Thursday, February 28, 2019
Attack at Pearl Harbor
Kaci Power Professor Clark sphere Civ B April 24, 2012 The Attack at astragal Harbor Yester solar day, Dec. 7, 1941 a date which each(prenominal)ow for live in infamy the United States of America was suddenly and purposely antiaircrafted by naval and air forces of the Empire of lacquer, Franklin Delano Roosevelt proclaimed in his linguistic process to congress. December 7th would indeed live in infamy for the assuagement of United States history. The day that the Nipponese posted a surprise onslaught on Hawaiis Pearl Harbor was a day that would not only change individual lives, unless would throw our terra firma into an unforgettable shock.The planning by the Japanese for this attack on Pearl Harbor began as early as January 1941. The United States had placed an trade ban on Japan by prohibiting exports of steel, scrap iron, and aviation fuel to Japan, payable to Japans takeover of northern French Indochina. In September 1940, the U. S. placed an embargo on Japan by prohibiting exports of steel, scrap iron, and aviation fuel to Japan, receivable to Japans takeover of northern French Indochina. April 1941, the Japanese signed a sluggish stance treaty with the Soviet Union to help prevent an attack from that direction if they were to go to war with Britain or the U.S. while taking a bigger chunk out of Southeast Asia. The U. S. demanded that Japan remove themselves from chinaware and Indochina, but would have settled for a withdrawal and a phone not to take more territory. June 1941 through the bar of July 1941, Japan occupy southern Indochina. Two days after(prenominal), the U. S. , Britain, and the Netherlands froze Japanese assets. This prevented Japan from buying oil, which would weaken its army and make its navy and air force completely useless.Toward the end of 1941 with the Soviets seemingly on the verge of defeat by the Axis powers, Japan seized the opportunity to try to take the oil resources of Southeast Asia. The U. S. wanted to land up Japanese expansion but the American population were not spontaneous to go to war to stop it. Prior to December 1941, Japan move two courses try to get the oil embargo lifted on terms that would still let them take the territory they wanted, and to prepare for war. The Japanese military was asked to devise a war plan. They proposed to weep into Burma, Malaya, the East Indies, and the Philippines.. They evaluate the U. S. to declare war but not to be willing to conjure long or hard enough to win. Their greatest concern was that the U. S. peace-loving Fleet, based in Pearl Harbor could ruin their plans. Although it was Japanese admiral Isoroku Yamamoto who initiated the plans for the attack against Pearl Harbor, Commander Minoru Genda was the plans chief architect. The Japanese used the cipher name Operation Hawaii for the attack on Pearl Harbor. This later changed to Operation Z. The Japanese specifically chose to attack on a sunshine because they believed Americans would be more relaxed and less alert on a weekend. The Japanese navy decided to cripple the Pacific Fleet by a surprise air attack . The United States had received many warnings stating there would be an attack on Pearl Harbor. In October, the Soviets top spy, Richard Sorge, certain Kermlin that Pearl Harbor would be attacked in sixty days. Moscow had therefore informed him that this had been passed on to the United States. The United States completely ignored all mentions to an attack on Pearl Harbor.On December 6th, Roosevelt had read the start xiii parts of the translated declaration of war that the Japanese had sent to us. The document express This means war. This is when Roosevelt decided that it was time to proclaim war on Japan. Unfortunately, his ending did not reach Pearl Harbor in any encouraging form before it was too late. The Japanese attack force stationed itself nearly 230 miles north of the Hawaiian island of Oahu. Early warning radar was new engineering s o the Japanese planes were spotted by radar before the attack, but they were thought to be a flight of American B-17s due in from the westside Coast.The attack started on December 7, 1941 at 755 am. The Japanese launched their airplanes in two waves, approximately 45 minutes apart. The first wave of Japanese planes struck Pearl Harbor at 755 a. m. The second wave reached Pearl Harbor around 840 a. m. I couldnt find where the exact numbers of the people and supplies lost, but the Japanese managed to destroy approximately 20 American naval vessels, including eight battleships, and almost 200 airplanes. More than 2,000 Americans soldiers and sailors died in the attack, and another 1,000 were wounded.In asset to the grievous loss of human life, war materials suffered. The Oklahoma and the Arizona battleships were destroyed. The Nevada, California, Tennessee, West Virginia, and Maryland were all extremely damaged or sunk. The day after the attack, President Franklin D. Roosevelt asked Congress to declare war on Japan. Congress clear this with just one uncooperative vote. Three days later, Japanese affiliate Germany and Italy also declared war on the United States, and again Congress accepted. More than two years into the conflict, America had finally joined World War II.The Japanese navy scored a brilliant success and cognizant their ultimate defeat. Before the events at Pearl Harbor, America was divided on the issue of war. More of the country wanted to let Europe word form out its problems by itself, because of the painful memories of the First World War. As tragical as this event was it opened the eyes of American to the reality of the built in bed at hand. Pearl Harbors Attack is a day that will be remembered by American for the rest of time. The lives lost and the soldiers who sacrificed their lives for us.
Mobile Phones: Resource or Distraction in Studies
Mobile telephones a resource or distraction in education Mobile phones argon one of the greatest frauds of mankind. Through his invention he has r for each oned his own world at his fingertips. He has removed the halt of distance between him and the world. But the important question which needs to be answered now is what should be the role of quick devices in the learning abut? It has been a key factor contributing to bad grades, also several(prenominal) health related disorders among students, but on the other hand, mobile devices screw help students with quick explore and provide a vital talk link to their, classmates, and even teachers.Students who do subjects which require field work research pull up stakes need kiosk phones while in the field. All unexampled cell phones whoremonger be used to take pictures in the field, create reports utilize simple word processing applications, save and submit selective information back to their schools. If their school has a remo te storage facility, students underside intimately back up their field work notes, videos and picture on that boniface while in the field. Most mobile phone service providers declare oneself cheap internet subscription packages, so students leave find it easy to go rid of data or make more extensive research online using their cell phone.Both parents and teachers will need to stay in touch with their children and students, so cell phones will make this communication simple. Also students use cell phones to join peer to peer discussions which can help them ask both thing educational during this discussion. This discussion can be hosted on online educational social networks like Piazza. com, this network has mobile phones apps which a student can install and join any academic discussion using their mobile phones. It is very important for students to be in position to learn from anywhere at any time.The education world is changing and many scholars are attending virtual classr ooms. Online education is now becoming so frequent than before, mobile phones have also helped in the growth of Mobile-Learning. Since todays cell phones have more than one application, students will always get distracted in the quest of trying to discover and try aside new cell phone applications. Female students are more in all likelihood to get distracted by mobile applications like Pinterest, Facebook or twitter, and then for the male students, they can get distracted by cell phone game applications or video streaming applications.This continuous distraction will affect a students concentration in the classroom, and it can also distract other students around them. When it comes to exam time, they will haunt to cheating. So they can decide to scan their notes on their cell phones or use text messaging service to cheat exams. Then few students can Google exam questions and copy whatever they find online, and in most(prenominal) cases this data published online is not correc t which results into exam failure.This trend will only increase, and its up to parents and teachers to balance the pros and cons of using cell phones as while of the learning process. While on that point is no single solution, perhaps there are lessons to be learned from the early internet era. The internet was at first seen as a new frontier with dangers lurking behind each click, whereas today schools and parents have universally embraced the web as a specialty for research, education and efficient communication. With appropriate safeguards and reasonable policies, perhaps cell phones and web-enabled bruise phones can run a similar course.
Wednesday, February 27, 2019
Elisabeth Kubler-Ross Essay
innate(p) July 8, 1926 in Zurich, Switzerland Elisabeth Kubler-Ross was the oldest of triplets, Erika and Eva of Protestant Christian pargonnts. In 1957 she graduated from the University of Zurich Medical School. She was bring on in the National Womens Hall of Fame in 2007 and the recipient of 20 various honorary degrees finishedout her career. She suffered two miscarriages, and eventually had a son, Kenneth, and a daughter, Barbara. In 1995 Kbler-Ross suffered a series of strokes which left her partially deactivate on her left side. She died in 2004 of natural causes.Upon reading Kubler-Ross book, Questions and Answers On termination and Dying, I found that it is set up in a interrogative mood and answer/advise format. The questions evolved from various formats, such as workshops, lectures and seminars. It is her belief that the bear on of anxious(p) or learning one has a terminal complaint processes in five stages denial, anger, bargaining, depression and acceptance. After reviewing my own experience with the toss of my son in 2000, I believe her hypothesis is correct. If much caregivers offered numerous type of this psychological counseling, m either citizenry could possibly deal with remnant and destruction a little easier.During her work and inform missions, she found that many people, including families, and doctors, either avoided give tongue toing with the dying person or didnt issue what to say to them. By addressing this problem through seminars, lectures and books her hope was to familiarize family, care-givers and professionals with what dying people are thinking and feeling. By being familiar with around of the issues, denial of end would hopefully pass and the patients wouldnt feel so alone in the dying process. It is noted in the book, that often multiplication the terminally ill person doesnt really want to talk about their impending death. The want to talk about tomorrow.What are the plans for tomorrow, what will the weathe r be tomorrow indicating they still often die hard a glimmer of hope for survival or an after-life. She often referred to death as thegreatest closed book in science. I would have to admit with this in certain situations. Although as human beings we know we will not live forever, we know some will pass away through terminal illness, some will die by accident the mystery begins to enter when we question When and Why.Her lifelong dedication of helping the terminally ill, as well as their families and friends to deal with loss and death lives on through the Elisabeth Kubler-Ross Foundation, established in her name in 2004. This foundation is volunteer based working mainly with the ideal Kubler-Ross established during her lifetime. The foundation presents options to dying people such as in-home nursing care so people can come to their final rest in a more comfortable environment often times with their family and clergy at their side. Kubler-Ross dedicated a large portion of her lif e volunteering for various entities. The first noted was at the age of 13 she volunteered to help Polish war victim at the beginning of land War II. This lead her to become active with the multinational Voluntary Service for Peace, which was also established shortly after World War II. This group currently has over 3000 voluntary projects worldwide. Kubler-Ross research, volunteerism and theories is her legacy to any and all facing death, including the patient, the families, the doctors and scholars.Reference1) Elisabeth Kbler-Ross Foundation website2) Elisabeth Kubler-Ross. (2014). The Biography.com website. Retrieved 0749, Apr 28, 2014, from http//www.biography.com/people/elisabeth-kubler-ross-262762.
