.

Friday, May 31, 2019

Indigenous Hawaiians Protest the Exploitation of their Islands :: Essays Papers

Indigenous Hawaiians Protest the Exploitation of their IslandsReminiscent of the Civil Rights movement that thundered through with(predicate) the Continental states in the 1960s, the Hawaiian Sovereignty Movement has gripped the shores and cities of Americas pet paradise and rattled its colonist society with determined strength and purpose the fence exploitation of Hawaiian land, Hawaiian spirituality, and Hawaiian life must unequivocally end now. From first contact in 1778, through the militaristic overthrow of the queer in 1893, Americas settler society ostensibly destroyed the cultural fabric and language of Hawaiis autochthonous people. American colonists killed thousands of natives through the spread of lethal diseases and crippled the existing Hawaiian economy through land acquisition and monopoly of the sugar market. Engineered exclusively for the benefit and survival of the settlers, American settler society allowed for no legal recourse by the marginalized natives native rights were denied altogether. Thus defined by 100 years of oppression and exploitation, modern Hawaiians are ferociously ethnocentric in a movement which has neared from demands of restitution to outright sovereignty (69). As multinational corporations sell our Hawaiian beauty(61), the Ka Lhui Hawaii actively seeks to mend indigenous self-determination and enforce the Draft United Nations Declaration on the Rights of Indigenous Peoples for all remaining Hawaiians. In these demands for universal human rights, the strenuous progress of decolonization reverberates with every non-violent demonstration and international gesture. Yet despite the triumphant illusion of decolonization, historical colonialism continues to render Hawaiians victim to the consuming institutions of neocolonialism, namely, co-optation and the scourge of tourism (108). Triumphant decolonization is not yet a reality. The success of decolonization rests heavily on eradicating the psychological dependency Hawaiia ns imbibe through haole education (42). As he who controls the past controls the future, modern day haoles seek to perpetuate modern racist realities by poisoning public memory with counterfeit history. Haoles teach these ludicrous interpretations of settler society and crudely render civilization as a blessed yoke to the feudal Hawaiians. Therefore, in the cycle of decolonization, the truth of the marginalized Hawaiians must be rewritten. Spiritual and cultural identity is primarily reclaimed in the celebration and survival of native languages and philosophies. As Haunani-Kay Trask had to learn the Hawaiian language like a sports fan so that Trask could rock within her and lay at night in her dreaming arms (118), so must the prostitution of Hawaii by haole and tourer be transformed.

Thursday, May 30, 2019

Madagascar: The Exotic Island :: essays research papers

Looking at a map of the southern hemisphere, one wouldnt expect such a seemingly " small" island to be so exotic and bountiful, but the island of Madagascar is just that. A 226,658 square mile (587,041 square kilometers) piece of land, with a a coastline of about 2,480 miles (3,990 kilometers), its a attractive and different view of its large neighbor, Africa.The island itself is made up of ridges, rivers, valleys, and tropical forests sectioning absent the different regions of the landscape, scattered trees and tall grasses to one side, narrow coastal plains, and low plataeus and plains off to another. To the north is Mt. Maromokotro, the highest peak on the island at 9,436 feet (2,876 meters). Coral beaches line the east coast, adding to the natural beauty of the already lovely landscape.The tropical climate provides varying amounts of rainfall-from 83 inches (211 centimeters) in the northwest to 14 inches (36 centimeters) in the southwest. The drought-infested south is extremely hot and dry, and the west is hot and wet. Indian Ocean cyclones bring periodic heavy rains and damaging floods. Once covered by forests, most of the island now has a savannah-steppe vegetation with a few forests in the west and evergreen forests on the eastern limit of the central plateau. An interesting climate for such a unique place.The animals there are also different and the likes of which not found anywhere else not plain in Africa. 50 species of lemurs inhabit the island, as well as 800 different types of butterflies. Though near the once-dubbed "Dark Continent", the species and vegitation seem to have remnants of Eastern India, consequence perhaps that the island is a breakaway of the decidedly larger continent of Asia.The peoples of the large island are as diverse as the wildlife, ranging from the Malagasy to the French, several native groups mixing with those of abroad origins. The population in itself has near doubled since 1950, 80 percent, mostly rural. Malagasy and French are the officials languages of the island, with Christians (both Roman Catholic and Protestent) making up the most of the religious groups. one-half still follow traditional ways, however. Education is free to all citizens of Madagascar ranging in age from 6 to 14. However, some tend to skip school and go straight to work.

