Tuesday, December 31, 2019

World Civilization - 4404 Words

ASSIGNMENT 05 HS250 World Civilizations II Directions: Customer Question Ask your own question now gt; ASSIGNMENT 05 HS250 World Civilizations II Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be one (1) single-spaced page in length; refer to the Assignment Format page for specific format requirements. Some historians have argued that the First World War was the logical, perhaps inevitable, outcome of the revolutionary changes of the nineteenth century. Discuss this†¦show more content†¦Customer Reply Sorry didnt mean to send it to you Posted by lisalkawecki 259 days and 4 hours ago. Response From Expert o.k., thanks, XXXXX XXXXX in the process of writing your first essay now 259 days and 4 hours ago. Customer Reply Ok kool when are you going to posted that for me.. Posted by lisalkawecki 259 days and 4 hours ago. Response From Expert as soon as I am finished, shortly Accepted Answer Good afternoon, Thank you for allowing me to assist you this afternoon. The following is the information that you requested: World War I The assertion that some historians have argued that the First World War was a logical, perhaps inevitable, outcome of the revolutionary changes of the nineteenth century is an accurate statement. In regards XXXXX XXXXX long term causes of the World War I, there are four central factors. The first two factors that contributed to the longterm causes of WWI were Militarism and Alliances. The growing Europeans divide had led to an arms race between the main countries involved in the war The armies of both France and Germany had more than doubled in size between 1870 and 1914. In addition, there was great competition between Britain and Germany for the rules of the sea. This led to the alliances that were signed between countries. Between the years 1879 and 1914 there were several alliancesShow MoreRelatedCivilization : A World Without Civilization954 Words   |  4 PagesCivilization After being asked the question â€Å"What is Civilization?† I began to consider what civilization meant to me, and what could it have meant for millions of people in the past. Prior to beginning History 101, if you had asked me my views on civilization, it would have been a lot different than it is now. Before, I hadn’t really considered a world without civilization, the idea seems so foreign to us, modern day humans. A world with no cities, no towns, and no production or consumption? ItRead MoreComparison of Civilizations in the Ancient World Essay983 Words   |  4 PagesEarly civilization consisted of core values that defined the communities that resided within it. These communities were driven by numerous factors in which would decide the overall outcome of the civilization. Geography, social and economic values, and they’re culture all played an important role in the makeup of these civilizations. Mesopotamia was a successful farming community early on. Utilizing the Tigris and Euphrates rivers this community was able to create a successful way of farming throughRead MoreAnalysis Of Samuel Huntingtons Clash Of Civilizations And The Remaking Of The World Order1018 Words   |  5 PagesIn Clash of Civilizations and the Remaking of the World Order, Samuel Huntington states â€Å"The most important distinctions among peoples are no longer ideological, political, or economic. They are cultural†. This is his main argument throughout this book. New patterns of distinctions and conflict will occur along boundaries of different cultures. However, patterns of cohesion will be found within the cultural boundaries. Huntington analyzes the resurgence of post-cold war cultural identities. He doesRead MoreWorld Civilizations Ii Essay2469 Words   |  10 PagesWorld Civilizations II Unknown Unknown University World Civilizations II Unknown xxxx x, xxxx How could rational thought and technological development have affected the world’s development in the modern age and the development to where we are today? The Purpose of this paper is to demonstrate how rational thought and technological advancement was the driving force behind the Modern Age. The reader will have some understanding as to how rational thought opened up minds to a new way ofRead MoreAshford His 103 (World Civilizations I) Entire New Course Essay1446 Words   |  6 PagesAshford HIS 103 (World Civilizations I) Entire New Course IF You Want To Purchase A+ Work Then Click The Link Below , Instant Download http://hwnerd.com/HIS-103-World-Civilizations-I-Entire-New-Course-ASHFORD-1161.htm?categoryId=-1 If You Face Any Problem E- Mail Us At Contact.Hwnerd@Gmail.Com Hunter-Gatherers. Although most students begin by assuming settled farming life was better than that lived by hunter-gatherers, closer acquaintance with full Paleolithic Hunter-Gatherer life showsRead More Samuel Huntingtons The Clash of Civilizations and the Remaking of World Order2706 Words   |  11 PagesAbstract Samuel Huntingtons The Clash of Civilizations and the Remaking of World Order defines eight major civilizations on the basis of religion. This division of global powers can be used to prove that the Western civilization will never completely dominate the global media. While Western thought tends to lead to a more representative form of government, and consequently a more libertarian or social responsibility-based media, the other belief systems of the global powers tend to lead to moreRead MoreIndia And China s World s Oldest Civilization Essay1010 Words   |  5 Pagesthe world’s oldest civilization and they have shared a long history of cultural, scientific and economic linkages. In this day and age considering the recent GDP numbers from China and India: Beijing (Capital of China) says its ‘grew by a respectable 6.7% in the first three months of 2016, while New Delhi (Capital of India)reported a remarkable 7.9% expansion in the same period. Together (India and China) they account for 16% of the world GDP, or about $13trillion. But the World Bank only showed theRead MoreAncient Egypt : The World Civilizations Essay1084 Words   |  5 PagesThomas Pennell World Civilizations I Mr. Shows 7 November 2016 Ancient Egypt Multiple factors go into account when considering that Ancient Egypt is one of the best civilizations of all time. First, the location of Egypt allowed it to prosper; second, the culture was one that the world hadn’t seen until then; third, the architecture that took place baffles scientists to this day; and lastly the impact it had on modern culture. Egypt is located in a prime location for civilization to spring upRead MoreAncient Civilizations And The Modern World1379 Words   |  6 PagesAncient civilizations have had profound effects of what we know as the modern world today. The primary purpose for anything that lives is to survive. Throughout history animals, plants and humans have adapted to their surroundings. All living things have changed throughout time. The thing that differs humans from the rest is, humans are more cognitively advanced. Over the course of time the shape and size of the human skull have changed. The size of the human brain has increased, which has allowedRead MoreContributions Of African And World Civilizations Essay980 Words   |  4 PagesContributions to African and World Civilizations The Carthage was one of first big empires of the Africa and continues to be the largest. The biggest contribution to world civilizations today is the military tactics taken away from the Carthage Army and Navy. Hannibal Barca was the greatest military Generals of the ancient world, he lead the Carthaginian Army. He took over at the age of 26. Some of the tactics that he used that were so successful and are used today are taking out and surrounding

Monday, December 23, 2019

Essay on Basic Concepts in Attachment Theory - 2804 Words

Basic Concepts in Attachment Theory Attachment theory is the joint work of John Bowlby and Mary Ainsworth (Ainsworth Bowlby, 1991 ). Drawing on concepts from ethology, cybernetics, information processing, developmental psychology, and psychoanalysts, John Bowlby formulated the basic tenets of the theory. He thereby revolutionized our thinking about a child’s tie to the mother and its disruption through separation, deprivation, and bereavement. Mary Ainsworth’s innovative methodology not only made it possible to test some of Bowlby’s ideas empirically hut also helped expand the theory itself and is responsible for some of the new directions it is now taking. Ainsworth contributed the concept of the attachment figure as a secure†¦show more content†¦129), a life-span perspective shared by Ainsworth 1989[pic]. And indeed, research on attachment in childhood has been complemented by expanding attention to attachment in adults. |Attachment in Adulthood | | | Attachment patterns are hypothesized to persist across the life span through the reinforcing properties of internal working models (Bowlby 1973[pic]; Main, Kaplan, and Cassidy 1985[pic]). The first attachment relationship provides a template, a self-perpetuating schema that influences subsequent relationships. Mental representations from early attachment bonds thereby influence how individuals seek, anticipate, and interpret future interpersonal interactions (West and Sheldon-Keller 1994[pic]). Reflecting its roots, attachment theory also has emerged as a framework for understanding the relationship between adult children and their parents. Some theorists have suggested that adult children relinquish their parents as attachment figures (Weiss 1982[pic]), whereas others have amassed secondary evidence that attachments to parents are sustained (Krause and Haverkamp 1996[pic]). In a study of adult children whose parents were institutionalized, Crispi, Schiaffino, and Berman 1997[pic] found that childrens attachment style predicted aspects of their well-being.Show MoreRelatedThe Theory Of Attachment Theory1421 Words   |  6 Pages There are a lot of close relationship theory that are studied in social psychology but one of the main theory is attachment theory. This theory not only provides a framework for understanding emotional reactions in infants but also in love, loneliness, and grief in adults. In adults there are attachment styles that are a type of working model that explains certain behaviors that are developed at infancy and childhood. An infant requires two basic attitudes during their earliest interactionsRead MoreBonding : Maternal Infant Attachment And The Maternal Role Attainment Theory1707 Words   |  7 PagesA concept is an abstract group of thoughts that integrates unrelated phenomena, and is the primary building block of a theory. Concepts are necessary components of a phenomenon, which are used to comprehend and be synthesized into a theory or paradigm. (McEwen, M. Wills, E.M.) According to McEwen Wills concept exploration, concept clarification, and concept analysis are three strat egies described by Meleis in 2012. These are used in nursing theory, research and practice to develop conceptualRead MorePsychology is not just common sense1300 Words   |  6 Pagesto disprove misconceptions and theories conceived out of said common sense. The majority of laymen believe that if an infant is not securely attached to its caregiver, it must have no sense of attachment at all. Moreover, they assume blindly that there will be no in-betweens. However, psychology shows that there is much more to it when it comes to attachment styles. There are in fact, three main types of attachment styles that make up the crux of the Attachment Theory, which will be explored in furtherRead MoreTheories Of Developmental Psychology : Attachment Theory1178 Words   |  5 PagesDescribe and evaluate two theories in developmental psychology Attachment theory, it refers to an affectionate bond. â€Å"A relatively extended and enduring connection with the partner is important as a unique individual is interchangeable with no other† Ainsworth (1989) cited in Gross (2003) hand out in class (03/06/2013).The aim of this attachment is for the infant to remain in close proximity to the attachment figure as she is considered the secure base and the infant would become distressed on separationRead MoreThe Attachment Of Children And Their Influence On Children1686 Words   |  7 PagesAvoidant Attachment in Children Parents are a vital factor in the development of their children. Many parents fill various roles as teachers, playmates, caregivers, and disciplinary figures; but one of the most important roles that a parent can hold is that of an attachment figure. The attachment between a child and their attachment figure is a strong predictor of the child’s later social and emotional wellbeing (Benoit, 2004). John Bowlby and Mary Ainsworth worked together to come to the principleRead MoreChild Care Services1536 Words   |  7 Pagesconsciousness erupts, and education must also . Froebel’s kindergarten offered play and discovery oriented activities (active learning) along with protection and safety. Froebel’s concept of kindergarten earned immense popularity and as a result, opened doors throughout Germany and then across Europe and Frobel’s concept of Kindergarten crossed the Atlantic to North America in 1856 in Wisconsin, the United States. The first public kinderga rten in Canada was established in 1892 as part of the ProtestantRead MoreFour Basic Elements Of Hirschis Social Bond Theory795 Words   |  4 Pagessocial bond theory is made up of four basic elements; attachment, commitment, involvement and belief. The element of attachment has to do with one’s involvement in society, and the bonds they form with others. Social bond theory is based on the idea that deviancy occurs in an individual when social connections are weak or non-existent, the element of attachment has to do with the bonds one forms with individuals or institutions. Attachment acts as an indirect control factor, as attachment determinesRead MorePersonality Development of Children: Who Matters More?1681 Words   |  7 Pagesdevelopment is attachment – the ability to form emotional bonds with others. Scholars agree that attachment is one of the most important aspects of child development, as it sets the groundwork for emotional development and subsequent social functioning (Hutchinson, 2008). Attachment relationships and their vast influence on people’s behaviors in all stages of their life cycles are essential to the research of developmental and clinical psychology (Encyclopedia.com). The attachment theory was developedRead MoreDynamic Systems Theory Of Motor Development Essay1360 Words   |  6 Pagesinfant undergoes includes (1) going from using basic reflexes to learning complex motor skills (e.g. how to crawl and walk); (textbook p. 142; Chapter 4), (2) developing fine motor skills (e.g. precisely reaching and grasping for a toy); (p. 185; Chapter 5), and (3) developing vision, specifically depth perception and pattern perception (e.g. developing the ability to recognize); (pp. 189-193, Chapter 5). These are examples of the dynamic systems theory of motor development as the infant progressesRead MoreClient Centered Theory Essay1224 Words   |  5 PagesClient Centered Theory Client centered theory was originated by Carl Rogers and is considered to be a humanistic theory of process or evolution (Coady Lehman, 2008). Rogers developed 19 basic premises of personality in which an individual was held to grow through the processes of a reduction in defensive mechanisms and the self-directed development of internal cognizance (Corsini Wedding, 2008/2011). The processes would occur when the theoretical constructs of congruence, acceptance and empathy

