Friday, March 13, 2020

Library Information System Essays

Library Information System Essays Library Information System Essay Library Information System Essay Information System: We are living in the 21st century which is known as the †computer age†, where almost every kind of work is carried out with the help of computer. From the smallest work to the most critical works are carried out with the help of computers. What is more, now with increasing popularity of the internet many important applications have sprung up to make use of this wonderful technology. Many important applications have been designed with the view to communicate information to people all around the world. An information system is an open system that allows input and facilities interaction with the user. In our case †Library Information System† is an open system which allows taking input from the user provide interactive environment to have di? erent output according to user’s need. The library information system maintains the record of Library for the following purpose: 1. For day to day issuing of library books. 2. For fast retrieval of books information. 3. Maintaining information about journals, magazines ,newspapers etc. 4. Information about the vendor’s of books ,journals,newspaper. 5. To produce di? rent reports against di? erent query as per our need. 6. Information about the students and sta? to whom books has been issued. 7. Maintain the record of ? nes. 8. Maintain the record of billing the newspapers, journals etc. 9. Maintain the record maintenance of books. 10. Record of bindings of journals. 1 2. 1Introduction to Initial Investigation: Initial i nvestigation determines whether an alternative system can solve the problem. 2. 2Existing System The present library management system of AEC is to keep record of various books, journals, newspapers, magazines etc to whom they are issued and the vendors and ? es related to the books. The present Library system of AEC is manual, means the librarian maintain the various records in ? les. There is no computer based information system. 2. 3Drawback of the Existing System: The present library system of AEC keeps all its records in paper ? les, which lead to maintaining a lot of ? les and document. This take a lot of time, e? ort and space from the cost involved in it. The addition and maintenance of personnel details of new student to whom books are issued at the beginning of every session as well as the old students who are promoted to the next class, in paper ? es is tiresome, time consuming and costly a? air. The information is kept in an unstructured and unsystematic manner and scatt ered among huge number of ? les. So ? nding of speci? c information needs going through a lot of papers, as proper indexing system is not there. Apart from these, billing of newspapers, journals, calculating total ? ne collected at the end of the month ,year needs a lot of calculation. Then for generating reports separate manual type machine is employed. 2. 4Proposed System: The proposed system aims at making the above system automated and online. The computerized system allows the librarian to calculate the ? ne, the bill by just click of a mouse. The status of a book could be known by knowing the title or author or the accession number of the book. The library form can also be downloaded from it. The software is required to perform the tasks as narrated below: 1. Online membership. 2. Keeps the track of issues and submission of books. 3. Status of b book. 4. Status of a member. 5. Status of the student who has taken the book. 6. Status of the book yet to be returned. 7. Calculation of ? ne. Also various reports will be generated on these topics. The system is also required to provide for 3 levels of access. These are as follows: General User: They have permission to search books in library, change their own password, and can view their own details. Librarian: The librarian is allowed to add, delete and modify the various records related to books and members. He/she can issue books to users. In brief we can say that he/she can maintain the information of the system. Administrator: The administrator has the highest level of access. He/she can creates, modify and delete the account of a member. FEASIBILITY AND REQUIREMENT ANALYSIS 3. 1Introduction Feasibility study is carried to check the workability of the candidate system. It’s impact on the organizational ability to meet the user need and the e? ective use of the system. The object of the feasibility study is not to solve the problem but acquire a sense of its scope. During the study of the de? nition is centralized and aspect of the problem to be included in the system are determined. Consequently cost bene? ts are with great accuracy at this stage. The result of this feasibility study is a normal proposal. There are three key considerations involve in the feasibility study analysis. They are as follows: 3. 1. 1Economic Feasibility Economic Feasibility looks at the ? nancial aspects of the project. It is most frequently used technique for evaluating the e? ectiveness of a proposed system. Economic feasibility is more common known as Cost Bene? t Analysis. The procedure is to determine the bene? ts and savings that are expected from a proposed system and compare them with cost. It bene? t outweighs costs, a decision is taken to design and implement the system. Otherwise, further justi? cation or alternatives in the proposed system will have to be made if it to have a chance of being approved. The proposed system, no doubt require some initial investigation , but it will bene? t the organization in its long run in the form of reduce total number of employees, quick decision making capacity to the management to capture the market occur etc. So, we can say that our project will help the organization in ? nancial gaining at its long run and so it is economically feasible. So, the bene? t expected from the system is much more compared to the cost incurred in computerizing. Hence the system is economically feasible. 3. 1. 2Technical Feasibility Technical Feasibility determines whether the technology needed by the proposed system is available and how this technology can be integrated within the organization. The technical needs of the system may vary considerably but might include: 1. The facility to produce output in a given time 2. Response time under certain conditions 3. Ability to process a certain volume of transaction at a particular speed. 