Cosmetology and College Search
When wanting to be a good Cosmetologist that person has to have good feat ethical motive as in being self-motivated with their work. Cosmetology c atomic number 18ers are jobs that help mortals appearance tint better over time as the sensory tomentum cerebrisbreadth is done by a licensed worker (An access to Cosmetology). For someone to be a good cosmetologist he or she has to have a creative mind and has to be a friendly person (An Introduction to Cosmetology).When that worker is working with someones hair, the main thing to consider is to ask the client how the hair is going to be cut and the book of instructions of that person always needs to be followed in order to concord the customer. Cosmetology workers can earn lots of money if taken the right agency to succeed their possibilities in the future.The general tasks a hairdresser may do daily and many more could include keeping work station kept clean at all times and cleaning hair accessories after each use, being sur e to ask the customer what hair style they would like and follow their instructions on how they want it, look at the hair and give the customer a couple of ideas on how the hair style could look, picking up the phone and winning customers calls and scheduling appointments, going through all files and making sure they are updated with all the customers correct information, being on cash depict duty to take the customers money from them, selling hair care products is a major component of this career and cosmetologists like to show customers before they appropriate the beauty shop and demonstrate the items that would work best with their hair for them to sell. (College Search and training Guide).A cosmetologist can make an reasonable of $11. 21 an hr and make an average of $43,250 a year (College Search and Planning Guide). In order for a worker to make this much they usually have 40 hour workweeks. In the United States, there are about 349,210 hairdresser/cosmetology jobs offer ed to pot in interest of being a cosmetologist(College Search and Planning Guide). The work environment for hairdressers is 99% always clean to satisfy a customer in their own personal salon or someone else that owns that salon (College Search and Planning Guide).
Tuesday, February 26, 2019
Compare and Contrast Wwi and Wii
identicaln/Contrast Essay Ever since the dawn of mankind there comport been wars. WWI and WWI were two of the near lethal and devastating wars in our history. In two wars, the Allied Powers defeated Ger legion(predicate) in hopes of terminating German expansion and dominance. Although somewhat similar, WWI and WWII were drastically different from each other. WWI was caused by an issue amongst countries for ascendancy of colonies, territories and resources. WWII began payable to nationalistic tensions and unresolved issues from WWI.The Great warfare or the First populace War launched the transformation of the world, but not until after the Second humankind War was anything really accomplished. WWI and WWII were similar in that they twain exceedingly devastated many countries of the world. In both wars, Europe was destroyed. People were left homeless tilth and industry were eradicated. Germany was also broken up as a resolve of both wars. After WWI, Germany no longer had c olonies, and they lost the Alsace-Lorraine territory that organize Poland.After WWII, Germany was divided up into four zones run by the Allied Nations Britain, The fall in States of America, France, and the U. S. S. R. They did this to make sure that the Nazi party would not gain control again. The total expenditure for all countries involved in both WWI and WWII was colossal. Countries like Germany, Britain, France and Russia suffered tough stinting problems after both world wars. In most European countries prices increased greatly after the wars. international trade in Europe declined and therefore created an obstacle in their economic recovery.Unlike Europe, the coupled States was change by both wars. After both WWI and WWI, serenitykeeping organizations were set up in hopes of guaranteeing political independence and territorial integrity for all countries, enormous and small. The League of Nations, established in 1919 under the Treaty of Versailles, promoted international corporation, peace and security. The League of Nations halted all activities after failing to proceed a abet world war. The get together Nations, an international organization set up in 1945, was aimed at international security, social progress, economic development, human rights and world peace.Fortunately, the United Nations so far has prevented another world war, and still plays a indispensable role in international peace to this day. The Allied Powers won both wars and successfully hindered countries like Germany and Japan from causing any more(prenominal) unnecessary demolition to the world. WWI and WWII differed in that they were initiated differently and WWII had a more profound effect on the world population, economy, and culture. WWI was caused mainly by imperialism. Increasing competition and desire for large empires led to an increase in run afoul that pushed the world into the Great War.WWII was virtually an extension of WWI. It was caused by unresolved issues be tween countries as a result of the First World War. Although both world wars were devastating, WWII was the deadliest multitude conflict in history. By the end of WWI, it is estimated that nearly 10 million nation died. At the conclusion of WWII, the death count exceeded 78 million. Forty to fifty civilians were killed in WWI, and almost half of them were due to war-related disease and famine. The total military deaths in WWII were as many as 25 million. WWII was a globular conflict, whereas WWI was fought over approximately one hundred miles of territory.Up until WWII, Europe remained dominant politically and militarily. But after WWII, Europe was split and two new superpowers emerged the United States and the Soviet Union. The financial cost of the two world wars differed drastically. $334 billion was fagged during WWI and $4. 1 trillion spent during WWII. After WWI, few attempts were made to prevent economic distress. But after WWII the World Bank, International Trade Organi zation, International Monetary Fund, and the Marshall Plan were created in order to counteract economic decline.While WWI and WWII have their similarities, there are so many more differences between the two. Both wars left Europe destroyed, caused widespread economic distress, and were won by the Allied Powers. On the other hand, WWII and WWII began for very different reasons, and WWII had a more substantial effect on our society in terms of peacekeeping measures, deaths, and financial cost. WWI was the beginning to the tragic Second World War which changed the soma of the world in its entirety.
Dr Jekyll and Mr Hyde coursework Essay
In the novel, Dr Jekyll and Mr Hyde which was written by Stevenson in 1886, a doctor cognise as Henry Jekyll is curious to know if it is possible to separate the 2 sides of hu military man temper, right(a) and sin. In his basement he creates a assortment to try and this is were Mr Hyde is introduced to the story. Jekyll drinks the potion and transforms into Hyde. Hyde is a prime example of pure evil, the complete contrary of Dr Jekyll but later on he is taken over by Hyde and it shows through him wanting to transform again after either of the crimes connected by his dark side. Stevensons objective for the novel was to get the ref to understand that nobody is perfect and everybody has a dark side to their personality.The twee era started in 1837 and ended in1901. This was how long Queen Victoria rule for. Society in London was very posh and rich during that era. In the novel Dr Jekyll is one of these rich people. Although London was said to be a civilised place there wer e actu eachy a few criminals who committed horrific rapes, decapitations and murders. Jack the ripper is one of them. This side of society back thus represents Mr Hyde. London back then had dark mist overy nights and some rainy nights, identical to the nights described in Jekyll and Hyde.nine in the morning, and the first fog of the season as the cab drew up before the cover up indicated, the fog lifted a elfin and showed him a dingy street.The cathode-ray oscilloscope is choosing Mr Uttersons path. The setting gives a picture that evil is trying to take verboten Uttersons path, luring him into evil. The Fog gives the audience an airy and tense atmosphere. You receive that anything could happen and that evil is lurking somewhere beyond the fog but it is undetectable. respectable like Mr Hyde, whatever will happen next is unpredictable. at that place is in any case a sense of suspicion as the fog lifted a little and showed him a dingy street. We delight in why the fog sho ws him a dingy street which is most likely infested with evil beings and we also wonder if Mr Utterson is wandering into a trap and this intensifies the suspence.Evil masterminds argonnt great(p) and this shows when Hyde reckons into the reverberate for the first time for the audience to chance upon.He is not easy to describe. There is something wrong with his appearance, something displeasing, something downright detestable. I never saw a man I so dislikedHe sounds like a dreaded monster, deformed and gives the woman a feeling of hatred when she sees him. Most villains look discomforting like the ones in movies. Jekyll on the other hand is the complete opposite, handsome and liked by the women in the novel. This shows the difference between the good and evil in the novel and contributes to Stevensons objective of getting the reader to see the difference between good and evil.Hydes actions are animalistic and he shows a sign of super gentleman strength when he beats Carew so ra pidly his cane snaps and Carew dies. This emphasizes his anger towards Carew and this unprovoked attack is so brutal, it makes the make at the window faint from shock.and at that Mr Hyde broke come in of all bounds and clubbed him to the earth. And next moment, with ape-like fury, he was trampling his victim under his pluck and hailing down a storm of blows, under which bones were audibly shattered and the body jumped upon the roadway. At the horror of these sights, the maid fainted.This description shows how relentless Hyde is and he doesnt hold back his anger and lets loose a flush of bone shattering blows. It is clear to the audience that he has channelled his anger into his fleshly strength then unleashes is all on Carew and the fact that Carew is beaten to cobblers last further expresses his anger and hatred towards Carew. His actions gives us an insight of what he is physically equal of doing and also makes us wonder if he is a human or a savage beast with intense streng th.Back in those times reputation was a key factor to a headspring known wealthy persons life and Hyde lives on a dull dingy street whereas Jekyll lives in his humble abode to forfend being found out by Utterson and Enfield. They both are suspect about Jekyll and want to find him out but they are unsealed if they should ruin his reputation, so instead they keep a close centerfield on him and ask him a few questions. The information they find out they want to keep to themselves beca example they dont want to ruin Jekylls reputation in case he is innocent. Utterson and his acquaintance Mr Enfield do all they can to identify who Hyde really is. What gets them thinking is when Hyde tramples calmly over the little girl and Utterson wants Hyde to pay 100 compensation and when he does, they realize that it is subscribe by Dr Henry Jekyll but they both promise never to gabble about the case again, so they dont let it out into the public.Hyde is able to stay hidden from the two lawyer s because of the neighborhood he lives in. The area is dirty, dingy, smelly and full of the low classed people. This way Hyde can keep a low profile and high status people wont voyage into this area and spot Hyde. He blends in with all of the citizens there. The women are poor and very savage and referred to as Wild harpiesAnd all the time, as we were pitching it in red hot, we were keeping the women off him as top hat we could, for they were as wild as harpiesThis quote emphasizes the violent side to these women. They establish unleashed their dark side, just like Hyde was unleashed from Jekyll and when Hyde gets into trouble, a woman laughs and says he deserves it. This noblewoman shows her dark side and no remorse at this comment towards Mr Hyde. This makes you realize that not only Dr Jekyll has an evil side to his personality. This also makes us clear up that everyone has an evil side to their personality.Stevenson presents the evil side of human nature in his novel, howeve r he also captures the good side of human nature and this is shown when Henry Jekyll admits to his own guilt.The pleasures which I made haste to seek my cloak were, as I have said, undignified I would scarce use a harder term. But in the hands of Edward Hyde, they soon began to turn towards false it was Hyde, after all, and Hyde alone, that was guilty. Jekyll was no worse.Dr Jekyll is admitting to his mistakes and he reveals to us that Hyde was his disguise. He is taking function for unleashing his dark side which is Hyde and refers to his actions as undignified. This shows that there is a good side to every human and he has displayed this through revealing that Hyde was to inculpation for all of the crimes committed and that Jekyll (his good side) was no worse.Overall Stevenson has shown us that no human is perfect. Everyone has a darker side to their personality. Good and evil is a stiff part of human nature. Stevenson makes us realise that we are all capable of doing bad thi ngs but all choose not to for a signifier of reasons.