Sunday, December 15, 2019

“Write About the Ways Auden Tells the Story in the Poetic Piece ‘Miss Gee’” Free Essays

â€Å"Write about the ways Auden tells the story in the poetic piece ‘Miss Gee’? † Through the ballad of ‘Miss Gee’ Auden tells the story of the character Miss Edith Gee this is achieved in a variety of ways. The poetic piece is a ballad intended to be read to the tune of ‘St James’ Infirmary’. Auden has created a regular pattern of quatrains as well as a regular rhythm which progresses the general flow of the poem and creates the atmosphere of a story for the reader. We will write a custom essay sample on â€Å"Write About the Ways Auden Tells the Story in the Poetic Piece ‘Miss Gee’† or any similar topic only for you Order Now The initial exposition is extremely sympathetic towards Miss Gee. â€Å"Now let me tell you a little story about Miss Edith Gee† is a cruel way to open the narrative as Auden instantly belittles her character and makes her seem insignificant, whereas she is actually the main, if not only character we meet in detail. This technique is effectives the reader then feels that she is insignificant, and although it is she who lends her name to the poem, is an outcast and a quiet individual. She is continually referred to as small, further lowering the impressions of the character to the reader. Auden establishes the setting of the poem in the introductory stanza, as would be done in a story â€Å"She lived in Clevedon Terrace/ At Number 83†. This is an ordinary address and place for the poem to be set it, this in turn establishes the normality and average attributes of Miss Gee showing her character as one of no complexity. The further repetition of ‘Clevedon Terrace’ in the poem is a constant reminder from Auden to the reader to always bring them back to the fact that the character Miss Gee is intended to be average and ordinary just like any other individual. Miss Gee’s appearance is made apparent by Auden in the third stanza â€Å"She’d a velvet hat with trimmings,/And a dark grey serge costume;† â€Å"purple†¦ green† this description of Miss Gee’s clothing is very ironic as lots of colours are present but on a colourless character. Auden may have intended this imagery to be seen as symbolism of Miss Gee’s persona how she tries to mask her simplicity in colours but is always unable to mask her unfeminine personality and the fact that she is insecure in her own skin. The is no connection between Auden and herself and the poem has a very impersonal tone to it Auden is very mocking of Miss Gee when describing her clothing as a â€Å"costume† which creates the impression that she almost trying to dress up as somebody else and is seen to some as somewhat of a joke. Auden uses a regular pattern of rhyme throughout the poetic piece How to cite â€Å"Write About the Ways Auden Tells the Story in the Poetic Piece ‘Miss Gee’†, Papers

Friday, December 6, 2019

A Review Facing Issues into the Construction Industry Australia

Question: Discuss about the A Review Facing Issues into the Construction Industry Australia. Answer: Project scope According to the Australian Construction Industry forum (2016), the Australian construction sector has constructed projects worth $ 207 billion, which is a slight drop from what the industry did in 2015 2016. The drop has been attributed to the passing of a construction and economic boom, which has now passed on to other sectors. Besides this, some other trends are facing the market, including an acute shortage of skilled labour (ACIF, 2016). The shortage has the potential of negatively affecting the industry through substandard work, and missed deadlines, as well as soaring costs. Costs are not being affected by labour shortages only, but also by the economic realities that have made materials and other factors of production much more expensive. There have been claims of malpractice, which have badly affected the reputation of the industry. Coupled with this, the industry has seen its insurance claims rise, raising concerns about its safety mechanisms. The industry has also been be set with decreasing productivity, due to the cutting off of employees wages. At the head of this problem is the decreased construction activity, as well as rising costs of capital, which have placed more stress on contractors to be as efficient as possible (Research-Australia, 2015). In light of these issues, there is a clear need for research on how the problems above could be resolved. Collecting and analyzing empirical data will enable the group to better identify and prescribe solutions to the problems outlined above. Group members and their roles ________will be the Group leader. The leader will assign tasks and coordinate research. He will also ensure all members are moving at the same pace. _______ will be the liaison officer. The member will be in charge of all communication with other parties, including other groups and the tutor. The member will also be responsible for all submissions of documents as the class may require. ________ will be the documents manager. The document manager has been charged with all typing and final documents preparations, including collating of the final document. The member will liaise with all group members, with the assistance of the group leader, to collect and combine information, thereby coming up with a finished document. Project activities The first activity will be the formation of the group after the group has been assembled; each member will be given their tasks during the duration of the research. The group embers will nominate amongst themselves, the positions lined out above. Once this is done, the group leader will set out a program in consultation with the members, and thereafter assign each member a specific duty to perform so as to complete the assignment. Each member will thereafter to complete their weekly tasks, which will be a preliminary fact finding mission. Thereafter, the members will together go to the field to collect the necessary data, using interviews, observations, questionnaires and any other tools that may help them in getting the information they require for the exercise. On a weekly basis, the members will meet to discuss their progress, and analyze the data collected thus far. The members will also, between themselves, draft the draft report, and build up on it as more research is conducted and data collected. On the 10th week, the data collection exercise should be complete. Members will hand in their assigned tasks, which will then be drafted into a single report. The following three weeks will involve weekly meetings, during which the document will be fine-tuned, and any issues addressed to the tutor. The final document will be completed on week 14. During the course of the research project, members are expected to at all times abide by the rules, which are: always attend meetings, and on time, submit the required weekly tasks on time, create time and carry out diligent research on the assigned task, cooperate with all members in ensuring research is accurate, and conduct themselves in a professional manner during discussions. Channels of communications should not be used for anything else other than for the purposes of the assignment. Group communication plan On the first meeting, a Whats App group will be created. The group will be used to conduct daily communications on the progress of research, and will serve as an important avenue to keep track of progress, while also easily addressing any issues arising. Every week, there will be a physical meeting, headed by the group leader. The meeting will be to take stock of what has taken place so far, and to help in a more detailed analysis of the assignment, The form of the assignment will become more clear during these meetings, after which the main agreed upon points will be communicated via Whats App by the group leader. Information will be shared using the two modules described above face to face meetings and Whats App messaging, as well as emails. Emails will be important in delivering information accompanied by attachments. Members who do not abide by the group rules, and engage in irresponsible behaviour will be put on notice by the group leader. Should the behaviour persist, other group members will make a unanimous decision to expel or suspend the member, and consult with the tutor on the action taken. In order to maximize results, all members will be expected to help each other in their daily tasks. Additionally, members are encouraged to air their views on the group for further discussion and assistance. Group agreement We agree to abide by the rules set out in section 3, and with the communication plan above. We unanimously agree on the group roles set out in section 2, and commit to doing our utmost in supporting other members in the research. Failure to fulfil our individual mandates will result in the penalties described in section 4 of this plan. Student 1 name Electronic signature Student 2 name Electronic signature Student 3 name Electronic signature Student 4 name Electronic signature Grant Chart Project Timeline preliminary research Field research submissions drafting of the final report week 5 week 6 week 7 week 8 week 9 week 10 week 11 week 12 week 13 week 14 References ACIF, 2016. Latest Summary. [Online] from acif.au: https://www.acif.com.au/forecasts/summary [04 02, 2017] Research-Australia, 2015. the issues facing the australian construction industry. [Online] from www.researchaustralia.com.au: https://www.researchaustralia.com.au/the-issues-facing-the-australian-construction-industry/ [04 02, 2017] Watson, M., 2007. Concerns for Skills Shortages in the 21st Century: A Review into the Construction Industry, Australia. Journal of Construction Economics and Building, 7, (1), available at https://dx.doi.org/10.5130/AJCEB.v7i1.2977 Najjir, G., et al, 2012. Issues for the Global Construction Market. Journal of Construction Economics and Building, pp 73 81. Hashim, N., et al, 2012. Management Challenges within Multiple Project Environments: Lessons for Developing Countries. Journal of Construction Economics and Building, pp21 31. Osman, O., 2014. Emerging Governance and Economic Issues in Construction Industry in Malaysia.1st Ed. Kuala Lumpur: AcademicInprint Series