Wednesday, May 29, 2019

Casse Study Essay -- essays research papers

Team Case StudyMy group is comprised of a group of individuals change in relating to people in the automobile industry, mainly car principals. Our teams goal is to work with dole outers and to servicing them understand how to effectively sell fomites, persuasion unseen, to internet buyers. These are buyers that will never even see the vehicle or step on the dealers lot. We turn in to teach the dealer how to market and relate to a customer well enough to incite them to buy a car that they will never touch, taste, smell, see, or test drive. In the growing age of internet fraud this task be lets difficult, we now eat to teach them how to make a customer trust them enough to send bullion to them, without ever meeting them. The Purpose, and long term goal, of this project is to drive the beat of listings of vehicles for sales on the site in a way that will help us meet our yearly goals of high growth.In 2003 during study of sales team environments, Amy Dewey, the director of a gency and association marketing for The Ameri clear College said, "Different personalities r on the wholey out in any type of team," she says. "You want to be as expeditious and effective as possible, but at that places going to be that social ratio that may prevent something from being as effective as it can be."This was proven to be true to me when a member of the team had signed an delineate in a territory that belonged to an separate team member. This had happened to be an direct that had been a previous customer of the composition owner in a diverse region. The dealership contact had moved to a dealership in this other territory, which did not belong to the account owner, and wanted to start a new account, and deal with the same representative he had been dealing with for years. The members whose region it was transferred the account to them since it was their area, without notifying the account owner of what she was doing. The account owner found out an d transferred the account back art object she was not in the office, but mentioned it out loud to the rest of the team. A new member of this team, that had over heard the account owner complaining, went to the member that own the region and exaggerated the story.This impacted the team in the fact that there were now some hurt feelings between these two team members that had worked togeth... ...oid conflict forrader it happens. When there is conflict, being an anchor member of the team, I have take place up with many creative solutions to our office conflict. I believe almost all conflict stems from bad communication. In 2002 Eric Abrahamson felt, Team conflict can initiate from differences between team members in terms of power, values, and attitudes. It tends to arise when resources are scarce, the team posture is ambiguous, members have different goals, and the tasks assigned have some connection.References1. Different personalities come out in any type of team," she say s. "You want to be as efficient and effective as possible, but theres going to be that social holding that may prevent something from being as effective as it can be." rootage Barry HigginsPublication National Underwriter. (Life & health/financial services ed.). Erlanger kinsfolk 8, 2003. Vol. 107, Iss. 36 pg. 122. Team conflict can arise from differences between team members in terms of power, values, and attitudes. It tends to arise when resources are scarce, the team situation is ambiguous, members have different goals, and the tasks assigned have some connection. Casse Study Essay -- essays research papersTeam Case StudyMy team is comprised of a group of individuals specialized in relating to people in the automobile industry, mainly car dealers. Our teams goal is to work with dealers and to help them understand how to effectively sell vehicles, sight unseen, to internet buyers. These are buyers that will never even see the vehicle or step on the dea lers lot. We have to teach the dealer how to market and relate to a customer well enough to convince them to buy a car that they will never touch, taste, smell, see, or test drive. In the growing age of internet fraud this task becomes difficult, we now have to teach them how to make a customer trust them enough to send money to them, without ever meeting them. The Purpose, and long term goal, of this project is to drive the amount of listings of vehicles for sales on the site in a way that will help us meet our yearly goals of high growth.In 2003 during study of sales team environments, Amy Dewey, the director of agency and association marketing for The American College said, "Different personalities come out in any type of team," she says. "You want to be as efficient and effective as possible, but theres going to be that social dimension that may prevent something from being as effective as it can be."This was proven to be true to me when a member of the team had signed an account in a territory that belonged to another team member. This had happened to be an account that had been a previous customer of the account owner in a different region. The dealership contact had moved to a dealership in this other territory, which did not belong to the account owner, and wanted to start a new account, and deal with the same representative he had been dealing with for years. The members whose region it was transferred the account to them since it was their area, without notifying the account owner of what she was doing. The account owner found out and transferred the account back while she was not in the office, but mentioned it out loud to the rest of the team. A new member of this team, that had over heard the account owner complaining, went to the member that owned the region and exaggerated the story.This impacted the team in the fact that there were now some hurt feelings between these two team members that had worked togeth... ...oid conflict b efore it happens. When there is conflict, being an anchor member of the team, I have come up with many creative solutions to our office conflict. I believe almost all conflict stems from bad communication. In 2002 Eric Abrahamson felt, Team conflict can arise from differences between team members in terms of power, values, and attitudes. It tends to arise when resources are scarce, the team situation is ambiguous, members have different goals, and the tasks assigned have some connection.References1. Different personalities come out in any type of team," she says. "You want to be as efficient and effective as possible, but theres going to be that social dimension that may prevent something from being as effective as it can be."Author Barry HigginsPublication National Underwriter. (Life & health/financial services ed.). Erlanger Sep 8, 2003. Vol. 107, Iss. 36 pg. 122. Team conflict can arise from differences between team members in terms of power, values, and attitudes. It tends to arise when resources are scarce, the team situation is ambiguous, members have different goals, and the tasks assigned have some connection.

Materialism in Todays Society Essay -- Consumerism America Capitalism

philistinism in Todays SocietyHave you ever sat down and re everyy thought about how overmuch you value your possessions? Do you value your belongings more than you value friends, family, love, or yourself? The truth is that obsession with possessions has be stick with a way of life in todays society.Materialism has been defined as the theory or doctrine that physical eudaimonia and worldly possessions constitute the greatest good and highest value in life. (Heritage Dictionary, 3rd ed.) This manner that we look to possessions to bring us happiness. We then use these possessions to make things and people behave or respond the way we desire. We have become so in(predicate) at fabricating and manipulating the world that we have come to believe that altering our surroundings is the way to solve all of our problems. We go through life contemplating that inner well-being depends on what we have or do. Due to these assumptions, materialism now carries the shape that people?s religion , occupations, and bloodlines used to carry (Twitchell 1999). We identify ourselves and others by what we wear, what we have, and what brands we sport.Our unrestrained inlet ascends the unlimited number of goods and merchandise available (Twitchell 1999). As the quantity and variety of products grow Materialism in Today?s Society 3larger, so does the demand for these products, thus resulting in mass branding. A brand is a product name or logo, that when consumers become familiar with, immediately brings to mind a specific product or service (Pavitt 5).We, as humans, want to fit in so we wear and use certain brand names because of the status we gain from them. Everywhere we look, there are dozens of newspapers, magazines, billboards, and televis... ...e. Materialism has been found to help us deal with life and problems and help us escape from all the issues of the real world? Just like a drug, material objects, luxury, and all the finer things bring us happiness and fulfillment. Th is is why I have come to believe that materialism has become more of a way of life for people in today?s society.ReferencesBoston, Gabriella (2003). Designed to Fit In young Fashion Defined by Peer Pressure. (The Washington Times, D01).Bothelo, Greg (2002). The Brand Name Game. (CNN New York, Dec. 05, 2005).Pavitt, Jane. Brand. New. (New Jersey Princeton University Press, 2000).Russel, Peter (2000). Waking Up in Time, Materialism- An Addictive Meme.Kulman, Linda (2000) Our consuming Interest. (U.S. News and World Report, 2000).Plasticsurgeryresearch.info. Cosmetic Plastic Surgery Research. (2002-2003).

