: linkedin.com/in/davidjwalker01 and a separate complementary job-seeking email address: davidjwalker01@bigpond.com Thanks and great advising David Walker david.walker1@students.mq.edu.au Log in to Reply

Friday, November 22, 2019

A Virtual Battlefield

Cyber warfare is an oncoming threat that will result in devastation. Cyber weapons can seriously hurt a country, and cause chaos that will match Pearl Harbor. Picture this- the click of a mouse could disable air traffic control screens, explode fuel refineries, steal valuable information, derail trains, and fry power grids. All capabilities of a cyberattack. And the bad news is the United States is not as prepared as it should be (for this new kind of warfare), and it’s happening right now. I can’t believe that the United States’ cybersecurity isn’t faring that well. We have known of the threat for a long time, yet defensive measures haven’t been taken. We seriously need to end this threat-our whole nation is at risk. Of course, CYBERCOM is a good start, but there really should be more members, which would result in a larger task force, and a stronger cyber defense. Not all cyberweapons are on a nation crippling scale, however. There have been some attacks on Google and Western Energy Companies, and investigators believe China was the aggressor, and Google declared Cyber War on China. Don’t believe that Google, of all companies, got cyberattacked? Check out http://gpsanalysis.com/?p=41 But, of course, some nation-scale warfare has happened, to the United States, too! In April of 2009, cyber spies infiltrated the Pentagon’s Joint Strike Fighter Project, an approximate three-billion dollar project, and were able to escape with huge amounts of data that was related to the aircraft’s design. Again, officials point to China. Ok†¦maybe Google, but the Pentagon got cyberattacked? Check again! http://www.popsci.com/military-aviation-amp-space/article/2009-04/hackers-breach-joint-strike-fighter-program Although China seems to be the most active offensive cyber attacker, America isn’t just a passive victim. In 2010 Israel and the United States hatched the Stuxnet virus, which targeted Iran’s nuclear enrichment facilities and basically destroyed thousands of centrifuges that were used to purify Uranium. Another cyberweapon hatched by the United States was the Flame virus. This virus seeped through the computers of Iran’s high-ranking officials, and collect information. http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html Iran has been receiving some heat from the United States and Israel ever since they began their nuclear weapons program. Yet Iran has been on the offensive side too. A cyberattack shut down RasGas, a producer of liquid natural gas in Qatar, and destroyed valuable computer data at Saudi Aramco- the world’s most valuable company. US intelligence confirmed that the aggressor was Iran. Many more cyberattacks have happened around the world though. I’m not going to sit here typing every single cyberattack. Hopefully you get my main point- Cyber warfare is happening RIGHT NOW. Although cyber warfare can really only frustrate and confuse temporarily, a nation can not win a war if the other side has it. That is why not only offensive measures, but defensive measures, are important. Blocking a cyberweapon from destroying data could cost you the outcome of a war, and bring victory to your side. But cyber defense is hard. Now, the enemy is in virtual space and an attack could come from anywhere. How could we possible set a good defense for that? The United States is scrambling to get good new Cyber Warfare tasks. U.S. Cyber Command (CYBERCOM) is America’s Cyber offensive and Cyber defensive military command. CYBERCOM has many tasks that can detect and patch security holes as well as creating new network systems for the military’s computer systems. CYBERCOM engages in offensive warfare and work on cyber weapons that can be combined with Special Operations Missions, or airstrikes. This is the first step to the protection of our great nation, and will prevail over our enemies when it gets the support it needs. New warfare means new tactics. I think that education is really the best way to go with this oncoming threat. Educate the citizens through websites and other essays like this one, and they will respond. Some will understand computer code, some won’t. But that can change through education. Another advantage is that physical strength is no longer a requirement- and we can face this cyber security threat head-on, to protect our nation and its citizens. Again, cyber warfare is happening right now, and is a serious threat. We need to prepare for this new weapon, and prevent our nation from another Pearl Harbor.

Wednesday, November 20, 2019

Article _(Have Gun) Essay Example | Topics and Well Written Essays - 1250 words

Article _(Have Gun) - Essay Example As said thesis points out, the crafting of government policies has become a sticky process of compromises and negotiations that involve the three major institutions in the American political system: congressional committees/subcommittees, executive branch agencies and interest groups. Sometimes called by various names as policy subsystems, issue networks and iron triangle, the three entities function essentially by staking out a claim over a specific area of public concern. Politics come into play when the executive branch agencies or bureaucracies go out to compete for scarce resources in the policy making arena in a bid to establish and maintain a â€Å"policy domain.† Apart from being specialists or technocrats, present realities thus require that the bureaucrats be also consummate politicians. It was believed to be the politicians more than the technocrats in CDC in action when the bureaucratic agency started to stake out a claim over gun-related violence as its administrative domain in the early 1990s. The agency found as window of opportunity the growing concern of Americans about the corrosive effects of escalating violence caused by firearms. 1) Firearm-related violence is a public health issue. As such, this kind of violence is CDC’s legitimate domain owing to its expert knowledge in the health care arena. The problem needs to identify risk factors, to develop, test and implement appropriate interventions. Violence was defined as â€Å"the intentional use of physical force against another person or against oneself, which either results in or has a high likelihood of resulting in injury or death.† It encompassed such acts as suicide, homicide, rape, assault and child or elder abuse which are intentional. 2) CDC has the necessary expertise in this area. Gun-related violence causes an estimated 35,000 deaths yearly in the US which translates into tremendous health care costs,

Tuesday, November 19, 2019

Corporate Social Responsibility Research Paper Example | Topics and Well Written Essays - 1000 words - 1

Corporate Social Responsibility - Research Paper Example This essay stresses that for a long time the key areas of corporate social responsibility haves been the well-being of the company’s employees and the protection of the environment. The civil society and the surrounding community focus on corporate social responsibility. The idea behind corporate social responsibility is that companies should not operate in isolation and detached from the broader society in their economic processes. This implies that such views as profitability, competition and survival that traditionally drove business missions are slowly losing ground to corporate social responsibility. New drivers have come because of CSR. It is necessary to explore some of these drivers and analyze how they affect business enterprises. This paper declares that the government’s diminishing role in businesses is one great driver. In many jurisdictions, citizens rely on their governments to provide the relevant regulations and legislations for the delivery of environmental and social objectives among the business communities. However, over the foregoing decades, most countries have witnessed the shrinking of their administration resources and distrust of the regulations set aside. Consequently, companies have resorted to carry out their own exploration non-regulatory and voluntary initiatives for restoring their confidence to the communities of operation. Customers have increasingly developed an interest for accountability and responsibility assumption by business enterprises. ... Customers have increasingly developed an interest for accountability and responsibility assumption by business enterprises. It is evident that the companies’ ethical conduct plays a big role in influencing the customer’s purchasing decisions. It is evident that more than 20 per cent of a company’s clients will likely to reward or punish them based on their perception on the company’s social performances. Besides, there has been an increasing pressure from investors. Lately, many investors assess the performance of companies on matters of ethical concerns before making their decisions on whether to work with the company. According to a report by the Social Investment Forum, there were assets worth more than $2 trillion that were invested in business portfolios that had social and environmental responsibility screens in the year 1999. Besides, more than 25 per cent of American customers considered ethical considerations of a company before purchasing or sell ing stocks with them. This was a survey by the Environics International. The labor market is also very competitive. Nowadays, most qualified and competent employees have increasing focusing on extra benefits beyond their paychecks. In the end, they seek out employers with operating practices and philosophies that coincide with their own doctrines. For a business enterprise to employ and retain these kinds of skilled and competent employees, they are left with no option other than improving their working conditions in terms of corporate social responsibility. Corporate social responsibility is also for the improvement of relations between supplies and business enterprises. This is because stakeholders are increasing

