Friday, May 31, 2019

Child Abuse and Neglect Essay -- Violence Against Children

tike Abuse is a very serious issue all throughout the world, in all different countries, cultures, and communities. The four main(prenominal) types of abuse are emotional abuse, physical abuse, neglect, and sexual abuse, and although emotional abuse and neglect are often overlooked, each has just as severe set up on children as sexual and physical abuse (Saisan et al.). The many causes of all kinds of the abuse of children have devastating effects on the childs disembodied spirit presently and later on in life.There are multiple different causes of child abuse, and although abusing a child cannot be pinpointed to one specific characteristic, issue, or situation, there are factors which contribute to the abuse or neglect of a child. It is preposterous to determine whether child abuse will occur, but commonly a family may be at risk if the caretaker is young, has little education, has little knowledge about child development, has had several children born within a few years, is infra great stress, and is extremely dependent on social welfare (Causes and Effects). As a child being taken care of by someone with alcoholic drink and/or drug addictions is difficult, as a result of these addictions sometimes caretakers cannot make good parenting choices and all too often are unable to properly forget for their children. There are many factors that can lead to child abuse, but not all families who meet this criteria abuse their children, just as those families who seem consummate on the outside may actually abuse their children (Saisan et al.). Child abuse happens in all different types of families, and although there are some predicaments where abuse is more than common, there is still no singular cause of child abuse.Contrary to many beliefs, the emotional a... ...Emotional Child Abuse Definitions of Child Neglect and Other emotionally Abusive Behavior. American Humane Association, n.d. Web. 20 Jan. 2014. Miller, Debbie. Child Abuse and Neglect. Encyclopedia of Education. Ed. James W. Guthrie. 2nd Ed. Vol. 1. New York Macmillan Reference USA, 2003. 267-270. Opposing Viewpoints in Context. Web. 28 Jan. 2014. Neher, Jon O. suppressed Emotions from Child Abuse Can Create Devastating Anger. Child Abuse. Ed. Heidi Williams. Detroit Greenhaven Press, 2009. Opposing Viewpoints. Rpt. from The Decade Dance. Annals of Family Medicine 3 (2005) 462. Opposing Viewpoints in Context. Web. 12 Dec. 2013. Saisan, MSW, Joanna, Jeanne Segal, Ph.D., and Melinda Smith, M.A.,. Child Abuse & Neglect Recognizing and Preventing Child Abuse. Helpguide.org Understand, Prevent and Resolve Lifes Challenges. N.p., n.d. Web. 3 Jan. 2014.

Thursday, May 30, 2019

Employee Motivation Essay -- Work Job Employee Motivation Management

Employee MotivationINTRODUCTIONIn the quest to obtain the maximum from employees and achieve organizational success, employers recognised the need to acknowledge that lot have complex needs. With the growing affluence of our society, Singaporeans of today be no longer solely driven by money but also challenges inherent in their responsibility. This is supported by our Senior Minister Goh who recently commented that Singaporeans prefer the experience of working abroad than locally as the foreign employer advocate the magnificence of not only work, but also the employees needs.(TODAY, 15 March 07).Before discussing the motivational strategies, a simplistic approach will be taken, apply Hackman Oldhams Job Characteristics Model, which defines the workforce into two categories. The first category consist of staff in job settings which are low in skill variety, childbed identity, task significance, low autonomy and feedback and followed by staff in complicated job settings with sco rer high in all fronts (Robbins, Millet, Waters-Marsh, 2004). GOAL SETTING / apprehension THEORYSpecific hard goals produce a higher level of output than does the generalised goal of do your best (Robbins, 2003). This statement defines Edwin Lockes goal-setting hypothesis which advocates giving employees clear targets so that they are aware of what needs to be done and how much effort to be expended. While easier goals are more quickly accepted, difficult goals, when accepted, result in higher performance as the specificity of goals itself acts as an internal stimulus. Also, people tend to perform better when timely feedback is provided (Bartol, Tein, Matthews, and Martin, 2005).When applied to individuals who are motivated by inhe... ...cShane, S and Glinow, MA 2003, Organisational Behaviour, McGraw-Hill, New York.McShane, S and Travaglione, T 2007, Organisational Behaviour on the Pacific Rim, Irwin/McGraw-Hill, Sydney.Robbins, SP 2003, Organisational Behaviour, Prentice Hall, SydneyRobbins, SP, Millet, B, and Waters-Marsh, T, 2004, Organisational Behaviour, Prentice-Hall, SydneyWood, J, Chapman, K, Fromholtz, M, Morrison, V, Wallace, J, Zeffane, R, Kennedy, R, Schermerhorn, J, Hunt, J and Osborn, R 2004, Organisational Behaviour A Global Perspective, John Wiley & Sons, Brisbane.Internet ReferencesSingapore leaking talenthttp//www.channelnewsasia.com/stories/specialreport/news/264096_8/1/.htmlFortunes Best companies to work for.http//money.cnn.com/magazines/fortune/fortune_archive/2007/01/22/8397996/index.htmAIA Singaporehttp//www.aia.com.sg/Content.asp?ca_typeid=4

Wednesday, May 29, 2019

Land Surveying :: Geography

Surveying is the technique and science of accurately determining the terrestrial or three-dimensional blank shell position of points and the distances and angles between them. These points are usually, but not exclusively, associated with positions on the surface of the Earth, and are often use to establish land maps and boundaries for ownership or political purposes. In order to accomplish their objective, surveyors use elements of geometry, engineering, trigonometry, mathematics, physics, and law.Historically, distances were measured using a variety of means, such(prenominal) as chains with links of a known length, for grammatical case a Gunters chain or measuring tapes made of steel or invar. In order to measure horizontal distances, these chains or tapes would be pulled crocked according to temperature, to reduce sagging and slack. Additionally, attempts to hold the measuring instrument level would be made. In instances of measuring up a slope, the surveyor might have to tak e fire (break chain) the measurement- that is, raise the rear part of the tape upward, plumb from where the last measurement ended.Historically, horizontal angles were measured using a compass, which would provide a magnetic bearing, from which deflections could be measured. This type of instrument was later improved upon, through much carefully scribed discs providing better angular resolution, as well as through mounting telescopes with reticles for more precise sighting atop the disc. Additionally, levels and calibrated circles allowing measurement of vertical angles were added, along with venires for measurement down to a fraction of a degree- such as a turn-of-the-century transit.The simplest method for measuring height is with an altimeter using air pressure as an indication of height. But for surveying more precision is needed. Toward this end, a variety of means, such as precise levels, have been developed. Levels are calibrated to provide a precise plane from which differe ntials in height between the instrument and the point in question can be measured, typically through the use of a vertical measuring rod.As late as the 1990s the basic tools apply in planar surveying were a tape measure for determining shorter distances, a level for determines height or elevation differences, and a theodolite, set on a tripod, with which one can measure angles, combined with triangulation. Starting from a position with known location and elevation, the distance and angles to the unknown point are measured. A more modern instrument is a total station, which is a theodolite with an electronic distance measurement device and can also be used for leveling when set to the horizontal plane.

Arranged Marriage :: essays research papers

Relationships are the most classic things in life. And marriage is oneof the most important relationships. Having said that, it becomes evenmore important who arranges the marriage, whether its ourselves or someoneelse like our parents or friends. Th e issue has taken the place of animportant neighborly problem. Different people have different opinions comingfrom different age groups from the different parts of the world. Marriage as we back end see is a fealty of spending the rest of our lifewith someone. This has a great impact on our life, career and personality.So, should we let our parents decide so much for us? To start with, it canbe answered positively. They are more experienced and well-placed in thesociety. They understand people better and thus, understand us better thanwe do sometimes. Moreover, being our parents, they want the outperform for usall the time. It may seem to be as simple but in reality its not. The choice of our lifepartner should have our recite in it. Of course How can we marry someone whowe dont know? Is it possible to stay along with the person and shareeverything that we have in our life ? From this channel of view it mat notlook sensible at all. Considering that all of us has the decent to decidefor ourselves once we are grown up and matured, the right of the choosingour life partner should be given to us and no one else unless of coursewe forfeit it to someone else. Coming back to the arguments, we can see somewhat us and observe how umteenlove marriages have been successful? In some parts of the world theystay in but unfortunately in many other places the fail to develop intolife-long relationships. The mostly youn g couples complain ofmisunderstandings, concealed truths about each other and making a hurried

Tuesday, May 28, 2019

Essay --

The difference between developing and authentic nations depended mainly on the basis of economics. Gross domestic product (GDP), is the Most commonly criteria for evaluating the degree of economic development, general standard of living, per capita income, amount of widespread infrastructure, and level of industrialization. A highly-developed country has a highly developed economy and advanced technological infrastructure compared to other less developed nations. Carbaugh (2013) developing countries are able to export manufactured goods and services to the developed countries like agricultural goods, raw materials, and labor intensive (such as textiles) which related to primary products. In the last three decades, few developing nations include China, Mexico, Turkey, Vietnam, and so on have increasing their exports of primary products significantly. For example, according to the Export Promotion Center of Turkey, Turkey, as a major cotton fiber producer the export value of Turkey s technical textiles and nonwovens was estimated at more than US$1.2 billion in 2008. Turkey exports its technical textile products predominantly to different developed nations such as Germany, France, Spain, Italy, and the United States. This increase as a result of economic reforms in Turkey based on free market principles, an planetary orientation, and reducing g all overnment intercession. This paper explain whether the establishment intervention in international trade good or not for a developing nations.protect domestic producers from the argument of imports is an economic policy adopted in most developing countries known as import substitution. During the Period from 1930 to 1980 many Latin American countries implemented import substitution policies. This... ...and limit foreign investment. The government allows the foreign projects as long as they recognizing the states permanent sovereignty over natural wealth and resources. This intervention of government has a positi ve effect by helping the domestic firms to growth. At conclusion, free trade and government intervention cannot be separate the country should have free trade and positive government intervention. Free trade tends to be inequality in income, wealth and opportunity. Without government intervention, firms can exploit monopoly power to pay low wages to workers and charge high prices to consumers. The positive government intervention can regulate monopolies and promote competition and redistribute income within society. Moreover the positive government intervention in the foreign direct investment was helping the domestic firms to growth.