Monday, February 25, 2019
Coronaââ¬Ã¢¢s Bank Essay
Anformer(a) bank vizor shows Coronas millionsChief Justice Renato Corona owns another peso account containing millions, a bank official testified on Thursdays hearing. As of 2010, Coronas Bank of the Philippine Islands account has P12 million, utter Leonora Dizon, branch manager of BPI Ayala Avenue Branch. Senate earlier ordered Dizon to raise and bring Coronas bank records from 2005 to 2010 to be presented as usher for the impeachments Article II, which deals with the truthfulness of statements of assets, liabilities and net worth.The bank manager verbalize Coronas BPI account is still active.Balances at yeargonnd were P149,000 in 2005 P153,000 in 2006 P5 million in 2007 P1.5 million in 2008 P678,000 in 2009 and whence P12 million in 2010. This is apart from Coronas two other accounts in Philippine Savings Bank with a combined completion balance of almost P20 million, as revealed in the impeachment court on Wednesday. In his 2010 SALN, Coronas declared cash asset was only P3. 5 million. last defense counsel Serafin Cuevas asked the Senate to subpoena Coronas bank records from BPI. He wanted to show that Coronas P12 million was not collect to a single deposit but accumulated over several(prenominal) transactions.But Senate President Juan Ponce Enrile, presiding officer of the impeachment court, told both parties to simply go to the bank to examine Coronas records in order to locomote things up.AirAsia Philippines Leasing 16 AircraftMANILA, Philippines Newly licensed AirAsia Inc. (Philippines) will lease 14-16 Airbus 320 planes to service home(prenominal)ated and international routes within 1.5 to 4 hours flight from its Clark, Pampanga hub in the next half(prenominal) decade.The airline business on Wednesday received its commercial air carrier corroboration (AOC) from the Civil Aviation Authority of the Philippines (CAAP) in the latters manilla office.In March, last year, AirAsia Inc. registered with the Securities and Exchange Commission (SEC) t o engage primarily in the business of air transportation in the Philippines and abroad for passenger and cargo.AirAsia Inc. is a 60-40 joint venture between Filipino investors Antonio O. Cojuangco, Michael L. Romero and Marianne B. Hontiveros with Malaysias AirAsia International Ltd., a wholly-owned subsidiary of AirAsia Berhad.The latter won the best low cost airline award for three consecutive years from Skytrax, the worlds largest airline and airport review site.In the coming weeks, we will begin our domestic and international operations using two brand new Airbus A-320s flown in from the Airbus factory in Toulouse, France, AirAsia Inc. CEO Marianne Hontiveros announced.The airline has fully complied with the new crocked process and requirements for the AOC meant to ensure safety conscientiousness in Philippine Aviation.We are committed to make air travel more fun, affordable and fond to all Filipinos, she added.The airline also aims to revitalize tourism and boost passenger t raffic at its hub in the Diosdado Macapagal International Airport (DMIA) in Clark, Angeles, Pampanga.
Econ case study Essay
1) Why is scotch science interchange to an understanding of the problems of plus?It is because that the suppuration of a countrified depends on economic grammatical constituents. Economics help bingleselfs you to interpret how a farming is developing, economic policies of a country that determine whether or not it develops and how fast it develops if it performs. In addition, economics helps you to understand how wealth and finance be distri besidesed, and the causes and set up of embraceing and lending. Problems of increment argon like not having heavy(p) m acey, economics teaches us nearly problems in development and so we notify better interpret these problems to begin with by looking at the economic comp mavennts that define the troubles. Further more than, economics is a amicable science and is concerned with raft and economic development problems as puff up as stemming from battalion so these fields are related and understanding the one helps you bett er understand the former(a) because you can build up a overlargeger effect.5) Why is an understanding of development crucial to policy homework in developing states? Do you recollect it is possible for a nation to agree on a rough definition of development and orientate its strategies accordingly?It is important because, like I answered on question come one, development of a country rely on the economic policies of a country which decide the country is developing or not, and how fast it develops. Depends on what policy formulation the country select, it whitethorn result different ending. In my opinion, currently nations cannot agree on a rough definition of development because intimately of them mother different approaches, measurements and standards. However, I believe in the prox on that point might be a working definition that the nations can agree on and orient its strategies. Like the textbookbookmentions on that point are three basic components that help understa nd the meaning of development which are sustenance, self-esteem and freedom.6. Why is a strictly economic definition of development inadequate? What do you understand economic development to mean? arse you give hypothetical or real ex sizables of situations in which a country may be developing economic aloney but pacify be under real?The Strictly economic definition of development was inadequate delinquent to not taking into account the factors other the financial or economical. I considered that economic development meant financial growth or the increment in yield of exhaustivelys. An example of a country that is authentic economically, but still underdeveloped would leave to be India, which I selected for the group presentations, because it is producing a plentifulness of goods and services, but many of its citizens are living in poverty and theres still a high inconsistency amidst genders.7. How does the impression of capabilities to function help us gain insight into d evelopment goals and achievements? Is specie enough? Why or why not?The capacities to function help us clear insight into development goals and achievements by letting us determine how more than freedom of choice a person experiences in their country which makes it a full measurement of growth. Money is not enough to gain insight of development goals and achievements because notes does not help flock from living long, and it does not guarantee peoples happiness.8. What forces may be at work in giving the Millennium schooling Goals such(prenominal)(prenominal) a high profile in international economic dealing?In my opinion, money forces work in giving the Millennium Development Goals. If a country throw high incentive of money, they can borrow money easier than the other country who does not perform well on money.2. Brazil has special absorb because its growth performance from the 1960s with the1980s was the best in Latin America, with at least round parallels with East Asia n policy and performance (Todaro & Smith, P.28). Moreover, other indicators of development in Brazil lagged, eventually under archeological site growth prospects. After the civil war and gaining benefits from the other Central American countries, it seems that Brazil should select been in a much better position to fight extreme poverty restrict and social equity. Rather, it has impactd to insure an extremely high percentage of its population in extreme poverty in an upper middle income country, and carcass one the countries with the highest degrees of disparity in the mankind.3. Chapter 21) harmonize to the textbook, the problems that close developing countries have in common are poverty, high levels of unemployment and underemployment, scurvy levels of pastoral productiveness and sizable imbalances between urban and rural levels of living and economic opportunities (Todaro & Smith, P. 92). The most significant problem is serious poverty because every person should at least have the most basic needs such as home, basic c rotaryhes and food.2) According to the textbook, low levels of living is the amount of money on average a person makes in a country. (Todaro & Smith, P. 29). In my opinion, low levels of living can exist simultaneously with high levels of per capita income because there might be a few that are earning a lot with the majority of the population earning less. For instance, on 1980s Portsmouth, Ohio and Brazil, which is an upper medium income country with nice levels of per capita with a bulk of its citizens living in poverty.4) In my opinion, among health, persistence productivity, and income levels, there are huge, and strong relationship because I rally grind back productivity decides the income levels, and it in addition affects peoples health. For instant, people can keep an eye on that peoples health is low when labor productivity is low and it comes with low productivity the income levels are lower than the normalcountries.5) Dominance, colony, and vulnerability in their relations with generous nations is that many developing countries do not have any sum of their own that they come to depend on the racy nations handouts and pretty much become vulnerable and dominated. In other words, spicy nations can kind of force the developing countries to do what they want, and make them light if they refuse. For example, rich countries are forcing or suggesting Iran and North Korea to give up atomic weapons by interrupting their economy. Moreover, a developing country is so unequal that it cannot localize and that is where the rich countries come and provide financial aid to make that poor nation depend on rich countries.6) Developed countries produce large quantities of goods, services, and in general do a lot of manufacturing. Countries such as these use science to improve technology and generally have good health care and education for their people. Compared to developed nations, developing countries p ractice subsistence farming and often suffer a miserable income, clo issue, and housing. Only few people in developing countries receive proper health care or education. In addition, and life expectancy is relatively short. Most developing countries also lack the resources needed for economic growth. Also, developing countries primary sector of economic is the major contributor to the GDP of the country. Low GDP per capita is there. Usually exports agricultural goods or inwrought resources and imports value added goods from developed countries.7) The composition of the power reflects dissatisfaction with income as a measure of well-being income is not the entirely argument in a persons utility function. The Human Development Index is an attempt to develop a better measure of well-being. If I human body the new HDI, I want to set up the standard of get entropy from people. Quality and trustworthiness of those data is dis strayable, especially when we get the information from UN non-democratic members. It is because I think it might much better if we have a standard method to get adequate data which shows their own interest for strengthening their credibility and legitimacy.12) According to Jan Kees van Donge, he states that in southeasterly Asia, the transition to sustained growth has consistently been associated with policies aimed at macroeconomic stabilisation better life in the rural sector, increasing agricultural productivity, and ensuring an ample supply of food. In contrast, sub-Saharan Africa initiatives in these directions have in nigh instances been present, but the concurrent pursuit of all three policy objectives has not. early(a) factors that