Saturday, November 16, 2019

Favourite Movie Essay Example for Free

Favourite Movie Essay My favourite movie is 3 idiot. 3 Idiots is adapted from a Chetan Bhagat’s novel. It is not just a story of 3 engineering students. The movie also presents the struggles of life that people have to face in their lives. The movie portrays how the human struggle for existence begins with the birth of a child. The child opens his eyes in the world to see the expectations floating in the eyes of his parents who want their children to become Engineer, Doctor, IAS, or some other officer, and glorify their family name. The movie effectively highlights the problem of parents pushing their children to choose what they don’t like and make them forget or ignore their hobbies that could have become a great profession for them. This happens overhere with Farhan who wanted to be a wildlife photographer. He could never do well in engineering but once he took up his hobby as profession he never looked back and established new milestones of success. On the other hand, Raju represents the class of children who under the burden of expectations of their parents start to fear failure. This ultimately kills their confidence and leads to their failure. This fear of failure sometimes forces them to take extreme steps as it happens with Raju who tries to commit suicide. But once he gains back his confidence he starts to taste success in whatever he endeavors. The film also depicts that life at engineering colleges is not fun; they have to deal with some serious problems including struggle to get good grades, ragging and mental pressure that forces a student to commit suicide. So I learnt a lot of things from this movie and the most motivating dialogue of this movie told by Rancho â€Å"Don’t run after success, be capable and success will come running after you† motivated me a lot in my life. Last of all I want to say that individual performances, screenplay, direction, editing to cinematography, especially melodious songs gave a perfection to this movie and made this movie, my favourite movie.

Thursday, November 14, 2019

Fraus with Plows: The 19th Century Development of Skokie :: Essays Papers

Fraus with Plows: The 19th Century Development of Skokie On the corner of Lake and Wagner Roads in Glenview, nearby an Audi dealership, the Glenview Tennis Club, and an Avon plant, nestled between rows of residential developments, is an 18-acre farm. As if its presence wasn’t anachronistic enough, the cows grazing in the field attest to the fact that the farm, which sits on the border between Chicago’s self-christened North Shore and its inner suburbs, is still in operation despite decades of efforts by developers to purchase it and convert the land into something more profitable for the north suburban niche. In fact, until 2000, the farm was owned by the Wagner family and run for profit, though it has since been purchased by the Glenview Park District and is now maintained as a museum to showcase the village’s historical roots. The rationale behind the village’s $7.2 million investment in the land was, as Park District Board President said, â€Å"...that this is a part of Glenview, and if we don't acquire it, it won't be there to show the children what Glenview was like.† In some ways, perhaps Wagner Farm’s presence is most fitting as a historical division between the two sets of suburbs directly to the north of the city. While both regions began developing simultaneously as outgrowths of the rapidly expanding and industrializing urban metropolis to the south, the lakeshore settlements were almost immediately identified as centers to serve the needs of affluent urban commuters, and their subsequent development was largely directed towards this goal, whereas the inland settlements were abruptly awakened to their similar potential only in the real estate boom of the 1920s. The explosion of road and highway construction after WWII would eventually level the playing field for development between these competing areas and render their boundaries nearly indistinguishable, but until then, towns like Glenview, Morton Grove, Niles, Park Ridge, Lincolnwood, and Skokie (then known as Niles Center) , would develop along a very different trajectory than th eir lakeshore neighbors, one that had much more in common with Wagner Farm than with the elegant single-family homes arranged in well-maintained subdivisions that now surround it. The development of Niles Center in many ways embodies a regional pattern of suburban development in 19th Century Cook County. With the exception of a few showcase towns like Riverside, Hyde Park Center, and the settlements along