Essay --

The difference between developing and certain nations depended mainly on the basis of economics. Gross domestic product (GDP), is the Most commonly criteria for evaluating the degree of economic development, general standard of living, per capita income, amount of widespread infrastructure, and level of industrialization. A substantial country has a highly developed economy and advanced technological infrastructure compared to other less developed nations. Carbaugh (2013) developing countries are able to export manufactured goods and services to the developed countries like agricultural goods, raw materials, and labor intensive (such as textiles) which related to primary products. In the last three decades, about developing nations include China, Mexico, Turkey, Vietnam, and so on have increasing their exports of primary products significantly. For example, according to the Export Promotion Center of Turkey, Turkey, as a major cotton fiber producer the export value of Turkeys te chnical textiles and nonwovens was estimated at more than US$1.2 billion in 2008. Turkey exports its technical textile products predominantly to different developed nations such as Germany, France, Spain, Italy, and the United States. This increase as a result of economic reforms in Turkey based on free market principles, an transnational orientation, and reducing g everywherenment interposition. This paper explain whether the governing body intervention in international trade good or not for a developing nations. defend domestic producers from the controversy of imports is an economic policy adopted in most developing countries known as import substitution. During the Period from 1930 to 1980 many Latin American countries implemented import substitution policies. This... ...and limit foreign investment. The government allows the foreign projects as long as they recognizing the states permanent sovereignty over natural wealth and resources. This intervention of government has a positive effect by helping the domestic firms to growth. At conclusion, free trade and government intervention cannot be separate the country should have free trade and positive government intervention. Free trade tends to be inequality in income, wealth and opportunity. Without government intervention, firms can exploit monopoly power to pay low wages to workers and charge high prices to consumers. The positive government intervention can regulate monopolies and promote competition and redistribute income within society. Moreover the positive government intervention in the foreign direct investment was helping the domestic firms to growth.

Monday, May 27, 2019

When I Saw Him

The first time I recognized him was from across the cafeteria of my old high school. He was overnice looking, had nice eyes, and an amazing smile. I had met him at a party a few weeks ago and we had exchanged numbers. My friend told me that Tim had liked me since the beginning of the school twelvemonth but just never acted upon it. Once I showed interest in him he leaped at the chance and asked me out. On our first date he besidesk me to a lake and brought his guitar with him. With his beautiful voice he started singing a song and playing along just as stunningly.I was so moved by his gesture that I started liking him back. The next few months were magical, but like any ordinary relationship the waters started getting a little rough as we got closer. The summer before he left for college was very difficult. I was getting scared of him leaving me so I got a little alike clingy. We also started getting into trouble on more than one occasion. He liked to drink and smoke a little to o much and I would get so angry when he would yell at me for asking him to settle d admit. He would say I wasnt his mom.He was right but I did care or so him just as much as she did. He started going places without me and our communication got more and more limited. When he finally left for college is when every amour fell apart. During month 10 of our relationship he was going to The New Hartford School of music and later on I found out that he also was sell drugs. Tim did all of the drugs he sold and even a few more. He eventually ran into some trouble with a couple of other drug dealers because he owed them a lot of money.His parents bailed him out and he moved back home. I had a feeling that Tim was getting more and more distant as he continued to go to college. He stopped calling altogether, and even when I called him he refused to answer. Texting became difficult because he wouldnt give me full thoughts or answers. It got to the distributor point where we didnt talk for a f ull week before I was finally worn-out and drained from putting up with his shenanigans. I broke up with him because he was so confused and messed up by the drugs that he stopped talking to me for a straight week.I apparently dumped him just in time too because a month after he was home he ended up getting arrested and thrown into jail for a number of felonies. I power saw Tim change drastically while we were going out and I did not want to follow the horrible path he was going down. I love life him but he had to get his stuff together. I also found out that he was diagnosed with bi-polar disorder. We rushed into things both emotionally and physically way too fast. Now that I should really get to know a person before I agree to be in a relationship with them.It wasnt just his fault that the relationship fell apart. We both had issues when going into it that we didnt communicate about. His parents did not like me, but they werent the nicest to Tim either. I had many problems of my own being a teenage girl in high school with bullies, school work, and family issues. In order to love someone else, a person has to love him/herself first. Tim and I just had too many problems from the beginning and we needed to focus on ourselves individually before going to fast, but we didnt. Boy, was that a dumb thing to do.

