Thursday, October 31, 2019

Tv channel comparison Research Paper Example | Topics and Well Written Essays - 750 words

Tv channel comparison - Research Paper Example In our country Qatar, there are two main local channels which Qatar TV and AlRayyan TV. Each one of these channels has its own aesthetic features and ways of attracting audience. Qatar TV started broadcasting since 1970 while AlRayyan just started one year ago. Of course, given all those years in broadcasting, Qatar TV must have the greater experience. However, lots of arguments have been made by Qatari people that put AlRayyan TV, despites of its recent launch, on top of Qatar TV because of its greater closeness to the Qatari society, having better programs and broadcasters. In this regard, this study aims to clarify differences between these TV channels in terms of social and religious influence, quality of staff and quality of programs broadcasted in the perspective of Qatari people. A lot of people argue and have put AlRayyan TV, despites of its recent launch, on top of Qatar TV , which launched decades ago, because of its greater closeness to the Qatari society, having better pr ograms and broadcasters. Methods The design of this research is quantitative due to its structured format and due to the fact that it is testing a number of variables in a specific situation with the help of extensive previous studies as well as using both descriptive and analytical statistics when analysing field work data such as questionnaire. The research sample was taken from the Qatari population, both male and females from different ages. The main instrument used in data collection was questionnaire that included questions to reflect the four variables the study is dealing with. These variables are: social influence, religion influence, quality of staff and quality of programs. Number of males in the sample: 40 Number of females in the sample: 20 Number of people who voted for: Qatar TV: 40% AlRayyan TV: 60% Mean for Males: 20 Mean for females: 40 Variables Qatar TV AlRayyan TV Total Age Gender Nationality Education (Table should be here) Data for this study was collected fro m the general population. 60 questionnaires were distributed and a total of 43 questionnaires were retrieved through a drop-off and pick-up method. Conclusions and recommendations Summary The study was aimed at identifying which TV station was most popular within the country in terms of social influence, religion influence, quality of staff and the quality of programs. After conducting the research and analyzing the data, it was concluded that AlRayyan TV was the most popular despite its recent launch. This was supported by the data collected from the sample of the 60 people. The limitation of this research is that most people who were interviewed did not return the questionnaire. Some of the information provided was also irrelevant and some respondents were not willing to cooperate. The information provided was also not very substantial since only a small sample of the whole population was interviewed. This data cannot therefore be a total representation of the views of the general population. Ethical Issues The ethical issues in the study are that the information of the respondents must be kept confidential and the identities should not be withheld. It is also very important to make sure that the respondents answer the questions freely without being forced. The researchers must also ensure that they maintain professionalism in the whole procedure. The information should not be changed and should be as accurate as possible. The findings may be useful for the managers of