Monday, November 11, 2019

Egovernance In Admission Systems Africa Education Essay

What is the quality of instruction offered in higher instruction establishments. This inquiry has been raised by everyone associated with higher instruction establishment like institutional members, parents, pupils, employees, funding organic structures and the authorities in other words ; the stakeholders of higher instruction establishments ( HEIs ) ( Bhanti et al. , 2012:16 ) . Antony ( 2005 ) cited in Bhanti et Al. ( 2011:16 ) asserts that, the stakeholders raise this inquiry with one or more involvement: pupils – for pick of establishment ; parents – for worth of personal investing in the instruction of their kids ; for authorities – answerability and policymaking ; support bureaus – for support determinations. The replies for this inquiry can be obtained from different beginnings peculiarly the sure one like regulative governments which control the quality and criterions of higher instruction system. The function of ICT in modern-day organisations including HEIs continues to spread out in range and complexness ( Garrity et al. , 1998 ) . Recently, the HEIs peculiarly regulative governments have become cognizant of the benefits of e-governance in higher instruction direction systems. In pupils admittances for illustration, HEIs are using ICT for commanding quality of admitted pupils and general quality confidence. In recent old ages, the tendency of ICT invention ( Archmann et al. , 2010 ; Batagan et al. , 2009:372 ) and the turning usage of the Internet and nomadic phones has changed the manner pupils are admitted into higher instruction establishments ( HEIs ) , switching from boring manual to a modern ways such as centralised on-line admittance systems.2.8.1 E-governance in admittance systems: WorldwideWorldwide, there is a enormous addition in the figure of colleges, institutes and universities which have raised concern on assorted facets related to the quality instruction suc h as admittance and the figure of pupils. This has led to the higher instruction regulative governments to maintain an oculus on admittance quality confidence by deploying several systems, which assist in pull offing malpractices related to admittance. Such systems include, the Universities and Colleges Admissions Service ( UCAS ) in United Kingdom ; the Joint University Programmes Admissions System ( JUPAS ) in Hong Kong ; Central Admission System ( CAS ) under Higher Education Admission Centre ( HEAC )[ 1 ]in Oman, which became the first state in the Middle East to follow electronic admittances for pupils seeking higher instruction classs[ 2 ]. Others include the Higher Education Centralized Admission System ( HECAS )[ 3 ]in Negara Brunei Darussalam ; and China ‘s University and College Admission System ( CUCAS )[ 4 ], to advert a few. Literature show that applicants to a higher instruction system come from a broad scope of backgrounds and, due to this fact, admittances policies need to turn to the devising of rather complex opinions about comparative potency within a diverse population of appliers. However, to-date in many states, each higher instruction establishment sets and implements admittances policies that are consistent with its peculiar mission ( QAAHE. 2006:5 ) . It has been insisted that, the policies and patterns for pupil admittances should be designed to procure a good lucifer between the abilities and aptitudes of the applier and the demands of the programme, therefore taking to the choice of pupils who can moderately be expected to finish their surveies successfully. Those doing admittances determinations need to know apart between appliers, to find who should be selected. This requires an exercising of judgement ; it is of import that this is underpinned by mention to transparent and justifiable s tandards ( QAAHE. 2006 ) .2.8.2 E-governance in admittance systems: AfricaDespite the fact that several states are implementing electronic admittance systems meaning among other things to control admittance malpractices in Africa, the literature portrays that there are fewer enterprises in following electronic admittances for pupils seeking higher instruction. In East Africa, for illustration, merely Tanzania is implementing to the full automated undergraduate admittances into HEIs. However, there is a similar admittance system in Nigeria, which is known as the â€Å" Joint Admissions and Matriculation Board † ( JAMB )[ 5 ]. Most of these inventions in Africa ‘s instruction sector have been supported by multi-stakeholder programmes such as the African Virtual University ( AVU ) and the World Bank to advance e-governance in HEIs.2.8.3 E-governance in admittance systems: TanzaniaTanzania is ranked 114th out of 132 states in the universe utilizing scientific discipline and engineering ( URT, 2008 ) . In East Africa, Tanzania is the first state to set up an machine-controlled admittance system in HEIs undergraduate admittances ( TCU, 2010 ) .2.8.3.1 Country OverviewTanzania is the biggest ( land country ) among the East African states ( i.e. Kenya, Uganda and Tanzania ) . It became independent from the British on 9 December 1961 and inherited an educational system from its colonial Masterss. Since independency, the Tanzania ‘s instruction system has grown quickly from a simple primary and secondary instruction to a complex instruction system including higher instruction run by both public and private sectors ( Mashalla, 2002:8 ) . Presently, the state has a population of 42,500,000 people ( IMF, 2008 )[ 6 ].2.8.3.2 Higher instruction development and enrolment tendency in TanzaniaThe history of higher instruction in Tanzania goes back to pre-independence when the state had no individual higher instruction establishment ( URT, 2008:1 ) . Tanganyik ans who had chances for higher instruction were trained at Makerere, Uganda. Within East Africa, higher instruction was last to come in Tanzania, therefore doing the state to hold smaller figure of skilled and trained human resources in the state in 1961. The former and first president of Tanganyika had observed this deficit of trained and skilled human resources and stated: â€Å" So small instruction [ had ] been provided that in December 1961 we had excessively few people with the necessary instruction makings even to adult male the disposal of authorities as it was so, much less to set about the large economic and societal development work which was indispensable. Neither was the school population in 1961 big plenty to let for any outlook that this state of affairs would be quickly corrected † ( Nyerere, 1967:4 ) . Higher instruction in Tanzania during the last century was preponderantly provided by University of Dar es Salaam ( UDSM ) . This was established as a college of the University of London in 1961 and so later it became a portion of the University of East Africa. In 1970, it became an independent University. In the 1970s UDSM was seen as â€Å" a development university † with all pupils being required to analyze development surveies and with field fond regards in many topics. The creative activity of Sokoine University of Agriculture ( SUA ) as the 2nd university in Tanzania was declarative of an consciousness of the importance of agribusiness in Tanzania ‘s development. The 1980s and early 1990s were a period of diminution for the university with registrations stagnating and passing per pupil falling dramatically. In 1994, the Institutional Transformation Programme was initiated and since so there has been a considerable addition in student Numberss. Several other third p reparation establishments have now become universities. More late, a figure of private universities have opened, chiefly run by spiritual organic structures ( Cooksey et al. , 2001 ) . Registration in third instruction during the 1990s was really limited so, with merely around 6,500 undergraduate pupils in 1998/1999 ( Cooksey et al. , 2001 ) . Since the terminal of the 1990s, registration in higher instruction has expanded quickly, although much of the enlargement has been through in private sponsored campaigners, both at the province universities and at private establishments, which have been granted university position. Admissions increased throughout the 1990s but since the 2002/3 academic twelvemonth, the authorities had put a bound on the figure of pupils that it would patronize. Until so, the figure of in private sponsored pupils had been about negligible, but since 2003, most of the enlargement in registration had been through in private sponsored campaigners ( Ishengoma 2004 ) . In recent old ages, the state has been spread outing entree in the instruction sector get downing with primary instruction through the primary instruction development programme ( MMEM ) in 2001, and the secondary instruction development programme ( MMES ) in 2004. Because of this, the state has been in attempts to spread out higher instruction in coaction with private sectors to run into the developments achieved at lower degrees ( URT, 2010 ) . To day of the month, there are more than 60 higher instruction establishments offering undergraduate grades in the state. Despite the fact that the gross registration rates ( GER ) in higher instruction have been lower side when compared to other developing states ( URT, 2010 ) ; yet the increased registration at lower degrees has resulted into monolithic force per unit area on higher instruction admittances which in bend has necessitated the constitution of the Central Admission System in the state.2.8.3.3 Constitution of CAS: A instance surveyHigher Education Institutions ( HEIs ) in Tanzania have undergone profound alterations in recent old ages. Significant enlargement of the system in order to acknowledge an increasing cohort of school departers, grownup scholars and by and large a more diverse set of pupils than in the yesteryear has been a cardinal portion of this alteration. These alterations have deductions on higher instruction service bringing, for illustration the admittance processes have become excessively complex with many challenges. During the last 10 old ages, the demand for higher instruction in Tanzania had been increasing quickly ; as a consequence, concerns over undergraduate admittance into HEIs have become an of import point of treatment for many stakeholders. Due to the current addition of HEIs and the subsequent enlargement of pupils enrolment, the admittance into these establishments has become complicated ( TCU, 2009:12 ) taking to a figure of jobs, including pupils passing money and clip in using for admittance to a figure of establishments so as to better their opportunities of being admitted ; troubles in screening out multiple admittances taking to holds in the start of the academic twelvemonth by universities ; complications in the expense of pupil loans by the Higher Education Students Loans Board ( HESLB ) every bit good as dual payments due to multiple admittances ; measure uping pupils neglecting to be admitted into universities due to incompatibilities in their applications ; universities ru nning at a lower place capacity as a consequence of superficial filling of institutional capacities caused by multiple admittances, therefore denying meriting appliers admittance chances ; and cheating by some appliers during the admittance procedure. Particular intercession was required and a cardinal admittance system was required to turn to these jobs. Therefore, in order to streamline the pupils ‘ admittance procedure, TCU in coaction with universities, NACTE and other HEIs established a new admittance system known as the Central Admission System ( CAS ) , where appliers for HEIs channel their applications centrally at TCU. Introduced in 2010, the CAS system is an electronic application theoretical account designed to cut down incommodiousness among prospective campaigners competing for topographic points in universities. The system targets to supplement the manual application system, which forced pupils to go from upcountry to Dar Es Salaam or other towns where the establishments are located in order to make full in application and admittance signifiers. It was early in 2009 when the University Computing Centre Ltd ( a company to the full owned by the University of Dar es Salaam ) was awarded a contract to develop a Central Admission System ( CAS ) to be used by all higher instruction establishments ( HEIs ) under the coordination of the Tanzania Commission for Universities ( TCU ) . The system was aimed to treat all applications for admittance into the Tanzanian HEIs will centrally through the system. The purpose of CAS is to computerise HEIs admittance procedure for higher instruction classs. Its bas ic aims are to widen their range to geographically scattered pupils, cut downing clip in activities, centralized informations handling and paperless admittance with decreased work force. Its other factors are cost film editing, operational efficiency, consistency position of informations and integrating with other establishments. Through CAS, applier has to come in merely the Index figure for ‘O ‘ degree and ‘A ‘ degree Exams, the system populates the personal inside informations and consequences from National Examination Council of Tanzania ( NACTE ) , and if the information provided lucifers so the applier can continue with selecting classs he/she is interested from all registered and take parting establishments. All degree programmes available in the pupils ‘ admittance guidebook have their minimal demand pre-configured which is used by the choice algorithm[ 7 ]. CAS ( Version I ) was developed utilizing Chisimba model. Chisimba is an unfastened beginning content direction system which is the merchandise of coaction between the 12 African universities who are members of the African Virtual Open Initiatives and Resources group. The proposal was approved on April 2009 and the first demo of the system to more than 40 representatives from HEIs was on 12th November, 2009. The demo was successful and the system execution started in the academic twelvemonth 2010/2011 to day of the month. The Tanzania Commission for Universities ( TCU ) regulates admittance of undergraduate pupils at higher instruction establishments harmonizing to their demands and Markss obtained and the admittance footings specified by the establishments. The TCU undertakings in admittance are specified as follows: Organizing all undergraduate admittances through CAS in coaction with take parting HEIs in regard of standards and admittance demands of each and every establishment harmonizing to subjects and available capacities ; Pull offing quality in admittances by guaranting that admittance guidelines are followed consequently ; Procuring admittance database of appliers and providing the Ministry of Education and Vocation Training ( MoEVT ) and other governmental be aftering organisations with the statistical informations in coaction with HEIs. Media consciousness of all academic plans for CAS take parting establishments in regard to admission operations in HEIs. Supply pupils with needed pupils Guide books about HEIs with their programmes offered and set up the enquiry service. Receiving, and treating all applications to HEIs in conformity to the submitted and approved programmes with their demands. Forming the Joint Admission Committee meeting for O.K.ing all admittances before publish the admittance consequences to appliers and the populace in general. Then administering the recognized pupils to the HEIs for senates blessings and advise the pupils, every bit good as the Institutions with the lists of the recognized appliers. Transportation, re-allocate and track withdrawn, postponed, discontinued and recognized pupils in HEIs after allotments. In Tanzania, the on-line application for undergraduate admittance is progressively deriving in popularity ( TCU, 2010 ) . Figures presented by the Tanzania Commission for Universities ( TCU, 2011 ) show that during 2010/2011 academic twelvemonth, when CAS was foremost introduced, 33,361 appliers out of 48,690 were admitted through CAS.2.9 DecisionIn general, e-governance in HEIs, peculiarly in Africa, is still in its babyhood. It has been deployed in several [ subdivisions? ] such as in e-learning, e-library, e-payments, etc. ; but in admittance still attempt is needed to do certain that massification of higher instruction in Africa goes together with quality higher instruction which can easy be controlled and monitored from the entry point, which is admission procedure. However, the execution of these attempts is confronted with many challenges heading to the e-governance execution peculiarly in the public sectors as explained in the literature. 1 ) Delete the footers and integrate the web references into the text. 2 ) You must continually demo the relevancy to your research subject of the assorted issues that you discuss. 3 ) Your literature reappraisal reads like a consultancy or direction study – there is really small critical battle with the subject ( mostly the consequence of your extended trust on official UN and other studies ) and about no grounds of battle with the relevant sociological literature. External testers will non accept this degree of battle in a PhD thesis. 4 ) Of great concern, nevertheless, is the extended plagiarism in the chapter. You have lifted big parts of the chapter, word for word, from ( acknowledged and unacknowledged ) beginnings. This is a really serious issue and may represent evidences for throw outing you from Rhodes and all other South African universities. The regulation is simple and clear: utilize your ain words when non citing from a beginning and acknowledge all beginnings when you draw on the thoughts they contain.