Tuesday, May 28, 2019

Impact Of Workplace Environment On Employee Retention Essay -- Busines

As employee satisfaction plays a vital role in the success of an organization. If the employees ar satisfied and apt with their job and working terminus then they will give their best for the improvement of an organization. Happy and satisfied employees always put more efforts for the organisational achievements and stay loyal to the company. Job satisfaction is directly related to the productivity... (http//www.expresshospitality.com/20080430/management08.shtml)The term employee satisfaction is basically used to describe either employees are joyful and contented or working conditions are meeting their needs and expectations. (Heath, 2006). Many factors are contributing towards the employee satisfaction with in the workplace like salary, rewards, promotions, incentives etc. These are the things which create the sense of belongingness in the employees towards their organization and they realized that they are bringing success in the organization. (Sundar, 2006).The success of any organization depends upon its members so if the members are happy with their jobs and they are rewarded for their work then they will ultimately give their best to the organization. Satisfaction also leads towards concentrating on the work. Foster (Harris et al, 2007) studied the shock absorber of social realize on employee satisfaction and job tenure. Social support has been defined as the actions of others that are either helpful or indented to be helpful They analyzed the impact of career mentoring and task support on job satisfaction and leadership style and task support on employee tenure and accounted Seventeen percent of the variation in job satisfaction and Nine percent of the variance in job tenure. (Harris et al, 2007).Similarly ... ...have demonstrated the importance of pay, work organization and work condition in shaping job satisfaction (Cohen and Bailey, 1997)Workplace environment is a concept, which has been operationalized by several researchers using di fferent variables to measure it ( Williamson, 2007 ) also analyzed the finish to which the individual perceive the workplace environment as fulfilling their intrinsic, extrinsic and social needs and their reason of staying with the organization. He conducted his research and information technology organization in united state. He analyzes the impact of over all rewards on employee commitment and turnover in the organization. He concluded that if the employees are provided high level of organizational support they are highly satisfied and show the high level of commitment towards their organization and low turnover rate. (Williamson, 2007)

Impact Of Workplace Environment On Employee Retention Essay -- Busines

As employee satisfaction plays a vital role in the success of an organization. If the employees atomic number 18 comfortable and happy with their job and working condition then they will give their best for the improvement of an organization. Happy and satisfied employees always put more efforts for the organisational achievements and stay loyal to the company. Job satisfaction is directly related to the productivity... (http//www.expresshospitality.com/20080430/management08.shtml)The term employee satisfaction is basically used to describe either employees are happy and satisfied or working conditions are meeting their needs and expectations. (Heath, 2006). Many factors are contributing towards the employee satisfaction with in the workplace like salary, rewards, promotions, incentives etc. These are the things which have the sense of belongingness in the employees towards their organization and they realized that they are bringing success in the organization. (Sundar, 200 6).The success of any organization depends upon its members so if the members are happy with their jobs and they are rewarded for their work then they will ultimately give their best to the organization. Satisfaction also leads towards concentrating on the work. Foster (Harris et al, 2007) studied the impact of social promote on employee satisfaction and job tenure. Social support has been defined as the actions of others that are either helpful or indented to be helpful They analyzed the impact of public life mentoring and task support on job satisfaction and leadership style and task support on employee tenure and accounted Seventeen percent of the variance in job satisfaction and Nine percent of the variance in job tenure. (Harris et al, 2007).Similarly ... ...have demonstrated the importance of pay, work organization and work condition in shaping job satisfaction (Cohen and Bailey, 1997)Workplace environment is a concept, which has been operationalized by several researchers using different variables to measure it ( Williamson, 2007 ) also analyzed the extent to which the item-by-item perceive the workplace environment as fulfilling their intrinsic, extrinsic and social needs and their reason of staying with the organization. He conducted his research and information technology organization in unify state. He analyzes the impact of over all rewards on employee commitment and turnover in the organization. He concluded that if the employees are provided high level of organizational support they are highly satisfied and show the high level of commitment towards their organization and low turnover rate. (Williamson, 2007)