appear to be of nearlywhat lesser importance, but that nevertheless deserve further study are industrialization on the bottom of unlike direct investing systems of politics and governance and cultural patterns as exhibit in policy choices. (Tracking Development in Southeast Asia and sub-Saharan Africa the primacy of policy, par.3)13) According to the textbook, colonial legacy is described as the colonies and institutions that were created and controlled by European and other foreign powers. These colonies and institutions that were created in the developing countries had a ostracise effect on the development of those countries that still continues today (Todaro & Smith, P. 69). The advantage of colonial legacy is that arrangement might be exists. A disadvantage would be that in many cases, these countries or institutions will not rich by its own countrys ability.14) According to the textbook, five characteristics of the developing world are physical and human resource endowments, per capita incomes, climate, population, and historical manipulation of migration. It says that developed countries are more natural resources when the country started to grow were as most developing countries usually did not have a lot of natural resources (Todaro & Smith, p.71). Per capita i ncomes are a lot higher in developing nations than in growing nations. The growth rates of populations in developing rural areas are usually higher canvassd to that of a developed nation.15) The differences between the traditional HDI compare to NHDI, HDI uses arithmetic mean. In contrast, NHDI uses geometric mean. HDI uses GDP and theNHDI re plants that with GNI. Traditional HDI added the three components and apportiond by three. However, NHDI takes the cube root of the product of the three component indexes. In my opinion, NHDI is better than HDI because it gives us a realistic average and the traditional HDI gives us an arithmetic average which is not realistic.4.a. R1=-21%, R2=42%, R3=59%, R4=9, R5=0.87%= 14.42%b. R1=-40%, R2=56%, R3=-90%, R4=0=-44.69%c. R1=-20%, R2=78.12%, R3=91.34%=39.7%5. Chapter 3 (page 136-137) Questions for Discussion 1-61) The structural change sham of Chenery focus on structural changes in the stages of the process of economic change, industrial and institutional structures of acclivitous economies. Chenery research conducted on the transformation of production structure shows that the increased role of the industrial sector in the economy in line with the increase in income per capita is happening in a country closely united with the accumulation of capital and improving human resources (human capital). The neo- Marxist is an indirect outgrowth of Marxist thinking. The main idea is that a disproportionate relationship between the central state which consists of the developed and the periphery is composed of the developing world.The false-paradigm seat is the model that advice or suggestions may mean well but often do not have enough information about the country to be assisted, especially developing countries. For the developing nations, I think thebest write up is related to the situation in most developing countries is the neocolonial dependence model (neo-Marxist). This model explains that economic development on develo ping countries depend on developed countries, especially in direct investment in the mining sector and import of goods produced.2) Dual societies means that rich nations and poor nations at world level are exist and a few rich complemented with a majority of poor people in the developing countries. Thus, dualism is a concept which represents the existence. I think it does not portray the development picture in developing country because it seems like a concept that divide the world into only two part. Development or developing countries.3)According to the text book, it says that different sets of conditions, of which some are superior and others small, can coexist in a given space (Todaro & Smith, p.125). Also, the interrelations between the superior and inferior elements are such that the existence of the superior elements does little or zero to pull up the inferior element, let alone trickle use up to it. These are reason why it is a valid conceptualization.4)According to text book, neoclassical economic theories designed to accelerate the growth of GDP as the principal index of development (Todaro & Smith, p.125). it is valid policy because it is all affiliated to the False-Paradigm Model and a policy of autarky.5) I do not think that there is a single unified possibleness that explain the one country. Including the economic theory, a situation should be explained by the several theories arising from discordant branches. Also, we can observe that there are many factors which are put into the section of output or input.6) Even though the free-market theory and the dependence theory indicates the opposite meaning of explaining the market, in my opinion, neoclassical, free-market theory is not needs incompatible with dependence theory. In case of the rich countries or the country, which is developed country yet it was developing countries at past, both free-market and dependence theory is needed to explain their economic status.6. Chapter 4 (page 195-19 6) Questions for Discussion 1-101) Actions can be taken by one agent reinforces incentives for others to take similar actions. With triple Equilibria graph, there are pressure which hit sense of residue point. Also, one equilibrium to other points there are demand shock, supply shock and organization interruption which indicates the metaphor of economic problems. For example, on our daily life basis we can observe the invisible hand in the market which means that government makes close for economy and affect our life.2) According to the PowerPoint, indivisibilities in amounts of investment imply a region of increasing returns to scale, as in the inflexible costs of the wide-ranging push model. Once again, increasing returns plays a constitute role in generating multiple equilibria. This is related to how the investment works with big push model. In case of O-ring model, investment is one of the outpour sector which effects the formula. It was hard to find the limitation in o ring model, but I would like to say and would like to ask why q is only between zero and one. It can be the limitation points of O-ring model?3) I do not think that developing countries can ply all of the traps described in this chapter. Especially developing countries cannot escape from the poverty trap because poverty fuels move the poverty. It is happening in underdevelopment countries. Therefore, if a country is in poverty trap and try to escape, they should have positive information externality from development countries. In case of development countries, it is still hard to escape the poverty trap but it is movable than the developing countries.4) High levels of inequality lead to lower rates of growth and development because it makes rich countries more rich and poor countries poorer. If there is a high level of inequality on growth and development rate, it supports the poverty trap, which is the most difficult thing to get out of the trap, to develop.5) In case of central planned market, such as public ownership of resource and governing board that makes decision for economy. If government interrupt the free market and give pressure to equilibrium point, it makes new prices from government. Also, it leads to a lack of private investment. Finally, the market might have a failure results.6) In my opinion, low level of trust of people outside ones extended family is related to information externality. It ceaselessly better to accept positive information. Also, it is connected with the Haussmann-Rodrick-Velasco Growth Diagnostic conclusion Tree theory. In case of low levels of private investment and entrepreneurship, it may causes low return to economic activity and high cost of cash in hand which cause low social returns and market failure.7) O-ring production function is complementarity between workers skills. Therefore, we can find O-ring production on our daily life where the place indeed high technology or the workers skills. For example, if the manufacturer of IPhone 6 has more significant skills, the price may different.8) I think the two approaches cannot be used together to inform each other. If I assume that logically cohesive model with strong assumptions is the big push model, the other theories, such as O-ring model can supports the limit of the big push. However, in my opinion, the two approaches cannot be used together to inform the like situation at the same time. Because there might be some overlap sections and limitations between two theories.9) As a reader of chapter 4, The largish Push model described in this chapter is useful in throw away additional light on the nature of problems considered. It shows market failures lead to a need for public policy intervention. Moreover, it is more efficient for economy because it assumes that stainlesscompetition with traditional planetary houses operating, limit pricing, monopolist with a modern firm operating. If there is an intertemporal, urbanization, infrastr ucture and training effects, a big push may necessary.10) According to my research,Egyptian reforms launched in 2004 appear to have focused well on the most critical constraints-reducing red tape and tax rates, and improving access to foreign exchange-thereby getting a strong growth response out of a limited set of reforms. However, inefficient bureaucracy remains an important obstacle to higher growth and reforms in this area should continue to have high payoffs. Ongoing reforms are also addressing constraints that are belike to become binding soon (or have become so already), such as inefficient financial intermediation and high public debt. Improvements in education may rapidly become a critical factor for sustaining higher growth ( Enders, Klaus-Stefan, sec.1).
Sunday, February 24, 2019
RSO Marketing Proposal
executive Director Marketing Professor Executive Summary The Rockford Symphony Orchestra is one of the leading cultural institutions n blue Illinois, performing over sixteen classical and pop concerts annually. The RSI was founded in 1934 and structured in 1943. The ROOKS first MusiC Director and Manager, A Arthur Sack, led the orchestra for twentys years. During this time, the Rockford field of operation Youth h Symphony Orchestra and the Rockford Symphony Orchestra Guild were established.The RSI continues its commitment to fulfilling its committee to lead in the creation of vibrant musical e experiences that the enlighten, educate, and entertain. (History, n. D. ) The RSI is celebrating its 80 anniversary and wants to reinforce the longevity of the organization by introducing their rich R oxford history into various music and performances for the 20142015 season and beyond. The RSI is also looking to bring forth a closer tie to the Rockford community. The organizations 80th an niversary needs to be leveraged in order to increase ova rural just the ticket sales.The long and acidulous winter of 20132014 was a major challenge the RSI faced making it tall(prenominal) to reach their revenue goals. Ticket sales were 50% lower than their budgeted goal as a result. A brief evaluation of the Rooks strengths and weaknesses has served as a off notation the towards the strategic analysis and a marketing invent for this 80 anniversary celebration and the future of the organization. The plan is to focus on bringing more awareness t o the community, the creating various ship canal to promote the 80 anniversary this season and increase overall ticket sales.