Saturday, November 9, 2019

Library Management System Essay

Name of the Project Vision Online Library Online Library is a system, which maintains books in the server in any format. It allows storing books, documents, audio and video files. User can Search and open documents by giving a simple query. Online Library Management System is a system, which maintains books, documents, audio/video files. To use this system user must be a member in this. Then user allowed storing books, documents, A/V files. Then user can search by giving a simple query. It is very difficult search books manually. Online Library makes easy. Deliverables / Functional Specifications Online Library uses user internal feedback from user to improve search process in every searching. It also uses indexing to locate documents very fast in searching which relate to query. Main aim of online Library system is providing highly relevant documents in very short period after giving query. It is just like Search Engine. It uses Vector space Model and Probabilistic Model to find similarity coefficient, weights. User Interface Requirements Database Centralized ONLINE LIBRARY BY M.SATHISH KUMAR Page 2 Browser based DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Requirements Integration Requirements Preferred Technologies J2EE Technologies i.e. JSP, Servlets, jdbc Frontend: – Html, JavaScript, Java Server pages. Backend: – Oracle 10g. Hardware Requirement Pentium 4 processor with 256 MB RAM, 40 GB Hard disk Web based Interface ONLINE LIBRARY BY M.SATHISH KUMAR Page 3 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 INTRODUCTION ONLINE LIBRARY BY M.SATHISH KUMAR Page 4 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 INTRODUTION Online Library Management System is a system, which maintains books, documents, audio/video files. To use this system user must be a member in this. Then user allowed storing books, documents, A/V files. Then user can search by giving a simple query. It is very difficult search books manually. Online Library makes easy. Online Library uses user internal feedback from  user to improve search process in every searching. It also uses indexing to locate documents very fast in searching which relate to query. Main aim of online Library system is providing highly relevant documents in very short period after giving query. It is just like Search Engine. It uses Vector space Model and Probabilistic Model to find similarity coefficient, weights. Existing System Early days Libraries are managed manually. It required lot of time to record or to retrieve the details. The employees who have to record the details must perform their job very carefully. Even a small mistake would create many problems. Security of information is very less. Report generations of all the information is very tough task. Maintenance of Library catalogue and arrangement of the books to the catalogue is very complex task. In addition to its maintenance of member details, issue dates and return dates etc. manually is a complex task. All the operations must be performed in perfect manner for the maintenance of the library without any degradation, which may finally result in the failure of the entire system. Benefits of automation Automation is procedure of converting a traditional system in to a computer organization. To overcome the defects of the existing system automation was introduced by the computerization of organization we get many benefits. ONLINE LIBRARY BY M.SATHISH KUMAR Page 5 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 The main objectives of undertaking this project are: ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · The students will register them through Online Individually each member will have his account through which he can access the information he needs. Books, documents, A/V files are stored in server. User will enter simple  query in text box and click on the Search button. Server takes the request and processes it. Returns hyper links of documents with their names, ranks weights and description. If the user clicks on name of the document then it will open with respective program and rank of document will increase for that query.(for example .pdf files with Adobe Reader) User can upload documents, books and a/v files. Time consuming is low, gives accurate results, reliability can be improved with the help of security. Proposed System: To solve the inconveniences as mentioned above, an Online Library proposed. PROCESS LOGIC: 1. The user inputs data (e.g.: fills out an HTML form and clicks the submit button.) 2. The client (Browser) sends the data to the web server in a standard format (i.e., the GET method or the POST method). 3. The web server launches the program specified by the user and feeds it the input (form) data. 4. The program (e.g.: servlet) processes the form data and produces another HTML page. 5. The web server sends back the HTML page to the browser. The web browser then displays the response page. ONLINE LIBRARY BY M.SATHISH KUMAR Page 6 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ANALYSIS Analysis is the process of understanding the existing system by gathering and interpreting the facts, diagnosing the problems. It is not just to determining the how best to solve the manual system problems, it should also work for the system observes the feasibility of system then design, coding phases will be executed. Analysis phase delivers requirements specification .The system specification serves as an interface between the designer and  developer as well as between developers and users. This describes the external behavior of the software without bothering about the internal implementation. Specification must be carefully checked for suitability, omission, inconsistencies and ambiguities. Problem analysis is performed to getting a clear understanding of the needs of the clients and the users and what exactly desired form the software. Analysis leads to the actual specification. During the process of analysis, a massive amount of information is collected in the form of interviews, questionnaires, and information from documentation, and so forth. The major problem during analysis is resolving how to organize the information from documentation, and so forth. So the information can be effectively evaluated for completeness and consistency. ONLINE LIBRARY BY M.SATHISH KUMAR Page 7 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 REQUIREMENT SPECIFICATION FUNCTIONAL MODEL / USE CASE MODEL IDENTIFYING ACTOR: 1. Administrator: He should register new Users, Delete Users etc. He can upload new documents, Documents, and A/V files. 2. User: He should register in site in order to access books. He can search for books. He can upload new books, documents, and A/V files into server. IDENTIFYING SCENARIOS: A Scenario is a scene, which explains a particular situation in more visualized model. A scenario consists of actors, scenes, and flow of events. In our project, we have the following scenarios: Scenario for Searching of EBooks, Document or A/V file: Scene Name Actors Flow of events Searching for books. User/Administrator User Opens home page of site. It will display text box and Search button. User simply enter query into text box, clicks on Search button. Browser sends request to the server. Server search documents for query and sends hyperlinks to documents (with weight, ranks, and a small description about document) in order of relevance to the query. ONLINE LIBRARY BY M.SATHISH KUMAR Page 8 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Scenario a for Opening EBook, Document or A/V file: Scene Name Actors Flow of events Opening Book, Document, or A/V file. User / Administrator User clicks on hyperlink of Document by reading description about document that had displayed below hyperlink. Then browser sends a request to the server again. The request contains name of document which user wants to open. The server will increase rank for document with respect to query into order to increase the relevance. Then server sends the document file in the form of response to browser. Now browser will open the document by using related application program on client system. (For example if server sent .mp3 file then browser opens it by using audio player, which installed on client‟s computer. Of course, Browser needs permeation of System Administrator to access application program.) ONLINE LIBRARY BY M.SATHISH KUMAR Page 9 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Scenario for Uploading a EBook, Document or A/V file into Server: Scene Name Actors Flow of events Uploading Administrator / User First User clicks on hyperlink of â€Å"Upload document†. Then browser sends request to upload file. Server return a webpage to browser it contains text box and browse button. By clicking on browse button a file window is displayed which allows to user to select a document from clients computer. After selecting document users click on upload button. Server checks for its extension. If document is.exe file server will not allow uploading file for the purpose of security. Then server insert name of document into documents table with unique document id. Then server creates index for document and insert into indexes table. Server returns a webpage, which contains confirmation and document id. ONLINE LIBRARY BY M.SATHISH KUMAR Page 10 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Scenario for Modifying Users: Scene Name Actors Flow of events Modifying Users Administrator If login user is admin then homepage contains a special Hyperlink that â€Å"modify user.