Monday, May 27, 2019

Customer Perception Towards Branded Carbonated Drinks

STUDY OF CUSTOMER BEHAVIOR AND ATTITUDE TOWARDS BRANDED change DRINKS Submitted by Hari Baboo CHAPTER 1 INTRODUCTION Bever while Industry in India A Brief Insight In India, beverages form an all in all- weighty(a) part of the lives of masses. It is an intentness, in which the players constantly innovate, in order to come up with better products to influence forward more consumers and satisfy the existing consumers. FIGURE 1 BEVERAGE INDUSTRY IN INDIA The beverage industry is vast and there various ways of segmenting it, so as to cater the right product to the right person.The different ways of segmenting it atomic number 18 as follows * Alcoholic, non-alcoholic and sports beverages * Natural and Synthetic beverages * In-home consumption and out of home on premises consumption. * be on wise segmentation i. e. beverages for kids, for adults and for senior citizens * Segmentation based on the amount of consumption i. e. high levels of consumption and low levels of consumption. If the behavioral patterns of consumers in India argon closely noniced, it could be feted that consumers perceive beverages in twain different ways i. e. everages ar a luxury and that beverages bring in to be consumed occasionally. These devil perceptions argon the biggest challenges faced by the beverage industry. In order to leverage the beverage industry, it is important to address this issue so as to encourage regular(a) consumption as well as and to make the industry more affordable. Four strong strategic elements to increase consumption of the products of the beverage industry in India argon * The quality and the consistency of beverages needs to be enhanced so that consumers are satisfied and they enjoy consuming beverages. The credibility and trust needs to be built so that there is a very strong and safe feeling that the consumers have while consuming the beverages. * Consumer education is a must to bring out benefits of beverage consumption whether in terms of heal th, taste perception, relaxation, stimulation, refreshment, well- universe or prestige relevant to the category. * Communication should be relevant and trendy so that consumers are able to find an appeal to go out, grease ones palms and consume. The beverage securities industry has still to achieve greater penetration and also a wider spread of distribution.It is important to get a line at the entire beverage market, as a big opportunity, for send and sales growth in turn to add up to the boilersuit growth of the food and beverage industry in the economy. The Carbonated Drinks Industry In India A Perspective The Rs. 17000 crore market of change plights industry in India looked real bad just after the Pesticide contr everyplacesy last year. But slightly cool promotions and quick reactions by cola companies have handled the crisis satisfactorily.The controversy has thought the industry few lesson or so and in the process consumer and the economy also benefited. Colas, contrib uting more than 50 per cent to fizzy draw sales, saw a huge slide after the pesticide controversy, but are believed to be making a come back. Thanks to increased publicizing spends which is over 20 per cent higher than last year. There is both(prenominal) good news on the non-cola segment. The lime and lemon segments with pocks analogous sprite and 7up have registered a 30 to 40 per cent growth, although on a smaller base. Nevertheless, the battle between two cola giants, Coke & Pepsi, did not go any(prenominal) slow. Rather it has become fiercer. They are now fighting each other even at the local level. That too the trend is as old as start of this millennium. The present scenario of the carbonate bedevils market is behaving the way it has all to do with a duopoly situation. A duopoly is a competitive situation where there are two competitors, normally of roughly extend to size. Although in all(prenominal) place they have local competitors and there is a huge unorganized flavoured water market.Yet again, packaged water is also a competitor to the cola brands and in this category neither of the two cola companies are market leaders. However, as far as the carbonated drinks are concerned there are only two brands, Coke and Pepsi. Therefore, we can safely say that this condition does qualify to be a near duopoly situation and thusly there is such intense competition. Unless, the two parties in a duopoly collaborate with each other, which is certainly not the case in the cola market cosmopolitan or in India, this battle is not going to slow d take even a bit Rather, it would grow stronger with every passing day.In a situation like this it is very interesting to observe marketing strategies in general and Product & Pricing strategies in specific of the players, merely because the action of matchless player is bound to invite similar reaction from the other. As if, the third law of Newton, that ? every action has an equal and opposite reaction? , can t fit better in any other situation In a duopoly like situation, as far as cola industry in India is concerned, it can be said that it is foolish to cut costs unless, one of the two parties has a more lower cost base. But that is not the case in India.In fact, both the companies, Coke and Pepsi, invest heavily in advertising and in distribution through their franchise as well as their own systems. However, a great deal of attention is paid by both companies to cost, particularly in the development of a tightly effective supply orbit system in which economies are squeezed out and, wherever possible both overheads and working capital are controlled. Therefore, it is extremely difficult to for both the parties to play with the prices. Rather, it is waiter-productive exercise, as when prices are reduced in a particular area by one of the cola brands, the second must follow.If we look into the history of pricing of these two particular players of the carbonated drinks industry, we wi ll see that the first major initiative in the price front took place some years ago when the brand Coca-Cola came back to India. At that point of time colas were help oneselfable only in two hundred ml nursing bottles. Coca-Cola, in its come back trail, broke the tradition by launching Cola in the 300 ml size bottles but at the same price as Pepsi, which was then in a two hundred ml bottle. With this strategy, Coke expected to gain advantage in the market especially in India, which is traditionally a highly price new market.However, Pepsi, as being a fierce competitor was prepared for it and soon launched its colas in the 300 ml sizes. Thereby, in India, it was the 300 ml bottle which became the prototype in most parts of the calculationry, making the price a parity issue between the two brands. Then, a few years ago, one liter and 1. 