4. Facility to communicate data to distant location During examining the technical feasibility, we have given more importance to the con? guration of the system than the actual make of the hardware con? guration. It provides us a complete picture about our system requirements; like how many workstations are required, how these units are interconnected so that they could operate and communicate smoothly, what speed of input is achieved at particular quality of printing. The proposed system is technically feasible as it examined that the hardware and software is enough at the workplace to carry out the system and also can support addition. The proposed system presents a technically feasible picture since all the resources necessary for the developments of the system under considerations are present in the AEC Library. 3. 1. Operational Feasibility Proposed project are bene? cial only if they can be turned into information systems that will meet the operating requirements of the organization. In general, people resist to changes and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user sta? is likely to have towards the development of a comp uterized system. It is common knowledge that computer installations have something to do with turnover ,transfer, retaining and changes in employee job status. Therefore it is understandable that the introduction of a candidate system requires special e? rt to educate, sell and train the sta? on new ways of conducting business. With the co-operation and understanding of the project development, the whole endeavor becomes not only di? cult but meaningless too. Hence, the operational feasibility is one of the vital factors for the overall success of the project. The proposed system is operationally feasible as: 1. Suitable codes are used to generate reports and queries 2. Although the client organization has not computerized the proposed system but most of the employees are quite familiar with the computer as they have other system already computerized. Moreover, we are providing user manual and help for better understanding and operating system. So , the proposed system is operationally feasible. 3. 1. 4Conclusion From the observation made in the feasibility study described above, it was recommended that proposed system is feasible and justi? ed that the feasibility study could be followed by the system analysis phase. 3. 2Requirement Analysis Information gathering is usually is the ? rst phase of software development project. The purpose of this is to identify and document the exact requirements for the system within the framework of the organization. The requirement analysis must be based upon the user need, the developer and the organization. 3. 2. 1Information Analysis There are four strategies available for determining information requirement. They are as follows: 1. Asking (interviewing) 2. Deriving from the existing information system 3. Review the written documents 4. Synthesizing from the characteristics of the running system In the purpose system the strategies asking and reviewing of the written documents has used for requirement analysis. Presently in the existing system all record are maintained manually. For the development of the proposed system review written documents has done the requirement analysis. Again rule and regulation of the management information system are determined by asking strategy to implement in the proposed system. 4. 1Hardware Requirements: 1. System Type : IBM compatible PC’s 2. Processor: Intel(R) Pentium(R) 4 processor 3. RAM: 512 MB 4. HDD: 40 GB 5. Monitor: Any standard color monitor 4. 2 Software Requirements: 1. Platform: Asp. Net 2. Language Used: C# 3. IDE Used: Microsoft Visual Studio 2008 4. Database: SQL Server 2005 5. OS Used: Windows XP 6. Internet Browser: Any web browser . 3 Technology and Tools Used Microsoft Visual Studio 2008 In computing, Microsoft Visual Studio is an Integrated Development Environment (IDE) from Microsoft. It can be used to develop console and graphical user interface applications along with Windows Forms applications, web sites, web applications, and web services in both native code together with managed code for al l platforms supported by Microsoft Windows, Windows Mobile, Windows CE, . NET Framework, . NET Compact Framework and Microsoft Silver light. Visual Studio includes a code editor supporting IntelliSense as well as code re factoring. The integrated debugger works both as a source-level debugger and a machine-level debugger. Other built-in tools include a forms designer for building GUI applications, web designer, class designer and database schema designer. It accepts plug-ins that enhance the functionality at almost every levelincluding adding support for source-control systems and adding new toolsets like editors and visual designers for domain-speci? c languages or toolsets for other aspects of the software development lifecycle (like the Team Foundation Server client: Team Explorer). Visual Studio supports di? erent programming languages by means of language services, which allow the code editor and debugger to support (to varying degrees) nearly any programming language, provided a language-speci? c service exists. Built-in languages include C/C++ (via Visual C++), VB. NET (via Visual Basic . NET), C# (via Visual C#), and F# (as of Visual Studio 2010). Support for other languages such Python, and Ruby among others is available via language services installed separately. It also supports XML/ XSLT, HTML/ XHTML, JavaScript and CSS. Individual language-speci? versions of Visual Studio also exist which provide more limited language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++. Microsoft provides †Express† editions of its Visual Studio 2010 components Visual Basic, Visual C#, Visual C++, and Visual Web Developer at no cost. Visual Studio 2010, 2008 and 2005 Professional Editions, along with languagespeci? c versions ( Visual Basic, C++, C#, J#) of Visual Studio 2005 are available for free to students as downloads via Microsoft’s Dream Spark program. Visual Studio 2010 is recently released. Designer Visual Studio includes a host of visual designers to aid in the development of applications. These tools include: Windows Forms Designer The Windows Forms designer is used to build GUI applications using Windows Forms. It includes a palette of UI widgets and controls (including buttons, progress bars, labels, layout containers and other controls) that can be dragged