Sunday, May 26, 2019

Smith Consulting Project

These reviews lead bring aw areness to the employees that their efforts (or lack of) name non gone un noniced. They pass on sort out that their performance level is directly proportional to the bonus, so instinctively, employees will strive to do their best in order to maximize the rewards. Encourage employees to further education, or seek professional certifications by offering tuition reimbursement, and bonus or salary perks for successful completion of degrees or certifications. This will let the employee know that the fellowship is willing to invest in him or her, and by extension, he or she is considered an asset.Form an employee relations committee which will plan social activities for employees to take office in. mathematical events include Potluck lunch, Christmas dinner, Charity endeavors (food, clothes, and book drives, etc. ), community cleanups, etc. This is an opportunity for faculty members of varied levels to come together and socialize without the constraints of bureaucracy or participation politics. Clients Engagement Approach tush be extended to include the centering that a society interacts with its Clients. Similar to the Employee Relationship, the union moldinessiness find a way to keep Clients happy, and loyal.Failure to do this could result in negative reviews, loss of thickenings, loss of business, and loss of revenues. The trickle-down effect of this can be disastrous as the federation sportingthorn have to lay off staff in response to decreased income. With this in mind, it is extremely authoritative to maintain good client relations. To achieve this, the company must be mindful to do the take uping Obtain expire directives from the client in foothold of their expectations. When in doubt, do not hesitate to observe up with the client for clarification. This ensures that both parties are on the corresponding page and rule outs miscommunication which can lead to inflict.Always communicate respectively with the cl ient. Always keep an open breeze of communication. It is extremely frustrating when a client is unable to contact his or her service provider. Deliver returns on clipping. This fosters reliability and loyalty. packet package increase Definition The chunk definition of software is a set of create verbally computer interpreted instruction dictating how to process information input and output. The suppuration of software is the process of creating the written set of instructions that meet the communicateed specification requirements according to customer need.The software festering life cycle is the development model to achieve a practical product fitting the description of the specification requirements. The development end-goal is to produce a product that is easily maintainable, productive, and dependable. Methodologies Scrum is the principal software development systemological analysis in practice by smith Consulting for new software development requests. Scrum is an agile development methodology involving development aggroups working in accord independent of each other and at the comparable time interdependent on each teams work (Tech Target, 2007).The Scrum methodology spawns developmental decisions as a result of active software creation, directing and guiding the development team task to keep on the project timeline and according to specification. The Lean computer software Development approach is smith Consulting secondary software development method in practice. The consideration of the Lean methodology for development is in regard to redevelopment or version upgrade to personifying software products. The Lean methodology is a derivative of a project oversight approach originally developed by the Toyota Motor Corporation (MANS, 2012).The pattern of the Lean approach is to develop a more robust and efficient software product. The development technique is to achieve a reduction in processing overhead. Rework includes removing invalu able features and employing modern coding technique to improve overall program flow. Project Management Project precaution is a critical function beca white plague the prosperity of the entire organization depends on it. Since the success of project management depends on the leaders of this company, they should possess a clear business vision that includes IT and business experience.This vision should be established at the ginning of the project and should clarify what is in and outside the orbital cavity of the project. The most efficient intricacy approach should be one that includes a good line of communication with stakeholders including end-users. These stakeholders should be tasked to show commitment to the project by agreeing to a contract. The project management process should be divided into manageable pieces that are easier to easier to understand and manage. Proper management also includes ensuring the required tools and manpower is available to the teams.The contract should understandably position who has what responsibility and how they are to be accomplished. Other requirements include Ensure each process has someone responsible for managing it Identify who is responsible for managing costs Identify who and how numerous analysts and what their functions are Identify contract programmer costs The project will be reviewed on a weekly basis to advert if the company is notwithstanding on the correct course and if any summational changes or if any previously unknown problems have arrived. Reviews are also a good time to find if any of the key players psyches have changed and how to approach it if at all.For this project I recommend selecting omen independent of the project to conduct these reviews. Single systems not one-size-fits-all The reason why a single system is not presumable to be a one-size-fits-all resolve is because you for one have a lot of areas that necessarily to be addressed. Now, when you look at the legitimate field in t odays world it I becoming increasingly technical-dominated by the availability of technologies that are specific to the legal field as head as the tangible type improvements for both the efficiency and productivity when solutions are implemented in many firms especially law firms.For the firms broad services you ill have to come up with decisions to purchase and implement specific technologies because its a heavy part of them all, and the reason for this is because if you choose and comfortably as put in the wrong solutions in place. The work environment will suffer as the staff will also struggle to suit to the software that is being used, ultimately not taking full advantage of the software or worst chemise scenario by abandoning the whole system altogether. other reason why a single system will not likely be a one-size- fits-all is because you will need different systems to be in place like PracticeManagement Software, and Storing Information and Automation. The biggest rea son why a single system is not likely to be a one-size-fits-all is because it will most likely lack the depth of functionality, so by this being said the firm will be looking to find more than one type of solution when it comes down to finding more than one practice area. One other difference is the level of customization because the one- size-fits-all provides for both front-end as well as back-end but lacks areas and you will need to find a better way to implement everything to work and function properly. Program Specification GuidelinesThis portion of the document should act as a guide for Smith Systems Consulting Software Developers to adhere to closely during the software development phase. This guide will help to streamline the companys way of determining requirements, and incorporating them into the developing program. The supply approach will ensure that the alike level of care and attention is bestowed on all of Smith Systems Consulting projects no matter what size or bu dget. Stakeholders A projects stakeholder is anyone who will be affected by, or who has an interest in the projects progress and execution.Stakeholders in a systems development project usually include (but are not limited to) the projects users, Information Technology department, the affected department(s)s manager, members of the companys upper management, the chief financial officer (SCOFF), and the companys president. Prior to entering the requirements elicitation phase of the project, it is imperative for the development team to make a list of all stakeholders, as they will play an important role in defining the systems requirements.User Requirements User requirements refer to the unique functionality aspects of a system that are accessory for the user to accomplish his or her Job. In order for the programmer or system developer to fully understand what the resulting program is meant to do, it is important to discuss the functionality details with those who know the operation b est the users. The users will provide in-depth and clear understanding of the inner- workings of the system as well as the pivotal tools and functions that are indispensable for optimal performance.The development team should be prepared to use various methods to elicit the requirements so that feedback is ga thered from all of the users that were nitpicked for the task. Some ballpark methods for gathering requirements are surveys and face to face interviews. Where necessary, the developer should also be prepared to offer an anonymous system to collect requirements in order to protect the identity of the user should they so desire that mode. The users play a pro tack role in system development.By offering different avenues for feedback and requirements retrieval the company is maximizing the get of information it receives and therefore ensuring that all bases are covered in the resulting product. Once the business development plan has been created it is important to consult with the users again. This ensures that the requested functionality and tools are accounted for and helps to prevent any costly misunderstandings in the future. System Security Requirements To describe the security requirements in the companys policy it must first define in detail what selective information it is expect to handle.This requires working closely with the clients to gain an understanding of the confidentiality and importance of data. Once that is established, and then the types of employees who will have access to certain levels of data should be clearly draw in terms of security levels. System Security sting will focus on the adjacent tasks Sign-on procedures This determines the security of countersignatures and defines when and how often users are expected to change them. Password reset methods will also be defined in the policy.In addition a method of accessing the system through back-room access methods should be described as a means of access in case of an emerg ency. Database security Access to the database is described here. This senior highlights which users have access to applicable data and which are designed on a need to know basis. Physical security Here the physical security of the equipment associated with the business to include reward such as industrial planttations and servers are described. Cameras will be installed at strategic locations along with bagged access points to minimize the possibility of the theft of physical property.Third-party tools Establish an understanding with venders to ensure their continued coalition is dependent on their ability to match our system security standards. Test environment A secure examination environment ensures that further required military unit have access to the outpouringing environment. Additionally, a test environment is a safe environment to prepare changes before officially rolling them out to the company as a whole. The yester security of Smith Consulting will require comp liance with semi-annual evaluations from an outside source to determine an evaluation of security precautions, procedures, and vulnerabilities.The results of the evaluation are to be maintained along with the policy instruction so that the requirements of future evaluations can be validated against past tests. Software Platform Compatibility Requirements Software compatibility is an important part of the process of software development. Compatibility is first determined by which operating system(s) the software to be developed will be designed to run on successfully. A determining factor may be what system the company is using now or what the computer they may be using in the future.For example, there may be some issues with Windows XP but the company may be set to release Windows 8 machines as part of the role-out of the new software. In this case it is best to design software compatibility for the Windows 8 machines. The same can be said with servers if the software will be netwo rk based. Additionally the company may consider raceway their services from the cloud. In this case the software compatibility may be no more than ensuring a compatible browser such as Internet Explorer, Fire thump or Chrome.Each scenario is different and is precisely one of the reasons why each company will require a customized Software Platform Compatibility Requirement list. Database applications programme Testing Requirements This section will serve as a generic methodology of Smith Consulting approach to database application testing requirements. The objective is to document a reusable database performance evaluation strategy regardless of database vendor or design specification. Additional testing steps may be applicable per vendor recommendation.Any additional steps are a project plan requirement used in injunction with Smith Consulting guidelines of database verification. The intention of database examination is for conducting a dictatorial test to validate data structure and data integrity during user software application read write performance testing. Assumptions Database performance testing in conjunction with software application database read write operations assumes the database architecture and structure development is to specification and logically designed.An additional assumption is the development of indexes, views, triggers, stored procedures, and functions exist and the database is available for software unit testing. Data Mapping Data mapping is a validation process to ensure end-user data entry form handle correspond with the mapped database table fields. The expected result of the verification of the retrieved data from application input must be consistent with the outlined data model from the database data dictionary. The only acceptable result will prove data writes to the designated table or tables and is congruent with format, length, and type of the data definition.Stress Testing The purpose of stress testing a database is to u nderstand the performance and reliability during heavy user interaction. Performing a high volume stress test assessment is essential to unveil database bottlenecks resulting in long response times and slow performance. A stress shoot down is performed by simulation of a designated number of application users. The load chance variable selection shall simulate, according to project specification, the reasonable number of end-users, below average number of end-users, slightly above average number of end-users, and five times the average number of end-users.The load simulation will create scenarios where users concurrently query against and write to the same table and numerous tables across he database. Result ill requires documentation and further evaluation for database optimization. Failure also warrants a hardware design team consultation to determine if the hardware is sufficient to handle the work load simulation. Transaction Isolation Transaction isolation verification te sts the database reaction during the occurrence of multiple table transactions taking place at the same time. A realistic situation exists where various read write requests will be present concurrently.While the scenario is unavoidable in a multi-user environment the state of the database is at risk during a existing read write request. The performance outcome ought to appear as though each database demand executes one right afterwards the other. Depending on the applied transaction isolation level, record locks are set in accordance with the transaction call (Microsoft SQL Server, 2012). The importance of testing transaction isolation validates read and write record locking, how long the locks are held, and the on-screen response time of the simultaneous operations.The transaction isolation testing is a sub-set testing situation of the database load testing. Isolation result documentation hall include the number of transactions, the response time of the transaction, and note the a ccuracy of the data read write. Data integrity errors must be reported to the database design team as well as the software design team for evaluation. Required submission includes the detailed steps of the data integrity inaccuracy for reproduction of the error.Budgetary Constraints Testing is the most widely used approach to ensure software quality but it also can be the most cost and time-consuming. To ensure the project for Smith Consulting stays in the green for budget concerns the project is scheduled with strict deadlines. Some cost overruns are regular for any project but the goal is to minimize the impact. Wars to accomplish these goals include defining clearly the responsibility of everyone involved with the project with clear methods of holding them accountable for their parts. Setting a financial goal is the best method to maintain a budget constraint.The project budget estimate should be accurately attested for management and the estimate should include when and how to handle costs associated with manpower in the event more help is required. The project statement should include a scope that is clearly defined in the beginning of the project. In situations where budget cuts may affect the ability to complete the project, managers should always start with physical resources before staff cuts. In more dire situations (where personnel are at risk) the standard remedy is to fill necessary positions with staff covering other potions to fill in until the financial situation has recovered.This design will ensure the impact on the project for the customer is minimal and will also prove our procedures are detailed. Software Testing To qualify new software for production the development team performs a multitude of readiness tests. Qualified software must pass the following tests Integration, Compatibility, Functionality, Usability, Security, Load/Stress, Documentation, Implementation, Automation, Support, and, Debugging. The following sections will highligh t the various testing methods that Smith Systems Consulting uses to ensure product reliability and competency.Performance Testing Meeting the needs of a company and client is a performance requirement of software engineering. Performance testing is a routine performance evaluation that determines how the system will behave. The behavior corresponds with the terms of responsiveness along with execution stability under a system initiated workload. One major thing that performance testing can serve well in is to measure, validate, investigate, or even verify all other attributes that are set up within the system such as the reliability, resource usage, and scalability.To monitor the systems performance, it is important to perform the steps that are highlighted in the following sections. Integration Testing While software is generally produced to perform specific Job functions, it is important and efficiency encouraging to incorporate integration with other applications. For example, a n accounting information system would benefit from company database integration, as well as Microsoft Excel and adobe brick Acrobat report saving integrations. Lately, it has become commonplace for programs to include software integrations as they incorporate the Software Oriented Architecture platform.With this in mind, it is extremely important for the development team to iron out the integration kinks before the software is released. To ensure that product integrations are functioning properly, the program testers have to Identify all of the integrated programs and software Determine the associated version poem that the program is being tested on. For ACH integration, perform in-depth testing. If the integration is not working well, the tester will have to troubleshoot, and perhaps contact the product team of the integrated product or service.When the integration is working properly, the version number should be noted. When the program is released to the public, the integrated programs version numbers that the program has passed the integration tests for should be displayed within its documentation as verification of compliance. Compatibility Testing Within an organization, there are many different platforms and software at use. In order for the company to be successful, all of the information systems must be able to communicate with their respective devices.The companys architecture must be build so that this wide web of services, and products are working in tandem with each other, and are able to co-exist in an unobtrusive manner. Ensuring this prevents software incompatibility issues, which can prove to be very costly. As an example, if an organization is only using Microsoft Windows devices, it would not make sense to purchase Office for MAC or other proprietary Apple software that do not integrate with the Microsoft Windows platform.Similarly, if a seer wanted to use the Microsoft Skydive feature which allows them to connect to a upstage PC, they will be unhappy to learn that Microsoft Windows 8. 1 does not support this. Performing compatibility testing showcases the limitations of the software and allows the programmer to compile a list of programs and versions which works with the system. Compatibility testing involves Determining the software that the program is required to maintain compatibility with. Performing thorough compatibility testing.If the system is found to be incompatible with the software already in place at the organization, the programmer just reevaluate, troubleshoot, and redo the section in question to make sire, Once the software is deemed compatible, the version numbers must be noted for inclusion in the project description documentation. Usability Testing One important factor when running an analysis on a potential client for Smith Systems Consulting is usability. Usability, by definition, are asking the questions is this capable of being used or is it convenient and practicable for use (Usable, 2014) .Each organization that SC approaches will behave this question differently. What one company deems as an important and commonly used featured may be impolitely ignored by the next. This is why usability is so important. Another way of looking at usability is trimming the fat. If a company doesnt need certain features than it really should be noted as not needing to be produced. This cuts down on production times and overall costs to the client making a more efficient project in the end.Functionality Testing To follow up with this of course it must be determined what is to be used most commonly and ensure that this is how the client envisioned. What is most important is that organization Smith Systems Consulting is working with feels they are getting apt attention and one certain way to do that is make the client feel as though theyve been listened to in the usability and functionality fields. Functionality is defined as the particular use or set of uses for which something is desi gned (Functionality, 2014).In this notion it is clear that functionality is heavily tied to usability. How something is used is in relation to how it is designed. When Smith Systems Consulting designs their products it is important to keep the user and usability in mind. These are both best accomplished by performing speaking with users who will e using the product especially those who may service in any beta testing. If the end users and stakeholders provide a clear vision then the project should be zip fastener less than a success when the developers attain that goal.Load/Stress Testing Each organization that Smith System Consulting will be working with will have their own unique technology environment they will be operating in. The more that SC knows of these environments the more they can consider potential benefits or weakness that can be considered. Once these have been considered then a test environment can be established. What makes a good test environment is running the intended software in mock environment, ideally on a system with near identical computer specs. This would include running on the same operating system and using the same amount of RAM, processing power, and hard drive utilization.Once these parameters have been set then a server / client test can be run ideally in a virtual environment. Once the program is operating on the network with an average number of computers machine-accessible and using the software then it can be fair to say this running a load test that is a test within linguistic rule operating parameters. To fully stress the system would be to mimic running the network at high capacity. This may include either a high number of concurrently connected users or the server carry a high load of responsibilities, such as sharing heavy SQL queries in addition to the software testing.Debugging Debugger or debugging tool is a computer created software program that allows the programmer to test as well as debug other types of programs. Therefore, with debugging the software plays a major factor because when a program is debugged, the programmer will find errors such as missing coding areas when creating the program. For example imagine that a developer created a weeping and he or she wanted to place a picture on it but wondered why the picture wouldnt display. Debugging the program can assist the developer with diagnosing and fixing the problem that is causing the program to malfunction.This goes to show that having a debugger is a worth tool for correcting computer programming errors. Software Security Assessment The purpose of a software security assessment is to identify and expel code vulnerabilities prior to customer delivery. Identifying the presence of a code-layer exposed vulnerability is a aboriginal action for conforming to a high standard. A good quality assurance model involves proactive steps to extinguish security flaws. Smith Consulting must guarantee the customer a secure product relea se and reduce the risk of threat exploitation via a thorough security testing regiment.Definition Software Security Assessment refers to testing criteria to establish threat resistant software. Testing shall demonstrate the softwares ability to withstand the attempts of infiltration with mall-intentions. Strategy Examination and assessment validate the absence of typical security errors exposing subjection to threat according to the Common Weakness Enumeration (The MITER Corporation, 2011). Black Box Testing The black box testing strategy involves the use of a testing group with no working knowledge of the software code structure, engineering, or implementation plan (Michael, caravan Wok, & Radicchio, 2005).Black box testers employ hostile approach to penetrate an applications security to identify bounds unknown during OSDL design and implementation phases. White Box Testing The white box testing strategy involves an orderly one-to-one validation source code is according to design specification and expected security components exist. The key appreciation from the black box testing is the assessor possesses an intimate knowledge of application code and construction (Mono, No Date). Analysis scans source code for common development faults identified from the Common Weakness Enumeration.The tester also keeps a lookout for seemingly harmless routines that can act as a back door for intrusion. Authentication Testing Authentication testing is a method of determining if a process or end-user is legitimate. The objective is to understand how the authentication process behaves and use that information to circumnavigate the authentication mechanism. Types of authentication tests are as follows 1 User Enumeration a brute force test using a valid user credential to determine if uncovering the authenticating password is possible (SPAS, 2012). Dictionary Testing a method for determining common words found in a dictionary exist in a user passers (SPAS, 2012). 3 Password Recovery the method to test the authenticity of a password reset or forgotten password request (SPAS, 2012). 4 Race Condition Testing identification of multiple processes executing simultaneously that modify the same data (SPAS, 2012). Documentation A good method of documenting processes in Smith Consulting products is to mirror the practices of life-cycle management tools that are in compliance with the Serbians-Cooley Act.A sound business in todays environment should focus their efforts on automation development and documentation processes. Smith Consulting documentation procedures will involve in audit process that will identify who has accessed code and what changes have been made. The documentation process will also include the ability to track what testing and assurance of quality has occurred during the construction of the project. In addition, the procedures will also include the ability to change parts of an existing project that have been determined to fall out of the sc ope of the goal of the business vision.The idea behind aligning documentation testing procedures with the described Act is to yield rewards such as rework reduction by automating change management aspects of programming within a project (Heavenliest, 2006). In doing so, the replacement of old paper-based software development tools with change management and code-management tools that allow Smith Consulting to monitor change request within the software development process by attaching electronic signatures to the software. This further alps the rework elimination process by verifying that the documentation changes in line with the goals of the business.The different documentation types are listed as Source Code Unit Test Report Software Test Procedure (provides instruction on how to test each component of a project) Code Explanation Report Implementation At times, in the implementation of test procedures it may become necessary to perform target testing to prove critical functions an d reduce the risk of large amounts of rework. Prior to the testing of each unit the developer is required to update the test procedure for conducting each test and record the results as scribed in the documentation procedure.In situation where more tests are required they will be completed as needed in order to satisfy those implementation requirements. Developers are required to implement and test development projects in accordance with coding standards and methods outline in the Software Engineering Manual. All unit test results are maintained in the Unit Test Report. Automation The automation method requires that the development model is separate from the test automation tools. The framework as designed is flexible enough to adapt to changes that the environment or the project may bring.The purpose of utilizing this method is because it is low costing. Implementing the test automation is a full- time effort that requires significant time and up-front investment. Automated tests are scheduled at 1,250, every other day. The only change to the automation procedure is if there is an unforeseen change to the business requirement that suggests a change should be made. Since automation is such an exhaustive task, it is reticent for projects on an enterprise level that expect multiple releases. The approach that Smith Consulting will use for its development projects is Test