Tuesday, October 29, 2019

Final Paper Essay Example for Free

Final Paper Essay Target corporation is one of the biggest retailers there is out there, bringing in an estimate of $74 million dollars a year in revenue. Majority of Target revenue is earned during the busiest time of the year, which are Black Friday and holidays. Target has had a huge positive reputation because of the â€Å"Expect More Pay Less† promise and giving 5% back to the community. However, Target has been going through some hard times because of the Target breach that occurred during the holidays of 2013. This research paper will focus first on introducing the Target breach and how it has affected the company and what the company has done to fix the problem. Moving forward, I will focus on internal controls that Target could have applied and summarizing everything towards the end. Target Breach Internal Controls Target Corporation is a well known and respected retail store out there. Target is a corporation that buys goods from manufactures at a purchase discount price and reselling it to consumers in a higher price to make a profit. Target has brought in revenue of $74 million dollars a year and continues to grow every year. However, Target has gone through some hard times with the Target breach that just occurred during the holidays of 2013. Consumers have had a hard time trusting their card readers and loyalty and sales have been dropping ever since. The question that is now in the air is what internal controls that company had during this breach and what could they have done to avoid this breach that just occurred. To begin with, the company was running perfectly and driving outstanding sales until the company and guest found out that they had a breach, also known to the community as the â€Å"Target Breach. Target corporation confirmed that a major data breach occurred between Black Friday and December 15, 2013, which includes many of the most important shopping days of the year† (Edelson, 2013). Ever since the Target breach, the company’s reputation was hurt, consumers were not confident about shopping, and are afraid of using the card readers at the stores. Later in time, after the breach was announced, the company had given further information on how the breach affected the people. It is believed that the breach affected roughly 40,000 card devices at store registers, which could mean that millions of cardholders could be vulnerable, according to the people familiar with the incident† (Sidel, 2013). On top of the 40,000 card devices being affected, 40 million people’s credit card and debit card information was stolen. The CEO of Target Corporation later released to the press and announced that personal information such as address, names, phone numbers, and e-mail address were also taken from the Target system. After reading about the Target breach, being an assistant manager for Target, and hearing about the tragic that has been caused, I remember feeling upset because of the way the company was going to be affected. However, it also reminded of the internal control concept that was thought in class. There was a lot of fraud involved with the Target breach, which is something that occurs when it comes to intern control. â€Å"Fraud refers to any act by the management or employees of business involving an internal deception for personal gain. Fraud may include, among other acts, embezzlement of business cash, theft of assets, filing false insurance claims, filing false health claims, and financial statement fraud† (Ferris, Wallace, Christensen, 2014, pg. 314). With the Target breach, you are able to see the fraud triangle concepts, which consist of pressure, opportunity, and rationalization. Being employed by Target, that concept came into mine when reading the article because there was an e-mail sent to management about believing that an employee that worked with the POS (point on sale) system had a lot of inside information within the system. The pressure was there to get information from the POS system and rationalization was involved when they knew that they can get credit card information. The opportunity occurred when they knew the busiest time of the year was going to be Black Friday and majority of the sales are driven in that day. From all that has occurred it is not clear what internal controls Target had in order to avoid this situation. Internal controls are important when it comes to businesses in order to avoid situation like the Target breach. There are two parts that I believe that important when it comes to internal controls, which are prevention control and detection control. A â€Å"prevention control is intended to deter a problem or fraud before it can arise† (Ferris, Wallace, Christensen, 2014, pg. 316). Target should have followed the prevention control with the POS system in order to avoid the Target breach. A â€Å"detection control, on the other hand, is designed to discover any problems or fraud shortly it arises† (Ferris, Wallace, Christensen, 2014, pg. 316). Target followed the detection control after the problem of the breach was brought and took justice in their own hands in order to fix the problem. The first thing Target did was post a prominent message on its Web site, â€Å"Important notice: unauthorized access to payment card data in the U. S. stores. † The message linked to a letter alerting customers that a breach occurred and outlining steps Target is taking to a voice a recurrence† (Edelson, 2013). Another step that Target has taken is bringing justice for the information was that was stolen out of their systems. Target had invested $5 million dollars into a multi-year campaign in order to stop phishing scams (Target, 2013). â€Å"Target has longstanding history of commitment to our communities, and cyber security is one of the most pressing issues facing consumers today,† said Steinhafel. â€Å"We are proud to be working with three trusted organizations-the National Cyber-Forensics and Training Alliance (NCFTA), National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB)- to advance public education around cyber security† (Target, 2013). Target has gone to long measures to protect the information of the guest and reinsure loyalty by offering ProtectMyID, which keeps track of credit reports, monitoring, and identity theft (Target, 2013). As an apology to the guest, Target offered a 10% off discount to all guests which were a huge success for the company but numbers of transactions was cash paid. Being an employee for Target, we are still determine to follow our core roles, continue delivering the â€Å"Expect More Pay Less† promise, and delivering an excellent shopping experience for our guest in order to continue driving profitable sales and guest loyalty. In order to avoid this situation and detect the problem ahead of time, Target should have incorporated the following elements that are designed for prevention and detection controls. The first element is establish clear lines of authority and responsibility, which is giving authority to a supervisor or manager but also evaluation their consequently to companies policies and rules. Implement segregation of duties, â€Å"requires that when allocating various duties within the accounting system, management should make sure that no employee is assigned too many different responsibilities† (Ferris, Wallace, Christensen, 2014, pg.317). Hire competent personnel, which the company sees if that person has the education and qualified skills to perform that job. Use control number on all business documents, which is having all important documents with control numbers. Develop plans and budgets, which is having a plan and budget in order to bring the company forward. For example, the $5 m illion dollars that were invested in the anti fraud software in order to bring guest loyalty back. Maintain adequate accounting records, which is making sure that the company has the most recent accounting records. For example, the number of fraud claims that were reported under guest bank statements in order to reinvers their money back. Provide physical and electronic controls, is locking their doors or important files to prevent theft, which should have happened with the POS system. Conduct internal audit, â€Å"is a company function that provided independent appraisals of the company’s financial statement, its internal control, and its operations† (Ferris, Wallace, Christensen, 2014, pg. 319). In conclusion, we are able to see how the company was impacted from the breach that had occurred and the actions that the company has taken in order to fix the problem. People information had been stolen and finances have been tampered through it. We are able to see how internal controls play an important part when it comes to finances, accounting, and to businesses such as Target. If the proper elements and procedures had been applied with internal control I am sure that all of this could have been avoided or reduced.