How does Shakespeare make Lady Macbeth into such a Dramatic Character Essay
Creating a cite comparable brothel keeper Macbeth who is ahead of her time, domineering and so far international from the 16th and17th century stereotypical women, is a fantastic achievement for Shakespeargon. chick Macbeths char proceeder is non too dissimilar to that of a entrance as umpteen aspects of the things she does and the language and imagery she uses be stool led me to cogitate that she whitethorn well be one. This could well have been the response if a Jacobean audience, T here(predi roame) are also frequent times when she appears to shoot the breeze on spirits.At the time when Macbeth was written the public were becoming progressively pre-occupied with witchcraft. A law was even put in place to ostracize it. It was also estimated that at least a staggering 8,000 witches were burned at the stake just in Scotland between 1564 and 1603 (which would have supported the Jacobean view at the time). As witches were used in the play it would have make it all the mo re than intriguing to the audience and to James I. another(prenominal)(prenominal) point of attraction is the particular that dame Macbeth appears to have some witchlike features, or that she could be working in sync with them. This only adds another fascinating dimension to her character and so would have broadened her appeal as a dramatic character at the time.When Macbeth was written, women were gestated to be inferior to men. skirt Macbeth contrasts to this belief in legion(predicate) right smarts. She, for example, has more direct everywhere Macbeth than he has of her. She also seems able to realityage and manipulate effectively and uses these skills in act 1 fit 7 she does a great job of persuading Macbeth to go through with the eat up of Duncan and in act 3 chance 4 when she attempted to stop Macbeth from giving away that he take outed Duncan.I also believe that the impact of the witches, especially at the very reservoir of the play furnishs an excellent buildi ng block for her to manipulate, control and domineer him. atomic number 53 of the most important factors in being able to control Macbeth are the witches. Without the information and ambition that the witches feed him, dame Macbeths persuasive spots wouldnt be anywhere near as effective. In addition peeress Macbeth seems to be undecided whether she is good, evil, somewhere in between or thusly what ulterior motive she has. Maybe she ac go to bedledges she is human after being interpreted over by spirits, but ultimately she cannot defeat her humanity. bird Macbeths portrayals in the Polanski and Estate acquire version contrast greatly. In the Polanski portrayal, Lady Macbeth is seen to reflect the way Shakespeare mean her to manifest. She also is seen to be devious and designing just as Shakespeare intended. However in the Estate version, Lady Macbeth gains kind-heartedness from the audience and we are certainly more sympathetic towards her, because as the film indicates s he wooly-minded her child earlier in life. This is also why many characters in the film look upon her polarly in comparison the Polanski version.The endorse we have of Lady Macbeth being portrayed in two different ways shows what an impressive, dramatic and intriguing character Shakespeare has created, and Im sealed that numerous other interpretations can be made, and entrust be made in the future.The very first time we are introduced to Lady Macbeth is when she has online a letter from Macbeth informing her about what the witches had told him. What is interesting is that she never dwells on the letter for a moment. She just bring d testifys straight into devising a way of how to get Macbeth to be king (and of course herself queen) by killing. She immediately knows he isnt capable of committing the murder as she asserts Its too all-encompassing of the milk of human kindness. Using the work milk fashion she views Macbeth as young or inexperienced and definitely incapable o f murdering Duncan. alike it initiates a sense of images connected with motherhood and femininity.She then does on to say I pour my spirits into thine ear which is a reference to the fact that shell have to use her persuasive causes to work him.It is immediately clear Shakespeare intended to give her world-beater, and the way she has already started to devise a plan straightaway in her mind is astonishing. She clearly commemorates she is steady already when she says Under my battlements. In Lady Macbeths mind the Macbeths castle is hers. This view is entirely in contrast with events at the time as any regular stereotypical woman in this time period would never aver to own her keep ups property.We as an audience already know that Lady Macbeth is an extraordinary plyful woman. But she thrives for more power. When she says Unsex me here this means that she feels restricted and wants to have mens power. She may also believe that a woman can only have so much power and to g ain more she would have to sound a man. I believe she feels jealous of Macbeths power and longs to feel what it is like to me a man like him.Immediately when Macbeth has met his wife after sending the letter, barely any pleasantries are exchanged and she quickly sets upon hideing him. Lady Macbeths frizzly innovative thinking has already devised a plan to kill Duncan and she wastes no time in unleashing it upon Macbeth Duncan That croaks the fatal entrance of Duncan. She has concocted that the murder will be covered up And pall thee in the dunnest smoke of hell and that the murder will happen under the Blanket of dark. She also tells him that she will poison the guards in order for him to get to Duncan And take my milk for get at.The way Lady Macbeth has already pieced together a plan of how to get herself into the powerful position of queen so rapidly is a select example that power and domination are the main features of her existence. She clearly thrives on power and her fin ishing statement in act 1 scene 5 only underlines this fact Leave all the rest to me. She is verbalize Macbeth that she has complete control over the situation and that instead of her relying on him, he can rely on her. This would be shocking to the audience as it challenges beliefs about societys personas at the time.Although Lady Macbeths plan seems win over, Macbeth is let off a bit wary of it. He puts forward the view that doing more than what is natural for a man to do, no longer makes him a man. In other words it would make him unnatural as it could almost be construed that Lady Macbeth is trying to mould Macbeth and make him into a somewhat preternatural character. Although we know Macbeth kills Duncan, he may not have done so if it had not been for his love and affection for his wife, as in the letter he wrote to her he called her My dearest partner of greatness. We also know that he trusted her with his life, as if the letter he had written to her had been seen by anyb ody else it may have been seen as treasonous. Without Macbeths love and trust for his wife Lady Macbeth may not have been able to persuade him to commit the murder.In act 1 scene 7 Lady Macbeth hits her husband where she knows it will hurt by making him feel like a coward when she continues to pelt my spirits into thine ear and she says mockingly Poor cat. The image of the cat is designed in to re-inforce the fact that Macbeth is being cowardly for having second sentiments over the murder of Duncan. Another even more damaging persuasive proficiency Lady Macbeth uses is to insult Macbeths manhood. When Lady Macbeth says When you durst do it, then you were a man it appears to demolish Macbeths futile attempts to convince himself that he shouldnt murder Duncan by mocking his masculinity and contrasting it to her commitment to him. AnxietyLady Macbeth seems hell-bent on persuading Macbeth to murder Duncan, but could she have done it herself? She claims Duncan looked like her father so she couldnt do it. But she also give tongue to she would kill her own baby if she had to I would while it was smiling in my face. I think she isnt quite as powerful as she appears on the surface and she is too scared herself of the consequences of killing a king. Although if this was the case it would be ironic as the guilt of Macbeth killing Duncan affects her a lot more.On waiting for Macbeth to commit the murder, Lady Macbeth is triumphant and gossamer and is confident having played her part by drugging the guards. Here Macbeth makes a foolish mistake by bringing the two bloodstained daggers sand from the scene of the crime. Lady Macbeth quickly notices his mistake and decisively orders him to put the daggers beside the drunk guards. Macbeth is too overcome with the fear of guilt to do this, which forces Lady Macbeth to endure out the deed for him. Without Lady Macbeths readiness of mind and position of purpose, Macbeth may have been exposed. We see Lady Macbeth has the ini tiative and grasps the situation save after persuading Macbeth to murder Duncan she has turned a great warrior into a punishable wreck.After Duncans death Macbeth kills the guards in a false debunk of loyalty, however Macduff questions this and although Macbeth justifies his actions it still seems unconvincing. Lady Macbeth conveniently faints after seeing the light bodies. I believe she fakes to faint as she is afraid that Macbeth wasnt convincing and this provides the perfect way to draw the attention away from Macbeth. Nevertheless I believe that Lady Macbeth may be genuinely blow out of the water by her husbands quick ruthless actions and maybe before she thought that he wouldnt be capable of murdering again. She may be shocked at what he has turned into, and not realize how omnipotent she has been. Also, with Macbeth playing so spontaneously this could be conceived by her as him challenging her powerLady Macbeth becomes uneasy as her husband seems to spend his time compl etely Desire has got without content. She is also not loveing her new found role as queen. It seems the position she so wanted in life hasnt lived up to her high standards. When Macbeth eventually does see her she pretends she is at ease with the current situation. In addition in this scene Lady Macbeth begins to lose her power over Macbeth and from her being so dominant now the situation and eternal rest begins to shift. He is beginning to formulate a plan without her, but he wont tell her what it is. Macbeth despite calling her Dearest chuck clearly feels he doesnt need her. Whereas in the first act, Lady Macbeth is overpowering Macbeth, now their roles have changed.In act 3 scene 4 Lady Macbeth grasps control over the situation for one last time. Banquos ghostwrite ironically occupies Macbeths seat as Banquos descendants will do the throne. Only Macbeth can see the ghost and he is terrified. Lady Macbeths quick thinking to draw the paste to a close and dismiss everyone is anot her example of how much influence she has had throughout the play, and without her Macbeth surely wouldnt be in the position he now currently finds himself in. However he seems to only talk of himself solo For mine own good. He even admits that he wants to lower the witches again. Lady Macbeth results in keeping Her state which means she is going to pillow and sit on the throne. On the throne is where she should be able to enjoy her role as queen but it somehow feels hollow and assoil for her without Macbeth by her side. And maybe it is no wonder that Lady Macbeth begins to question what has become of her.In Macbeths castle at Dunsinaine a doctor and a waiting gentlewoman discuss their patient, Lady Macbeth. Lady Macbeth is sleepwalking and it essential finally dawn on the audience that she has lost all control and is on the verge of insanity as sleepwalking was seen as a supernatural sign of being possessed. Earlier in the play she tell Whats done is done meaning she is sugge sting that killing Duncan would not be of concern once it had been accomplished. However now whats done is not in the past put present in her mind. She now goes on to say Whats done cannot be undone Which is the complete mated to her earlier statement.She says Who would have thought the old man would have so much blood in him? while in her dream-like state. I think this means that she didnt realize so much guilt would overwhelm her after Macbeth had murdered Duncan, also that she didnt think there would be so many deaths after they had killed Duncan.What is fascinating about Lady Macbeths situation now is she set about trying to influence Macbeth and it appears she has influenced herself into her own death. Lady Macbeths death could almost be viewed as a sacrifice for Macbeth. She may have felt that she was becoming a heart and soul for him and that he would do better without her. Furthermore she could have killed herself as she had lost control over herself and more importantly o ver Macbeth, who seemed to be playing spontaneously without her dramatic impact over him. Macbeths reaction may also come as a surprise to the audience as when he says She should have died hereafter it feels like he is being unpremeditated and has more important things to worry about than his wifes death. Or does the word hereafter suggest he may dwell and bewail over the matter later?In conclusion the dramatic power of Lady Macbeth is at first influential and rewarding to her and her husband, but then spirals out of control. Shakespeare has created an iconic and revolutionary character and one who seems to have numerous personalities on-the-go at once. At first she seems supernatural with her uncompromising desire for her husband to take the throne, but then she shows aspects of humanity- she would have killed Duncan herself if he hadnt have reminded her of her father. Finally, it seems that Shakespeare created the characters of Macbeth and Lady Macbeth to compliment each other. As when Macbeth is weak and hesitant, Lady Macbeth is strong and dynamic when Macbeth is diligent and determined, Lady Macbeth is tormented and slowly disintegrates. Without the relationship they provide for each other they wouldnt have got to the stage of their downfall.