Saturday, May 25, 2019

Calorimetry Prelab

Experiment 12 Calorimetry and Heat of Reactions ____________________________________________________________________________________________________________ PERFORMANCE GOALS 1. To learn how to use of a calorimeter 2. To learn how to collect and manipulate data in the computer 3. To maneuver the calorimeter constant 4. To use Hess righteousness to find the combust or formation of atomic number 12 oxide CHEMICAL OVERVIEW Enthalphy (? H) when chemical or physical changes occur at a constant pressure. Calorimeter is an instrument with insulating walls where the reaction happens. Eq. 1 q rxn = -qsurrounding Heat of capacity of the calorimeter Cp must be calculated at the beginning of every calorimeter experiment in Joules/ C Heat Capacity of the Calorimeter The calorimeter constant is easily found by adding a bushel amount of hot water to a known amount of cold water and the change in temp for each recorded, due to the Law of goose egg Conservation the amount of heat released by t he hot water should be equal to the amount of heat intent by the cold water Eq. 2 q released( Hot water) = -q absorbed ( stone-cold Water) If there is a discrepancy between these two values use the following equationEq. 3q= m x spht x ? T Where spht is the specific heat of the substance in J/ gC ?T is the temperature change in C andm is the mass in grams potty of Cold Water51. 20 g initial temperature of cold water20. 3 C gage of hot water49. 82 g Initial temp of hot water98. 2 C Final temp of the mixture58. 3 C Eq. 4qHot = mHot x sphtWater x ? THot qHot = (4. 184 J/ C-g)(49. 82g)(58. 3 C-98. 2 C) = -8317 J Eq. 5qCold = mCold x sphtWater x ? TCold qCold = (4. 184 J/ C-g)(51. 20g)(58. 3 C-20. 3 C) = 8142 J 8317-8142 = 175 joules Cp = ( 175 J ) / (58. C 20. 3 C) Cp = 4. 6 J/ C take fire OF REACTIONS q released = -q absorbed Eq. 6 q released = (q solution + q calorimeter ) Eq. 7 qSolution = mSolution x sphtWater x ? TSolution sphtsolution= 4. 184 J/ g C Eq. 8q calorimeter= Cp x ? T Eq. 9 q reaction = ? Hreaction Hesss Law Hesss Law adduces that the enthalpy of a reaction is independent of the steps that it takes to get from reactants to products because enthalpy of reaction is a state function. State Function- depends on initial and concluding state but not on the path taken ?Temperature ?Volume ?Pressure ?Energy Mg (s) + 1/2 O2 (g) MgO ( s) PRE-LAB ASSIGNMENT 1. Predict the product, balance the questions and redeem the net ionic equations for the reactions a. Mg (s) + HCI (aq) b. MgO (s) + HC (aq) 2. Write the reaction that represents the enthalpy of formation ( ? Hfor ) of water. 3. Use the table of the thermodynamic data in your text book to calculate the ? H for each of the three reactions REMEMBER Eq. 10 ( ? H rxn = ? ( n? H for )prod ? ( n? H for )react 1) 2) 3) 4. Use Hesss Law combining the three molecular equations to calculate the ?Hrxn for the reaction of the formation of MgO. PROCEDURE A. CALIBRATION OF THERMISTOR 1. 2. 3. 4. 5. 6. 7. B . DETERMINATION OF THE HEAT CAPACITY OF THE CALORIMETER 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. C. REACTION OF MgO AND HCI 1. 2. 3. 4. 5. 6. 7. 8. 9. D. REACTION OF Mg AND HCI 1. 2. 3. 4. 5. 6. 7. E. DATA AND CALCULATIONS A. Calorimeter Constant quid of Styrofoam cup with lid + spin bar (g) Mass of cup with lid + spin bar + 50mL of room temp. water (g) Initial Temp of Room Temp. Water ( C ) Initial Temp of Hot Water( C ) Total mass at the end (g) cipher Heat released by Hot Water (J) (Eq. 4) Calculated Heat absorbed by R. T Water (J) Eq. 5) Calculated Heat absorbed by Calorimeter (J) Calculated Heat Capacity of the Calorimeter, Cp (J/C) (Eq. 8) B. Heat of Reaction of MgO Mass of weighing boat (g) Mass of weighing boat + Magnesium oxide (g) Mass of Magnesium oxide (g) Mass of Styrofoam cup with lid + spin bar (g) Mass or Styrofoam cup with lid, spin bar (g) + HCI Calculated Mass of HCI (g) Total Mass of solution at the end Calculated Mass of MgO (g) (using total mass of solution)Initial Tem perature of Solution (C) (before MgO was added) Final. Temp of solution (C) (after MgO was added) Calculated Heat absorbed by solution (J) (Eq. 7) Calculated Heat absorbed by calorimeter (J) (Eq. 8) Calculated Total heat absorbed Calculated Total heat released by the solution (Eq. 6) Calculated counterspys of MgO Calculated Moles of HCI Heat released per Mole of MgO Molar Heat Reaction (kJ/mol) C. Reaction of Mg with HCI Mass of weighing boat (g) Mass of weighing boat + Magnesium (g) Mass of Magnesium (g) Mass of Styrofoam cup with lid + spin bar (g)Mass or Styrofoam cup with lid, spin bar (g) + HCI Calculated Mass of HCI (g) Total Mass of solution at the end Calculated Mass of Mg (g) (using the final mass of solution) Initial Temperature of Solution (C) (before Mg was added) Final. Temp of solution (C) (after Mg was added) Calculated Heat absorbed by solution (J) (Eq. 7) Calculated Heat absorbed by calorimeter (J) (Eq. 8) Calculated Total heat absorbed Calculated Total heat releas ed by the solution (Eq. 6) Calculated Moles of Mg Calculated Moles of HCI Heat released per Mole of Mg