Friday, November 29, 2019

Significance of Selling Online Research Paper Example

Significance of Selling Online Paper Selling online can revolutionize your business. An online storefront has a number of very powerful advantages over a brick-and-mortar location that can yield big dividends for surprisingly little investment of time and money. Even if you have a physical shop, an online store can be a big help in marketing your business, as well a being a supplementary sales outlet that can add to your bottom line. The benefits of opening an online store are endless: 1 . Reduce your costs – setup and operational costs are much less than selling from a hysterical store, directly improving your bottom line. There is no rent to pay, you hire less personnel, and so forth. 2. Simplify your sales processes – using simple automation, customer orders can go directly to your products database and into the shipping queue. With a well-designed online store you can improve your sales processes considerably, reducing your costs further or selling more products per transaction. 3. Go global overnight – increase sales opportunities by gaining instant access to a wider marketplace. Sell to the entire country and even abroad! 4. You can sleep but your store never will – with your online shop open 24 hours a day, 7 days a week, you increase the number of customers who can shop your selection, further increasing your opportunity for sales. As the internet is growing and increasing on a daily basis and computers being in every home the ability to buy and sell directly online has become the internet number one commodity. We will write a custom essay sample on Significance of Selling Online specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Significance of Selling Online specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Significance of Selling Online specifically for you FOR ONLY $16.38 $13.9/page Hire Writer People from all countries, cities within Canada, the USA and the rest of the world are buying and selling online. People love shopping but a lot people do not have time to go to a shopping mall, they do not have time to waste riving to and from stores. Online buying and selling is the way to start freeing up more time to do other things with families and friends. The advantages of buying online are that it is quick, prices are usually lower priced, descriptions and comments can be seen by past customers. There is a large number of people buying online and if they are all satisfied you will be too. The advantage of buying online can be that you are not physically able to touch the product and it usually takes a few days for delivery. The advantages of selling online is that you are able to reach a large audience, you are able to sell multiple items at low low costs without having a store and at times without even having a product or service. The disadvantages of selling online is that your customers may find lower prices at other competitors, the internet is a large place and you have to carve out a niche market for you and your online products and services. Selling online has a number of advantages over selling by conventional methods, including: * Making savings in set-up and operational costs. You don’t need to pay shop assistants, rent high-street premises, or answer a lot of pre-sales queries. Reducing order-processing costs – customer orders can automatically come straight into your orders database from the website. * Reaching a global audience, thereby increasing sales opportunities. * Competing with larger businesses by being able to open 24 hours a day, seven days a week. Being able to receive payment more quickly from online transactions. * Attracting customers who would not normally have investigated your type of high-street outlet. * Improving your offerings using the data gathered by tracking customer purchases. * Using your online shop as a catalogue for existing customers. Selling over the internet is not very much different from selling on the counter. It is more or less the same thing. Selling through inter net has lots of challenges and requires lots of efforts and patience. But people think that online business is relatively simple and Just dunk into it. Elf you run your own business, then you probably know that getting customers is not that easy task. It is no different if you are running the business online. Getting customers for your business is always a tedious task. In some of the cases, it is even more difficult to get online business as there eight not be enough traffic on that site. Elf you know how to market your business, you can easily sell online. Then you do not need any web experience or programming knowledge. But you need to have some common sense and need to be a business fanatic. Then, you have the capability to run any type of business. Cost factor is the biggest advantage of selling your products online. The retail space is expensive and the traffic is limited to a local market only. An online store is always cheap and easy to manage. Considering these factors, you cannot afford not to sell online.

Monday, November 25, 2019

Free Essays on Closed Chambers

Closed Chambers Edward Lazarus has written the book Closed Chambers based on his own experiences, interviews with sources such as other former clerks, and memoranda from the chambers of the justices, as well as other accessible sources. He discusses the evolving role that political ideology has played in the decisions of various cases in the areas of civil rights, abortion, and the death penalty. He focuses specifically on the Rehnquist Court of the 1980’s. Lazarus criticizes both liberal and conservative Justices for sacrificing judicial review for the pursuit of political agenda, and collegiality and debate for machiavellian tactics. Lazarus portrays the modern Rehnquist Court as bitterly divided into factions. There are the Justices like Rehnquist, Scalia, and Thomas who are considered jurisprudentially "conservative," as well as those like Blackmun, William Brennan, Thurgood Marshall, and John Paul Stevens who are jurisprudentially "liberal" (Blackmun, Marshall and Brennan have left the court, but they were on the bench during many of the events Lazarus describes). The members of the different factions, says Lazarus, tend to vote on the important cases based on political preference, without fulfilling their obligation to justify their conclusions with well-reasoned opinions. The bad blood between the factions is serious enough that, for example, when the liberals induce the Court to hear the case of someone on death row, the conservatives have been inclined not to allow a stay of execution, which would have the result of the prisoner being killed while the Court was in the middle of reviewing his case. Lazarus also discusses the role of the clerks. The justices hire young law-school graduates to help the Court select cases to hear and also to help the Justices research and write opinions. Lazarus portrays the clerks as sharing in the factionalism of their bosses thereby, exacerbating that factionalism. This is too much ... Free Essays on Closed Chambers Free Essays on Closed Chambers Closed Chambers Edward Lazarus has written the book Closed Chambers based on his own experiences, interviews with sources such as other former clerks, and memoranda from the chambers of the justices, as well as other accessible sources. He discusses the evolving role that political ideology has played in the decisions of various cases in the areas of civil rights, abortion, and the death penalty. He focuses specifically on the Rehnquist Court of the 1980’s. Lazarus criticizes both liberal and conservative Justices for sacrificing judicial review for the pursuit of political agenda, and collegiality and debate for machiavellian tactics. Lazarus portrays the modern Rehnquist Court as bitterly divided into factions. There are the Justices like Rehnquist, Scalia, and Thomas who are considered jurisprudentially "conservative," as well as those like Blackmun, William Brennan, Thurgood Marshall, and John Paul Stevens who are jurisprudentially "liberal" (Blackmun, Marshall and Brennan have left the court, but they were on the bench during many of the events Lazarus describes). The members of the different factions, says Lazarus, tend to vote on the important cases based on political preference, without fulfilling their obligation to justify their conclusions with well-reasoned opinions. The bad blood between the factions is serious enough that, for example, when the liberals induce the Court to hear the case of someone on death row, the conservatives have been inclined not to allow a stay of execution, which would have the result of the prisoner being killed while the Court was in the middle of reviewing his case. Lazarus also discusses the role of the clerks. The justices hire young law-school graduates to help the Court select cases to hear and also to help the Justices research and write opinions. Lazarus portrays the clerks as sharing in the factionalism of their bosses thereby, exacerbating that factionalism. This is too much ...

Thursday, November 21, 2019

Commerce Clause WIckard v. Filburn and Affordable Care Act Term Paper

Commerce Clause WIckard v. Filburn and Affordable Care Act - Term Paper Example The judicial system novel comprehension was solidified and elongated over the next couple of years, as the older judges stopped working due to retirement, giving FDR the chances that his militant endeavors had failed to establish. With this in mind why should we bother reviewing, much less written of the book â€Å"Rethinking the New Deal Court?† Main body Barry Cushman, a historian at Virginia University, provides a simple answer: the story we are aware of and love is incorrect. In Barry’s point of view, the assertion that a craven court suddenly neglected several doctrines to save itself from the critics of Roosevelt’s group is misplaced on every instance. The doctrinal alterations were not sudden, but happened over an extended period of time, as a number of justices slowly pulled away from previous decisions restricting government’s directive of the economy. The climax was not 1937 but rather 1934, when the judicial system defended a New York decree set ting milks’ price. At last, the absolute momentum to change was not the threats from outside, but the judgment of the courts own ruling. Even though, Cushman is in agreement that by 1940 the constitution of the pre-New Deal was gone, he is not in the same wavelength why, when, and how it was neglected. Stressing Cushman’s disapproval of the typical description, is a condemnation of the poetics of the legal authority- the way we converse about jury and rule unspoken in that account? To be distinctive, he believes that the typical explanation is too reductionist in its handling of decree and the jury. The law is reduced to politics, treating the jury as just politicians who are not elected militants who respond to their condition as any politician might be; doing what is prudential to enhance their agenda. Many at times, they are usually greedy and their reach supersedes their grasp. Such overreacting was in short what transpired in the 1930s, according to the typical ac count. By putting down the New Deal and supplementary intrepid political schemes channeled to save the nation from the Depression, the Judicial aggravated such a powerful response that it had to move back in the facet of Roosevelt’s Court-packing preparation in order to conserve what was left of its veracity and supremacy. Cushman starts by illustrating that the typical account does not fit the history of events. In fact, this description requires a string of events that is exactly the opposite of what actually transpired. Most visibly, the fairness debated and voted for the vital cases in meeting a number of weeks before Roosevelt proclaimed the court-packing strategy. Although not yet unearthed, the toggle happened before the nine noticed that they required to be saved. In the event that the court had the knowledge of the courts-packing strategy when voting, the plan stimulated up such antagonism from politicians and people that it might have threatened the justices. Indeed , looking at it at a closer perspective of opposition to the jury indicates that the real mystery is why the jury for ages to integrate the New deals. It was fastest in its resistance during the first years of the New deal, when the allies and FDR were mostly known and liked. It rejected the struggle long after the climax of