Saturday, February 23, 2019
Blood Bank Management
Abstract The purpose of this give the bouncevass was to develop a line circumspection discipline dodging to assist in the focus of line of merc yieldise bestower records and ease/or go the distribution of family in various parts of the country basing on the hospital demands. Without dissolute and timely rile to sponsor records, creating market strategies for declivity grant, lobbying and sensitizing of ocellus conferrers becomes truly difficult. The p atomic n coffee tree 18ntage circumspection reading brass offers functionalities to quick attack to bestower records collected from various parts of the country.It enables monitoring of the results and performance of the transmission line bequest activity much(prenominal) that relevant and measurable accusings of the organization rotter be checked. It offer ups to heed timely, confidential and secure health check reports that facilitates planning and conclusiveness do and thusly alter aesculapian armed service deli genuinely. The reports generated by the dust give answers to most of the ch wholeenges worry faces as far as agate line presenter records ar concerned. Chapter 1 1. 0 INTRODUCTION 1. 1 primer coat to the Study rail line giver Recruitment (BDR) is the attend to of drawing p benthood from a unpaid dividing line giver (BD) for future melody transfusion, Wikipedia (2006). In Uganda, root army, preventative and trouble is an activity that is carried out by Uganda cherry-red target party (URCS) in partnership with Uganda stock Transfusion (UBTS). Founded in 1939, URCS is part of the human wide florid grouchy Humanitarian Movement whose missionary station is to rebound the power of humanity for improving the lives of the vulnerable in Uganda, Muller (2001).URCS ful carry throughs this mission while adhering to the principles of impartiality, neutrality, independence, unity, universality and voluntary service for the expiration Cross/ deprivatio n Crescent Movement. It operates without Uganda with 45 branch offices. Besides providing adequate tag on of ph truth line for transfusion, URCS is involved in the first aid services, road dependablety, tracing, contingency mitigation/prep atomic number 18dness, mobilization for routine immunization, HIV homec atomic number 18, youth empowerment and conjunction base HealthC ar (CBHC).URCS had a manual remains using idea cards to recruit BDs, collect/keep argument presenter records and hand out results to BDs who atomic number 18 scattered throughout the country. The paper card scheme (PCS) utilise to specific tout ensembley capture someoneal data and medical history of the BDs. This entropy would be procedured in hearing/locating alive BDs, carrying out pre- donation counseling and taking neckcloth results. Unauthorized persons however, easy accessed the paper clay and hence making it impossible to keep hiding and confidentiality expected of medical record s.The security of the medical records was alike non inadequate as whatever person could easily access them. Lukande (2003), states that such a ashes is time consuming, prone to h solelyucinations of origination and abstract resulting from the fatigue of the substance absubstance ab substance abusers. The PCS at URCS had lead to aggregation of sensible paper cards due to increasing number of short letter bestowers, a situation that frustrated the body users because of the delays and at times reverse to access historical records. The safe strain policy was wanting(p) at URCS because the PCS could non cater for the secernate attributes of the policy.Gerard (2002), states that the primary(prenominal) principles upon which the safe crinkle policy is based on ar the informed consent, confidentiality and secrecy of the BDs. The Ethiopian Red Cross Society publication, Development in the 1990 states that data from blood donors should be completely confidential and if this is non as sured, pull ins of the blood donors should not be record at all and/or an alternative record appellation should be utilise. Full implementation of the safe blood policy has called the use of education technology (IT) in providing scoreing source to the identified challenges.The associated problems with the PCS include delays in accessing historical records, inconsistencies and hallucinations in data entry that stem ripe(p) from acquisition of data from the blood donors because the exercise is of routine nature and real tedious to the system users. The automation of the system using modern IT has modify the part of service. Secondly, with the use of IT, now relevant and timely blood donor reports tin hindquarters easily be generated and hence facilitating planning and decision-making.Scolamiero (2000), recommends blood donor services automated beledge system as a resolution to routinely collected, accurate and readily available information in blood t ransfusion services. It is as headspring as important to vizor that the impact of information technology on organizations is increasing as new technologies evolve and existing ones expand. concord to Clifton (1995), nearly all business executives say that information technology is spanking to their business and that they use IT extensively.Certainly business executives main concern is planning, coordination and decision-making, therefore, the role of IT in enhancing management of blood donor records is of major importance. In all, the computerization of blood donor PCS at URCS came at the ripe time apt(p) the soil to the situation. This is more than so because the demand for safe blood in Uganda has change magnitude due to soaring increase in total population. therefore, modern substance to manage the PCS using IT had to take route. 1. 3 General ObjectiveThe main objective of the study was to create electronic blood donor management information system in purchase order to assist in the management of blood donor records, planning and share information in a more confidential, convenient and secure way using modern technology. pic 1. 3. 1 ad hoc Objectives To conduct a study on blood donor management To blueprint an electronic blood donor management system To clear the be after using a prototype 1. 4 Scope The study geographically limited itself at the URCS blood donation/collection centers.It center more on the acquisition, distribution and management of blood units for BDR activities. The study curiously empha sized the first appearance and implementation of an electronic management information system that automated blood donor data acquisition and dissemination of results. This in turn allow ease and speeds up the planning, decision-making process because of the timely, secure, confidential and good reports. 1. 5 Significance of the Study This study is important to URCS and the blood donors because it aimed at addressing problems of secur ity, secrecy and confidentiality of blood donor records.It besides strived to check the delays, errors, inconsistencies in medical records and timely access to historical records all of which had far fetched impact on planning and decision-making. The study resulted into the next proceedss It has eased the control and distribution of blood in various parts of the country basing on the hospital demands. URCS can now create market strategies for blood donation, lobbying and sensitization of the blood donors. modify data acquisition and quick access to medical records by the efficacious users of the system go away be assured. picIt has eased the monitoring of the results and performance of the blood donation activity and hence relevant and measurable objectives of URCS are checked. It go away continue to improve on the planning and decision-making process by providing to management timely, secure and confidential medical reports related to blood donation. It will also improve m edical service delivery due to timely and clear generation of management reports by the relevant entities. The study will benefit the URCS management, who will find it easy to strategically plan, coordinate and take decisions concerning BDR activities.URCS counsellors on the early(a) hand will be able to keep confidentiality of the donors results and disseminate blood results to donors with ease. Meanwhile that is the object lesson, the automation of the data collection process will simplify the work of the data clerks. Equally important, the blood donormmobilizes will be render strong grounds for laying sensitization strategies between regions thatmyield more blood units and those with less. The study also has formed supercharge purlieu of knowledge for students who whitethorn wish to take re calculate in blood donor management. 2. Blood Donor remainss Challenges and Successes The blood donation service involve a series of mutually beneficial operations such as donor regist ration, donor screening/evaluation, blood collection, blood screening, inventory management and blood dissemination. nearly of the popular existing blood information systems in the horse opera world today are mainly online systems. The systems interfaces do not meet skillfuly the blood safe policy described in this study and as such not sufficient for illiterate population. Most blood donors in Uganda are hobnailed based where online systems ay not be the best. The level of computer literate among the blood donors in Uganda is growing because the mass of them are school students. The main challenge remains customizing interfaces that are suitable for capturing basic donor information. whatever of the attributes on the interfaces use in the western world such as state and province are not applicable in Uganda. Tripura blood donor information system is a good example of the blood donorsystem that is not suitable for Uganda. Also some(prenominal) key attributes such as age and sessions in picUganda are lacking on most the interfaces drawed. The interfaces also are not user-friendly as there are m all links within the system that can easily confuse the system users and hence leading to data entry errors and boredom. At the Macau blood Transfusion Centre, system Integrado de Bancos de Sangue (SIBAS) works as its solution of computerized blood bank information system. SIBAS complies with the invitee/server infrastructure, as does its client, and provides an integrate environment for those isolated but interdependent operation in the blood center.With the ledger entry of the SIBAS the blood service at Macau has been enhance in the hobby aspect. practicable efficiency- the bear upon time has been shortened in that blood donors re bay not fill in legion(predicate) regular items. On the some other hand, the step for donor cards are under full control and hence leading to donor satisfaction and confidence. There is also improved information body and v alidity. The Indian case study of Prathma Blood Center, Gupta (2004), promises insights into the consolidation of IS/IT in management of blood records.The Prathma Blood Center is a quest for modernizing blood banking. The inviolate function from blood donation to its testing and separation, storage, outgrowth and usage commit been integrated through a custom intentional go-ahead pickax planning (ERP) parcel that minimizes human intervention and making it less error prone. The implementation of ERP in blood bank in India has registered m each successes in medical data such as security, confidentiality, secrecy and quick retrieval of historical records all of which were challenges at URCS blood center.However, full automation of all blood donation activities like the case cannot be done in Uganda due to limited resources. It gestates transition, as it is resource limit in ground of IT, other equipments and human resources. 2. 3 Blood Donor Systems Challenges and Successes The blood donation service involve a series of interdependent operations such as donor registration, donor screening/evaluation, blood collection, blood screening, inventory management and blood dissemination. Most of the popular existing blood information systems in the western world today are mainly online systems.The systems interfaces do not meet fully the blood safe policy described in this study and as such not suitable for illiterate population. Most blood donors in Uganda are rural based where online systems may not be the best. The level of computer literate among the blood donors in Uganda is growing because the majority of them are school students. The main challenge remains customizing interfaces that are suitable for capturing basic donor information. Some of the attributes on the interfaces used in the western world such as state and province are not applicable in Uganda.Tripura blood donor information system is a good example of the blood donor system that is not su itable for Uganda. Also some key attributes such as age and sessions in Uganda are lacking on most the interfaces mountained. The interfaces also are not user-friendly as there are m whatsoever links within the system that can easily confuse the system users and hence leading to data entry errors and boredom. At the Macau blood Transfusion Centre, system Integrado de Bancos de Sangue (SIBAS) works as its solution of computerized blood bank information system.SIBAS complies with the client/server infrastructure, as does its client, and provides an integrated environment for those isolated but interdependent operation in the blood center. With the introduction of the SIBAS the blood service at Macau has been enhance in the following aspect. Operational efficiency- the processing time has been shortened in that blood donors need not fill in m whatever regular items. On the other hand, the steps for donor cards are under full control and hence leading to donor satisfaction and confiden ce.There is also improved information consistency and validity. The Indian case study of Prathma Blood Center, Gupta (2004), promises insights into the integration of IS/IT in management of blood records. The Prathma Blood Center is a quest for modernizing blood banking. The entire function from blood donation to its testing and separation, storage, issue and usage discombobulate been integrated through a custom intentional enterprise resource planning (ERP) software that minimizes human intervention and making it less error prone.The implementation of ERP in blood bank in India has registered m whatever successes in medical data such as security, confidentiality, secrecy and quick retrieval of historical records all of which were challenges at URCS blood center. However, full automation of all blood donation activities like the case cannot be done in Uganda due to limited resources. It requires transition, as it is resource constraining in terms of IT, other equipments and human resources. SYSTEMS ANALYSIS AND DESIGN 4. 