and dropped on a form surface. Layout can be controlled by housing the controls inside other containers or locking them to the side of the form. Controls that display data (like textbox, list box, grid view, etc. can be data-bound to data sources like databases or queries. The UI is linked with code using an eventdriven programming model. The designer generates either C# or VB. NET code for the application. WPF Designer The WPF designer, codenamed Cider, was introduced with Visual Studio 2008. Like the Windows Forms designer it supports the drag and drop metaphor. It is used to author user interfaces targeting Wi ndows Presentation Foundation. It supports all WPF functionality including data binding and automatic layout management. It generates XAML code for the UI. The generated XAML ? le is compatible with Microsoft Expression Design, the designer-oriented product. The XAML code is linked with code using a code-behind model. Web designer/development Visual Studio also includes a web-site editor and designer that allow web pages to be authored by dragging and dropping widgets. It is used for developing ASP. NET applications and supports HTML, CSS and JavaScript. It uses a codebehind model to link with ASP. NET code. From Visual Studio 2008 onwards, the layout engine used by the web designer is shared with Microsoft Expression Web. There is also ASP. NET MVC support for MVC technology as separate download and Dynamic Data project available from Microsoft Class designer The Class Designer is used to author and edit the classes (including its members and their access) using UML modeling. The Class Designer can generate C# and VB. NET code outlines for the classes and methods. It can also generate class diagrams from hand-written classes. Data designer The data designer can be used to graphically edit database schemas, including typed tables, primary and foreign keys and constraints. It can also be used to design queries from the graphical view. Mapping designer From Visual Studio 2008 onwards, the mapping designer is used by LINQ to SQL to design the mapping between database schemas and the classes that encapsulate the data. The new solution from ORM approach, ADO. NET Entity Framework, replaces and improves the old technology. Properties Editor The Properties Editor tool is used to edit properties in a GUI pane inside Visual Studio. It lists all available properties (both read-only and those which can be set) for all objects including classes, forms, web pages and other items. Object Browser The Object Browser is a namespace and class library browser for Microsoft . NET. It can be used to browse the namespaces (which are arranged hierarchically) in managed assemblies. The hierarchy may or may not re? ect the organization in the ? le system. Solution Explorer In Visual Studio parlance, a solution is a set of code ? les and other resources that are used to build an application. The ? les in a solution are arranged hierarchically, which might or might not re? ect the organization in the ? le system. The Solution Explorer is used to manage and browse the ? les in a solution. Team Explorer Team Explorer is used to integrate the capabilities of Team Foundation Server, the Revision Control System into the IDE (and the basis for Microsoft’s Code Plex hosting environment for open source projects). In addition to source control it provides the ability to view and manage individual work items (including bugs, tasks and other documents) and to browse TFS statistics. It is included as part of a TFS install and is also available as a download for Visual Studio 2005 and 2008. Team Explorer is also available as a stand-alone environment solely to access TFS services. Data Explorer Data Explorer is used to manage databases on Microsoft SQL Server instances. It allows creation and alteration of database tables (either by issuing T-SQL commands or by using the Data designer). It can also be used to create queries and stored procedures, with the latter in either T-SQL or in managed code via SQL CLR. Debugging and IntelliSense support is available as well. Server Explorer The Server Explorer tool is used to manage database connections on an accessible computer. It is also used to browse running Windows Services, performance counters, and Windows Event Log and message queues and use them as data source. Microsoft SQL Server 2005 SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it de? ned an xml data type that could be used either as a data type in database columns or as literals in queries. XML columns can be associated with XSD schemas; XML data being stored is veri? ed against the schema. XML is converted to an internal binary data type before being stored in the database. Specialized indexing methods were made available for XML data. XML data is queried using XQuery; CLR Integration was the main features with this edition where one could write SQL code as Managed Code these are those code which are being executed by CLR (Common Language Runtime). SQL Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in T-SQL. In addition, it also de? nes a new extension to XQuery, called XML DML that allows querybased modi? cations to XML data. SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed over web services, results are returned as XML. For relational data, T-SQL has been augmented with error handling features (try/catch) and support for recursive queries (Common Table Expressions). SQL Server 2005 has also been enhanced with new indexing algorithms and better error recovery systems. Data pages are check summed for better error resiliency, and optimistic concurrency support has been added for better performance. Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more e? cient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier. SQL CLR was introduced with SQL Server 2005 to let it integrate with the . NET Framework. SQL Server 2005 introduced †MARS† (Multiple Active Results Sets), a method of allowing usage of database connections for multiple purposes. 5. 