Wednesday, November 20, 2019

History and the Current Debate on Fox Hunting Literature review

History and the Current Debate on Fox Hunting - Literature review Example The view that man is superior to animal was also pointed out by Aristotle who thought that only humans were â€Å"capable of rational deliberation† (Trevelyan 1922). Hunting is one of the characteristics that mankind holds ever since its existence. It can be traced back to the days of the nomads whose only means of survival was through hunting. But with time, the verb has gone through a drastic change from a means of survival to a sport and thus a necessity has been replaced by entertainment. The Homo erectus hunted for living whereas the man of today hunts because hunting is a hobby and a means of amusement. It is an out-door sport with the intention to exhibit one’s skills or a perfect answer to one’s boredom. But for Paget, hunting is not a sport played at leisure but a dangerous pursuit of an animal in the places where they actually exist freely and reproduce. He says that a shot is solely registered for a hunt and if a man actually deviates from this reason, he is not a hunter and not a part of the sport of hunting (Paget 1900). Hunting is divided into various groups and fox hunting has been placed above all the other forms and has been marked to be the best sports by a group of people. It was and still continues to be the favourite sport of the Britons. Fox hunting is a blood sport as the animal world calls it and is a subject of much controversy as it is the shooting of animals for the purpose of enjoyment (Gast 2006). In Britain, the history of fox hunting holds a large volume and can be traced back to the 17th century when it was at its highest peak. It was the greatest sport until 1914 which was the year when the World War One started and it marked the end of the golden age. It was now surrounded by controversies and a full fledge debate up rooted between the masses whether it should be made legal or not and thus it was a turning point in the history of Britain (Wallen 2006). The history of Fox hunting can be traced back to 1534, when farmers in Norfolk, England started hunting down foxes with the assistance of their hounds. They were trained to follow the fox’s scent and only a hound could kill it while the hunter watched because its meat was not considered edible. The fox hunters were not much attracted to the idea of killing the fox with their own hands. They rather watched the hound do the honors while they sat on their horses and enjoyed the view. The fox was not meant for eating but was a pest that threatened farmers’ livestock and crops (Gradiner 2006). Thomas Fownes was the first man with a pack specifically for fox hunting. He sold it to a breeder in Yorkshire who further spread the transaction and by the middle of the century, several packs were seen that were exclusively kept for chasing down the foxes (Paget 1900). During the eighteenth century, fox hunting had replaced stag hunting and had spread out till Pytchley under the Lordship of Althrop (Trevelyan 1922). It had become the fa vourite sport of the riches who took it as a means of showing their wealth and valour. It was the sport of the higher class that existed in the society. There was a gradual division of class and culture and the upper class now aimed to live a much lavish life. They now, owned colossal estates and houses and enjoyed hunting because they were rich enough to buy and maintain horses and hounds (Gast 2006). The year 1753, is considered to be mark as an important era of fox

Monday, November 18, 2019

Activities of KKD in the International Market Essay

Activities of KKD in the International Market - Essay Example The paper tells that Krispey Kreme stores are located in Australia, Canada, Hong Kong, Indonesia, Japan, Kuwait, Mexico, The Philippines, South Korea and United Kingdom. In fiscal 2007, 60 new international stores were opened, while 5 international stores were closed down. Krispey Kreme concentrates on their development effort, primarily in Asia and Middle East. In 2007, The Krispey Kreme was awarded the development rights in the Middle East, Hong Kong, Tokyo, the Philippines, and Indonesia. The developments and franchise agreements for these territories provide for the development of in these regions 200 stores. The International Franchise division consists of the company’s global store franchise activities. Worldwide franchise stores trade in doughnuts and complementary products, exclusively through the appropriate sales channel as in the case of Krespey Kreme direct outlets, using the same store formats as in the company stores segment. The International Franchise division also uses a kiosk format for the effective operation. The North Carolina-based Krispy Kreme has come to Asia. The KKD opened its first shop in Hong Kong and then in Indonesia. Tokyo, Manila and Macau outlets were opened as they expanded their business in Asia. For the other part of the continent, KKD opened outlets in Kuwait; with an eye on is setting up this fall in Kuwait with additional shops planned for the Saudi Arabia, Egypt and United Arab Emirates. Hong Kong and other Asian countries are relatively easier targets now, than it were it were a few years ago. External Environment of Krispey Kreme: In the US market, Krispy Kreme faces completion in baking industry. Krispey Kreme production includes breads, pies, doughnuts, cakes and coffee. The competition is exceedingly high and so firms must be able to provide cheap, differentiated products to the purchaser who needs them for low switching costs. In America, the people are busy and they always go for the fast food which makes t hem fatty and diabetic. Now the people are aware of this problem, and they are choosy in food as well as taste. In international market, the Dunkin’s Donuts is the main competitor for the Krispey Kreme donuts because it offers or similar lines products to the customers. The Dunkin’s donuts have a reputation in international market as they only introduced the first zero gram fatty products for the customers. The Asian franchises sell doughnuts only at their outlets aiming at monopoly. KKD’s business in the United States actually concentrates on wholesale business. Krispy Kreme has appended its base in the US by supplementing them with other items, in supermarkets and convenience stores. The Challenges: 1)  Ã‚  Ã‚  Ã‚  Ã‚   Competitive: KrispyKreme functions in the area of expertise eatery business; on the other hand they compete with all outlets that a customer can access with the intention of satisfying usage for snacks, coffee, or treat-based objects. These o utlets consist of other area of expertise eateries, fast food outlets, local expediency stores, and other retail atmospheres that store coffee and other beverages. With regard to their core merchandise, Krispy Kreme also has to compete with unbranded doughnut producers that are sold through supermarkets and doughnut vans. 2)  Ã‚  Ã‚  Ã‚  Ã‚   Economic/Financial: The continued financial recession is destined to tighten customer’s expenditure. As Krispy Kreme is a non-necessary food article this may pressure sales. Price rises is not the target of Bank of England as there is upward stress on long-term rates of interest all over UK. An increase in interest rates will enhance the price of capital and denote more luxurious borrowing for Krispy Kreme, which is deeply engaged in competition with its rivals. 3)  Ã‚  Ã‚  Ã‚  Ã‚   Physical Environment: Due to the increase in rivalry, it is vital for Krispy Kreme to pursue the real trends and be a step