† If admin clicks on that hyperlink he will navigate to another webpage which contains details of users. In that admin can modify user details admin can delete users who violated terms of site. IDENTIFYING USE CASES: A use case is a description of systems behaviour from a user‟s standpoint. It is a tried and true technique for gathering systems requirement from a user‟s point of view. ONLINE LIBRARY BY M.SATHISH KUMAR Page 11 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 USE CASE DIAGRAMS Use case diagram for entire Online Library System: ONLINE LIBRARY BY M.SATHISH KUMAR Page 12 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Use Case Diagram for Searching: Use case Diagram for Uploading file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 13 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 SEQUENCE DIAGRAMS Sequence Diagram for Searching: ONLINE LIBRARY BY M.SATHISH KUMAR Page 14 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Sequence Diagram for uploading file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 15 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Sequence Diagram for Opening file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 16 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 COLLABORATION DIAGRAMS Collaboration Diagram for Searching: ONLINE LIBRARY BY M.SATHISH KUMAR Page 17 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Collaboration Diagram for uploading file: Collaboration Diagram for Opening file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 18 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ACTIVITY DIAGRAMS Activity Diagram for Searching: ONLINE LIBRARY BY M.SATHISH KUMAR Page 19 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Activity Diagram for Uploading file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 20 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Activity Diagram for Opening file: ONLINE LIBRARY BY M.SATHISH KUMAR Page 21 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 CLASS DIAGRAMS DBHandler Class: DBHandler is respnosible for performing all operations which are need interaction with Database. It perform all operation in database like inserting document, creating index, inserting query, mating database consistency , creating tables, recovering database when database crashed. It highly simplifies maintains of database. Adminstrator need not worry about database at any time. ONLINE LIBRARY BY M.SATHISH KUMAR Page 22 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 VectroSpaceModel Class: VectorSpaceModel is class it responsible for calculating similarity coefficients of documents with respect to query. After calculating similarity coefficient it passes documents with similarity coefficients to probabilistic model class, which will finds weights using similarity coefficients. ProbabilisticModel Class: Probabilisticmodel class responsible for calculating weights for documents using similarity coefficients. After calculating weights, it will get ranks for documents from rank table. And return documents to Search class. ONLINE LIBRARY BY M.SATHISH KUMAR Page 23 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Read Class: Read class for responsible for reading text from text files. It will read text from different format of text files. For example .doc, .pdf, .xls, .txt, .html etc. It read reads text and clean text and returns as string. If the file is not text file then it will return name and extension of file as string. Search Class: Search Class acts as driver class. It does not perform any tasks. It makes all class working together. ONLINE LIBRARY BY M.SATHISH KUMAR Page 24 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 DEPLOYMENT DIAGRAM ONLINE LIBRARY BY M.SATHISH KUMAR Page 25 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 DESIGN SOFTWARE STRUCTURE: Software is fundamental characteristic of computer software. Software structure is to decompose the complex groups of module into sub modules i.e., Process, Menus, Inputs and Reports. The most general form of the software structure is the network. The structure is the network. The structure inside a complex processing node might consist of concurrent processes executing in parallel and communication through some combination of shared variables. DATABASE DESIGN: Planning the Database: The most important consideration in designing the database is how the information will be used. ïÆ'Ëœ Business activities that will use the database to perform. ïÆ'Ëœ Business rules that apply to these activities ïÆ'Ëœ Data wanted to maintain in the database The main objectives of designing a database are ïÆ'Ëœ ïÆ'Ëœ ïÆ'Ëœ Data integration Data integrity Data independence DATA INTEGRATION: In a database, information from several files is co-ordinate, accessed and operand upon as though it is single file. ONLINE LIBRARY BY M.SATHISH KUMAR Page 26 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 Logically, the information is centralized, physical, the data may be located facilities. Design Methodology: Design is concerned with identifying software components, specifying relationships among component, specifying software structure and providing a blue print for the implementation phase. Design consists of three types: 1. Architectural Design 2. Detail Design 3. External Design Architectural Design: Architectural Design involves identifying the software components, decoupling and decomposing them into processing modules and conceptual data structure and specifying relationships among the components. Detailed Design: Detailed design is concerned with the details of how to package the processing modules and how to implement the processing algorithms, data structure and interconnection among modules and data structure. GUI based design: In order to have a better understanding over the system design, it is appropriate to know the actual designing in terms of the development platform and the way in which the GUI are designed to satisfy the requirements of the user. The analysis of the design aspects of this package is proposed External design. External design of software involves conceiving, planning and specifying the external observable characteristics in different devices connected though data communication ONLINE LIBRARY BY M.SATHISH KUMAR Page 27 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 of a software product. This includes reports and display formats. External design begins analysis phase it continues into the design phase. DATA INTEGRITY: Data integrity means storing all the data in single place and allow each application to access it. This approach results in more consistent, on update being sufficient to achieve a new record status for all the applications, which use it. This leads to less data redundancy, data items need not be duplicated, requirement. DATA INDEPENDENCE: Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the content and organization of physical data without reprogramming of applications and to allow modifications to application programs without the reorganizing the physical data. Normalization: Data structuring is refined through a process called normalization. Normalization is a formal process of developing data structures in a manner that eliminates decomposition redundancy and promotes integrity. of complex records into simple It is a step-by-step records to reduce a reduction in the direct access storage  redundancy, inconsistencies and remove anomalies. There are several normal forms to be followed in normalization process. The most important and widely used are: ï‚ · ï‚ · ï‚ · ï‚ · ONLINE LIBRARY BY M.SATHISH KUMAR Page 28 First Normal Form Second Normal Form Third Normal Form DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 First Normal Form: A table is said to be in first normal form if the intersection of any column and row contains only value. Method: This is identifying a suitable identifier from the pool of normalized data. Remove any item that repeat within a single value of this key to another relation bringing with them the identifier key to form part of new composite key in the relation. Second Normal Form: For a table to be in the second normal form it should also be in the first normal form and the values in every column are functionally dependent on the complete primary key. Method: Examine every column and section whether its value depend on the whole of  the compound key or just some parts of it. Remove key. Third Normal Form: For a table to be in the third normal form transitively dependent on the primary key. Method: Examine every non-key column with every other non-key column. If the value of the non-key column depends on the other non-key column then remove the columns to separate table. it should be in the those that depend only on part of the key to a new table with that part as the primary second normal form and the values in every non-key column are not ONLINE LIBRARY BY M.SATHISH KUMAR Page 29 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 De Normalization: The normalization process helps in reducing to a great extent but sometimes when information is required from more than one table, at a fast rate , it is desirable to have some degree of redundancy in table . Their deliberate introduction of redundancy for a highly improved performance is referred to as † De Normalization† . DATABASE TABLES: 1. QUARRIES: The QUARRES table can store quarries entered by user with unique ID (QID). It is stores unique quarries irrespective order of words and case of letters. 2. DOCUMENTS: The DOCUMENTS table can hold name of documents, which are in server with unique ID for every document. 3. WORDS: The WORDS table can store words, which are in documents. This table plays key role in creating index for documents. This table contains a unique ID and words column. Unique words can be stored in this table irrespective of case of letters. 4. RANKS: The RANKS table can hold rank and weight for each document with respect to query. This table contains four columns. QID and DID are refer QID of QUERRIES and DID of DOCUMENTS table respectively. 