5 litre non-returnable deary bottles at a discount in comparison to, a 300 ml returnable glass bottle, the traditional promotion in this pr oduct category, was launched by Pepsi. It was a successful move resulting in significant increase in the consumption level especially amongst the loyal consumers in the urban areas.And part of the rule of the game, Coke followed Pepsi in the above move in order to reduce the cost per glass to the consumer. Then came the days of a 500 ml non-returnable PET bottle which was advertised almost totally on the cost of the consumer per 100 ml of cola Nevertheless, the great advantage that the PET bottles provided is that they have increased home consumption level which was not of much significance compared to out of home consumption till then. And in very young times the Coke did a u-turn that is price cuts. The latest move of reducing price to the consumer is the very opposite of what has been happening to-date.It has now re-launched a 200 ml bottle at a unit price of approximately 2/3rd of the 300 ml price, thus making retail purchase look cheaper. This strategy was meant to fight consu mption pattern of smaller towns and rural areas where two state share a 300 ml bottle. Importantly, by making the bottle smaller it has only reduced unit price without affecting the trade margin. It has been reported that Pepsi has been cutting the price of its 300 ml bottle in some places, until an inventory of 200 ml bottles was built, as an answer to the Cokes strike.However, this act of Pepsi might boomerang as there is a strong hazard of having some negative effect on the supply chain and other inventory cost in the long run. Competitive Arena The soft drink market all over the world has been witnessing a neck to neck battle between the two major players, Coca-Cola and Pepsi since the very beginning. The thirst quenchers are attempt hard to have the major chunk of the pie of carbonated soft drink market. Both the players are spending their energies in building capacity, infrastructure, promotional activities etc.Coca-Cola being 11 years older than Pepsi has dominated the sce ne in most of the soft drink markets in the world and enjoying leadership in terms of market share. But the Coca-Cola people are finding it hard to keep away Pepsi, which has been narrowing the gaps regularly. The two are posing threats to each other in every nook and corner of the world. While Coca-Cola has been earning most of its bread and butter through beverage sales, Pepsi has a multi products portfolio with some portion from the same business. Aims/ObjectiveIn this query we are making an attempt to study which carbonated drink is pickred by consumers somewhat Manipal, and do they take into account factors such as price, brand, taste etc while purchasing a carbonated drink. * Consumer perception towards Carbonated drinks. * To understand buying behavior of consumers. * To recommend for future course of action. CHAPTER 2RESEARCH shape Research Design Descriptive research- also known as statistical research, describes info and characteristics about the universe. Descriptive research answers the questions who, what, where, when and how.COLLECTION OF DATA 1. Primary data Based on questionnaire, will be distributed among consumers & direct interview will be taken, to collect the data. 2. Secondary data Collected from articles, magazines, newspaper research reports and internet. 3. sampling Stratified sampling technique will be considered. A sample size of 200 consumers will be selected from Manipal to study. The process of pigeonholinging members of the population into comparatively homogeneous subgroups before sampling. Proportionate allocation uses a sampling fraction in each of the strata that is proportional to that of the total population.If the population consists of 60% in the potent stratum and 40% in the fe male stratum, then the relative size of the two samples (three males, two feminines) should reflect this proportion. SAMPLE SIZE This refers to the number of element to be selected from the universe to contribute a sample. The sample sh ould be optimum i. e. it should fulfill all the requirement of efficiency, respectiveness, reliability and flexibility pertaining to the research conducted. It is generally denoted by n. It can be cypher using the formula- n = z / e? in case of Infinite population.Where, n=sample size ?= well-worn deviation e=error Many a times, the standard deviation of population is not known and sample is not yet taken, rough approximate of the population will given by, Range of Population Distribution 6 Here range is the difference between highest and lowest score. In this case, range = 5-1 =4 Therefore standard deviation, For 95% confidence level, from normal distribution circuit card, z=1. 96 Error, e=0. 1 Substituting these values in the above equivalence , we get, n= (1. 96 0. 67? )/(0. 1? ) Sample size, n=172. 44 Taking sample size as 200.Random sampling is undertaken for selecting sample from the population SAMPLING ERROR In any study involving the sampling process, there would norma lly be a certain amount of inaccuracy in the data poised. This inaccuracy is termed as Sampling Error. In other words, sampling errors are those errors which arise on account of sampling. Limitations of the Study 1. Some of the respondents refused to fill the questionnaires. 2. The responses may vary as some people did not want to come up with real answers. 3. The people were busy in their own work so they might not have given actual responses. . Limitation of time. 5. The survey is conducted only in few areas of Manipal hence the results may vary in other parts of the cities. 6. modal valuest sample size. 7. And like any other research the limitation of personal bias of respondents limits the scope of the study. 8. The findings are based on the survey conducted in the month of feb the results may vary in other months. CHAPTER 3. DATA REPRESENTATION AND ANALYSIS 3. 1 DEMOGRAPHIC FACTOR Gender of respondents frequence table GENDER Frequency share Valid percentage Cumulative Pe rcent Valid male 106 53. 53. 0 53. 0 female 94 47. 0 47. 0 100. 0 inwardness 200 100. 0 100. 0 Inference The above pie chart depicts the distribution of the total sample that we had undertaken in our study. We observe here that most of the respondents are male than female. Male respondents are 106 out of 200 respondents whereas females are 94 out of 200. epoch of respondents Frequency table AGE Frequency Percent Valid Percent Cumulative Percent Valid 0-15 68 34. 0 34. 0 34. 0 16-25 56 28. 0 28. 0 62. 0 26-35 44 22. 0 22. 0 84. 0 36-45 26 13. 13. 0 97. 0 46-70 6 3. 0 3. 0 100. 0 sum of money 200 100. 0 100. 0 As per respondents, age group of 0-15 people with the frequency of 68 out of 200, 16-25 group people are around 56 , 26-35 are 44 people , 36-45 are 26 people respectively. 3. 2 PROFESSIONAL FACTOR Frequency table WORK Frequency Percent Valid Percent Cumulative Percent Valid pro 26 13 13 13 businessman 18 9 9 22 service 52 26 26 48 learner 98 49 49 97 others 6 3 3 100 Total 200 100 100 InferenceAs per respondents the student respondent are 98 out of200while service people were around 52 out of 200 ,professional people are around 26 ,businessman people are around 18 whereas 6 of them are in others category. 3. 3 CARBONATED DRINKS Frequency table COLA Frequency Percent Valid Percent Cumulative Percent Valid coca cola 36 18. 0 18. 0 18. 0 pepsi 34 17. 0 17. 0 35. 0 thumbs up 52 26. 0 26. 0 61. 0 7up 24 12. 0 12. 0 73. 0 sprite 22 11. 0 11. 0 84. 0 mazza 16 8. 0 8. 0 92. 0 fanta 16 8. 0 8. 0 100. 