Saturday, November 16, 2019

Concepts of Corporate Strategy | SWOT Analysis of Apple

Concepts of Corporate Strategy | SWOT Analysis of Apple Corporate Strategy Introduction â€Å"Marketing strategists term this a harvest strategy and consider it a no-brainer† (Hamel Prahalad, 1994:125). â€Å"Few current business concepts are more prone to oversimplification than the growth/share model, with its labelling of products or divisions or whole companies as ‘dogs’, ‘question marks’, ‘stars’ or ‘cash cows’† (Seeger, 1984:94). â€Å"An apparent disadvantage of the matrix was that it assumed that market share was reliable indicator of future profitability† (Calandro Lane, 2007:30). The above three quotations all criticise the BCG growth/share matrix and its practicality as a competitive tool. This paper discusses the advantages and limitations of the matrix and its application for Apple Inc. as a competitive tool. It concludes that the BCG matrix does have some advantages but is not appropriate for all businesses industries and should not be used as a sole analysis model. In the fast pace d competitive modern business world using just the BCG matrix for evaluating a company’s portfolio can have disastrous consequences. The paper is divided into five parts. Starting with an introduction, it moves on to the concepts of corporate strategy, portfolio analysis and the portfolio models. The third part discusses some of the advantages and limitations of the BCG matrix. The fourth deals with the implications of the BCG matrix when applied to Apple Inc. ending with the conclusion. Corporate Strategy, Portfolio Analysis and Portfolio Matrix Models â€Å"Always to be best, and to be distinguished above the rest†. This quote from Homer the 8th Century Greek Poet epitomizes the aim of all organizations. This is where strategy comes in. â€Å"Strategy is the direction and scope of an organisation over the long term, which achieves advantage in a changing environment through its configuration of resources and competences with the aim of fulfilling stakeholder expectations† (Johnson, Scholes Whittington, 2005:9). One of the ways of achieving this is through competitive strategy. According to Porter â€Å"competitive strategy involves positioning a business to maximize the value of the capabilities that distinguish it from its competitors† (1980: 47). To achieve this, careful analysis of the external and internal environment is required. PESTLE and Porter’s Five Forces Model can be used for external analysis. For internal analysis the most commonly used is the seven S framework as well as SWOT analysis, v alue chain, value chain (supply) analysis and portfolio analysis. The result is greater understanding of the environment in which the business operates. Organizations operate under three levels of strategy. Corporate-level strategy, business-level strategy and operational or functional strategy. Corporate strategies deal with the organization as a whole while business strategy â€Å"focuses on how to compete in a particular industry or product-market segment† (Hofer Schendel, 1978 cited in: Beard Dess, 1981:667). Operational strategy is how the organization accomplishes the strategies set out in the first two using its various resources. For an organization to be profitable it is important to have effective strategies on all levels but a successful corporate strategy is crucial to the success of business and operational strategy. The late 1960’s and early 1970’s saw many conglomerates diversifying into different fields. New divisions or (Strategic Business Units) were evolving. The problem management faced was of effectively managing all these diversified units. One strategy could not work for all SBUs as they all experience different competitor threats, market growth rates and market shares. This problem was solved by the creation of the portfolio analysis. â€Å"Portfolio strategy pertains to the mix of business units and product lines that fit together in a logical way to provide synergy and competitive advantage for the corporation† (Daft, 2008:249). The aim of the corporation is to have a balanced corporate portfolio, so that they can decide which activities or products to expand,introduce and which businesses to acquire or dispose off. Thus, â€Å"diversified company portfolios are the normal and natural business form for efficiently channelling investment into the most productive use† (Henderson, 1977:203). The most common form of evaluating the corporate portfolios is the portfolio matrix models. Igor Ansoff, developed his Product-Market Growth Matrix in the 1950’s. He believed that â€Å"just to retain its relative position, a business firm must go through continuous growth and change† (Ansoff, 1957:113). He used four possible combinations of market penetration, product development, market development and diversification and plotted them on a 22 model. McKinsey Co developed a matrix where the variables were market strength and competitive position. Bruce Henderson in the mid 70’s using the same matrix principle developed his BCG growth/share matrix model. It had the same 22 matrix but was based on relative market share and market growth and used cash flow and the experience curve as a criterion. Arthur D. Little developed another model which used the product life cycle. â€Å"These [latter] three matrices form the basis of the various portfolio models that have been widely used to structure the strategic planning process of the firm in the 1970’s† (Coate, 1983:47). Since then there have been many matrices developed e.g. the GE model which uses ROI for assessing an investment opportunity and Shell which used a similar refined matrix evaluating business prospects along with the competitive position of the company. However, the most commonly used matrix by organizations is still Henderson’s BCG Growth/Share Matrix. It has to be taken into consideration however that â€Å"it is important to see these models as aids to decision making, not a replacement for management choice† (Hooley, Saunders Piercy, 2004:64). BCG Matrix – Advantages and Limitations The BCG matrix plots SBUs by looking at the relationship between market growth and market share. Henderson divided the matrix into cash cows, stars, question marks and dogs and asserted that â€Å"only a diversified company with a well balanced portfolio can use its strengths to truly capitalize on its growth opportunities† (Henderson, 1970:37). To show the relative significance of the SBU, size is shown in circles which can be calculated either from assets employed or sale turnover. The growth/share matrix gained immense popularity among large organizations with many SBUs. They could now use the matrix and decide which units to nurture, invest or divest. Its main advantage was its attractive presentation and easy to remember terms. Using only two variables it was easy and quick to make as well as being versatile enough to be applied to different brands, products, customers and distribution channels. The matrix became popular with managers who preferred the idea of cash flow implications rather than profits which are more in the accounts domain. The PIMS database which was developed at the General Electric in the 60’s and further developed by the Management Science Institute at Harvard in the early 70’s also supported this view. Another reason for the BCGs popularity was fashion. â€Å"It is an idea that is well understood and liked by many mangers and therefore one that allows communication between headquarters and strategic business units (SBUs). It has become part of the common business vocabulary† (Hooley et al, 2004:71). Undoubtedly, the simplicity of the matrix was its major advantage but it had its limitations as well. One of the major problems of the BCG matrix were the claims made by the developers that â€Å"such a single chart with a projected position five years out is sufficient alone to tell a company’s profitability, debt capacity, growth potential, dividend potential and competitive strength† (BCG, 2008:3). According to them the matrix would provide the complete solution but this is an erroneous belief. It does not provide the perfect solution for evaluating a company’s portfolio. This is also affirmed by Hooley et al who say that â€Å"if it is used it should be audited carefully to ensure its validity rather than followed blindly† (2004:2). Furthermore, there is no set definition of what an SBU is or what the definition of a market is e.g. a product might be a leader in a local market niche but at the same time a small player in the global market. The matrix is also difficult to plot accurately using market share and market growth. Organizational strength cannot be measured by market share alone, it has to take into consideration other strengths e.g. financial strength, brand equity, exclusive distribution channels or unique product features etc. In the same way market growth is only one aspect of market attractiveness. Using the cash flow resources for evaluation can also be perceived as a flaw. â€Å"In times of high inflation, cash flow may indeed be the major constraint on a company’s action range, but other capabilities such as appropriate managerial talent, expertise, know how, skilled labor and organizational flexibility are also important† (Derkinderen Crum, 1984:132). Also, according to Henderson â€Å"we should kick the dogs, cloister the cows and throw our money at stars. Only the question mark category demands management thought† (Seeger, 1984:94). This assumption can be criticised as being over simplistic. Dogs, should not be divested off without thought. They can retain that important portion of market share keeping competitors at bay, and also an organization who has a dominant product may deliberately introduce a dog into its portfolio for the same purpose. Sometimes, â€Å"occasionally it is possible to restore a dog to viability by a creative business segmentation strategy, rationalizing and specializing the business into a small niche which it can dominate† (Hedley cited in Wit Meyer, 2004:322). The human aspects and behavioural implications of the matrix are also overlooked e.g. how managers of SBUs categorized as cash cows react when their hard earned cash is given to other SBUs, or of members within the organization whose brainchild is divested? This can affect the morale of management and may result in quick turnover of disgruntled staff which is not beneficial to the organization. The simplicity of the matrix where an advantage can also be harmful since competitors can easy identify the strategy being used and use it to their advantage. An example of this is the successful infiltration of the Japanese in the UK motorcycle industry. Another limitation as Coate says is that â€Å"independent strategies can’t be defined for all possible business units† (1983:52) i.e. a business unit producing multiple products cannot invest in one profitable product and ignore the others. Either they all get investment of all of them have to be divested. Despite the fact that the matrix’s limitations far outweigh its benefits, it is still frequently used by organizations and in certain situations can be used as an effective competitive tool as well. The important thing is that it should not be used as the sole analysis method for decision making. Even the Boston Consulting Group has in recent years admitted that market share by itself does not necessarily mean competitive strength. â€Å"In a series of articles in the Financial Times in November 1981, Michael Gould of the BCG maintained that it is valuable to be the market leader for branded goods with the advantage of price leadership and the ability to spread marketing and distribution costs over a high volume; but economies of scale may be achieved even by a firm that is not the largest producer in the industry (Johnson et al, 2005:90). It is though, fair to say that â€Å"the simplicity of the Box makes it operationally useful and its ease of understanding makes it a use ful operational tool provided its limitations are kept clearly in mind† (Hooley et al, 2004:87). Apple Inc. The BCG Matrix 1: Profile Strategy: Apple is a global company operating in the technology industry which designs, manufactures and markets personal computers, portable music players and mobile communication devices. It was established in 1977 as Apple Computer Inc. specialising in personal computers. Operating in the ever changing high growth market and extreme competition, Apple began losing its market share to its major competitors including IBM and Hewlett Packard as well as the entry of numerous other PC manufacturing companies determined to enter the highly profitable market. SWOT Analysis (fig 2) Strengths Weaknesses Strong brand image Robust financial performance Media content Declining research and development (RD) investment Opportunities Threats Smart Phones Booming MP3 player markets Growing personal computers and peripherals markets Intense competition Dependence on specific suppliers Patent infringement Apple was faced with a weakening Mac line, stiff competition and demand for better value by the shareholders. There was need for a drastic change in strategy and product diversification was chosen as a mean of entering other consumer electronic market segments. In the Swot Analysis (fig 2) carried out by DataMonitor, we can clearly see their opportunities in the smart phones and MP3 player markets. In January 2007, the company changed its name to Apple Inc. as they diversified into other products. Currently, Apple Inc. in its portfolio owns three SBUs. The first is the Mac range which comprises of desktop and notebook computers along with their accessories. Secondly, it offers music products and services which include ipod, itunes etc. The third SBU consist of the mobile communication devices i.e. iphone. 