Friday, May 24, 2019

Cyber crime Essay

The proliferation of the use of inter engagement technology for some time presently has seen the growth of hatreds that are committed over the net which is also referred to as the cyberspace. These villainys are referred to as cyber- nuisance. Basically cyber-crime is part of electronic crime and it is a crook activity that is executed through computer network (Balkin, 2007). Traditionally the term espouses such crimes as fraud, theft, forgery, blackmail, and other illicit activities that are make over the network. moreover as the use of computer networks ca-ca increased and more grammatical cases of computer crimes have come up and the definition of the crimes has also become expounded. The web is a worldwide thing in which materials are posted and rileed from all corners of the world. This worldwide coverage of the net gives rise to a diversity of information that is found in the net and it follows that cyber-crimes are a worldwide crimes. The nature of the differences in cultures in the world for example give rise to a need make sure the net is an objective platform of information dissemination, be it religious, social, or political material.The growth of business over the internet e-business has also brought in a nonher type of cyber crime whereby people may defraud potential customers of their money by advertising goods, services or even jobs that are non existent. Other types of cyber crimes exist, and they shall be looked at in the following discussion. According to the USAs Department of Justice, there have been very many cases of cyber-crime that are reported annually. This made the US establishment to join hands with the European councils Convention against Cyber crime in 2006.Look morethe issues concerning identity theft essayTypes of cyber-crimes The crimes that are common in the cyber are fraud. Fraud is a dishonest misrepresentation of facts that is intended to cause loss for somebody else and benefit the fraud doer. This includes chan ging inputs in internet in unauthorized manner, altering or deleting information that is already stored in the net, altering existing system tools, manipulating bank systems so as to make unauthorized access to bank ATMs (Shinder, 2002). Offensive content is another form of cyber crime. Harmful contents of websites are considered as cases of cyber crime.Also distasteful or wretched the information carried in a cyber sites is not allowed. All materials that have the potential of inciting hate crimes in societies, materials that encourage political rebellion, or blasphemous material are not allowed also as they are basically offensive in significant manner. If these kinds of materials are found posted on the web their owners are charge of cyber crime. The reason for the restriction of these materials is that they lead to hostilities based on faith, race, etc that the modern world does not have a place for. Harassment is another type of crime that occurs over the net.It includes the circulation of derogatory comments, and obscenities that are directed at certain individuals that are based on their aspects of gender, religion, race, sexual orientation or national identity. This is mainly done through news groups, e mails with hate messages, and chat rooms. Another crime that is supported by the net is drug trafficking. Drug trafficking is done through the net in that the illegal substance sellers use encrypted e-mail and other available internet technologies. The substances themselves are delivered to the buyer after they make payments.This crime leads to more gross revenue for the drug sellers since the exchange is restricted in most countries and the intimidated users of the drugs resort to this option as a save haven. Cyber terrorism is another kind of cyber crime. This crime is the coercion or intimidation of organizations or the establishment to advance a certain persons political or social goals. This is done by launching attacks on their computer netwo rks, and the information stored there using computer. This vice can be defined as an act of terrorism that is committed via the use of computer resources or cyberspace.It ranges from simple propaganda to the use of the internet to commit a serious terrorist attack (Blane, 2003). Hacking activities are classified as acts of cyber terrorism. This activity is the attacking of websites of families, individuals, and groups within a network, in order to collect information that is useful for criminal activities such as blackmailing, robberies, or ruining the activities of the web owners. A Canada case in 2000, which involved a Mafia boy who had committed 54 counts of illegal access to computers, is a classical case of cyber crime.The defendant also faced ten counts for mischievous data attacks on dell computer, yahoo, among other companies websites. There are many let downs in the fight against cyber crime. Many countries around the world lack systems and laws that are aimed at combating the crime. In extreme cases there are nations that condone or encourage some cyber crimes. In many of the countries the burden of flake cyber-crime is left to corporations that are touch on in one way or the other by the vice. Some of the countries have laws against the crime but the law is not implemented while others have proposals for the law but they have not made the law.Nigeria here serves as an example of such a country which has a good plan for fighting the crime only that the proposals have not been made into law. The bill addressing the crime is in the national assembly waiting to be discussed. If the bill were passed, cyber criminals would be prosecuted and duly punished. This go slow attitude is seen in many countries that dont seem to realize the danger that cyber-crimes pose to the victims. In any case government agencies like the police force, and crime investigation departments are among the leading victims of cyber crimes.Also politicians get lots of cyberspace bl ackmail and hence they should be in the head of finding a solution to the problem. Again cyberspace crimes are an image destroying affair. For instance a cyber-criminal operating from a country A to injure a victim in country B destroys the overall image of their country and this may translate to less trust for his country in the eyes of other countries. The result of this may be sparing loss of for the country that hosts the cyber-criminals as web based companies refrain from investing in the country (Yar, 2006).Protections against cyber-crimes The enactment of laws against cyber crime by the governments has been a move in the right direction. In US there are such laws as Computer Abuse and Fraud present that address issues of fraud that is related to computers, SPAM act that is intended to at controlling assaults of non solicited pornography. Other laws address extortion threats, identity theft, wire fraud, electronic communications privacy, and secrets of trade (Thomas, 2000). Legal frameworks that address each emergent form of cyber-crime should be made.The laws that are made should be implemented and avoid the situations from the past where some of the laws have not been put into practice. There should be cooperation with among the stakeholders concerned in the cyber-crime inclusive of all operators and technical solution providers in the sector. Such cooperation is a fast way to eliminating cyber criminals as their life in the community will be made difficult. The operators of cybercafes should not involve themselves with people who abuse the internet and commit the crimes. Public awareness on the crimes should be instituted.This campaign should inform the public about the dangers involved in the crimes. Awareness about cyber-crime should be created among members of the society so as to cut the lean of cases that are likely to occur if the people are not aware. The structure of the Europes convention against cyber-crime is that nations who become sig natories of it harmonize their national laws, improve their inquiring capacity on the matter and cooperate with other nations in the fight against the crimes. If this convention is adoptive internationally it is able to stop the problem to a outstanding extent.This is due to the trans-border nature of the problem. Since the net is used and violated worldwide then a workable solution to the problem should be worldwide. If the convention is not adopted in all countries, and cyber-criminals continue to operate freely there still will be effects on those countries that have ratified the convention (Shinder, 2002). On top of all this, victims of cyber-crimes should report the cases to the authorities for actions to be taken. Cyber criminals should be named and shamed so that they may cease from the practice. ConclusionCyber crimes are very prevalent in todays world and all actions that is required should be done to curb them. The current actions taken against the crimes are not enough and more should be done to address the problem as it posses a grave danger to the entire population of the world as it has the potential to influence political, social and economical wellbeing of communities, individuals and institutions. Protection of the selfs interest can only be guaranteed through the concerted efforts of all stakeholders and nations in fighting the crime. ReferencesBalkin, J. (2007). Cybercrime Digital Cops in a Networked Environment NYU Press Blane, J. (2003). Cybercrime and Cyberterrorism. Nova Publishers Shinder, D. (2002). Scene of the Cybercrime Computer Forensics Handbook. Syngress Thomas, D. (2000). Cybercrime Law Enforcement, Security and Surveillance in the information Age. Routledge Yar, M. (2006). Cybercrime and Society Crime and Punishment in the Information Age. SAGE http//www. usdoj. gov/criminal/cybercrime/ http//computerworld. co. ke/articles/2008/11/10/nigerian-govt-rated-low-curbing-cybercrime