5.  INDEX: The INDEX table helps to search engine while searching for documents, which are relate to query given by user. Simply it makes fast Searching. It contains two columns WID, DID refer WID of WORDS, DID of DOCUMENTS tables. 6. USERDETAILS: The USERDETAILS can hold details of users. Username, user-id, password etc. ONLINE LIBRARY BY M.SATHISH KUMAR Page 30 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ENTITY RELATIONSHIP DIAGRAMS ONLINE LIBRARY BY M.SATHISH KUMAR Page 31 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ABOUT THE SOFTWARE INTRODUCTION: HTML stands for hyper text makeup language. It is a language used to create hypertext documents that have hyperlinks embedded in them. You can build web pages. It is only a formatting language and not a programming language. Hyperlinks are underlined or emphasized words or locations in a screen that leads to other documents, W W W is a global, Interactive, dynamic, cross Platform, graphical hypertext information system. The idea behind hypertext is that instead of reading text in rigid linear structure you can easily jump from one point to another. You can Navigate through the information based on your interest and preferences. HYPERMEDIA HTML pages with audio and video files linked to them are called Hypermedia. HTML is platform independent. HTML IS PLATFORM INDEPENDENT: If you can access internet, you can access WWW, Irrespective of your operating system and the operating system to the web server. All you require to view and unload the HTML files, which are on the WWW, are a browser and internet connection. WEB IS DISTRIBUTED: The information on the WWW is distributed through out the world. You can access it with a few mouse clicks. You do not have to store it on your machine. Information on the Web is dynamically updateable. As the information is at the site where it is published, the people who publish it can change it any time. HTML is a language for describing structured documents, HTML describes the structures of documents – lists, headings, paragraphs Etc. Elements of web documents are labeled through the usage of HTML tags, It is the tags that describe the documents. Anything that is not a tag part of the Document itself. ONLINE LIBRARY BY M.SATHISH KUMAR Page 32 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 The Static Web When the World Wide Web was born, it consisted of static Web sites. Web sites consisted of static documents (mostly HTML pages) that were accessible through Web servers. Users used Web browsers to access these Web sites. A Web browser communicated with a Web server over the Hyper Text Transfer Protocol (HTTP). Using an HTTP request, the browser communicated with the Web server and asked to get access to a certain document. The Web server managed a set of documents stored on a file system. When asked for a document, it would retrieve it and return it within an HTTP response: HTML DOES NOT DESCRIBE PAGE LAYOUT: World for windows or lotus improve for example, have different styles for Headings, font, Size, and identification. HTML does not have all these. Based on the plat form , exact placement or appearance of any element will change. There may be or may not be fonts installed. By separating the structure of the document and its appearance, a program, that reads and understands HTML can make formatting decisions based on capabilities of the individual platform . In addition to providing the networking functions to retrieve documents, Web browsers are also HTML formatters. ONLINE LIBRARY BY M.SATHISH KUMAR Page 33 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 They parse and format documents and display them on the screen. Different rowsers show data differently. ADVANTAGES : A HTML document is small and hence easy to send over the net. It is small because it does not include format information. HTML documents are cross platform compatible and device independent. You only need a HTML reliable browser to view them. Font names, locations Etc.. are required. Currently the standard fully supported is HTML 2.0 & HTML 3.0 is in use. It supports. Centered and right aligned text. Tables . Math equations Text and image alignment JAVA INTRODUCTION Java is an intercepted language. Though it bears a close resemblance to C++ , it is different from it in many ways. It is a smaller,  portable, purely object oriented Language that eliminates many of the sources of bugs and complexities that are common with C Or C++ . JAVA FEATURES: Java is simple, Object Oriented, Intercepted, Robust, Secure Architecture neutral, Portable, has high performance, multi threaded and dynamics. It is easier To use Java because it’s syntax is similar to C and C++, more so when it eliminates components of C that causes bugs and memory leaks and hence a lot less debugging, Java provides a powerful Set of pre-tested libraries that give us the ability to use advanced features even with few lines of Code. OBJECT ORIENTED Java is an Object oriented programming Language that uses software objects called CLASESS and it is based on reusable, extensible code. This implies we can use Java’s classes, which are sets of variables and method s, as ONLINE LIBRARY BY M.SATHISH KUMAR Page 34 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 templates to create other Classes with added functionality without the need to write the code from Scratch. The Application can be made small and easy to develop if we plan the class hierarchy well. Robust: Java is Robust because, the language removes the use of pointers and The Java Runtime System manages the memory for us. Java gives us automatic bounds checking for arrays, so that they cannot reside in an address space which is not allocated for them. Automatic memory management is taken care of by the Garbage Collector. Interpreted: Java is interpreted; hence the development cycle is much faster. Java needs to compile for a single, virtual machine and then the code can run on any machine that has JVM ported to it. Secure: Java is secure, so user can download Java programs from anywhere. Java provides extensible compile time checking followed by a multi layered level of runtime Checking. Architecture Neutral: Java is architecture neutral, so user applications are portable across multiple platforms. Java’s Applications are written and compiled into Byte Code for JVM, Which emulates an actual hardware chip. The Java Interpreter installed at the client, so applications need not be written for various platforms separately converts byte Code to machine code. Java further ensures that the applications are the same on every platform by strictly defining the sizes of the basic data types and their behaviour. Dynamic: Java is Dynamic., so the applications are adapted to changing environments, Java’s architecture allows the user to dynamically load classes at runtime from any where on the network, which means that the user can add functionality to applications by simply linking in new classes. ONLINE LIBRARY BY M.SATHISH KUMAR Page 35 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 JDBC OVERVIEW What is JDBC? JDBC is a Java TM API for executing SQL statements. It consists of a set of classes and interfaces written in the JAVA programming language that makes it easy to send SQL statements to virtually any relational database. In other words, with the JDBC API, it isn’t necessary to write one program to access a Sybase database, another program to access an Oracle database, another program to access an Informix database, and so on. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. And, with a program written in the JAVA programming language, one doesn’t have to worry about writing different programs to run on different platforms. The combination of JAVA and JDBC lets a programmer write it once and run it anywhere. JAVA, being robust, secures, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language basis for database applications. What i s needed is a way for JAVA applications to talk to  variety of different databases. JDBC is the mechanism for doing this. JDBC extends what you can do in JAVA. For example, with JAVA and the JDBC API, it is possible to publish a web page containing an applet that uses information obtained from a remote database. Or an enterprise can use JDBC to connect all its employees (Even if they are using a conglomeration of Windows, Macintosh and Unix machines) to one or more internal databases via. An Internet. With more and more programmers using the JAVA programming language, the need for easy database access from JAVA is continuing to grow. MIS managers like the combination of JAVA and JDBC because it makes disseminating information easy and economical. Business can continue to use their installed databases and access information easily even if it is stored on different database management systems. Development time for new applications is short. Installation and version controls are greatly simplified. A programmer can write an application or an update once, put it on the server and everybody has access to the latest version and for business selli ng information services, JAVA and JDBC offers better way of getting out information updates to ONLINE LIBRARY BY M.SATHISH KUMAR Page 36 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 external customers. Various ways to use JDBC are discussed in. What Does JDBC Do? Simply put, JDBC makes it possible to do three things: Establishes connection to databases. Send SQL statements. Process the results. JDBC is a Low-level API and a base for Higher-Level API. JDBC is a â€Å"Low-level† interface, which means that it is used to invoke SQL commands directly. It works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed also to be a base upon which to build higher-level interfaces and tools. A higher-level interface is â€Å"User-friendly†, using a more understandable or more convenient API that is  translated behind the scenes into a Low level interface such as JDBC. So why not just use ODBC from Java? The answer is that you can use ODBC from JA V A, but this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge. The question now becomes â€Å"Why do you need JDBCT’ There are several answers to this question: 1. ODBC is not appropriate for direct use from Java because is uses a C interface. 