2. BCG Matrix and Apple’s Product Portfolio: In the current competitive industry using the BCG matrix offers some benefits for Apple but there are disadvantages too. The flexibility that the matrix offers i.e. it can be used for plotting product portfolio of a firm can be beneficial to Apple. To introduce new products and revamp current ones a company needs vast amounts for investment. Apple needed money for RD which is a major expenditure for companies operating in the technology industry. â€Å"The Company believes continual investment in research and development is critical to the development and enhancement of innovative products and technologies† (Apple Investor Relations, 2007:1). Between 2005 and 2007, Apple spent $535 million dollars on RD. Part of this money was obtained by withholding dividend payments for two years between 2006 and 2007. The rest was from divesting within the Mac range. Using the BCG matrix, the decision of which products to invest in and which to divest would have been pretty straigtforward. Market growth for technological products very rarely slows long enough for a product to be classified as a cash cow. Therefore, most of these products would be classified either as a star, question mark or dog. At the time when Apple changed its strategy it had a large number of computers in its product range which it needed to reduce. The whole of the Mac Range would have been plotted with a few top selling products as stars which would have been carrying the whole load of the company with its profits. A few question marks which had low market share but were still making a profit which was being again utilized internally, but had low chances of becoming a star and quite a large number of products and their associated accessories and software would have been plotted in the dogs quadrant. By divesting in the dogs, Apple would have undoubtedly lost some market share but in introducing new products their aim was to attain market share in other markets. Spending huge amounts on RD, Apple updated and introduced fewer but better computers like ibook and imac into its product line in direct competition with their competitors. At the same time as updating its product line for the Mac range the ipod range can also be plotted on the matrix. The ipod currently holds 77% of the global market share , but to keep up with the current high demand Apple almost every year introduces a new version with more features and divest the oldest version which by that time has moved to the dog quadrant. It also uses the same strategy for the iphone range. Even though iphone is a relative new offering from Apple, it is already facing competition and to maintain and increase its market share Apple keeps introducing newer versions. Therfore, even though the BCG matrix does offer Apple benefits for managing its product portfolio, it negates one of the main declarations of Hendrix that â€Å"only a diversified company with a well balanced portfolio can use its strengths to truly capitalize on its growth opportunities† (1970:37). For a well balanced portfolio, a company must have cash cows, however, with Apple and its products, the market growth rate never slows enough for a product to become a cash cow. Most of its products are in the star or question mark quadrants, and some are dogs which are then divested. Apple however sometimes does tend to retain some dogs, even though Henderson believed that â€Å"pets are not necessary† (1970:37), and should be divested off, Apple keeps some of its older versions of products because they retain a small share of the market which might be vital to the companies overall market share. 3. BCG Matrix and Apple’s SBU Portfolio: However using the BCG matrix with Apple’s corporate portfolio poses quite a few problems. First of all the developers claims that â€Å"such a single chart with a projected position five years out is sufficient alone to tell a company’s profitability, debt capacity, growth potential, dividend potential and competitive strength† (BCG, 2008:3), cannot be applied to Apple Inc. Apple operates in a fast changing environment where the introduction of one product can radically change the competitive strength and market share of a company. An example is Dell Computers who in 2007 lost its market leader title to HP. Within one year HPs market share increased dramatically to 17.6% while Dells managed only 13.9%. Apple comes third with a global market share of 2.6%, but that can change rapidly. Also for Apples iphone the current market share is only 6.5% compared to Blackberry which holds 41% and Palm at 9%, but the iphone is relatively new. It was introduced in July 2007 a nd immediately took over 28% market share of the US smart phone industry showing competitive strength of the product. Apple with iphone is challenging the market leaders and its market share is increasing every quarter. Therefore, a five year forecast cannot be accurate for analysing its future position. Also, however, if we plot the Mac computer range using market share and market growth rates, it would be positioned in the question mark quadrant. But that would make analysis difficult since two products of the mac range i.e. the ibook and imac are stars but as a SBU plotted in question marks. To manage all the products together would be difficult since some products require investment and some do not, according to the matrix you plan a unit strategy not an individual one. Once again Henderson’s criteria of having a balanced portfolio for success would not be applicable in the SBU matrix either. Currently, Apple’s ipod business unit is a market leader with majority market share and high market growth and would be plotted as a star, and the iphone and mac ranges would be placed in the question mark quadrant. It does not have any cash cows or dogs. A successful organization has to have cash cows from where cash flow is diverted into stars and question marks. The ipod sales at present is generating enough cashflow, not only to sustain itself but the other SBUs as well. If we blindly believe Henderson’s assumption then logically Apple should be in dire trouble whereas it is actually increasing its market share and cash flow with all three units. Another drawback of using the BCG matrix would be giving its competitors easier understanding of its strategy. With the company’s annual reports and market shares available publically, if competitors like HP and Blackberry know that Apple is using the BCG matrix as the sole analysis method they can easily construct a matrix for Apple and figure out its future strategies. Therefore, even though the BCG matrix could be useful to Apple Inc. for analysing its products strength and could be used as a decision tool, it would not be useful for future decision concerning its SBUs. It has to be admitted though that the BCG in its simplicity maybe can be more effective in another industry. It can be used as an internal analysis method but using it as the sole decisions making analysis method could be hazardous for the company. This is further confirmed by Seeger who says that â€Å"no management model can safely substitute for analysis and common sense† (1984:97). Apple would benefit using the SID techniques, risk analysis e.g. the monte carlo risk analysis model as well as personal experience and judgement before making any future decisions for its strategic business units. Conclusion We have thus seen how as a competitive tool the BCG matrix has its advantages and disadvantages. The main advantage being its simplicity and ease of plotting, â€Å"but elegance and simplicity in a theory’s presentation cannot guarantee sanity in its use† (Seeger, 1984:93). At the same time the matrix has its disadvantages in not having clear boundaries of what a market is and the criterion for market share and growth and the effect of external factors on it. To gain a competitive advantage a company aims towards â€Å"making an outlay of cash now in the expectation of extra cash coming in the future† (Dixon, 1994:21). For that they need to be in a competitive position and know which units to invest in and which to divest. BCG matrix makes this decision easier for managers but it has to be utilized in a carefully evaluated way. The matrix does give an indication of SBUs performance in the current market but it is not a model that should be followed without use of other methods of analysis and use of judgment by managers. This can be summarized in the words of Porter who affirms this by saying that â€Å"the growth/share matrix can be one component of a competitor analysis when combined with other kinds of analysis† (Porter, 1980:364) or Hooley et al who say that â€Å"it is clearly inadequate as a complete solution, but is of undisputed value as a starting point in many analyse† (2004:72). Therefore, not begrudging BCG matrix the benefits it offers mangers; it is defective as a sole analysis model for competitive strategy and still needs careful evaluation before any decision can be finalized. Bibliography Ansoff, H. I. (1957) Strategies for Diversification. Harvard Business Review, 35(5):113-124, Online available at: http://web.ebscohost.com/ehost/detail?vid=4hid=106sid=2bad248a-b6cb-4c13-81c2-74db4080bfda%40sessionmgr102 (Accessed 15th June 2008) BCG: The Boston Consulting Group, (2008). The Experience Curve Reviewed. IV. The Growth Share Matrix or The Product Portfolio. Online available at: http://www.bcg.com/publications/files/Experience_Curve_IV_Growth_Share_Matrix_1973.pdf (Accessed 12th July 2008) Beard, D. W. Dess, G.G. (1981) Corporate-Level Strategy, Business-Level Strategy, and Firm Performance. The Academy of Management Journal, 24(4):663-688, Online available at: http://www.jstor.org/stable/256169?Search=yesterm=corporate-levelterm=performanceterm=firmterm=strategyterm=business-levellist=hidesearchUri=%2Faction%2FdoBasicSearch%3FQuery%3DCorporate-Level%2BStrategy%252C%2BBusiness-Level%2BStrategy%252C%2Band%2BFirm%2BPerformance%26dc%3DAll%2BDisciplinesitem=1ttl=194returnArticleService=showArticle (Accessed 22nd May 2008) Calandro Jr, J Lane, S. (2007) Special Section: Winning in your industry: new tools and strategies. A new competitive analysis tool: the relative profitability and growth matrix. Strategy and Leadership, 35(2):30-38, Online Available at: http://www.emeraldinsight.com/Insight/viewContentItem.do?contentType=ArticlecontentId=1596528 (Accessed 2nd May 2008) Coate, M.B. (1983) Pitfalls in Portfolio Planning. Long Range Planning, 16(3): 47-56, Online available at : http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V6K-45PMPYS-14_user=10_coverDate=06%2F30%2F1983_alid=760368145_rdoc=3_fmt=high_orig=search_cdi=5817_sort=d_docanchor=view=c_ct=3_acct=C000050221_version=1_urlVersion=0_userid=10md5=f8879374940c70491a7e8906d1bc6068 (Accessed 24th June, 2008) Daft, R. L. (2008) New Era of Management, 2nd ed. Mason: Thomson Higher Education. Derkinderen, F. G. J. Crum, R. L. (1984) Pitfalls in Using Portfolio Techniques – Assessing Risk and Potential. Long Range Planning, 17(2): 129-136. Online available at: http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V6K-45K4GRJ-9P_user=6649953_coverDate=04%2F30%2F1984_alid=760368145_rdoc=2_fmt=high_orig=search_cdi=5817_sort=d_docanchor=view=c_ct=3_acct=C000010181_version=1_urlVersion=0_userid=6649953md5=4eb70387aca6a81b0bed14dab76607ae (Accessed 24th June, 2008) Dixon, R. (1994) Investment Appraisal. CIMA, rev.ed. London: Kogan Page Hamel, G. Prahalad, C. K. (1994) Competing for the Future. Harvard Business Review. 72(4): 122-128, Online Available at: http://web.ebscohost.com/ehost/detail?vid=5hid=107sid=728905ba-dc97-471c-a829-b8c61346578f%40sessionmgr108 (Accessed 23rd April 2008) Henderson, B.D. (1970). The Product Portfolio. Reprinted in Stern, C.W. (ed.) and Stalk, G. (ed.) (1998). Perspectives on Strategy From The Boston Consulting Group, pp. 35-37, John Wiley and Sons, New York. Henderson, B.D. (1977) The Corporate Portfolio. Reprinted in Stern, C.W.  and Stalk, G. (eds.) (1998). Perspectives on Strategy From The Boston Consulting Group, pp. 203-205, New York: John Wiley and Sons Hooley, G. Saunders, J. Piercy, N. (2004) Marketing Strategy and Competitive Positioning. 3rd Ed. Essex: Prentice Hall. Apple Investor Relations, (2007) Apple Inc. 10-K Annual Report. Available from http://phx.corporate-ir.net/phoenix.zhtml?c=107357p=irol-reports (Accessed 17th May 2008) Johnson, G. Scholes, K Whittington, R. (2005) Exploring Corporate Strategy. 7th Ed. London : Prentice Hall. Porter, M. E. (1980) Competitive Strategy. New York : The Free Press. Thompson Jr, A.A, Strickland III, A.J. Gamble, J. E. (2007) Crafting and Executing Strategy. 15th Ed. New York : McGraw-Hill Irwin. Wit, B.D. Meyer, R. (2004) STRATEGY-Process, Content, Context. 