Thursday, May 23, 2019

Review of Chart of Accounts †Philippines Essay

Review of Chart of Accounts Philippines Questions and Suggested Answers 1. In China GAAP, the bonds or stocks purchased argon categorized as Held-for-business or Available for sale or Long term investment, based on the purpose of purchase. Does Philippine GAAP have similar miscellanea? Philippine client want to separate the marketable securities to current or non-current, it means short or long term, right? Answer The Philippine pecuniary Reporting Standards (PFRS) based from International financial Reporting Standards (IFRS) classifies Investment in Bonds and Investments in Stocks as financial assets.For this purpose, investments in bonds or stocks are classified as ? transaction securities (debt or equity securities) o o ? ? Financial assets at fair value through profit or loss by requirement Financial assets at fair value through profit or loss by designation Available-for-sale securities (debt or equity securities) Held-to-maturity securities (debt securities only) These i nvestments are classified as all current (short-tem) or noncurrent (long-term) assets. The account name Long-term investment is not among the financial assets classification in PFRS.Current investments are investments that are by their very nature are readily realizable and are intended to be held for not more than one year. Debt Trading securities Available-forsale v v impartiality v v Current v Noncurrent Current or Noncurrent v Maybe classified as current or noncurrent depending on whether they are intended to be held within one year or for more than one year v Held-tomaturity v 2 For instance, trading securities are normally classified as current assets because these investments are expected to be realized within twelve (12) of the balance sheet date.Noncurrent financial assets are investments other than current investments. This residual definition means that the noncurrent investments are intended to be held for more than one year or are not expected to be realized within t welve months after the end of the reporting period. Trading Securities or Held-for-trading Securities The first category of financial assets chthonian PAS 39 is called financial assets at fair value through profit or loss. This category includes two types of financial assets, they are A. Financial assets that are held for trading or popularly known as trading securities

Wednesday, May 22, 2019

The Hippopotamus

The Hippopotamus Eliot uses the comparison of the hippo and The Church to make a pestering to en against religion. There are two main symbols in this poem, the hippo and The Church. Through hoot the poem, the stanzas are broken up between the two symbols, describing the hi pop in the beginning of the stanza and The Church in the end.In the third stanza it says, the hippos feeble steps may err, meaning the hippo can walk astray (9). This shows how the hippo is a symbol that represents the weakness of the flesh, even in the strongest of Cree tauter. Even though the hippo may seem to be strong and thick skinned animal, the com request to The Church proves it to be weak against the power of religion. The Church represents two different things in this poem, depending on the interpretation.In the beginning Of the poem, it represents the strength and et renal life of God in comparison to the weakness of the flesh, as it reads in the 7th line in the SE condo stanza, while the True Church can never tell on For it is based upon a rock. (7). But as t he poem reads on, the comparison between the hippo and The Church merge, causing a mock queen mole rat tone to arise. The hippo dies and is carried up to heaven with angels signing and hard as of gold playing, leaving the church below Wrap in the old filmy mist (32, 36) In r eating this, TheChurch morphs from a strong symbol of God, into a weak and hypocritical ins tuition that is wasting its strength to save on livery an animal. The two tones then combine in the end to Courtney make Elites opinion on The Church and religion known hypocritical, inflated, and egotistical. Knowing that Elites work in his archaean years was that of a cynical tone, and know Wing that this poem was one of the first he wrote, we can assume that this is a Poe m of mocking tone.

Tuesday, May 21, 2019

Kean University

I never thought this day would come as fast as it did. I feel similar this year is just going to fly by and the next involvement I fare Ill be packing to go to college, but let me not outwit ahead of myself. I remember always being asked, What do you essential to be when you grow up? The funny thing is, Ive always known. Ive always wanted to be a teacher. I can look back to my younger years and remember playing teacher, writing out worksheets, education classes with my cousins. Its something I always enjoyed. I am a sort out of the Coop Education program at my high shoal, I am now an intern at a preschool.It is just one touchstone closer to what I want to do in my future. I now have hands on experience with young children, being fit to interact and add input with any ideas I may have. As you can see, I am a determined young lady if I want something I am going to try my hardest to be the best I can be in the field I am interested in. Kean University has so much to offer me , especially because I know what I want to do with my life. Kean is a teaching University and elementary education is one of the most commonplace fields at Kean.Why else would I look any further? I have a plan, people with plans become successful. I am someone who can be a team impostor when needed be. I was on my schools softball team my sophomore year in high school. I believe that playing a sport, taught me sportsmanship, self-confidence, and being able to work as a unit. You are able to bond with you teammates through the rough long practices and demanding games. I enjoy being involved in school activities. I was apart of Spanish Club and was the secretary of this club in 2007.We had fund raisers, put on a show for the International Festival two years in a row, held at Bloomfield high up School, and also provided semi formals ,many accomplishments were made being apart of the Spanish Club. I was also joined do Crew my junior year, it gave me insight as to how plays and shows are put together. Its not an easy chisel it is time consuming but a learning experience. Next time I watch a play, I know how much hard work everyone backstage put in, being a part of stage setup and lighting was something stark naked I tried out and did enjoy.I am a determined young woman ready to attain young information in a new ambiance with different people from different walks of life. I am ready to leave my nutshell and burst into a new atmosphere I can say Kean University is where I would like to spend the next intravenous feeding years of my life growing. The campus is big itself, and is unlike any environment Ive put myself in. I would like to dorm. Its a time in my life were I can be independent. A year away from my parents and around people I am not familiar with . Life is about experiencing new things. I want to advance, study and experience this all at Kean University

Monday, May 20, 2019

African American Theatre 2 Essay

African American plain started out, hundreds of years ago, as a put ination of amusement for the mordant community. The theatre was a place where African Americans, equally men and women, could work, study, and perfect their expertise. The beginning of African American theater set in effort back in the 1830s, and it eventually became one of Americas most(prenominal) prevalent sources of entertainment everyplace the course of over one and a half decades, there has been an apparent(a) transformation within the dominion of African American theater.For example, African Americans have prevailed over the intense burden of subjugation in forms much(prenominal) as political affairs, comfortable residency and most significantly, equal human rights. One of the most apparent leisure pursuits that were in remission from African-Americans came in the appearance of the performing arts, more particularly film. During this time, the monastic order in general would non permit, for example , blackens to drink from the same water fountain, so to share the same on order experiences or television effects was, without a doubt, not even simply prohibited but unheard of.However, as time went by, the potency of the expectant African American actors and actresses weighed down the greater part of the general society, and society ceased being able to keep African Americans from appearing on stage and on television. For the longest time, the stage became and stayed the only way for African Americans to communicate the deep sorrow and oppression that the society, particularly the livid population, had put in front of them. Through acting, in addition to both singing and dancing, African Americans were able to, mentally and spiritually, go to a place that no tormenter could find them.With this new form of communication, African Americans found a new method of endurance, and acting was the fundamental technique. Even though the African American actors and actresses were agonis tic to take the road of continued existence in the theater to gain self contentment, it was, as an understatement, not unproblematic. For the longest moments in time, African American actors and actresses were not permitted to step foot on stage. However, black actors were sort of ridiculed by Caucasian actors in what they called black face. Black face was a performance where white actors and actresses would literally conceal their faces with black paint and makeup, so as to imitate an African American actor. From this falsification of the hopeful actors, derogatory names such as Tom, Mulatto, Mammy, Coon, and Buck resulted. Similar to Black Face, there was what is called folk singer Shows. Minstrel shows, which consisted of comic skits, variety acts, dancing, and music, ridiculed and made fun of African Americans in the most disapproving ways.According to these shows, black people were looked upon as ignorant, lazy, and unreasonable, but also cheerful and melodious. Broadway, whic h is the heart of theater for Americans, had been closed to blacks for more than a decade. However, this was only until the African American tuneful Shuffle Along turned out to be a runaway success, which some historians believe was the beginning of the Harlem Renaissance. The foremost African American play to be produced on Broadway was The Chip Womans Fortune in 1923, written by Willis Richardson.In the year of 1959, Lorraine Hansberry, a famous playwright, became the first African American woman to have her play produced and performed on Broadway. Hansberrys play, entitle A Raisin in the Sun, became an outlet for a continual assembly of plays by African American playwrights who ofttimes brought their own individual occurrences in the great effort in opposition to racial discrimination to the theater plays that they produced. . By the revolving of this period, the minstrel show enjoyed but a shadow of its former popularity, having been replaced for the most part by vaudeville.I t survived as professional entertainment until about 1910 amateur performances continued until the 1960s in high schools, fraternities, and topical anaesthetic theaters. As blacks began to score legal and social victories against racism and to successfully assert political power, minstrelsy lost popularity. The usual minstrel performance followed a three-act structure. The troupe first danced onto stage then exchanged wisecracks and sang songs. The arcminute part featured a variety of entertainments, including the pun-filled stump speech.The final act consisted of a slapstick musical plantation skit or a send-up of a popular play. Minstrel songs and sketches featured several stock characters, most popularly the slave and the dandy. These were further divided into sub-archetypes such as the mammy, her counterpart the old darky, the provocative mulatto wench, and the black soldier. Minstrels claimed that their songs and dances were authentically black, although the extent of the bl ack influence remains debated.Spirituals (known as jubilees) entered the repertoire in the 1870s, marking the first undeniably black music to be used in minstrelsy. Blackface minstrelsy was the first distinctly American delegacy form. In the 1830s and 1840s, it was at the core of the rise of an American music industry, and for several decades it provided the lens through which white America saw black America. On the one hand, it had strong racist aspects on the other, it afforded white Americans a singular and broad awareness of significant aspects of African American culture.