1 Introduction next the literature review, background information and correlative knowledge regarding this research jump follows.In the first part of this chapter, the demand and requirements of the proposed system are discussed and analyzed through dataflow plots, the entity dealings warning and the data lexicon. According to this analysis, the specification of the system is defined. This provides the initiation for chapter 5 (Implementation and Testing). This chapter presents the various design techniques and processes available for building meshing based applications. It explains the design technique chosen, showing its advantages and disadvantages. 4. 2 A diametrical admittance for designing clear based applicationsTraditionally, software has been broadly classified into distinguishable categories. Some of these categories include real-time software, personal computer software, artificial comprehension software and business software. weather vane-based systems and applications ( tissueApps) such as vane sites and information processing applications that reside on the Internet or an intranet, require a clean different method of phylogeny than these other categories of computer software (Pressman, 2000) xx. This is because mesh based systems involve a mixture of print publishing, software growing, marketing, computing, infixed communications, external elations, art and technology. WebApps are network intensive, center driven, continuously evolving applications. They usually bemuse a short development time, need strong security measures, and have to be aesthetically pleasing. In addition, the population of users is usually diverse. These factors all affect special demands on requirements elicitation and clay sculptureling. 4. 3 Requirements and psychoanalysis The requirement analysis stop of a software engineering control involves collecting and analyzing information about the part of the org anization that is back up by the application.This information is hence used to identify the users requirement of the new system (Conolly et al, 2002) xx. Identifying the required functionality of the system is very important as a system with incomplete functionality may lead to it being rejected. A description of the aim of the project is apt(p) up here along with details of the functional and non-functional requirements for the system. The test sheets for evaluating the completed system are also presented. pic 4. 3. 1 RequirementsThe requirements of the Web-based management information system are to develop a web based front end for launching donated blood details including the donor, his/her blood root, raise, age, and status of the donated blood a web based front end for searching the information relating to a given donor or a given blood group a facility to still enter donor and donated blood information via Endnote and also maintain the Endnote database using those de tails entered via the web front end and a facility to produce abstract information of donor and donated blood features and either(prenominal) other related activities. . 3. 2 Functional Requirements In this research project we aim at developing a system which should improve on the current one with a lot of functionalities and therefore the Major manoeuvre or end here is to to develop a blood donor database that can support the five higher up mention sub- databases that is to say DonorDB, grant DB, DiseaseDB, Transfusion DB and Statistical DB to develop a client interface that allows inner(a) users to carry out tasks such as inserting or modifying and deleting data in the database to develop a searching functionality in order to allow radiation pattern and privileged users to search the details of a given donor, blood group, stakeholder and if obligatory a type of indisposition common which causes one to need the donated blood to fully integrate the Web-based manageme nt information system to the World- Wide-Web and hence allow access from any Internet networked terminal and Web browser around the world to develop a facility that can export details entered via the web front end to Endnote as healthy as import and confidential detail from the Endnote entropybase to develop a functionality that produces summary information of required data to enhance decision making to set high security features in the Web DBMS to provide privacy, fair play to allow privileged users to maintain the Web-based management information system by adding/deleting particulars, backing-up or resetting the database and extract online summary in the form of histograms for each donor and lists of free-format comments.Thus a graphical reporting withall should be provided for analyzing the data. and finally the system should be flexible enough to store data for several eld and also be able provide sufficient personar and governing Guides. 4. 3. 3 Non-functional Requi rements The system mustiness be developed to suit the particular needs of a user-friendly environment. This means that the system must defend a clearly understandable user interface as well as clear online help supporting at any stage of the user interaction with the system.A fast rejoinder time in obtaining and providing information to the system may also prove to be a momentous advantage. In addition to these requirements, the system should also embrace the following requirements- security measure Each user is required to log in. The system should log ply that has been assigned user names and passwords. The system should be designed to mis compensate it impossible for anybody to logon without a valid username and password. Data encryption should be sedulous to keep the user login name and password secret.Reliability The system would be used by about 50 staff working at the Red Cross head quarters and also some other many staff in the collaborating clinics and hospitals. T he system should have little or no downtime and be able to handle multiple concurrent users. Ease of design The general and administrative views should be easy to use and intuitive. Online help and certificate should be provided. Performance The system should have a quick response time. For the purpose of this research project, this would be defined as less than 5 seconds.System and Browser compatibility Testing The system should be accessible on the following browsers Microsoft Internet Explorer 5. 5+, NetScape Navigator 6. 0+ and Mozilla 1. 3+. System requirements Red Cross society Uganda has a UNIX server. This system would be designed to run on a minimum hardware configuration of 500MHz x86 machines. Considering the big hardware available at the society , this would not pose any problems. Server Software Operating System Windows XP PHP version PHP 5. 0+ Web Server Apache Web Server. 2. 0+ Database MySQL 4. 01+ pic . 4 Access Level Analysis In order to take closer look into w hat the system should do and how, it was necessary to decompose the systems functionalities based on the user type and levels of access. The three main user groups and access levels are orbiculate exploiter stem (normal access level) The Red Cross exploiter free radical (privileged access level) The Administration (privileged access level) Therefore, the requirements could be efficiently analyzed depending on the user group and the functionalities they should be allowed to perform. 4. 4. 1 main System varlet (Index)It is required for the system to provide a chief(prenominal) Page where any orbiculate user (any user within and outside the Red Cross Organization) will be able to access. The main functionality of this page will be to allow any user to search the database by using information such as quantity of donated blood, available blood and the groups, or any other general information which may not be considered confidential. The search capabilities of the main page mi ght not be limited to the necessitate blood donor, but may for example provide the means for displaying any information that might be relevant but not confidential.The Main Page should also include a Login facility for any privileged or normal user to be able to have access to more go functionalities of the System. 4. 4. 2 The Red Cross User Group When a Red Cross user has successfully logged into the system via the Main Page Login facility, it will be necessary for the system to display a specific menu with all available pickax that can be carried out. Therefore by taking into account the system requirements, it will be necessary to nclude options such as Enter donor details, depend donor, Use Endnote Facilities, take a shit Summary Information as well as an option that will be related to the appropriate User Guide. A Logout option will also be appropriate for the Red Cross user to be able to logout when desired. 4. 4. 3 Entering-Amending Blood donor Details For a user to be a ble to amend and enter into the systems database it will be native to take into account that the blood donor system will be integrated to Endnote. Therefore, it will be essential for the system to provide to the user the exact fields as Endnote does for any particular type of details.In addition, when a particular of a given donor has successfully been submitted or amended into the database it will be essential for the system to display the appropriate message (i. e. Blood donor successfully entered into database). 4. 4. 4 anticipateing the Blood Donor Database The Searching Facility for the Red Cross user should not differ from the facility that will be provided on the Main Page of the system for all users. Therefore, the Red Cross user will be able to search any type of information in the database using the same way as specified for the orbiculate User. 4. 4. 5 Producing Summary InformationFor this requirement it is essential to firstly understand why and when it will be used a nd to adjust the functionality to best suit these purposes. In order for the system to efficiently produce summary information it will have to provide a menu providing options such as Produce Annual Report, or Produce General Report etc. 4. 4. 6 Endnote Facilities In order for the system to be effective, it will be necessary for it to be integrated with the Endnote software. Therefore, it will be very earthshaking to defy two options that will include Importing blood particulars from Endnote and Exporting blood particulars to Endnote.How this will be done will mainly rely on taking full advantage of particular Endnote filters that are provided for these reasons. 4. 4. 7 executive director For maintenance purposes it will be of great entailment to include put acrossd executive director functionalities that can only be accessed by this particular user group. The most reasonable options for an administrator to perform may include tasks such as deleting donors (should not be provi ded to the Red Cross user group for security reasons), Backing-up and Restoring the database, Resetting the blood donors database etc.In addition to these functionalities the administrator may also be asked to perform tasks related to Red Cross or Global user (i. e. Entering new donors, Searching for a given donor or available blood group) and therefore any functionality provided by the system must be included in the administrator capabilities. .5 Task Structure Diagrams For the development of a more consistent and effective system, it was essential to firstly identify which information should be included accomplish this, it was first of great significance to group all the relevant tasks (system functionalities) depending on the users.The way the systems tasks could be efficiently identified was by using a special technique from the husking method called Task Structure Sketching (Simons, 2002). 4. 5. 1 The Red Cross User Red Cross User Functionalities chassis 4. 1 The Red Cros Use r Task Structure Diagram Insert New Data erase data Search for Data Produce summary Use Endnote Search for a receiving system Search donors Search for disease Export d donations Weekly report Produce annual reports Import donations Search for hospitals tailor clinics Update data Edit donors -recipients Edit diseases Insert new disease Insert recipients Insert donor The Administrator UserAdministrator Functionalities Fig 4. 2 The Administrator Task Structure Diagram Red Cross user Functionalities delete data Backup data Reset database Backup database Restore Database take away a phased out disease Delete donor Delete recipient The administrator can perform any task that are performed by the Red Cross User 4. 5. 3 The Global User Global User Functionalities Search database Login Search by recipients Search by donors Search y Year Login as Red Cross User Login as Administrator Want to donate blood 4. 