3rd Ed. London : Thompson Learning. XML Database: An Introduction and Analysis XML Database: An Introduction and Analysis XML, mnemonic of eXtensible Markup Language is one of the most extensively used data format and is used as a standard for exchange of data over the internet. As large amount of data is represented as XML documents, techniques like RDMS have to be used to store and query these XML documents. There are two well known approaches for parsing an XML document to convert into relational DBMS: SAX and DOM parsing. In this research, both these methods are studied and then the performance is compared. Some alternative ways of data structuring and tagging from tables of RDBMS as a hierarchical XML document has been studied. As a final result, the best alternative which will provide with the best and effective performance for capturing and querying XML data using RDBMS can be found out. When a large amount of data is to be loaded into an XML document, it becomes important to execute the request query and save the process at XML document. One way is to use XML native data base system. This has two weaknesses 1. eXtended Markup Language resident database system is not ample to save data and it cannot contain the complicated query at relational DBMS. 2. It is impossible for the users to access XML documents and data that are stored in a relational DBMS. To overcome the above mentioned weaknesses, querying and storing XML data techniques using RDBMS are used. The steps for this approach are- 1. Data or an XML document is saved by making relational table design. 2. XML data is divided by separating them into columns in the presented table. 3. SQL Queries are used to get access to the XML document format obtained in RDBMS dta format. To transfer data from XML to data base, the strategy is to use C# as middleware. This research can be done by parsing technique with the help of SAX parser or by using XML Tree Class. To do the vice versa, the present format of XML document from relational SQL SERVER 2008 database supported by C# script, used as middleware; is converted with the help of tagging and structure. All alternatives (outside engine) done by tagging and structuring process implies that a part of the task was done outside the relational database engine. For comparing the XML document and RDBMS from the point of speed in loading the process in the browser following tasks were performed:- Searching of the data in the XML document is done with the help of DATA binding technique. Presentation of the XML data from RDBMS is done by searching data from XML document which was saved into SQL database, than with the help of DOM Tree method the result of the query is saved as a XML Document Database problems in XML They are hard to update. We cannot implement the constraints. Its difficult to optimize the xml database. Hard to maintain the consistency Data Storage and Data Transmission: These two are different concepts. In data storage we store data and while storing it we need to check the validity of the data. In Data Transmission we simple transfer the data from one system to the other. XML are generally used for the Data Transmission purpose. COMPARISON Relational Database XML Database META DATA Definition CREATE TABLE DEFINE XML SCHEMA Persistence of DATA INSERT,UPDATE CREATE XML DOCUMENT QUERY SELECT XPath ,XQuery 1.2 BENEFITS AND LIMITATIONS OF DIFFERENT DATABASE TECHNOLOGIES: Speed is the major advantage of creating database with objects. In OODBMS (Object oriented Database Management System) data is stored as objects but not in the form relational rows and columns such as in relational DBMS that is why OODBMS is faster than relational DBMS. OODBMS is more applicable than relational DBMS (RDBMS) for some tasks. This is because OODBMS performs many operations using navigational interfaces where as RDBMS uses declarative interfaces. OODBMS follows pointers to implement navigational access to data in an efficient manner. One disadvantage of RDBMS s is we need relational mapping layer to map the entire model for application objects to the database object model, whereas in OODBMS there is no need to match those layers. In RDBMS due to this mapping there may be an impedance mismatch and there is no such problem in OODBMS and it also increases the performance. OODBMS has some drawbacks like:- As it is said above OODBMS uses pointers to implement navigational access to data this is one of the drawback as in general purpose queries this will lead to delay the output and also becomes complicated than relational One more drawback is that there is no mathematical foundation for OODBMS, unlike RDBMS. This makes OODBMS weaker than RDBMS in supporting queries. The difference between data-base centric thinking and oop is in the way it views the world. The first one views the world through a viewpoint which is declarative and attribute-driven. The latter one views through a viewpoint which is behavioural. This is one of the major differences between databases and OOP. Many consider database technology as a failure. Hence attempt are being made in research and industrially to closely integrate database functionality into object programming languages. 1.3 DIFFERENT APPROACHES FOR THE DATABASE DESGIGN Different approaches for the database design includes data model approach design approach and so on. Starting with the data model approach: For effective project implementation database design is most important aspect thats why should be completed within given time line to give economical approach in project developing phase. Data model construction and updating on change of data deign in necessary as every application will need data storage. It is one of the most crucial parts of an application for developer and user as well. The different normal forms are:- 1st Normal Form Similar group should be stored in different table and tables should be provided by primary key to identify columns. 2nd Normal Form To protect data redundancy foreign key must be introduced. 3rd Normal Form Primary key plays a prominent role making every column in the table related. This makes every column a dependent of the primary key of the table. Those fields not satisfying above property should be stored in a new table with a new key. 4th Normal Form: Independent relationship should be removed from the relation database. 5th Normal Form Many to many relationships can be related logically thats why its also known as Exists in never-never land. Followed by the data model approach is the design approach which is explained as below: 2nd and 3rd form designs should be used for large application having enhancement scope. Scalability should be kept in mind during designing phase of application. Third form can ask you to make host of tables with less number of entity which reduces data replication across tables. While talking to a fellow developer i came to know that they used 3rd form as they were quite sure that it would not create dependency problem for their application as they used comma to differentiate primary values in a defined field of a table. Classes that can be used as data object which contain properties, actually a description and quality of entity element and these properties are introduced by getter and setter, should be designed at the time of creating class diagram for an application. Both object and property shows real life entity. For creating the database tables we need following constraints and relationships to be there in that table so that final database developed will be more effective and understandable. These are explained in the Constrains section under the database design part with the help of query tools. LO2 DEsign and implementation: 2.1 Requirement: This assignment is to understand the database design concepts, implement the database designed and execute the queries to obtain the required result with the help of SQL Server database. It also helps in developing Client side application to modify, update and view the results through C#. Net. Deeveedeezee, the online DVD shop records the customer details, DVD details which includes title, genres, Studio, classification, actors, directors and other information. It provides the users to rate a DVD using star scaling ranging from 1 to 5 and also allows them to create their own wish list. Our objective is to understand how the database of this DEEVEEDEEZEE is maintained, practically implementing it with the help of SQL Server and develop an client end application that interacts with SQL Server and provides the user the authority to view and add details. The WindowsFormApplication1 is the project tile and the client application can be run by opening the solution in MS Visual studio and Debugging the Code. It can be done by clicking on Build->Start Debugging. Function: Deeveedeezee.com as mentioned above provides the online customers various details about the DVDs, their reviews, ratings, synopsis and also allows them to create their own wish list. To maintain such a database, it has to be well designed and effectively handled by the administrator or the team of database continuously monitoring and assessing the required information. Every user is provided with unique user-id and password with which they can login and access the required information about the DVDs. They can even provide their comments, reviews and ratings as well which are again recorded under their user-id and are provided when ever required or asked for. Also deeveedeezee handling such large information from the website requires an Administrator or a team working on databases so that it is well managed and maintained. Thus every administrator and the team member again have got their own user-ids and passwords so that they can login into the databases and do their assigned tasks. These discussed details are presumed to be handled and the rest of the discussion focuses on the database designing, implementation and development of a client application which interacts with SQL server to provide them the easier access to add and view data from the database. Thus the backend database has got various data rules, definitions and constraints to be handled. Recording distinct information and accessed by different types of users, database has got different tables and views with appropriate fields and attributes. The database design diagram shown below shows the clear picture of how the database is designed, the various tables it maintains, attributes it holds and their properties. DATABASE DESIGN DIAGRAM ERD The diagram shown below depicts the various tables and its attributes. This design is modified and improved further with the help of Entity Relationship Diagram. The Entity Relationship diagram of the report is as below. The rectangle boxes are considered as entities The ovals are treated as attributes. Rhombus represents relationship between the entities. The diagram represents all entities, attributes and also the relations between the entities. It is a graphical representation of the relations. The ER diagram is a good means of understanding the relationships between the entities and attributes. In the below diagram, different users can be uniquely determined by its attributes like userId, email, firstName etc. User entity is related to DVD by Reviews. The ratings given to the movie by viewers are recorded through Ratings. Comments are the reviews of viewers. DVD on the other hand can be uniquely determined by its attributes like dvdId, title, studio etc. Role connects DVD and People. Role can be various tasks of people like actors, producer, and director. People have attributes of peopleId and peopleName. dvdDetails dvdId title retailPrice releaseDate runningTime synopsis genres studio users userId initials firstName surname dateOfBirth address email mobileNo telephoneNo password timestamp studio Fig: Database Design Add view Users Add roles id peopleId dvdId role wishlist id email userId wishlist Customers view dvdClassification id dvdId classification description people peopleId peopleFirstName review reviewId userId email dvdId review rating timestamp Entity Relationship Diagram (ERD) peopleName peopleId people Role dvdId title retailPrice releaseDate runningTime synopsis genres studio DVD RatingComment Review userId dateOfBirth surName firstName initials User telephoneNo mobileNo email address password 2.2 4.3 DOCUMENTATION AND Implementation OF THE DATABASE: Database Implementation and Datatype Usage The designed database discussed with the help of database design diagram and entity relationship diagram are implemented in SQL with the help of MS visual studio. All the attribute and tablenames are in used as per the conventions like using camel case, singular table name and so on. The output tables, conents nd query results are recorded with the help of screenshots and are shown as below: Table1: user table Comments: The details of the users like firstName,email, DOB, address, contact details are recoderd. In this table Primary key contraint,Not Null constraints are present. Datatypes of each attribute as per the given data rules are being implemented as shown above. Table2: dvdDetail table Comments: It stores the all details of DVD like running time ,release date,title and creates an unique dvd id. In this table Primary key contraint,Not Null constraints are