Sunday, October 27, 2019

The Differences Between Athens And Sparta History Essay

The Differences Between Athens And Sparta History Essay Athens and Sparta may be on the same country and even on the same continent, but many differences can be found between these two city-states, They were close together on a map, yet far apart in what they valued and how they lived their lives (White, 2010). Some of the things they have differences, are the types of government each of then used to rule their cities. The education may have some similarities but at the end they differ in little things, as the military organization. The citizens on these two cities were in some part similar but also a little different as many of the things I had already talked about on the above. Both, Sparta and Athens did different things for their benefits and this things gave them the opportunity of unite more and the formation of a new government call democracy. There were three types of governments used by this two cities; monarchy, oligarchy and democracy. Each of them with different characteristics and that it identity and differ them from each other. Monarchy for example, is a type of government that consists that a king or a queen are the ones that rule the city, making everyone do what they order to do. Oligarchy, on the other hand is a government in which a small group of citizens gather together and they are the ones that control the taking of decisions (White, 2010). This were the types of governments that Spartans and Athenians used to control they cities, which at the end created the formation if a new government called democracy; a system of government in which citizens vote to make governmental decisions. On Sparta, the people that could be citizens were only the men and they need to be 30 years old. No women were allowed to be considered a citizen and of course they were only used to be housekeepers. Some of the women in Sparta owned lands and that was one the reason they were the freest women in Greece. Like in here, this author says: Citizen women were free to move around and enjoyed a great deal of freedom. Spartan women could own and control their own property (Unknown Author, Lets Compare at the time of Pericles, about 475 430 B.C).On Athens, the wealthy noble people that owned land were the ones that were consider citizens. One similarity between this two cities, were that no women where consider citizens but on Athens they werent allowed to own land. They also divided themselves into common people that didnt own land and the helots, which were free Greeks that had lived in Sparta before they were conquered. Not all the things between Sparta and Athens were completely different, there were some things which they had similar things. For example, on the way of government they both had a person or persons which were the ones that control the city and the things they were suppose to do. For example, Both Athens and Sparta had an Assembly, whose members were elected by the people. Sparta was ruled by two kings, who ruled until they died or were forced out of office. Athens was ruled by  archons, who were elected annually (White, 2010). Their military tactics and movements werent completely the same but they both had an army that Ortegà ³n 2 could help them. Also the weapons they used were similar, as helmets and swords. The educations for these two cities were similar in the way that they teach things, not the same things but they learned things. Also this education was mostly for men in both of the cities. Some differences they had on the things I just said were notably marked and they were constantly seen. On their government for example, the Spartan form was called  oligarchy, but it had elements of monarchy  , democracy, and  aristocracy(Unknown Author, Athens vs Sparta). They had a king which went with them to war and all the things they assisted, but he wasnt the one that took the decisions; the citizens were the ones that decided things. Instead on Athens, they used the democracy as they way of governing, which for them was more organized, but they were impartial because only the wealthy noble people were the ones that could vote. On their military part, Sparta only focused themselves into teach their people to fight and know how to defend themselves, instead Athens gave the options to men to take the decision if they wanted to join the army or not and study another thing. At the end, both of these city-states helped to the formation and evolution of the democracy, which in now days are used in most of the countries around the world. Sparta in somehow used the democracy but only a little group and even more in a group of old men which they didnt had knowledge of the things that were happening. Athens, on the other hand already used the democracy but a very restricted way which limited the common people to vote. Both of this forms of government opened the eyes of many tyrants and rules which at the end, when Greece united for the fight of power between Persia. It evolved and in a way it expanded around, giving new options to the world. Ortegà ³n 3