1Introduction: The design process translates requirements into a representation of the software that can be assessed for quality before coding begins. Once the requirements have been collected and analyzed, it is necessary to identify in detail how the system will be constructed to perform the necessary tasks. The design activity is often divided into 2 separate phases. One is system design and the other is detail design. System Design: System design aims to identify the modules that should be in the system, the speci? cation of these modules and how they interact with each other to produce the desired result. System design describes what components are needed. Detail Design: During detail design the internal logic of the modules speci? ed in the system design is decided. Detail design focuses on designing the logic of each of the modules. Detail design describes how the components identi? ed during system design can be implemented on the system. 5. 2System Design The web enable system for Asaam Engineering College Library has at present three modules with a number of sub modules. The following system design documents focuses detail on these modules and the speci? cation of these modules. The software modules of this web enable system are : Administrator Module 1. Create and delete account 2. System backup 3. View record Member Module 1. View record 2. Compile record 3. Enter record 4. Update record 5. Delete record 6. Generate reports User Module 1. View record 5. 3Detail Design During detailed design the internal logic of each of the modules speci? ed in system design is decided. The main aim of the detail design is to explain how the system work or how the ? ow of data takes place within the system. Detailed design deals with system speci? cation. 5. 3. 1 Abstract Representation of the proposed system Before making the detailed design of a system, ? rst the most abstract representation of the problem is worked out. The following use case diagram gives the working of the proposed system. 5. 3. 2The Uni? d Modeling Language: The uni? ed modeling language (UML) is a language just as sure as C, C++, Pascal, German, English etc. And the UML is probably the newest languages invented by human kind, invented around 1997. The UML is used to build models that will later be used to build real products, in our case Software. A model is a collection of text and diagram that represents something. A model is to software that a blueprint is to a house. Models are valuable for many speci? c reasons. Models are valuable because they consist of pictures to a large extent and even simple pictures can convey a lot of message then a lot of text. The UML is an o? cial de? nition of a pictorial language where there are common symbols and relationships that have one common meaning. The UML supports all aspects of SDLC from requirements gathering to design to development. There are mainly types of diagrams in the UML. The major types are: 5. 3. 1. 1Use Case Diagrams: Use case diagrams are a part of the requirements gathering process and are used in highlevel design to identify fundamental requirements of a system. It describes the participants and is also helpful in developing test plans. A use case’s main symbols are the actor and the use case oval. Use case diagrams are called the mother of all other diagrams of the UML. It gives the static view of a system and focuses on goals not processes. 5. 3. 1. 2Activity Diagram: Activity diagram are like ? ow charts but are more ? exible by supporting parallel application and by dividing areas of responsibility into swim lanes. Activity diagrams are used to analyze processes and if necessary, perform re-engineering. 5. 5 Data Tables A database is a collection of inter-related data, stored with minimum redundancy to serve many users quickly and e? ciently. The primary objectives of a database are fast response time to queries, more information at low cost, control redundancy, clarity and ease of use, accuracy and integrity of the system, fast recovery, privacy and security of information, data and program independence and availability of powerful end user language. The heart of a database is the DBMS. System analysis clears that all data used by process must be derived directly from input documents and reports are to be retrieved from the database ? les. The database of Library Information System† is a collection of di? erent types of information. So it has di? erent tables to access the information easily and e? ciently. Also the data redundancy is checked in the database. To get a nice understanding of the database, we have divided the database into several tables which are as follows. 1. Book Information: The Book Information store the all related information regarding a book. Table 1: Book Information ELEMENT NAME DATA TYPE CONSTRAINT Accession no nvarchar Not null Title nvarchar Not null Author nvarchar Not null Publisher nvarchar Not null Volumme nvarchar Not null Edition year nvarchar Not null nvarchar Not null Source 2. Member Information: Member Information table store the details of a member. The member may be a student, stu? or the librarian. 3. Card Inforamtion: This table stores the information regarding a card. 4. Transaction Table:: This table stores the transaction information of a book. Table 2: Member Information ELEMENT NAME DATA TYPE CONSTRAINT Member id nvarchar Not null nvarchar Not null Roll no Name nvarchar Not null nvarchar Not null Branch Session nvarchar Not null Town/Vill nvarchar Not null nvarchar Not null Dist Table 3: Card Information ELEMENT NAME DATA TYPE CONSTRAINT Card no nvarchar Not null nvarchar Not null Issue date Due date nvarchar Not null Table 4: Transaction Table ELEMENT NAME DATA TYPE CONSTRAINT User id nvarchar Not null Accesion no nvarchar Not null Issue date nvarchar Not null Return date nvarchar Not null Due date nvarchar Not null 5. User Login Form: This table contains data regarding log in information. Table 5: Transaction Table ELEMENT NAME DATA TYPE CONSTRAINT User id nvarchar Not null nvarchar Not null password roles nvarchar Not null Database normalization for the Library Information System The Library Information System is normalized up to BCNF (Boyee Coded Normal Form). st Normal Form: No column in the database contains multiple values, so the database is in the 1st Normal Form. 2nd Normal Form: Every Non key attributes fully functionally dependant on the primary key. Hence it is in 2nd Normal form. 3rd Normal Form: All non key columns do not depend on any other columns . Hence the database is in 3rd Normal Form. 4th Normal Form: A relation R is in BCNF if and only if every determinant is a candidate ke y. All the tables in the Library Information System ful? ll the condition. Hence the database is in BCNF. 6. 