0 Total 200 100. 0 100. 0 As per respondents, 52 people out of 200 likes thumbs up, while people loves to drink coca cola , pepsi, 7up, mazza, fanta 36,34,24,22,16,16 respectively Gender vs. age GENDER * AGE rag tabulation AGE Total 0-15 16-25 26-35 36-45 46-70 GENDER male play 34 30 25 14 3 106 evaluate enumeration 36. 04 29. 68 23. 32 13. 78 3. 18 106 female believe 34 26 19 12 3 94 evaluate Count 31. 96 26. 32 20. 68 12. 22 2. 82 94 Total Count 68 56 44 26 6 200 expect Count 68 56 44 26 6 200 From the respondents, in the age group of 0-15 have 34 males and females respondent respectively. While 16-25 age group have 30 males and 26 females respondent respectively. While 26-35 age group have 30 males and 26 females respondent respectively. Because they are major consumers of branded carbonated drinkers Gender vs. Occupation GENDER * WORK Cross tabulation WORK Total professional businessman service student others GENDER male Count 20 12 23 47 4 106 Expected Count 13. 78 9. 54 27. 56 51. 94 3. 8 106 female Count 6 6 29 51 2 94 Expected Count 12. 22 8. 46 24. 44 46. 06 2. 82 94 Total Count 26 18 52 98 6 200 Expected Count 26 18 52 98 6 200 As per respondents, male generally who respondent are majorly students and in female also major respondent were student only. While service people are only 23 as male and 29 as female respondent , professional count is 20 in male and 6 at female. In businessman category 12 are male respondent while 6 of them are female. Gender vs. favor branded carbonated drinks GENDER * COLA Cross tabulation COLA Total coca cola pepsi thumbs up 7up sprite mazza fanta GENDER Male Count 21 22 31 12 8 5 7 106 Expected Count 19. 08 18. 02 27. 56 12. 72 11. 66 8. 48 8. 48 106 female Count 15 12 21 12 14 11 9 94 Expected Count 16. 92 15. 98 24. 44 11. 28 10. 34 7. 52 7. 52 94 Total Count 36 34 52 24 22 16 16 200 Expected Count 36 34 52 24 22 16 16 200 As per respondent male person like thumbs up are around 31 persons while 21 and 22 people like coca cola and Pepsi respectively.In7up category 12 male respondent and in sprite, mazza, fanta 8,5,7 respectively are there. And in female person like thumbs up are around 21 persons while 15 and 12 people like coca cola and Pepsi respectively. In7up category 12 female respondent and in sprite, mazza, fanta 14,11,9 respectively are there. Gender vs. Effect of advertisement GENDER * ATTRACT Cross tabulation ATTRACT Total creativity Effect of brand ambassador idea frequency logical GENDER male Count 29 25 14 28 10 106 Expected Count 25. 4 26. 5 11. 66 26. 5 15. 9 106 female Count 19 25 8 22 20 94 Expected Count 22. 56 23. 5 10. 34 23. 5 14. 1 94 Total Count 48 50 22 50 30 200 Expected Count 48 50 22 50 30 200 As per respondents, advertisement is mode of marketing where frequency of ads, creativity and effect of brand ambassador for male respondent are 28,29and 25 respectively. While in female has effect of brand ambassador, frequency of ads and logic of ads are 25, 22 and 19 respectively. Age vs. Preferred branded carbonated drinksAGE * COLA Cross tabulation COLA Total coca cola Pepsi thumbs up 7up sprite mazza fanta AGE 0-15 Count 13 12 15 13 5 5 5 68 Expected Count 12. 24 11. 56 17. 68 8. 16 7. 48 5. 44 5. 44 68 16-25 Count 8 11 9 8 7 7 6 56 Expected Count 10. 08 9. 52 14. 56 6. 72 6. 16 4. 48 4. 48 56 26-35 Count 11 7 15 2 5 1 3 44 Expected Count 7. 92 7. 48 11. 44 5. 28 4. 84 3. 52 3. 52 44 36-45 Count 4 3 12 0 4 2 1 26 Expected Count 4. 8 4. 42 6. 76 3. 12 2. 86 2. 08 2. 08 26 46-70 Count 0 1 1 1 1 1 1 6 Expected Count 1. 08 1. 02 1. 56 0. 72 0. 66 0. 48 0. 48 6 Total Count 36 34 52 24 22 16 16 200 Expected Count 36 34 52 24 22 16 16 200 As per respondents, 0-15 age group does show that much of variation and as same at other age groups. While the age group of 16-25 show much variation than 46-70 age group people. Age vs. Reason of purchase AGE * LIKE Cross tabulation LIKE Total brand name taste easy avail packaging price Effect of brand ambassador others AGE 0-15 Count 16 16 9 10 11 6 0 68 Expected Count 13. 6 17 10. 88 6. 8 13. 6 5. 44 0. 68 68 16-25 Count 9 14 9 4 15 3 2 56 Expected Count 11. 2 14 8. 96 5. 6 11. 2 4. 48 0. 56 56 26-35 Count 10 8 11 2 10 3 0 44 Expected Count 8. 8 11 7. 04 4 . 4 8. 8 3. 52 0. 44 44 36-45 Count 5 8 2 4 4 3 0 26 Expected Count 5. 2 6. 5 4. 16 2. 6 5. 2 2. 08 0. 26 26 46-70 Count 0 4 1 0 0 1 0 6 Expected Count 1. 2 1. 5 0. 96 0. 6 1. 2 0. 48 0. 06 6 Total Count 40 50 32 20 40 16 2 200 Expected Count 40 50 32 20 40 16 2 200 As per respondent, 0-15 age groups reasons for purchases of branded carbonated drinks are basically on brand name and taste. While age group 16-25 group people think price and brand name is the important factor in pick of drink. former(a) age group thinks taste as one of the factor and as well as brand name, prices are important factor. Null hypothesis ho Is taste dependent on the plectrum of branded carbonated drinks?The results are as shown below with the help of table and graphical representation. COLA * TASTE Cross tabulation TASTE Total very important important not important not at all important COLA coca cola Count 5 19 7 5 36 Expected Count 8. 1 17. 6 7. 7 2. 5 36. 0 Pepsi Count 15 8 9 2 34 Exp ected Count 7. 7 16. 7 7. 3 2. 4 34. 0 thumbs up Count 5 33 10 4 52 Expected Count 11. 7 25. 5 11. 2 3. 6 52. 0 7up Count 9 8 6 1 24 Expected Count 5. 4 11. 8 5. 2 1. 7 24. 0 Sprite Count 5 13 4 0 22 Expected Count 5. 0 10. 8 4. 7 1. 5 22. 0 Mazza Count 3 8 5 0 16 Expected Count 3. 6 7. 8 3. 4 1. 1 16. 0 Fanta Count 3 9 2 2 16 Expected Count 3. 6 7. 8 3. 4 1. 1 16. 0 Total Count 45 98 43 14 200 Expected Count 45. 0 98. 0 43. 0 14. 0 200. 0 We can observe here that the respondents takes as taste as important in excerption of carbonated drinks. As taste is one of factor which influence in the selection of carbonated drinks Chi-Square Test Value df Asymp. Sig. (2-sided) Pearson Chi-Square 31. 655(a) 18 . 024Likelihood Ratio 33. 984 18 . 013 N of Valid Cases 200 a 13 cells (46. 4%) have expected count less than 5. The minimum expected count is 1. 12. INTERPRETATION Since the calculated value 0. 024 is less than 0. 05, we reject the null hypothesis and conclude maxim that the taste is dependent on the selection of carbonated drinks. Null hypothesis ho Are carbonated drinks only popular among the youth? AGE * COLA Cross tabulation Count COLA Total coca cola pepsi thumbs up 7up sprite mazza fanta AGE 0-15 13 12 15 13 5 5 5 68 16-25 8 11 9 8 7 7 6 56 26-35 11 7 15 2 5 1 3 44 36-45 4 3 12 0 4 2 1 26 46-70 0 1 1 1 1 1 1 6 Total 36 34 52 24 22 16 16 200 As per respondents, age group 0-15 are 68 respondent where they like coca cola, Pepsi, thumbs up,7up 13,12,15,13 respectively. Age group 16-25 are 56 respondent where they like coca cola, Pepsi, thumbs up,7up 8,11,9,8 respectively. Age group 26-35 are 44 respondent where they like coca cola, Pepsi, thumbs up,7up 11,7,15,2 respectively. We can observe here that the respondents age factor affect importantly in selection of carbonated drinks.As taste is one of factor which influence in the selection of carbonated drinks Chi-Square Tests Value df Asymp. Sig. (2-sided) Pearson Chi-Square 27. 016(a) 2 4 . 304 Likelihood Ratio 31. 222 24 . 147 N of Valid Cases 200 a 18 cells (51. 