Friday, October 25, 2019

Using a PC on a Network :: essays research papers

Computer networking, like most industries, has its own jargon, which includes technical terms, abbreviations, and acronyms. Without a good grasp of the terminology, it will be difficult to understand the concepts and processes involved in networking. A network interface card (NIC), pronounced "nick," is also called the LAN adapter, or just the network interface. This card typically goes into an ISA, PCI, or PCMCIA (PC card) slot in a computer and connects to the network medium. It then connects to other computers through the network media. Media refers to the various physical environments through which transmission signals pass. Common network media include twisted-pair, coaxial, and fiber-optic cable, and even the earth's atmosphere through which wireless transmission occurs. A protocol is a set of rules. In the case of a network protocol, it is a set of rules by which computers communicate. The term "protocol suite" describes a set of several protocols that per form different functions related to different aspects of the communication process. Cisco IOS software which runs on Cisco equipment and devices, is the industry-leading and most widely deployed network system software. It delivers intelligent network services for enabling the rapid deployment of Internet applications. Cisco IOS software provides a wide range of functionality, from basic connectivity, security, and network management to technically advanced services. The functionality of Cisco IOS software is the result of a technological evolution. First-generation networking devices could only store and forward data packets. Today, Cisco IOS software can recognize, classify, and prioritize network traffic, optimize routing, support voice and video applications, and much more. Cisco IOS software runs on most Cisco routers and Cisco switches. These network devices carry most of the Internet traffic today. Network operating system (NOS) usually refers to server software such as Windows NT, Windows 2000 Server, Windows Server 2003, Novell NetWare, UNIX, and Linux. The term sometimes refers to the networking components of a client operating system such as Windows 95 or the Macintosh OS. Connectivity devices refer to several different device types, all of which are used to connect cable segments, conne ct two or more smaller networks (or subnets) into a larger network, or divide a large network into smaller ones. The term encompasses repeaters, hubs, switches, bridges, and routers. Network applications Network applications are software programs that run between different computers connected together on a network. Some of the more common uses of network applications include using a web browser program to find content from the World Wide Web, or using an e-mail program to send e-mails over the Internet.

Thursday, October 24, 2019

Biochemistry Prac Report Essay

Alcohol dehydrogenase (ADH) plays an important role in the anaerobic fermentation of yeast. This reports aims to analyse the kinetic parameters of ADH through spectrophotometry of ADH-catalysed reaction where ethanol is used as a substrate. The Lineweaver-Burk and the Eadie-Hofstee plots are used to linearly transform the hyperbolic form of the Michaelis-Menton equation and to calculate the accurate values of the kinetic parameters under consideration. This results obtained from these plots and equation help tp determine the importance of Km values of enzymes and various factors affecting it such as pH, temperature, presence of metalloenzymes. A brief discussion about the poor substrate specificity of ADH towards ethylene glycol and methods to prevent the occurrence of acidosis in human being due to the presence of ethylene glycol is also presented. INTRODUCTION Dehydrogenases enzymes oxidize a substrate by transferring hydrogen to an acceptor. (Branden et al. , 1975). Alcohol dehydrogenase (ADH- EC 1. 1. 1. 1) belongs to this group and catalyses many enzyme reactions (Sund and Theorell, 1963). Saccharomyces cerevisiae (Yeast) has three isoenzymes of ADH namely YADH-1, YADH-2 and YADH-3. YADH-1, which is important for fermentation, consists of four identical subunits, each containing a co-enzyme binding site and a bound zinc atom (Leskovac et al. 2002). Anaerobic conversion of Saccharomyces cerevisiae involves conversion of pyruvate (formed during glycolysis) into ethanal (acetaldehyde) in the presence of enzyme pyruvate decarboxylase (first step) and then reduction of acetaldehyde in the presence of ADH using co-enzyme NADH into ethanol, carbon dioxide and NAD+ (second step). The second step is reversible and these post-glycolysis reactions take place in the cytosol (Petro, 2005). The above-mentioned reactions were the basis of this practical where the kinetics of ADH was closely monitored by spectrophotometric analysis. NADH has an absorption maximum at 340nm while the oxidized form has no absorption at this wavelength. A backwards reaction was carried out and an expected increase in absorbance of the solution was observed as at 340 nm as NADH was reformed (Suzuki et al. 2000). The role of kinetic parameters, maximal velocity (Vmax) and the Michaelis constant (Km) of ADH were also investigated. The isoezyme YADH-2, which differs from YADH 1 at position 294 (methionine inYADH-1, leucine in YADH-2) is responsible for promoting the backward reaction by oxidizing ethanol to acetaldehyde. The higher activity of YADH-2 can be attributed to tighter binding of the longer chain alcohols and more rapid hydrogen transfer (Gould and Plapp, 1990). This background helps to define a hypothesis for this practical.