1Introduction: A system should always be tested thoroughly before implementing it with regards to its individual programs, the system as a whole, user acceptance etc. This is because implementing a new system is a major job which requires a lot of manpower, time and other resources. There are many levels of testing which ultimately leads to an error free system. The testings which are carried out is described below: 6. 1. 1 Program Testing: The program testing is carried out during the programming stages itself to test the logical and syntax error. 6. 1. 2 Unit Testing: In the unit testing di? rent modules were tested against the speci? cation produced during design of the module. When this testing was done with di? erent modules, some errors were detected and debugged and when modules were found to be working properly independently, next round of testing was followed. 6. 1. 3 String Testing: String testing is a method in which each program is tested to see whether it conforms to the related progra ms in the system. Each portion of the library management system was tested against the entire module with both test and live data before the entire system is ready to test. 6. 1. 4 System Testing: It was done to uncover the weakness that was not found during string testing. The whole system tested to see whether it works properly with valid and invalid data. The system was also tested for recovery after various major failures such as power failure etc. 6. 1. 5 Acceptance Testing: It is the system testing and performance tests performed by the customer to determine whether or not to accept the system. The library information system was accepted by the system. Implementation includes those activities that take place to convert the older system to the new one. The new system may be totally new or replacing an existing. In either case proper modi? cation is essential to provide a reliable system to meet the organization requirements. System implementation describes how the di? erent parts of the system are interacting with each other to give us a feasible software solution. The project is implemented on 3-tier architecture. It is installed on SQL server and which can be accessed by all users. This application is secured by putting user name and password, a user has to enter login details to the system. Figure 1: How the Application works The web server receives a request for some processing. Depending on the sent request the web server passes the request is forwarded to the respective request handler class and after the processing is done. The required data is fetched from the database, the required result i. e. response is passed to the client. Any further request from the client to the server goes through the same procedure. Once the software is developed, delivered and deployed, it enters the maintenance phase. Changes are inevitable when computer based systems are built, therefore mechanism for evaluating, controlling, and making modi? cations has to be adopted. These are called the maintenance activities they include: 1. Corrective Maintenance 2. Adaptive Maintenance 3. Perfective Maintenance or enhancement 4. Perfective Maintenance or reengineering Software may have some errors or bugs remaining in the system that must be removed as they are discovered. This is called corrective maintenance. Once the software system is deployed, the environment in which it operates changes. The software must adapt to the changed environment. The maintenance due to this phenomenon is called the adaptive maintenance. Software must be upgraded and enhanced to include more features and provide more services. As a result new versions of the software are released. This is called perfective maintenance or software enhancement. Reengineering is a rebuilding activity for added functionality, better performance and reliability, and improved maintainability of the software product. Unmaintainable software is subjected to rebuild following a reengineering process model. CONCLUSION 9. 1Introduction: The main concerns of the software development are software quality, programmer’s productivity and increase job satisfaction. The fundamental problems of software development are control of complexity, the lack of physical constraints, and boundaries in software and tendency to mix concerns that belong to di? rent level of abstraction. Finally, it is a people intensive activity for developing software for its use by other people. The †Library Information System† is designed and developed to satisfy the organization needs as far as possible. The Library Information System has built after an extensive research and evaluation of the existin g manual system. The main aim of the system is to maintain the records of the membership registration and the book issued to the member with the very best of accuracy and e? ciency. The purpose system is economically, technically and behaviorally feasible and is incorporated with some security measure so hat only authorized personal can manipulate the record. While developing this software we have tried to consider all the points, may be due to time constraint we may miss some valuable points for which we apologize to the concerned people. Any comments or suggestion that can improve the software are welcome. 9. 2 Overview of the System The proposed system covers the following area and processes: 1. Member’s registration 2. To maintain the record of individual member’s in detail 3. Status of the book. 4. No. of books available subject wise. 5. User friendly interfaces. Limitation of the Propose System The limitations of the purpose system are as follows: 1. † The system cannot give information about the vendors. 2. The data implementation with SQL server. 3. Security consideration and implementation is left to the database . administrator. 4. Need the help of manual system. 9. 4Scope and Further Enhancement of the Propose System: 1. The process of maintaining the detail information of the vendor can be included. 2. More enhancements can be identi? ed when the system is in the operation or used by di? rent users. ABSTRACT This report describes our group’s implementation of an online library information system. We used the Entity-Relationship model to design a database that will store and organize the library’s data. We have created the database using SQL and populated it with some sample data. The system can keep track of library cards, users, librarians, administrator, books and the relationships betwee n them. Using ASP. NET with C#, we have created an Internet-based graphical user interface that allows users and librarians to access the system remotely