Sunday, May 19, 2019

Building a Child’s Playhouse

This is an important comeback because it concerns the welf be of children. Their mental health, wellbeing and recreation The greatest p arntal rapture and the greatest pargonntal vexation are tie in to the bliss and sorrow of their children. If you involve the children in building their baffle got raise, a youngsters Playhouse, you provide an out permit to them for their creative endeavors. But fortunately or unfortunately, commercialization of the Playhouse projects has robbed a big portion of creativity that genuinelyly belongs to children.Yet, the concept of Playhouse still fascinates children and they feel a intellect of involvement, in going through the literature, designs and colorful photographs concerning this project. Their involvement in the process of selection of the house thrills them. In the present day modern materialistic world, when there are too many unhealthy distractions for the children, to give rise social and home loving feelings in their minds is o ne of the solid achievements of concepts like building a infants Playhouse. If such a house is at the countryside so much the betterIt helps to cement the bonds surrounded by the children and Mother Nature with all her flora and fauna If the children born and brought up in metropolitan cities were to stay put in the youngsterrens Playhouse at the countryside, it will leave deep favorable impression on the formative minds. They will experience the difference between the concrete jungle and the real jungle of the birds and animals mount information Children are no ordinary market for the employment giants. In fact, they are the principal(prenominal) targets for pabulum items and colas. The multinationals have staggering budgets running into millions of dollars to hook the children to their products.The business of costly, commercial Playhouses and Cottages has been taken over by the business community. Do-It-Yourself Playhouse Building Plans, Build a new Playhouse, Play Fort, Kids Cottage, or Child-Size Backyard Cabin for your kids. These plans are crafted by experts and by the editors of magazines like Family Handyman, Garden Gate, WOOD Magazine, Workbench and more. They come with clear illustrations and step-by-step book of instructions to make your work easy. Most of the plans include complete material lists. (Summerwood Products)Thats about the real Playhouse, let us say, the architects wendy house, which is like a housing project, with the stamp of childrens delight inment program. Naturally, the main emphasis of such types of Playhouses is what maximum happiness and sporting activities the house great deal provide for the children In the bodily structure of such Playhouses, the role of children in the process of performion and finishing is very limited, because every thing is related to the house arrives in a packed container/parcel, and the assembling incite of such engineering units also belongs to the company-trained personnel.Some eras, c hildren are mere observers only they get the visual joy of the house being assembled by experts in battlefront of their eyes. It is not possible to provide clear cut dimensions of a playhouse . The design and the area can be anything. The definition of a playhouse is, a small structure that looks like a house and is big enough for children to play in. (Collins Cobuild English Language Dictionary) The children did build their Playhouses and found their stimulate channels of happiness since time immemorial. But the models and designs have undergone metamorphic changes.In olden days, children built Playhouses using mud, tree leaves and branches, to play and enjoy the games created by them. They were low budget or no-budget playhouses, created for the sake of temporary enjoyments, during week ends and during holidays. There was more joy and less capital investment in such Playhouses. The study of the problem During my study of the Playhouse phenomenon, I found the mushroom growth of p layhouses of all sizes, varieties and designs. It has become a fashion with the city folk to own a Childrens Playhouse at the countryside. It is construction activity in full swingThe Childs Playhouse has almost become synonymous Holiday Homes built for employees by Banks, Multinational Corporations and so forth The original purpose of building the play house for children was altogether different. It was by the children, for the children and to the children If it is a real playhouse for children, the joy and the activity element in building the Playhouse, needs to be the exclusive property of the children. If the children stay put present during the inaugural ceremony of a newly constructed playhouse by their rich parents, well, it is still a playhouse but much of the joy essence is not in it.Let the parents spend some step time with their children. Have a close look at this observation by a acquire happily observing his child engaged in building something of her own Later, while recovering from the obtain experience, I didnt notice Ana busy in her roomuntil I was called for a fitting. Resting on green mop soles was a converted shoe box, with painted laces hooked around colored paper clips. My new shoe had everything bagel stickers on its sides and sports-card toes, rivaling the best in-store models.Children in todays media generation often dont make things at home, and they often construct objects only in cyberspace. Computer games, and nonetheless the new LogosR, come with hefty instruction manuals for constructing very particularized pre-determined forms. Art teachers need to consider the importance of children making things, building by hand, constructing their own objects without formulas or patterns. (Szekely, February 2001) court of building a Playhouse and material required This is a higher(prenominal)ly hypothetical question and no fixed answer can be given.It all depends upon ones requirements and plan. What is important is the involvemen t of children in the construction of the house. That is the real Playhouse. It can be a low-budget simple cardboard playhouse, created by contrivance boxes. Children need not be told how cut holes, windows and doors and install air conditioners You can provide the children with dozens of boxes so that they can build a real big playhouse with all the furnishings like curtains, wall decorations and even a table tennis court They can paint the house and make the interior decorations of their choice.And if you need to go for real Play Houses, all that you have to do is go through the various catalogues and do the selection in consultation with your children, the real masters of the Play Houses The material used for such Playhouses is of high quality and as per approved specifications. The Playhouse comes with a warranty of 5 years or more. The innate cost of the Playhouse will be as per your budgetary allocations. Conclusion and recommendations Children have endless possibilities and confidence. The parents and the teachers have a great responsibility to wean away the children from the net games.This is not to say that the net games are totally bad. But moderation in this area is the need of the hour. Children, love physical activity Their real joy is in creativity, involvement, create playthings, alter playthings and destroy playthings. Building playhouses needs to be an important part of the syllabus for children, where the teachers should be mere observers. Watch and note what the children do, left to themselves. They can be given extensive hints. The mention made about the responsibility of teachers and parents is just not an academic issue. Spending maximum time with your children is the social need of the present times.The distractions for the children and the younger generation are too many. Involvement of the parents in the activities that use up the children is one way to control them in the positive way. Staying in a playhouse and engaging with the children is bang-up for both Finally, try to awaken the hidden genius within your child. By allowing him to construct and have his own Play House Word count 1317. . Works Cited Collins Cobuild English Language Dictionary. Summerwood Products, Designers of Fine outside Structures Szekely, George. Handmade Art, Arts and Activities Magazine, February 2001.

Saturday, May 18, 2019

Three Stages of the Child Development

Question 2 What ar triad stages of small fry development? Maria Montessory divide the bear on of child development into tree stages. 1. First stage Absorbent top dog (0-6 years) This is the termination of transformation and the character of this period is k at presentn as the Absorbent Mind. The child absorbs environment into himself. The child creates the person she will fashion once given an appropriate and specially prep atomic number 18d environment to work. Montessori said that during the absorbent encephalon, the Sensitive Periods be at the strongest and facilitates the childs encyclopaedism process.This period can be divided into two sub-phases. Unconscious Absorbent Mind (0-3 years). The child cannot be dictated in this period nor can be directly influenced by the adults. The child learns unconsciously from his environment by using his senses of seeing and hearing. No formal schooling is suggested in this period however provision of a suitable environment greatly helps a child in reservation good early impressions of the world around him. Children under the age of three, do not need to move over littleons in order to learn, they simply absorb everything in the environment by experiencing it, being part of it.It is indeed important that the environment set up is good, nice and positive since this is what the child will absorb whether he chooses to or not. Conscious Absorbent Mind (3-6 years). Child becomes sensitive to adult influence. The period from 3 to 6 years of age is a period of conscious construction when the child takes consciously from the environment. This is the bless epoch to play. The child realizes the environment by the work of his hands. The child starts building personality basing on the impressions stored during first three years of his life.The sense of touch gets coordinated with the mind. Hands become a prime tool of learning. This is as well as a condemnation of social development. The child wants to have compan y of other children and can be separate from mother for short periods of term. Children of this age are also very drawn to activities that engage the five senses. Montessori materials are designed to clearly isolate specific concepts such as length, weight, shape, size and color. Children learn to compare and line using their senses of smell, taste, touch, sight and hearing. 2. Second stage Later Childhood (6-12 years)For many children, these years from six to xii are the glory yearsa time of calm and steady growth and expansion of interests. At approximately six to seven years of age, children experience a major transformation. This transformation leads from the sponge-like absorbent mind of early childhood to the reasoning, counting adult mind. This is the period when children develop crystalline thinking skills. They have to think and consciously study in order to learn. During the stage of the absorbent mind, learning happened almost automatically through with(predicate) exposure, but the reasoning mind needs to be consciously engaged in the learning process.This is a period of uniform growth, an intermediate period or the second stage of childhood. At this stage children are more stable, calm and of great energy. As the child has mastered most of the basic human skills, he no longer has the Absorbent mind but learn through reasoning using his supposition to explore further. It is also a period of self discovery and a period for developing characters, ethics and ethics. Montessori offers an exciting idea for guiding education The secret of good teaching is to regard the childs intelligence as a fertile field in which seeds may be sown, to grow under the heat of flaming imagination.Our aim therefore is not merely to make the child understand, and still less to force him to memorize, but so to touch his imagination as to enthuse him to his inmost core. (Montessori, 1967, pg. 15). Maria Montessori place three primary developmental drives of the el ementary years. First, the child develops a voracious appetite for facts. Second, the child enters a period of moral formation and begins to ask questions about right and wrong. Third, his imagination becomes his most powerful learning tool.To feed this hungry mind and active imagination, Maria Montessori suggests that children need a vision of the whole initiation starting with the solar system, the history and geography of the earth. Only a vision of the universe offers a example for understanding all of the component parts. On the moral level, it helps children begin to understand that they are part of an coordinated whole. 3. Third stage Transformation (12-18 years) This is a period of Transformation, both physically and psychologically. Mentally, they have developed logical thinking and do not like to be told or pressure into learning.During this time, age twelve to 18 years others become more important. Little by little they leave the family, first emotionally thus physic ally. This is hard on parents. Parents are asked to see the adult in the child. Parents need to change how they talk. What was appropriate in the lead is not anymore. They see adulthood coming and are very interested in themselves. All children at this age have an inferiority complex. They are convinced they are being watched. They imagine everyone is looking at them. They dont have a stable inside or outside anymore. It is also a very idealistic time.They need to be exposed to heroes and idealists. They want to know they have a utilisation to play. They respond to people who make a difference. The hardest part in our society is that they are seen as useless. indian lodge is telling them there is no place for them until they get older. The way out for this is often the arts, music and drama. This is the time that the child develops significant relationships with other adults. at that place is a decrease in IQ during this period. The child has a decreased interest in academic lea rning when they are really growing and going through great physical changes.It is a time to train for self-sufficiency. Connect lessons with practical, concrete experiences. This is a good time to learn about the independence and interdependence of nature. Like the first stage of development it is also divided again into two sub-phases Puberty (12-15 years) At this stage the child is like a new born(p) baby. His character is seldom stable and there are signs of indiscipline and rebellion. The advent of puberty indicates the end of childhood. tag physical changes take place and the child becomes very sensitive of his self.All the confidence and joyfulness of the childhood is abruptly lost. At this stage, the child needs full emotional support of parents and teachers. Adolescence (15-18 years). This period is marked with an attitude of rebellion, discouragement, hesitation, and doubts. There is an unexpected decrease in intellectual capacity as compared to an extrovert of 6-12 year s. The creativeness takes charge. The child now transforming into adulthood wants to explore the world. Sensitive to criticism and hates to be ridiculed. Parents and teachers need to accommodate mistakes and encourage new ideas.