Tuesday, October 22, 2019

Dragonflies, Suborder Anisoptera

Dragonflies, Suborder Anisoptera All dragonflies belong to the order Odonata, as do their close cousins, the damselflies. Because there are distinct differences between dragonflies and damselflies, taxonomists divide the order into two suborders. The suborder Anisoptera includes only the dragonflies. Description: So what makes a dragonfly a dragonfly, as opposed to a damselfly? Lets start with the eyes. In the dragonflies, the eyes are quite large, so large in fact they make up the bulk of the head. The eyes often meet at the top of the head, or come close to it. Next, look at the dragonflys body. Dragonflies tend to be stocky. When resting, a dragonfly holds its wings open horizontally. The hind wings appear broader at their bases than the fore wings. Male dragonflies will typically have a single pair of cerci at their hind ends, as well as a single appendage projecting from the underside of the tenth abdominal segment (called an epiproct). Female dragonflies often bear vestigial or nonfunctional ovipositors. Dragonfly nymphs (sometimes called larvae, or naiads) are entirely aquatic. Like their parents, larval dragonflies generally have stocky bodies. They breathe through gills located in their rectums (theres an interesting bit of insect trivia for you), and can propel themselves forward by expelling water from the anus. They also bear five short, spiky appendages at the hind end, giving the nymph a rather pointed appearance. Classification: Kingdom – AnimaliaPhylum – ArthropodaClass – InsectaOrder – OdonataSuborder - Anisoptera Diet: All dragonflies are predaceous throughout their life cycles. Adult dragonflies hunt other insects, including smaller dragonflies and damselflies. Some dragonflies capture prey in flight, while others will glean meals from vegetation. Naiads eat other aquatic insects, and will also catch and consume tadpoles and small fish. Life Cycle: Dragonflies undergo simple, or incomplete, metamorphosis, with just three stages to the life cycle: egg, larva or nymph, and adult. Mating in dragonflies is a fairly acrobatic achievement, and which sometimes begins with the male scooping out his competitors sperm and flinging it aside. Once mated, the female dragonfly deposits her eggs in or near the water. Depending on the species, the eggs may take anywhere from a few days to over a month to hatch. Some species overwinter as eggs, delaying the start of the larval stage until the following spring. The aquatic nymphs will molt and grow repeatedly, a dozen times or more. In the tropics, this stage may last only a month. In temperate areas, the larval stage can be considerably longer, and even last for several years. When the adult is ready to emerge, the larva climbs out of the water and fixes itself to a stem or other substrate. It sheds its exoskeleton one final time, and the adult emerges, looking pale and delicate in its teneral stage. The castoff skin that usually remains affixed to the substrate is called the exuvia. Special Adaptations and Behaviors: Dragonflies operate each of their four wings independently, which enables them to perform sophisticated aerial moves. Observe dragonflies patrolling around a pond, and youll see that they can take off vertically, hover, and even fly backwards. The dragonflys large, compound eyes each consist of about 30,000 individual lenses (called ommatidia). Most of their brainpower goes to processing visual information. A dragonflys range of vision is nearly a full 360Â °; the only place it cant see well is directly behind it. With such keen eyesight and skillful maneuverability in the air, dragonflies can be tricky to catch – just ask anyone who has ever tried to net one! Families in the Suborder Anisoptera: Petaluridae – petaltails, graybacks Gomphidae – clubtails Aeshnidae – darners Cordulegastridae – spiketails, biddies Corduliidae – cruisers, emeralds, green-eyed skimmers Libellulidae – skimmers Range and Distribution: Dragonflies live throughout the world, wherever aquatic habitats exist to support their life cycle. Members of the suborder Anisoptera number roughly 2,800 worldwide, with over 75% of these species living in the tropics. About 300 species of true dragonflies inhabit the U.S. mainland and Canada. Sources: Borror and DeLongs Introduction to the Study of Insects, 7th edition, by Charles A. Triplehorn and Norman F. JohnsonSuborder Anisoptera - Dragonflies, BugGuide.Net, accessed November 23, 2012Anisoptera, University of Wisconsin BioWeb, accessed November 23, 2012Dragonflies and Damselflies, Odonata, University of Florida, accessed November 23, 2012Dragonflies and Damselflies of the West, by Dennis Paulson