Wednesday, February 26, 2020

History and Philosophy of Physical Education and Sport. Academic Essay

History and Philosophy of Physical Education and Sport. Academic Secondary Sources and Media Sources paper - Essay Example This program aimed at developing and nurturing athletes to win gold medals for the magnificence of East German. These athletes were sacrificed for the glory of the country. These athletes were treated as experimental guinea pigs for performance enhancing drugs and were dropped if they were not productive (Kremenik et al, 2007). However, the facts of the East German case show that the athletes were forced to use the blue steroid pills. The athletes were informed that the pills were vitamin pills. This was a top secret plan that was pioneered by the Olympic head, Ewald (Kremenik et al, 2007). Because of their greed for East German’s magnificence, they lied to the athletes and eventually led to the deterioration of the health condition of numerous athletes. It is imperative to identify that the primary aim of Olympics is not just breaking records, but the feeling of energy that is generated. If athletics was about breaking records then every athlete would make attempts to enhance his or her performance by tying motors on their feet. Doping is a contentious and regular topic in athletics (Pound, 2010). The use of drug enhancing substances not only puts the health of the athlete in danger but also risks losing his or her medal. Athletes represent the vibrancy, human health and the satisfaction of potenti al. This constitutes the reasons why the International Olympics Committee does not allow doping. Notably, doping makes athletics unfair (Pound, 2010). Athletics should be fair and should offer a ground where the athletes are only differentiated by the level of their skills alone. However, the East German case is a different case where the athletes were subjected to the blue steroid pills. The International Olympics Committee was marred with a huge disconnect with scientific research and despite various researches that were

Monday, February 10, 2020

Reponse paper Essay Example | Topics and Well Written Essays - 500 words

Reponse paper - Essay Example She goes and does not locate the cat. She passes by the reception she encounter the padrone who makes her feel small yet of supreme importance. However, something changes since when she goes back to the room, the husband pays attention as the American girl chatters about her boyish appearance and her desire to possess a cat. The husband distasteful orders her to find something to read. This essay is a response addressing the connotation short story â€Å"Cat in The Rain† by Hemingway. ‘Cat in the rain’ is portrayal of women’s status in a male dominated society. The story is pertinent because it displays the women’s desire for freedom do what they want as opposed to what is expected of them by the husband or the society. Gender roles and gender specific expectations and issues have long been developed by patriarchal society to maintain a control over them. Indeed, even the husbands rarely recognized the interests of the women. Hemingway’s story highlights the women’s desire to be free demonstrated by the great desire of the American Wife to free the cat and own it, which depicts their yearning to be free. Cat therefore, symbolizes women’s status that at all times strives to conform to the demands of their husband. ‘It isn’t any fun to be a poor kitty out in the rain’ (Hemingway Web) reflects the nostalgia of the woman to flee from her vigilant and domineering husband. The protagonist in the story is first addressed as ‘American wife’ and then as ‘American girl’ that subtly defines the difference between a married girl and girl who can pursue their happiness as they deem within the broader framework of patriarchal society. This depicts marriage as a form of confinement for women. Indeed, social conditioning significantly affects marital bond and makes women rebel against the restrictions that make

Thursday, January 30, 2020

China Child Policy Essay Example for Free

China Child Policy Essay One of the things that people love and appreciate about the U.S.A is the fact that it’s a free country. There is about 322 million people that live in the U.S, each day marks thousands of new lives and deaths. Some people, like myself enjoy big and crowded families so they usually have more than 1 child. Now imagine having three kids and have two of them taken away from you because you’re not supposed to have more than 1. It sounds unfair and controlling but in China the â€Å"one child policy takes place†. China’s one child policy was first announced in 1979 by the Chinese president Deng Xiaoping as a method of controlling the fast growing population to help raise living standards. The policy limits couples to one child. In 1983 fourteen million women in china had abortions forced and organized by the same family-planning committee that killed Feng’s baby. In 2009, there were six million abortions. Now the government is working on letting certain couples have an extra child but only if both parties were born under the one child policy and had no siblings growing up. That way they prevent a drastic decrease in the population. I, personally think it’s unfair and too controlling of the Chinese government to control how many kids a family can have because it’s cruel and unfair to break up families like that. If a woman dares to get pregnant a second time, fines, pressures to abort the baby, and even forced sterilization will accompany her through her second pregnancy. For example a 23 year-old Chinese girl called Feng Jiamei was forced into abortion in the seventh month of pregnancy, the baby was killed by local Chinese â€Å"family-planning officials.† For one thing, people should have the freedom to decide how big a family they want. China’s once child policy takes away Chinese people’s human rights. Most Chinese kids don’t know what it feels like to have siblings, aunties, uncles, cousins etc. The Chinese government basically a dictatorship because they tell people how to run their families. China’ s one child policy takes away from the people’s human rights and I believe the Chinese population should rise up against the government and the â€Å"one child policy† policy because that’s unfair and the punishments such as forced abortion and sterilization are cruel and unusual. Chinese people need to rise up one day and let their voices be heard.