4%) have expected count less than 5. The minimum expected count is . 48 . INTERPRETATION Since the calculated value 0. 304 is higher than 0. 05, we accept the null hypothesis and conclude saying that the age is mutually beneficial on the selection of carbonated drinks. So, carbonated drinks are popular among the youth.Null hypothesis HO Is advertisement a major factor in the selection of the brand of carbonated drinks? COLA * LIKE Cross tabulation Count LIKE Total brand name taste easy avail packaging price Effect of brand ambassador others COLA coca cola 11 7 4 3 9 1 1 36 pepsi 7 10 3 3 8 3 0 34 thumbs up 10 11 9 4 13 5 0 52 7up 5 9 5 3 1 1 0 24 sprite 1 6 6 4 2 2 1 22 mazza 3 4 4 2 2 1 0 16 fanta 3 3 1 1 5 3 0 16Total 40 50 32 20 40 16 2 200 We can observe here that the respondents advertisement affects importantly in selection of carbonated drinks. As advertisement is one of factor which influence in the selection of carbonated drinks Chi-Square Tests Value df Asymp. Sig. (2-sided) Pearson Chi-Square 32. 104(a) 36 . 654 Likelihood Ratio 33. 992 36 . 564 N of Valid Cases 200 a 34 cells (69. 4%) have expected count less than 5. The minimum expected count is . 16. INTERPRETATION Since the calculated value 0. 654 is higher than 0. 5, we accept the null hypothesis and conclude saying that the advertisements are interdependent on the selection of carbonated drinks. So, advertisement affects in the selection of branded carbonated drinks. Null hypothesis HO Does occupation has a role in selecting the Carbonated drink? WORK * COLA Cross tabulation Count COLA Total coca cola pepsi thumbs up 7up sprite mazza fanta WORK passkey 5 4 7 2 3 2 3 26 Businessman 6 12 0 0 0 0 0 18 Service 11 8 14 14 4 1 0 52 Student 14 9 30 7 14 12 12 98 Others 0 1 1 1 1 1 1 6 Total 36 34 52 24 22 16 16 200 As per respondent, 30 student selec t thumbs up as their favorite drink , in businessman category nobody likes other drink rather than coke and pepsi. While in other occupation doesnt have any definite favorite drinks. Chi-Square Tests Value df Asymp. Sig. (2-sided) Pearson Chi-Square 73. 241(a) 24 . 000 Likelihood Ratio 77. 160 24 . 000 N of Valid Cases 200 a 22 cells (62. 9%) have expected count less than 5. The minimum expected count is . 48.INTERPRETATION Since the calculated value 0. 000 is lower than 0. 05, we reject the null hypothesis and conclude saying that the occupation are dependent on the selection of carbonated drinks. So, occupation does not affect in the selection of branded carbonated drinks. CHAPTER 4 FINDINGS AND result Findings 1. Maximum number of people surveyed is below 15 years because they are major consumers. 2. Out of 200 people 13%are professionals, 9% are businessman, 26% are serviceman, and 49% are students. 3. Out of 200 respondents, 97% of consumers buy cold drinks and only 3% of t hem do not buy. 4. 9% respondents like coke, 18% prefer Pepsi, 12% 7up, 11 % of them prefer Sprite, 9% Fanta, and 23% prefer Thumbs-up. 5. 25% people purchase cold drinks because of taste, 20% people purchase cold drinks because of brand name, 20% people purchase cold drinks because of packaging, 15% people purchase cold drinks because of price, 11% people purchase cold drinks because of brand ambassador, 8% people purchase cold drinks because of easy availability & 1% people purchase cold drinks because of any other reason. 6. Out of 200 consumers 98% have seen the advertisement and only 2% have not seen the advertisement of any brands. 7. 3% people call up the advertisement of coke, 23% people remember the advertisement of Pepsi, 1% people remember the advertisement of 7up, 6% people remember the advertisement of sprite, 4% people remember the advertisement of Fanta, and 23% people remember the advertisement of Thumbs-up. 8. 24% people remember the advertisement because of creat ivity, 25% people remember the advertisement because of brand ambassador, 11% people remember the advertisement because of their idea of delivering the message, 25% people remember the advertisement because of frequency of ads, and 15% people remember the advertisement because of logical reason.Conclusion From the analysis of the data collected and from the experiences we have reached the following conclusions * COKE is most popular amongst its users mainly because of its TASTE, BRAND NAME. Thus it should focus on good taste so that it can fetch the major part of the market. But most of the consumers prefer THUMSUP as their 1st preference, then COKE. * We come to the conclusion that visibility affects the sales of project in a very special way. And in terms of the advertisements lays is lacking behind mostly consumers remember the advertisement because of the frequency of add and brand ambassadors, creativity. After acquiring a new customer, there is lot of importance of its retent ion also. This can be done only by providing extra flavors and good taste. * In todays scenario, customer is the king because he has got various choices around him. If you are not capable of providing him the desired result he will definitely switch over to the other provider. Therefore to survive in this cutthroat competition, you need to be the best. Customer is no more loyal in todays scenario, so you need to be always on your toes.We feel that there is cut-throat competition between COKE,PEPSI,THUMSUP so to be on top of mind of the customers they need to do something outstanding every time. CHAPTER 5ANNEXURE QUESTIONNAIRE Dear Sir/Madam, This questionnaire has been prepared with a view to make a STUDY OF CUSTOMER BEHAVIOR AND ATTITUDE TOWARDS BRANDED CARBONATED DRINKS . The information will be strictly used for educational purpose only by the students of Manipal Institute of Management (Manipal University) . we would be grateful if you could spare some time in filling up this qu estionnaire. ) NAME 2) AGE a)0-15 b) 15-20 c) 21-35 d) 36-45 e) 46-70 3) Gender M F 4) Occupation Professional Businessman Service Student Other 5) Do you drink soft drinks Yes No 6) If yes which soft drink Brand Coke Pepsi 7) If No why so?. 8) Which carbonated drink do you prefer most Coke Pepsi 7Up passel Dew Thumbs Up Sprite Fanta 9) Which package do u prefer most Pet Bottle Glass Bottle 10) somewhat Carbonated drink what do you like the most Brand name Taste Easy availability Packaging PriceBrand ambassador all other 11) What is the importance of taste in a carbonated drink? (Please rate them from 1- 4) 1=Very Important 2=Important 3=Not important 4=Not at all important 12) Have you seen any advertisements of carbonated drinks Yes NO 13) Advertisement of which carbonated drinks do you remember the most Coke Pepsi 7Up Thumbs Up Sprite Mountain dew Fanta 14) What attracted you in the advertisement? (PLEASE RATE THEM from 1-4) CreativityBrand ambassador Idea of delivering t he message Frequency of add Logical reason 15) What is your opinion of the brand? minute Good Fair Poor 16) What is your monthly consumption? 17) Any suggestions? ____________________________________________________________ __ CHAPTER 6 BIBILOGRAPHY (i) Research methodology by C. R. Kotari (ii) Websites www. cocacola. com www. pepsi. com www. wikipedia. com (iii) Doing Quantitative Research in Education with SPSS by Daniel Muijs.