present Datatypes of each attribute as per the given data rules are being implemented as shown above. Table3: review table Comments: It stores the reviews and the rating i.e No. Of stars given to the DVD by the user. It has not null contraints ,check constraints which checks that the rating field have value greater than 0 and less than 5,foreign key contrains.email is the foreign key which is refrencing to the primary key of the users table. userId and dvdId the combination of these two is used as a primary key. Table4: people table Comment : It stores the name of the people involved in the movie or DVD and gives a unique id to each of them that is peopleId. Table5: role table Comment: It stores the role of the each people involved in the movie like director,producer,actor etc. It has a foreign key dvdId which refrences to the dvdDetails dvdId.id is the primary key which is a identity with a seed 1. Table6: wishlist table Comment: It stores the wishlist of each user in comma seprated form. In this table id is the identity with seed 1 and userId is the primary key and email is the foreign key. Table7: dvdClassification table Comment: It stores the classification of the dvd with a little description about the dvd. dvdId is the foreign key and id primary key and also a identity with seed 1. Constraints NOT NULL Constraint: This is a constraint which restricts the user from entering the null value or leaving it blank. The user needs to provide the details for that field. It becomes necessary for the user to enter. Fig: NOT NULL CONSTRAINT In the given example id,email,userId fields can not be left empty. User need to provide these details otherwise it will through error.wishlist can be left empty. Query for this constraint CREATE TABLE wishList ( id int NOT NULL, email varchar(100) NOT NULL , userId int , wishList varchar(MAX) NOT NULL) Primary key constraints: This constraint is used to uniquely identify the row in the table. This field is not repeated in any of the other row. Primary key of one table can be used as the reference or foreign key of the other table. Fig: PRIMARY KEY Constraint In the above example userId is the primary key. All the rows in this table will have different userId. Fig: Showing the implication of Primary Key constraint In the above figure it is clealy shown that the userId is different for different rows. Unique constraint: This is the constraint used for uniquely identifying a particular column. All the values in a particular column are different. Fig: UNIQUE CONSTAINT In the above figure userId field has a unique constraint.It is a identity with a seed of 1.Every time a new row is inserted is automatically increments the value of the userId which ensures that in userId column no value is repeated. Fig: Showing the implication of Unique constraint In the above figure in userId column no value is repeated . userId has a unique constraint. Foreign key constraint: This constraint ensures that the database has a refrential integrity. Foreign key is works on the refrence of the primary key of some other table. Query: CREATE TABLE wishList (id int , userId int PRIMARY KEY, email varchar (100) references users(email) wishList varchar(MAX) ); Fig: Foreign Key Constraints In the above figure email is the foreign key which refrences the email i.e the primary key of the users table. Check constraint: This constraint makes sure that all values in a column satisfy certain specific criteria. Query: CREATE TABLE review ( reviewId int NOT NULL, userId int NOT NULL, dvdId int NOT NULL, review varchar(200) NOT NULL, rating float CHECK (rating0) timestamp timestamp) This check constraint helps in validation of ensuring the star rating to be between 0 and 5. Or CREATE TABLE dvdDetail ( dvdId int NOT NULL primary key identity(1,1), retailPrice int NOT NULL, title varchar NOT NULL, synopsis varchar NOT NULL, runningTime int CHECK (runningTime>10 AND rating genres varchar NOT NULL studio varchar NOT NULL) This check constraint ensures that the running time to be between 10 and 5000. LO3 Use of Manipulation and Query tools 3.1 Benefits of Manipulation and Query Tools in Database Manipulation and Query tools in database include those commands and statements that on execution would help in data manipulation. SQL maintains certain standards which includes DML or Data Manipulation Language. The major SQL commands that include in this DML are INSERT, UPDATE, ALTER and so on. These tools or query commands help in modification of tha data and constant updates that have to be made. SQL Server 2008 offers a very good platform that provides access to database and also it provides the query window for executing various commands that include in the Data Manipulation Language. They are very much useful in making it easier for the user to modify the data and update some information. A fine picture of these tools and their functioning can be understood in the sections below: 3.2 Implementation Query tools: Query for viewing all DVDs belonging to the Romantic Comedy genre in order of price. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = Romantic Comedy) ORDER BY retailPrice The query when executed would result into the table as shown below: Table: Result of the query Query for viewing all DVDs belonging to the Universal Pictures UK studio. Table:Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (studio = Universal Pictures UK Studio) Table: Result of the query Query for viewing all DVDs in which Johnny Depp or De Caprio have acted. Table: Initial data in dvdDetails table Query:- SELECT dvdDetails.dvdId, dvdDetails.title, dvdDetails.retailPrice, dvdDetails.releaseDate, dvdDetails.runningTime, dvdDetails.synopsis, dvdDetails.genres, dvdDetails.studio, choose.dvdId AS Expr1 FROM dvdDetails INNER JOIN (SELECT DISTINCT [NATURAL].dvdId FROM roles AS [NATURAL] INNER JOIN people ON people.peopleId = [NATURAL].peopleId WHERE (people.peopleFirstName = Shahrukh) OR (people.peopleFirstName = Amir khan)) AS choose ON choose.dvdId = dvdDetails.dvdId Table: Result of the query View all the DVDs which Steven Spielberg has directed. Table:Initial data in dvdDetails table Query:- SELECT dvdDetails.dvdId, dvdDetails.title, dvdDetails.retailPrice, dvdDetails.releaseDate, dvdDetails.runningTime, dvdDetails.synopsis, dvdDetails.genres, dvdDetails.studio, choose.dvdId AS Expr1 FROM dvdDetails INNER JOIN (SELECT DISTINCT [NATURAL].dvdId FROM roles AS [NATURAL] INNER JOIN people ON people.peopleId = [NATURAL].peopleId WHERE ([NATURAL].role = Director) OR (people.peopleFirstName = Farah Khan)) AS choose ON choose.dvdId = dvdDetails.dvdId Table: Result of the query View of all the DVDs suitable for a Valentines Gift. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = Romantic) Table: Result of the query View of all the DVDs suitable for children (under 10s) to watch. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = under 10) Table: Result of the query DVDs on the wishlist for a specified customer Table:Initial data in wishlist table Query:- SELECT wishList FROM wishlist WHERE (userId = 1) Table: Result of the query DVDs in order of release date Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails ORDER BY releaseDate Table: Result of the query DVDs belonging to a specified studio in order. Table:Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails ORDER BY studio Table:Result of the query To add a sample DVD. Table: Initial data in dvdDetails table Query:- INSERT INTO dvdDetails (retailPrice, releaseDate, genres, studio, runningTime, title) VALUES (99, CONVERT(DATETIME, 1990-05-02 00:00:00, 102), under10, Coke Studio, 1100, Tom) Table: Result of the query Table:Data in dvdDetails table after executing query An update query to change the review star rating assigned by a customer to a DVD. Table: Initial data in review table Query:- UPDATE review SET rating = 3.5 WHERE (userId = 1) Table:Result of the query Table:Data in review table after executing query 3.3 EVALUATION OF QUERY TOOLS: Queries can be simple and complex. For the complex queries we make the stored procedures, views and trigger which we can use later in our code and for the simple query we can directly embed in the code. Stored procedures contain more than one query and the stored procedure is pre compiled method for accessing the data from the database. Queries including select, insert, update etc are written in the procedures. After committing the query if any error occurs then we roll back and ignore the result of that query. If the correct relationship is present between the tables than only we can get the correct result from the data LO4 Use, documenting and implementing of Relational Database Management System 4.1 4.2 TESTING OF THE RELATIONAL DATABASE AND ITs IMPLEMENTATION Queries in the section 3.2 produce the result correctly i.e. the output of different queries are correct and as we know that queries will give the correct output only when the relation between the tables are correct i.e. the relational database is correctly made. Queries in the view section and the also in the client application desired view produce a correct result which shows that the implementation of the relational database is correct. Client Application: Microsoft Visual Studio has been used for developing the client application in C#.NET. Our main objective was to provide the user with the facility to add and view the data from the database so that proper updating can be done and relevant information can be provided to the user through the online website of deeveedeezee.com. The prerequisites for this application are: MS Visual Studio installed in the computer system with C#.NET and SQL server. The MDF file or the database has to be loaded into the application through MS Studio by Data-> Add new datasources-> Database. Once the database is loaded, the SqlConnection string path has to be modified to the path where the database is located. Every user of this client application is provided with unique username and password through which he can log in into the application. The application only highlights the required and mentioned features in the assignment of VIEW and ADD. The figure below represents the Client Application as it looks after logging in successfully. afterlogin client app.JPG Fig: Client Application The user allowed viewing and adding the data, on clicking the respective buttons would be directed to the forms as shown below: view and add.jpg Fig: View and Add forms One can view the details of DVDs, Reviews posted by the customers through online website, Ratings provided by them, their wish lists and the user data. One can add up details to be displayed about DVD to the customer, roles played by various actors, actress and other working staff for that particular product, rating as per the reviews and rating awarded by the customers and also new users data. The following sets of figures describe how the data and various details are added to through the client application into the database: add dvddetails.JPG Fig: Add dvdDetails On clicking the submit button, in the coding section the query to insert the details of DVD which includes dvd Name or title, Price, Genres, Date of Release of the DVD, Studio and synopsis is executed and the table of dvdDetails is updated as shown above in the query section. add ratings.JPG Fig: Add DVD Ratings Viewing the details of review and rating provided by the customers through online, the user of this client application can rate the dvd accordingly. He has to identify the dvd ID and based on the information he has got he can provide the rating on a scale of 1 to 5. As explained above similarly on clicking the submit button, the query gets exected in the back and the table of concerned gets updated as shown above in the query section. add roles1.JPG Fig: Add Role Details This helps in providing the customer regarding the cast details of the product. add users.JPG Fig: Add Users Details This helps in validating the user by adding them into the database. Similarly viewing would allow the user with the following output: Fig: View of dvdDetails dvdDetails includes title, price, date of relase and such other features that described the dvd. dvdID is uniquely and automatically generated and is considered as the primary key. From the data available in this table dvds can be classified based on their genre and studio as per requirement. Fig: View of Roles This table helps in updating the online site with the roles played by various persons involved in making this product. The persons can be identified by their unique ids. Fig: View of Wishlist As provided online by the customers their wishlist gets updated in the database ad can be viewed for knowing required information about the user and his preferences for future use. Fig: View of Users data Users or customers using deeveedeezee.com online and th staff using this application, all the details are provided in this table from which one can know about their personal details and contact information to be used for various purposes. Fig: View of Reviews Based on the data provided in the reviews by online viewers, the users of this application can add the modified rating based on data collected from many sources. 2.3 Application of a range of database tools to enhance user interface In all the above view forms, GRIDVIEW t