Wednesday, January 22, 2020

Richard Feynman Essay -- biographies biography bio

A Very Brief Synopsis of His Life Fantsay Feynman Stamp Richard Feynan was born may 11, 1918 in Manhattan,. He received his Bachelors of Science from Massachusetts Institute of Technology in 1939, and Ph.D. from Princeton University in 1942. At Princeton he worked on the atomic bomb project and revolutionized scientific approaches to quantum mechanics. He then worked, for two years, as the youngest member of the team at the Los Alamos Scientific Laboratory, that developed the first atomic bomb. For the next five years he worked as the chair of theoretical physics at Cornell University, and then as such at the California Institute of Technology, where he continued working until the end of he life. He received numerous awards, including the Nobel Peace Prize in 1965, wrote many best selling books, helped a small country named Tuva, was noted for his bongo drumming skills and witty lectures, and played a key role in the Rogers Commission hearings on the Challenger space shuttle accident in 1986. He was married three times, succeeded by Gweneth Howarth and his two children by her, Carl Richard, and Michelle Catherine. He died at age 69 of abdominal cancer, eight years after diagnosis. On winning the Nobel Peace Prize Feynman holds brain of Gregg From his doctoral work on quantum mechanics, he developed Feynman Diagrams" to explain rates for electromagnetic and weak interaction particle processes. One of the things that made Feynman Diagrams, and much of his other work, remarkable was the fact that Feynman took a more visual approach to physics, avoiding complicated manipulation of equations in favor of more easily understood diagrams. Feynman Diagrams are still used as the standard method for describing particle inte... ...s in a form that's still widely used throughout theoretical physics, in every field." Richard Feynman: "My mother [Lucille Phillips] taught me that the highest forms of understanding that we can achieve are laughter and human compassion". General Donald Kutyna: "Feynman had three things going for him. Number one, tremendous intellect, and that was well known around the world. Second, integrity... Third, he brought this driving desire to get to the bottom of any mystery. No matter where it took him, he was going to get there, and he was not deterred by any roadblocks in the way. He was a courageous guy, and he wasn't afraid to say what he meant." MIT physicist Philip Morrison : "[Feynman was ] extraordinarily honest with himself and everyone else, . . . he didn't like ceremony or pomposity . . . he was extremely informal. He liked colorful language and jokes."