2. Calls from Java to native C code have a number of drawbacks in the security, 1. implementation, robustness, and automatic probability of applications. A literal translation of the ODBC API into a Java API world not desirable. For example, Java has no pointers, and ODBC makes copious use from, including the notoriously error-prone generic pointer â€Å"void *†. You can think as JDBC as ODBC translated into an object-oriented interface that is natural for Java programmers. 2. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the other ONLINE LIBRARY BY M.SATHISH KUMAR Page 37 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 hand, was designed for a wide range of programmers and keeps simple things simple. 3. A Java API like JDBC is needed in order to enable an â€Å"all-Java† solution. When ODBC is used, the driver manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in JAVA, however, JDBC code is automatically installed, portable, and secure on all Java platforms from network computers to mainframes. In summary, the JDBC API is natural JAVA interface is to the basic SQL abstractions and concepts. It builds an odbc rather than starting from search, so programmers familiar with odbc will find it very easy to learn JDBC. JDBC retains the basic design features of ODBC; infarct, both interfaces are based on the x/Open SQL CU( call level interface). The big difference is that JDBC builds on and reinforces the style and virtues of  Java, and of course, it is easy to use. ADVANTAGES. Until now, the middle tier has typically been written in languages such as C or C++, which offer fast performance. However, with introduction of optimizing compilers, translating Java byte code into efficient machinespecific code, it is becoming practical to implement the middle tier in Java. This is a big plus, making it possible to take advantage of Java’s robustness, multi-threading and security features. SOL Conformance Structured Query Language(SQL) is the standard language for accessing relational databases. One area of difficulty is that almost most DBMSs(Database Management Systems) gives a standard form of SQL for basic functionality, they do not conform to the more recently defined standard SQL syntax or semantics for more advanced functionality. For example, not all databases support stored procedures or outer joins, and those that do are not consistent with each other. It is hoped that the portion of SQL that is truly standard will expand to include more functionality. In the mean time, however, the JDBC API must support SQL as it is. One way the JDBC API deals with the problem is to allow any query string to be passed through to an underlying DBMS driver. This means that an application is iTee to use as much SQL functionality is desired, but it runs the risk of receiving an error on some DBMS. In fact an application query need not even be an SQL, or it may be a specialized derivation of SQL designed for specific DBMS(for document or image queries). For example, a second way JDBC deals with the problems of SQL conformance is to provide ODBC style escape clauses. Which are discussed in SQL Escape Syntax in Statement objects. This escape syntax allows a programmer to use SQL ONLINE LIBRARY BY M.SATHISH KUMAR Page 38 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 functionality item within a JDBC program. The ODBC API is a natural choice for Java developers because it offers easy database access for Java  applications and applets. Because JDBC brings together Java and databases, the remainder of the topic gives a brief overview of each. JDBC DRIVERS The JDBC drivers that we are aware of at this time fit into one of four categories. 1. JDBC-ODBC bridge plus ODBC Driver: The JavaSoft bridge product provides JDBC access via ODBC drivers. Note that ODBC binary code and in many cases database client code must be loaded on each client machine that uses this driver. As a result, this kind of driver is more appropriate on a corporate network where client installations are not a major problem, or for applications server code written in Java in a three-tier architecture. 2. Native-Api partly – JAVA Driver: This kind of driver converts JDBC calls into calls on the client api for Oracle, sybase, Informix, DB2, or other DBMS. Note that, like the bridge driver this style of driver requires that some binary code be loaded on each client machine. 3. JDBC-Net all– JAVA Driver: This driver translates JDBC calls into a DBMS independent net protocol, which is then translated to a DBMS protocol by a server. This net server middleware is able to connect its all-Java clients to many different databases. The specific protocol used depends on the vendor. In general, this is the most flexible JDBC alternative. It is likely that all vendors of this solution will provide products suitable for internet use. In order for these products to also support internet access, they must handle the additional requirements for security, access through fire walls, etc., that the web imposes. Several vendors are adding JDBC drivers to their existing database middleware products. 4. Native – Protocol all-Java Driver: This kind of driver converts JDBC calls into the network protocol used b: dbms’s directly. This allows a direct call from the client machine to the dbms server and is a practical solution for internet access. Since many of ONLINE LIBRARY BY M.SATHISH KUMAR Page 39 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 these protocols are proprietary, the database vendors themselves will be the  primary source. Several database vendors have these in progress. Eventually, we expect that categories 3 and 4 will be the preferred way to access databases from JDBc. Driver categories 1 and 2 are in term solutions where direct all-Java drivers are not yet available. Category 4 is in some sense the ideal; however, there are many cases where category 3 may be preferable: e.g., where a thin dbms in dependent client is desired, or if a dbms-independent protocol is standardized and implemented directly by many dbms vendors. SERVLETS Introduction: The Java web server is JavaSoft’s own web Server. The Java web server is just a part of a larger framework, intended to provide you not just with a web server, but also with tools. To build customized network servers for any Internet or Intranet client/server system. Servlets are to a web server, how applets are to the browser. About Servlets: Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming, including inextensible scripting solutions, platform-specific APIs, and incomplete interfaces. Servlets are objects that conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the client-side – object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform independent, dynamically loadable, pluggable helper byte code objects on ONLINE LIBRARY BY M.SATHISH KUMAR Page 40 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 the server side that can be used to dynamically extend server-side  functionality. For example, an HTTP Servlets can be used to generate dynamic HTML content. When you use Servlets to do dynamic content you get the following advantages: ïÆ'Ëœ They‟re faster and cleaner than CGI scripts ïÆ'Ëœ They use a standard API (the Servlets API) ïÆ'Ëœ They provide all the advantages of Java (run on a variety of servers without needing to be rewritten). Attractiveness of Servlets: There are many features of Servlets that make them easy and attractive to use. These include: ïÆ'Ëœ Easily configured using the GUI-based Admin tool ïÆ'Ëœ Can be loaded and invoked from a local disk or remotely across the network. ïÆ'Ëœ Can be linked together, or chained, so that one Servlets can call another Servlets, or several Servlets in sequence. ïÆ'Ëœ Can be called dynamically from within HTML pages, using server-side include tags. ïÆ'Ëœ Are secure – even when downloading across the network, the Servlets  security model and Servlets sandbox protect your system from unfriendly behavior. Advantages of Servlet API One of the great advantages of the Servlet API is protocol independence. It assumes nothing about: ïÆ'Ëœ The protocol being used to transmit on the net ONLINE LIBRARY BY M.SATHISH KUMAR Page 41 DOCUMENTATION OF ONLINE LIBRARY July 24, 2012 ïÆ'Ëœ How it is loaded ïÆ'Ëœ The server environment it will be running in ïÆ'Ëœ These qualities are important, because it allows the Servlet API to be  embedded in many different kinds of servers. There are other advantages to the Servlet API as well. These include: ïÆ'Ëœ It‟s extensible – you can inherit all your functionality from the base classes made available to you. ïÆ'Ëœ it’s simple, small, and easy to use. Features of Servlets: ïÆ'Ëœ Servlets are persistent. Servlet are loaded only by the web server and can maintain services between requests. ïÆ'Ëœ Servlets are fast. Since Servlets only need to be loaded once, they offer much better performance over their CGI counterparts. ïÆ'Ëœ Servlets are platform independent. ïÆ'Ëœ Servlets are extensible. Java is a robust, object-oriented programming language, which easily can be extended to suit your needs ïÆ'Ëœ Servlets are secure. ïÆ'Ëœ Servlets can be used with a variety of clients. Loading Servlets: Servlets can be loaded from three places From a directory that is on the CLASSPATH. The CLASSPATH of classes reside. From the