Friday, May 17, 2019

Land Subsidence in Bangkok, Thailand

Land Subsidence in capital of Thailand, Thai debarkSpecific PurposeTo guide my audience to hold that we mustiness halt the subsiding in Bangkok by cut pour down over-exploitation of groundwater, increasing the usage of surface water, and sing re localisetlement of the ceiling seat of governmentThesisIn night club to maintain our capital seat of government safe, we must understand the jobs and causes of the husbandry subsiding, and take action to halt the remission.organisational Form Problem-cause-solutionIntroductionAttention GetterIf you have been experiencing a spot lower late, it is non provided your imaginativeness. In fact, Bangkok has been droping.Around 20 per centum of Bangkok had already sunk by about a metre over the past 30 old ages, s support Srisuk ( 2006 ) , manager of the Groundwater Research Centre.Reason to listenThis is what is go oning in Bang Khun Thian territory of Bangkok. Panya Changcharoen ( 2008 ) from this territory say, Im non certain how lo ng my firesidehold and I can populate here. We urgently need aid before we lose the whole territory to the sea. The people in this territory lost their places, kills, and occupations as or so countries submerged. If we do non halt the land remission in Bangkok, non merely Bang Khun Thian, but the whole metropolis will fall below sea degree.Credibility StatementA professor from Chulalongkorn University said that Bangkok is droping at twice the enumerate it was a decennary ago ( Trisirisattayawong, 2009 ) .A Dutch expert who has studied the state of affairs said, In fewer decennaries, Bangkok may non be habitable ( Haberman, 1983 ) .More than 50 per centum of the sinking feeling has been caused by the tapping of groundwater by industry, said Dr. Sanitwong ( 2013 ) , manager of the Gio-Informatics and Space Technology Development Agency.Preview of Main PointsFirst, I will exemplify the dangers of the land remission in Bangkok.Second, I will discourse why this catastrophe is go on ing to us.Finally, I will appoint how we can get the better of this job.BodyThe jobBangkok, the capital metropolis of our state, is quickly droping.Even worse, the gait of land remission has been quickened ( Trisirisattayawong, 2009 ) .If this proclivity continues, most of our capital metropolis will be in danger of falling below sea degree by century s terminal ( Haberman, 1983 ) .Urban countries wish Bangkok are vulnerable to set down remission, which is frequently destructive.Land remission can damage our substructures ( Tularam & A Krishna, 2009 ) . It can destruct our Rama bridges, our BTS, our MRT, our main roads, our railwaies, and our voltaic power lines.Land remission besides amendss underground pipes, increasing H2O depletion. This can make a vacuum cleaner in the aquifer, which could do a prostration of land ( Hasan, 2006 ) .Land remission can do monolithic inundations like 2011 because it increases inundation hazard ( Tularam & A Krishna, 2009 ) .PassageIn order t o halt the land remission of our capital metropolis, we must foremost cognize what caused this catastrophe.CausesOur capital metropolis is droping chiefly because of inordinate groundwater pumping.The land remission rate is rough 3 centimeter a twelvemonth in some topographic points in Bangkok callable to over-extraction of groundwater ( Shaw, Srinivas, & A Sharma, 2009 )As we pump groundwater, the H2O that bears the dirt above is bit by bit removed, impacting the geologic construction. Hence, the land begins to lessen ( Tularam & A Krishna, 2009 ) .There is no appropriate pricing policy in pull outing groundwater beyond sustainable output degrees, and hence there is over-exploitation of groundwater ( Suwal, n.d. ) . In Thailand, none of national bureaus is responsible for coordination groundwater resources ( Foster, 2008 ) .Overloading on the wanton Bangkok ClayBecause the soft Bangkok Clay is about 70 per centum saturated, it is really soft, weak, and compressible ( Bhattacha rya, 2013 ) .The land remission in Bangkok has occurred because constructions were built without sing the bearing capacity of the soft Bangkok Clay.The weight of the land surface rises due to building of heavy edifices, ensuing in the compression of the clay bed ( Bhattacharya, 2013 ) .PassageWe now know that over-exploitation of groundwater and overloading on the soft clay have caused the land remission in our capital. Then now, we must larn to work out the jobs.SolutionWe need to cut down the rate of groundwater pumping.Groundwater in Thailand costs merely approximately 10 ticals per one three-dimensional metre ( Department of Groundwater Resources, n.d. ) .Higher monetary values for groundwater are requisite ( Bangkok State of the Environment, 2001 ) .We besides need to utilize groundwater and surface H2O conjunctively, or utilize much surface H2O if possible.Surface H2O intervention workss have a larger capacity. They are a clasp more efficient in providing H2O to urban coun tries ( Mahmud, 2009 ) .Surface H2O intervention workss are located somewhat the beginnings of surface H2O such as nearby rivers ( Mahmud, 2009 ) .If none of the solutions plants, we should in conclusion see relocating the capital metropolis as the last option.Some Thai environmental experts believe that traveling the whole capital metropolis to a higher land, for case one of the 16 northeasterly states, is the lone solution ( Kurlantzick, 2011 ) .Resettlement of the capital metropolis is dearly-won and time-consuming, but the safety of the new capital will convey benefit in the long haul ( Capitals should, 2012 ) .DecisionThink of your place. You grew up at that place, you have spent most of your clip at that place, you feel the safest at that place. However, will your sweet place be still there when you are at your 50? If the land remission in Bangkok can non be stopped, no 1 can guarantee that your house will be safe when you are old. Even though land remission has been a secu re menace to our capital metropolis, our authorities has ignored this grave danger. We merely have few decennaries to undertake this job. nowadays is clip. We must maintain our eyes unfastened. We must press the authorities. We must salvage our places.MentionsBangkok State of the Environment. ( 2001 ) . 5 Land remission.Regional Resource Centre for Asia and the Pacific.Retrieved from hypertext permute communications communications protocol //www.rrcap.ait.asia/pub/soe/bangkok_land.pdfBhattacharya, K. A. ( 2013 ) . An analysis of land remission in Bangkok and Kolkata due to over-extraction of groundwater.EJGE.Retrieved from hypertext transfer protocol //www.ejge.com/2013/Ppr2013.163alr.pdfCapitals should be moved to Northeast, top scientist says. ( 2012, Feb 5 ) .The State.Retrieved from hypertext transfer protocol //www.nationmultimedia.com/national/Capital-should-be-moved-to-Northeast-top-scientist-30175186.htmlDepartment of Groundwater Resources. ( n.d. ) . retrieved from hyper text transfer protocol //www.dgr.go.th/en/organize.htmFaculty of Geosciences at Utrecht University. ( 2010 ) . Rising sea degrees attributed to planetal groundwater extraction.Utrecht University.Retrieved from hypertext transfer protocol //www.uu.nl/EN/Current/Pages/Wereldwijdonttrekkenvangrondwaterleidttotzeespiegelstijging.aspxFoster, S. ( 2008 ) . Siam Strengthening capacity in groundwater resources direction.The World Bank.Retrieved from hypertext transfer protocol //www.un-igrac.org/dynamics/modules/SFIL0100/view.php? fil_Id=178Haberman, C. ( 1983 ) . Crowded Bangkok is droping under weight of its ain growing.The New York Times.Retrieved from hypertext transfer protocol //www.nytimes.com/1983/05/01/ world/crowded-bangkok-is-sinking-under-weight-of-its-own-growth.htmlHasan, F. K. ( 2006 ) . Water direction in Dhaka.International Journal of Water Resource Development, vol. 22Kurlantzick, J. ( 2011 ) . Time to travel Bangkok? .Council on Foreign Relations.Retrieved from hypertext transfer protocol //blogs.cfr.org/asia/2011/11/09/time-to-move-bangkok/Mahmud, A. ( 2009 ) . Impact of urbanisation on land H2O.Research throw off of Social Science 2008-9.Retrieved from hypertext transfer protocol //www.academia.edu/8072864/ Impact-of-Urbanization-on-Ground-WaterSanitwong, A. ( 2013 ) . Thailand needs to move as Bangkok sinks faster.Deutsche Welle.Retrieved from hypertext transfer protocol //www.dw.de/thailand-needs-to-act-as-bangkok-sinks-faster/a-16739739Shaw, R. , Srinivas, H. , & A Sharma, A. ( 2009 ) .Urban hazard decrease An Asiatic position.Wagon Lane, UK Emerald Group Publishing LimitedSrisuk, K. ( 2006 ) . Excessive groundwater usage sinking Bangkok .Department of environmental Quality Promotion.Retrieved from hypertext transfer protocol //www.deqp.go.th/index.php? option=com_content & A view=article & A id=145382006-02-17 & amp catid=72010-02-04-06-14-10 & A Itemid=43 & A lang=thSuwal, S. ( n.d. ) . Water in crisis Thailand.The Water Project.Retr ieved from hypertext transfer protocol //thewaterproject.org/water-in-crisis-thailandThai National Committee on Irrigation and Drainage. ( 2002 ) . General Information about Thailand.International Commission on Irrigation and Drainage.Retrieved from http www.icid.org/v_thailand.pdfTrisirisattayawong, I. ( 2009 ) . PS-inSAR measuring of land remission in Bangkok metropolitan country.Chulalongkorn University.Retrieved from hypertext transfer protocol //www.sv.eng.chula.ac.th/attachments/article/84/ACRS2009_InSAR_GEO2TECDI.pdfTularam, G. A. , Krishna, M. ( 2009 ) . Long term effects of groundwater pumping in Australia A reappraisal of impacts around the Earth.Journal of Applied Sciences in Environmental Sanitation,4( 2 ) , 151-166.Warr, P. ( 2005 ) . Thailand beyond the crisis. Routledge Curzon, New York New yorkWater Environmental Partnership in Asia. State of H2O environmental issues Thailand. Retrieved from hypertext transfer protocol //www.wepa-db.net/policies/state/thailand/thaila nd.htm