Tuesday, January 14, 2020

Effects of Using Computers

Effects of Using Computers As the world is developing rapidly, people rely more and more on science and technology. When they define the concept of science and technology, â€Å"most people today think of silicon chips, iPods, high-definition TVs, and visual cell phones† (Wilson 320). Among those high-tech inventions, cars and cell phones are two scientific inventions that mostly affect people’s lives. For example, they can get to the destination faster or simply make a phone call to talk instead of taking time to write a letter. However, all of these effects do not stop there. As people can observe, they no longer work manually or by hand because everything have become computerized. Therefore, it is not unreasonable to believe that â€Å"in the future, computing is not computers any more; it is about living,† according to Nicholas Negroponte (27). In fact, the invention of computers has had both positive and negative effects on people’s development, such as, in humans’ social lives, in their jobs, and in human entertainment. First of all, humans’ social lives rely on computer invention because of its helpfulness. With the aid of technology, using computers with internet access is not an unusual way to communicate anymore. Since computers were invented, communication has become easier and quicker because â€Å"computers will join together to communicate with us and for us† (qtd. in Leone 13). For example, international students, who do not live with their family, can keep in contact with their parents via webcam. They can not only talk but also see each other’s face. Talking via webcam like that helps those international students feel like they are living far away from home. Maintaining better communications means maintaining a better relationship, so people might say that â€Å"computers can foster human contact† (Swerdlow 17). When people are bored or disappointed, they usually log in to chat room or facebook where they can meet many different and interesting people. For example, my friend’s brother immigrated to the U. S. ten years ago and left his girlfriend in Vietnam. The only thing that helped them keep in contact was the computers. They just kept chatting via webcam about how they lived without the other. Even though they did not live together, talking via webcam helped them maintain their relationship. Three years ago, they decided to get married. There are not many people reaching this destination, but computers provide people one way to keep their distant relationship. However, using online chatting to communicate has its own side effect which badly affects people’s privacy. Although computers have made communication easier, quicker, and more convenient, it has also brought the privacy concerning. For example, every time people visit a dating or chatting site, all of the activities that they make will be saved and â€Å"can be converted into permanent records that, when combined with innumerable other such records, can form a detailed profile of who we are† (qtd. in Wagner 59). It is scary to see our profiles online, meaning that people’s privacy is known as public information which they never expect to see. In addition, most people use a credit card to shop online, and every time they use it, that credit card can be matched to specific titles and be stolen easily. Using credit card to buy something online is so convenient; however, it is not safe because some online hackers can steal people’s account number and start using it illegally. In fact, using computer to access the Internet has impacted people’s privacy. Secondly, computers play a big role in people’s jobs because computers help people perform work faster and more correctly. Long time ago when computers were not invented, hundreds of people collaborated to trade stocks by using blackboards, chalk, and phones, and with much calculation, stock trading now is so much easier and quicker. It means people just simply turn on their computers, and all the information about stocks will appear on their screens. Sometimes, â€Å"human power is becoming increasingly ineffective in controlling the way information technology shapes our economic and political lives† (Swerdlow 21). For example, in the supermarket, there are too many products with many different price ranges, and computers help employees to complete the sum up transactions faster. In fact, no matter what jobs people are working, they need computers because the world has been computerized. Some people think that there is a lot of work that computers cannot perform. Yes, there is some work that needs physical movement or physical force, but computers can help people perform other tasks that require a complex thought process. According to Levy, a writer of Quarterly Journal of Economics in 2003, â€Å"computers cannot easily substitute for humans in these jobs but they can complement humans by providing large volumes of information†, he implies (30). For example, part of the truck drivers’ jobs is usually to carry goods in and out of the truck, and computers can not help them to do it. However, it can provide the truck drivers the navigation system to get to the destination quicker. Computers are an intelligent machine that can help people do various work through its various functions, so people cannot deny the crucial role of computers in people’s jobs. However, applying computers in the workplace also has a certain disadvantage. The major effect of computers is that computers create an unemployment problem. Unemployment is a serious conflict because employers no longer need much labor to run their companies when computers can help them in various aspects. In reality, â€Å"[computers] technology is enabling companies to extend their operations and enlarge their profits while reducing their workforce and the pay and security of those who remain by contracting out work to cheaper labor around the globe and by replacing people with the machines† (Noble 40). For example, employers are used to hire accountants to keep their business documents, but when they have computers, those accountants are no longer needed because the employers can handle their documents by themselves with the accounting software. Moreover, the increased use of computers in the workplace causes another serious consequence which is the decrease of employees’ work skills. According to Joan Greenbaum, a programmer at IBM company, he writes â€Å"in the language of work rationalization, the worker who does the same task over and over again†¦is being deskilled because she does not have a chance to use her own intelligence and knowledge† (63). Employees will not practice anything at all if they keep working on one work over and over again. They have computers which really help them do a major of work, so they do not really need to use their knowledge to perform their work. In fact, computers are really useful for employees to work on a variety of tasks, but there are some bad consequences following the computers’ advantages. Last of all, computers have influenced humans’ entertainment because they have some functions that televisions or cell phones do not. Mostly, children listen to music or watch movies with a CD/DVD player to entertain themselves, but when they know how to use computers, their use of those inventions is less than after they discovered the effects of computers. Evidently, â€Å"U. S. residents 13 and older consider computers more important for home entertainment than the CD player, stereo or DVD player† (Evangelista E1). A major of teenagers use computers to entertain because of the computers’ functions. For instance, televisions can not be used to go online, but computers can. Televisions do not have â€Å"hard drive† to store music and movies, but computers do. Moreover, computers also help teenagers exploit other different activities on the Internet, and one of which is game online. Playing games online has become very popular because of the advantages it offers. People do not need to come by a game store to find one because there are many interesting games on the Internet. People can also gamble online. Therefore, there is no doubting the truth that computers help people entertain themselves more effectively. However, entertaining via computers connected to the Internet may cause bad effects on people’s lives, especially teenagers. Among game online and movies, the violent images are the most common issue that most parents do worry about. They seem to act exactly like what they have seen in the movies or the games on the Internet. For instance, one of my friend’s younger brother, who is now sixteen years old, usually watches gangster movies, and his favorite one is â€Å"Young and Dangerous†, a Hong Kong gangster movie. He tends to act like a gangster and tries to be as cool as the main character, which he really loves to be. He even gets the same that character’s dragon tattoo on his back. About three years ago, he fought with another group of students of another school and was put in jail for six months. Therefore, online games and movies may mentally influence teenagers. Additionally, games and movies online also has a bad effect on teenagers’ physical development because they can spend most of their time sitting in the front of a computer, having their eyes glued to the monitor, and playing from early morning until midnight without eating anything. Playing games online is seemly like having drug abuse because when teenagers get into it, they will have difficulty getting out. Focusing too much on game online, teenagers have lack of exercise which directly affects on their physical growth, and they will become hypoactive which means they are less active and communicative. Therefore, most people, especially teenagers, should realize that watching movies and playing games online too much can cause serious consequences. As time has passed, scientists have invented many great high-tech inventions, and computer invention is one of those. In fact, every high technology has not only advantages but also disadvantages, so computers are not an exception. Computers have both positively and negatively impacted humans’ social lives, their jobs, and also their entertainment. Now, when people define the concept of science and technology, the first invention which they mention is the computers because computers have become a part of humans’ lives. Computers have many sophisticated functions to perform a variety of work, but people should remember that computers may cause bad effects.