Thursday, November 7, 2019

The Sphinx in Greek and Egyptian Legend

The Sphinx in Greek and Egyptian Legend There are two creatures called a sphinx. One sphinx is an Egyptian desert statue of a hybrid creature. It has a leonine body and the head of another creature typically, human.The other type of sphinx is a Greek demon with a tail and wings. The 2 types of sphinx are similar because they are hybrids, having body parts from more than one animal. Mythological Sphinx and Oedipus Oedipus was made famous in modern times by Freud, who based a psychological condition on Oedipus love of his mother and murder of his father. Part of Oedipus ancient legend is that he saved the day when he answered the riddle of the sphinx, who had been ravaging the countryside. When Oedipus ran into the sphinx, she asked him a riddle she did not expect him to answer. Should he fail, she would eat him. She asked, What has 4 legs in the morning, 2 at noon, and 3 at night? Oedipus answered the sphinx, Man. And with that answer, Oedipus became king of Thebes. The sphinx responded by killing herself. Great Sphinx Statue in Egypt That may have been the end of the most famous, mythological sphinx, but there were other sphinxes in art and some of them still exist. The earliest is the sphinx statue made from the native bedrock in the desert sands at Giza, Egypt, a portrait thought to be of Pharaoh Khafre (fourth king of the 4th dynasty, c. 2575 - c. 2465 B.C.). This the Great Sphinx has a lion body with a human head. The sphinx may be a funerary monument to the pharaoh and of the god Horus in its aspect as ​Haurun-Harmakhis. Winged Sphinx The sphinx made its way to Asia where it gained wings. In Crete, the winged sphinx appears on artifacts from the 16th century B.C. Shortly thereafter, around the 15th century B.C., the sphinx statues became female. The sphinx is often depicted sitting on her haunches. Great SphinxThis InterOz site says sphinx means strangler, a name given the woman/lion/bird statue by the Greeks. Site tells about repair and reconstruction efforts.Guardians SphinxPhotographs and physical description of the Great Sphinx which is thought to have been commissioned by the Fourth Dynastys King Khafre.Saving the Secrets of the SandInterview and article on Dr. Zahi Hawass, director of the Sphinx Restoration Project, by Elizabeth Kaye McCall. See Recent Interviews for more information from Dr. Hawass.Remnants of a Lost Civilization?Zahi Hawass and Mark Lehner explain why most Egyptologists ignore the early dating theories of West and Schoch West and Schoch ignore the evidence of Old Egyptian society.

Monday, November 4, 2019

Impact of Leadership in Organizational School Culture Essay

Impact of Leadership in Organizational School Culture - Essay Example She acknowledges that they do not respect each other due to lack of a consistent culture. The principal thus decides to institute a culture week to have the students showcase different cultures to ease the apparent tension. Lack of a homogenous school culture is both oppressive and discriminatory for other subgroups found within the school. The decision to include students in the management of their affairs is critical in effecting change that directly touches on their problems. Second: Staff stability to facilitate the development of strong cohesive school culture. Patricia Morgillo was posted to Quinnipiac Elementary School a priority school by designation of the state. The design was based students needing an intervention on the CMT. The school would receive more funding from New Haven school district, but stigma was directed to its teachers and pupils. She decided to refer to the school’s data to mobilize support for improvement from students and teachers. Previous adminis trators had not used hard data effectively to improve students' potential. "In fact, when I first came here, they used check marks to track students mostly on behavior, Morgillo said. Quinnipiac was a community school, and Morgillo knew staff had to examine statistics and soft data to implement change. Dr.Osborne, an executive in the district’s priority schools devised an action plan for addressing low test scores, strengthened professional development, and using data to effect change in different strands of the Connecticut Mastery Test.

Saturday, November 2, 2019

John Paul II Essay Example | Topics and Well Written Essays - 1500 words

John Paul II - Essay Example While the NE is a doctrine and set of ideas that was put forward by John Paul II in the early 1990's, the roots of this belong in the establishment of the Second Vatican Council (1962) and in documents like the LUMEN GENTIUM (1964)[1]. In the broadest terms, it can be said that the Second Vatican Council or Vatican II was the Catholic Church's attempt to adapt and assimilate some of modernity or modernism. For instance, one of the changes or transformations that most Catholics are likely aware of, is that Mass is no longer required to be in Latin. The significance of this historically is rather rich. The very Reformation which split the Catholic Church in the Sixteen Century, partially happened because of a new movement to bring the Bible into the vernacular or to the language of the people [2]. And, while the Bible had made it into the languages that common people spoke many centuries earlier, Mass continued to be conducted in Latin until 1962: "Since these duties, so very necessary to the life of the Church, can be fulfilled only with difficulty in many regions in accordance with the discipline of the Latin Church as it exists today" [3]. Another aspect of the NE that is both central, and which has its roots in Vatican II and the the Lumen Gentium, is the incorporation of lay individuals into the body and mission of the Church. That is, viewing lay people as not just the object of being converted or taught, but as valuable members of the community who have a contribution to make in spreading the word, so to speak: "every layman, in virtue of the very gifts bestowed upon him, is at the same time a witness and a living instrument of the mission of the Church itself 'according to the measure of Christ's bestowal'" [4]. Compare this remark with what John Paul II says about the NE: Today, in particular, the pressing pastoral task of the new evangelization calls for involvement of the entire people of God, and requires a new fervor, new methods and a new expression for the announcing and witnessing of the gospel [5]. The first important and general dimension of the NE, and as it relates to changes in the Catholic Church since the early 1960's, is the inclusiveness, and a less hierarchal approach to the ministry of the Church. However, where Vatican II and the Lumen Gentium are a way of accommodating or assimilating modernism to some extent, the NE as established by John Paul II is succinct insofar as it can be said to be a set of ideas that is actually reactionary modernism or modernization. By reactionary, it is not implied in terms of having as its object Catholic doctrine, rather, society itself. One of the concerns of the NE, is increased secularization, a decrease in the basic lay understanding of the tenets of Christianity, and Catholic Catechism. As John Paul II's assistant states on the subject of his concern with secularization in Western Europe that it was "gradually drifting further and further from its roots and so from its histor y and culture" [6]. This is a perspective about secularization, according to one of John Paul's biographer's that began in the post-war period of the late 1940's and early 1950's, and as far back as then he viewed: "new forms of pastoral activity open to a broader participation by the laity" [7]. Although there is a lot in common between the