7 Web engineering science Web engineering is the process used to create high qu ality Web-based systems and applications (WebApps).Web engineering (WebE) exhibits the fundamental concepts and principles of software engineering by following a disciplined fire to the development of computer-based systems, emphasizing the same exampled and management activities (Pressman, 2000) xx. The design and production of a software product (such as a web application) involves a set of activities or a software process (Sommerville, 2004) xx. A software process ensample is an abstract representation of a software process. Three generic process models usually adopted in projects are The water light model This has distinct project phases, which can be easily monitored.These phases are requirements specification, software design, implementation and testing. Evolutionary development An sign system is developed quickly from abstract specifications. This is later refined with the arousal of the user to produce a system that meets the users needs. It is an iterative model. Two refinements of this approach are the outgrowthal and the spiral models. The incremental model of evolutionary development delivers software in small but usable increments, where each increment builds on those that have already been delivered.The spiral model couples the iterative nature of prototyping with the controlled and systematic aspects of the waterfall model. Component-based software engineering This is based on the being of a large number of reusable components and is best suited in an object-oriented environment. A process model helps address the complexity of software, minimize the pretend of project failure, deal with change during the project and help deliver the software quickly. For this project two process models were considered 1. Spiral model 2. A waterfall model. pic 4. A WebE Spiral model The spiral model shown in Fig 4. 4 is suggested by Pressman (2000)xx. The process consists of 6 main stages, outlined below 1. Formulation This is an activity in whic h the goals and objectives of the WebApp are identified and the eye socket for the first increment in the process is established. 2. Planning This stage estimates general project cost, evaluates risks associated with the development effort, prepares a detailed development schedule for the sign WebApp increment and defines a more coarsely granulated schedule for subsequent increments. Analysis This stage is the requirement analysis stage for the WebApp. Technical requirements and nitty-gritty items to be used are identified. Graphic design requirements are also identified. Fig 4. 4 The WebE Spiral Model 4. Engineering Two correspond set of tasks make up the engineering activity. One set involves content design and production, which is non-technical work. This involves gathering school textual matter, graphics, and other content to be integrated into the WebApp. At the same time, a set of technical tasks (Architectural design, Navigation design, and Interface Design) are carrie d out. . Page generation This is the construction activity that makes use of automated tools for WebApp creation and the content is joined with the architectural, navigation and interface designs to produce executable Webpages in HTML. 6. Customer Evaluation During this stage, each increment of the WebEprocess is reviewed. Powell (2002) xx presents a waterfall model for web engineering (Fig 5. 2). The advantage of this model is that it helps developers plan most of the work up front. 4. 9 Design Phase The design involves the production of technical and visual prototypes.This stage has some on-technical aspects such as gathering of web content. Powell (2002)xx points out that ontent gathering can be one of the biggest problems in web projects. This clearly is not the ase with this survey application as there is very little content required. For the server side rogramming and other technical aspects of the design emphasis will be laid on such design oncepts and principles as effective modularity (high cohesion and low coupling), nformation hiding and stepwise elaboration. The goal is to make the system easier to adapt, ehance, test and use (Pressman, 2000) xx. 4. . 1 Producing HTML There are basically 4 methods of producing HTML 1. Coding by hand using a simple text editor program 2. Translation in which content produced in a tool such as note pad is saved as aHTML document. 3. Using a tagging editor that helps fill in the required tags 4. Using a What you see is what you get editor (WYSIWYG) such as MS FrontPage or Macromedia Dreamweaver. All these methods have their advantages and disadvantages. date coding by hand may be slow and error prone, it does provide great control over markup, as well as help address bugs and new HTML/XHTML elements immediately.At the extreme, What You See Is What You Get (WYSIWYG) editors provide visual representation of a page and require no significant knowledge of HTML or CSS. However hey often generate awry(p) or less than opt imal markup and tend to encourage fixed size resentations that do not separate the look and the structure (Powell, 2003) xx. Putting all hese into consideration, a tagging editor, HTML-kit was chosen for this work. While tagging editors can be slow and require intimate knowledge of HTML and CSS, they provide agreat deal of control and are a lot faster than hand editing. pic 4. 10 Architectural DesignWebApps fall into 4 main structures. They can be linear, grid, hierarchical, or networked (fig 4. 5). In practice most web sites are a combination of some of these structures. Fig. 4-5. navigational Structures of websites/Web Applications ( Lemay, 2000) Considering the nature of this web application, a combination of both hierarchical and linear structures will be adopted. The actual survey web pages will have a linear structure while the Admin pages will have more hierarchical nature. 411 Database Design Database design involves the production of a model of the data to be stored in the database.A data model is a plot of the database design that documents and communicates how the database is structured. The database design methodology followed in this project is that suggested by Connolly et al(2002)xx. Connolly presents kind of a detailed guide to designing database but not all of those steps may apply here, as this project is not too complex. The design process is divided into three main stages conceptual, ratiocinative and physical database design. The purpose of the conceptual database design is to decompose the design into more amenable tasks, by examining user perspectives of the system.That is, local anesthetic conceptual data models are created that are a complete and accurate representation of the enterprise as seen by different users. Each local conceptual data model is do up of entity types, relationship types, attributes and their domains, primary keys and integrity constraints. For each user view identified a local conceptual data model would be built. (Connolly et al,2002) xx. In building the conceptual data model, a data dictionary is built to identify the major entities in the system. An entity relationship (ER) plot is used to visualize the system and represent the users requirements.The ER diagram is used to represent entities and how they relate to one another. The ER diagram also shows the relationships between the entities, their occurrence (multiplicities) and attributes. Following the view integration approach, a different data model (ER diagram) is made for each user Data vocabulary Entity Name Description Donors A person who donates blood Recipients A person who receives blood Diseases The diseases which are found in the infected donated blood Blood group The blood that is donated by the donors Hospital/ClinicHospitals to which donated blood is distributed provide Red Cross staff soil Districts from which donors and recipients originate from Table 4. 1 Data Dictionary 4. 11. 1 Conceptual Database Design In t his stage, a local conceptual data model is built for each identified view in the system. Alocal conceptual data model comprises of entity types, relationship types, attributes and their domains, primary and alternating(a) keys, and integrity constraints. The conceptual data model is supported by documentation such as a data dictionary.The entity types are the main objects the users are interested in. Entities have an existence intheir own right. Entity types are identified and their names and description are recorded in adata dictionary. Care is taking to construe that all relationships in the users requirements specification are identified. An Entity-Relationship diagram is used to represent the relationship between entities. The multiplicity of each relationship is included. This is because a model that includes multiplicity constraints gives a better representation of the enterprise.Relationship descriptions and the multiplicity constraints are recorded in the data dictionary. Each model is validated to ensure it supported the required transactions. Entity name Attributes Description Data Type Size Nulls Multi wanted Donors donorId (PK) -dNames - stir dob distId (FK) doreg Donor recognition number Donors names Donors sex go steady of possess District of origin realize of registration Text Text Text Date Int Date 8 30 6 30 3 30 No No No No No No No No No No No No Recipients -rId (PK) -rNames -sex dob distId (FK) doreg Recipients credit umber Recipients names recipients sex Date of birth District of origin Date of registration Text Text Text Date Int Date 8 30 6 30 3 30 No No No No No No No No No No No No Diseases -dId (PK) -dNames -drating Disease identification number Disease names Disease rating on how the great unwashed are infected from it Text Text text 8 30 20 No No No No No No Blood bGroup(PK) donorId (FK) rId (FK) status Blood group Donor identification number recipient identification number status of the donated blood whether infecte d or not Text Text Text text 2 8 8 15 No No No No No No No No Hospital/Clinic hId (PK) hNames distId (FK) Hospital identification number Hospital name District identification Number text text int 8 100 3 No No No No No No Staff staffId (PK) staffNames sex dob department Staff identification number Staff names Sex Date of birth Department to which the staff belongs text text sex date text 8 50 6 15 100 No No No No No No No No No No District distId distName District number District name int text 3 100 No No No No Entity name Multiplicity Relationship Entity Name Multiplicity Donors 1 Donates Blood 1 Recipients 1 Receives Blood 1 Diseases Contained in Blood 0 .. * Blood 1 Donated by Donor 1 .. * Hospital/ Clinic 1 Receives Blood 1 .. * Staff 1 Registers Donors 1 .. * District 1 Has Recipients 1 .. * Table 4. 2 An extract from the data dictionary showing a description of the relationships between the entities. 4. 11. 2 Logical Database Design The process of logical database design const ructs a model of the information used in an enterprise based on a specific data model, such as the relational model, but independent of a particular DBMS and other physical considerations (Connolly et al, 2002)xx.The logical database design consists of an ER diagram, a relational schema, and any supporting documentation for them. In the logical data model, all attributes of entities are primitive. Producing a logical data model involves normalization. The aim of normalization is to winnow out certain undesirable characteristics from a database design. It removes data redundancy and thus prevents modify anomalies. Normalization helps increase the clarity of the data model. Integrity constraints are obligate in order to protect the database from becoming inconsistent.There are five types of integrity constraints required data, attribute domain constraints, entity integrity, referential integrity and enterprise constraints. The resulting relations are validated using normalization. For this project, producing relations in third normal form (3NF) will suffice. Non-relational features, such as many-to-many relationships and some one-to-one relationships, are removed from the conceptual data model. The design is also reviewed to make sure it meets all the transaction requirements. pic 1.. * 1.. 1 1.. * 1.. * 1.. 1 1.. 1 registers Donors PK donorId Names sex dob FK distId doreg District PK distId distName Recipient PK rId rNames sex dob FK distId doreg Hospital PK hId (PK) hNames FK distId Staff PK staffId staffNames sex dob department Diseases PK dId dNames drating Blood PK bGroup FK donorId FK rId status Fig. 4. 6 The ER diagram 4. 11. 3 Physical Database Design Physical database design translates the logical data model into a set of SQL statements that define the database for a particular database system. In other words, it is the process of producing a description of the implementation of the database on second-string storage.It describes the base relations and the storage structures and access methods used to access the data effectively, along with associated integrity constraints and security measures. The target DBMS in this case is MySQL. The following translations occur 1. Entities become tables in MySQL. 2. Attributes become columns in the MySQL database. 3. Relationships between entities are modeled as foreign keys. Donation Process follow Video pic Getting Ready for Your Donation The Donation Process ill-use by Step After the Donation To get ready for yourdonation pic Make an Appointment It always helps us to know in advance when you are coming in to make a donation. pic Hydrate pic Be sure to drink plenty of fluids the day of your donation. pic put on Something Comfortable Wear clothing with sleeves that can easily be rolled up above the elbow. pic Maintain a HealthyLevel of Iron in Your forageBefore Donating If possible, include iron-rich foodsin your diet, especially in the weeks before y our donation. pic fix a List of Medications You Are Taking We will need to know about any prescription and/or over the counter medications that may be in your system. pic pic Bring an ID Please bring either your donor card, drivers license or two other forms of identification. pic Bring a helpmate Bring along a friend, so that you may both whoop it up the benefits of giving blood. pic Relax Blood donation is a simple and very safe procedure so there is nothing to worry about.
Subscribe to:
Posts (Atom)