Sunday, May 26, 2019

The Effect of the Automobile on American Life

The automobile is one of the most important inventions in our countries history. It has totally affected the American way of life. Four main areas it affected are other transportation, roadways, rural life, and urban life. Automobiles affected other ways of transportation. Horse-drawn transportation was almost completely replaced. Trains and trolleys lost rides as cars became to a greater extent affordable and popular. Roadways were then created. More than 400,000 miles of new road connected people and places. The construction of the new roadways created many jobs. Along the roadways structures such as filling move popped up.Soon after drive-in restaurants, banks, movies, and convenience stores became popular. Tourist cabins were made for travelers passing through the country. Billboards advertising restaurants and products soon lined the streets. The automobile affected the farmers way of life. Farmers got their bang-up to the markets faster, giving them a better income. It creat ed greater contact between neighbors in the country, also. People in the country also gained access to shopping and leisure legal action within the cities. The urban life was also affected by the automobile. They gained access to the country.Although most affects were for the better, the cities got hectic. Between traffic snarls and pollution the cities changed. The automobile also caused depopulation of inner cities to the suburbs. As the cities depopulated and automobiles became more popular there became a lack of parking of all the people driving to work. Parking in the city was very high. As a result the automobile changed the American way of life. The way the automobile affected the way of life still continues today. Its still a major(ip) effect on people as in how and where they live and work.

Saturday, May 25, 2019

Environmental Risk Assessment Of Pipelines Environmental Sciences Essay

The aims of this survey are to analyze the plump of ESI for hiting the hazards posed by grapevines to the environment all while good as to bespeak the hazard tonss in location-based maps. A comparative semi-quantitative attack based on land utilizations and High-Value Areas ( HVAs ) was carried out. A geographical information schema ( GIS ) as a tool was employed to influence fresh maps related to environmental hazards utilizing rational mathematical equations. The chief logic for utilizing the equations was the space-based attacks and ESI all bit good as intersections. A hazard geographical map based on the ESIs and concluding hazard mark ( FRS ) is presented with consequences demoing that the most susceptible and uncollectible country is an country comprised of Rhizophora mangle forested flora located in the grapevine locality. It is shown that mapping the hazards of grapevines with the applied method is of more depend talent and doohickey every bit good as comparative f ullness in comparing to show non-holistic methods for measuring the environmental hazards of grapevines.Hazard is the badness of the effects of a risky activity sing its chance of happening ( Jafari et al. , 2010a, B, degree Celsius, vitamin D ) . Pipeline failures can potentially do terrible amendss. Environmental hazard estimation ( ERA ) involves the scrutiny of hazards ensuing from natural events ( deluging, utmost conditions events, etc. ) , engineering, patterns, procedures, merchandises, agents ( chemical, biological, radiological, etc. ) and industrial activities that may present menaces to ecosystems, animate beings and people ( Belluck and Sally, 2001 Anonymous, 2004 ) . Hazard directors may make up ones mind, for illustration, that estimated hazards are acceptable, and no action is required, or that hazards are excessively mellow and require redress, extenuation, ordinance, decrease, or prohibition ( Belluck and Sally, 2001 ) .1.2. Environmental slightness index ( ESI )Environmental sensitivity Indices ( ESI ) composed of many field-data is indispensable for monitoring and control systems ( Schiller et al. , 2005 ) . Mok Kang ( 2002 ) has carried out a sensitiveness analysis of the Korean composite environmental index ( CEI ) by analyzing the CEIs computed by functional signifiers and those derived from sentiment studies, with a particular accent on the appraisal of weights of environmental indexs and subjects the CEIs are based on environmental subjects and force per unit playing area indexs. NOAAaaa?s ( National Oceanic and Atmospheric Administration ) Environmental Sensitivity Index ( ESI ) attack consistently compiles information in standard formats for coastal shoreline sensitiveness, biological resources, and valet de chambre-use resources. ESI maps are utile for placing 47 sensitive resources before a spill occurs so that protection precedences can be established and cleanup schemes designed in progress. Using ESIs in spill response red uces environmental effects of the spill and killing attempts ( NOAA, 2008a ) . Environmental Sensitivity Index ( ESI ) maps do been an built-in dowery of oil-spill eventuality planning and response since 1979, when the first ESI maps were prepared yearss in progress of the r individuallying of the oil slipperinesss from the IXTOC 1 good blowout in the Gulf of Mexico. Since that clip, ESI Atlass have been prepared for most of the U.S. shoreline, including Alaska and the Great Lakes Before 1989, traditional sensitiveness maps were produced as colour paper maps, with limited distribution ( because of the cost of reproduction ) , and without a mission for ready updating. However, since 1989, ESI Atlass have been generated from digital databases utilizing Geographic Information System ( GIS ) techniques. As the oil-spill response alliance moves towards development of machine-controlled sensitiveness maps, it is of import to specify what comprises the ESI function system and how this information is being developed and distributed utilizing GIS engineering ( NOAA, 2008b ) .1.3. ESI in grapevine hazard appraisalFor the initial stages of hazard direction, a rigorous definition of environmentally sensitive countries might non be perfectly necessary. A working definition by which most people would acknowledge a sensitive country might do. such(prenominal) a on the job definition would necessitate to turn to rare works and animate being home grounds, delicate ecosystems, impacts on biodiversity, and state of affairss where conditions are preponderantly in a natural province, undisturbed by adult male. To more to the full distinguish sensitive countries, the definition should anyway turn to the ability of such countries to absorb or retrieve from taint episodes ( Muhlbauer, 2004 ) . In the unify States, a definition for high environmental sensitiveness includes intake locations for 70 community H2O systems, wetlands, riverine or estuarial systems, national and provin ce Parkss or woods, wilderness and natural countries, wildlife saving countries and safeties, preservation countries, precedence natural heritage countries, wild and scenic rivers, land trust countries designated critical home ground for threatened or endangered species and federal and province lands that are research natural countries ( Stansbeny, 1995 ) . These country labels aspect specific definitions in the US regulative universe. In other states, similar countries, possibly labeled otherwise, will no uncertainty be ( Muhlbauer, 2004 ) , as it is so for Iran with more focal point on IUCN classs of protected countries. Shorelines can be particularly sensitive to grapevine spills. Specifically for oil spills, a superior system for impact to shore-line home grounds has been developed for estuarian, lacustrine, and riverian parts ( NOAA, 1994 ) . As an illustration of an appraisal 80 attack, an rating of a gasolene grapevine in the United Kingdom identified, weighted, and scored some(prenominal) critical factors for each grapevine section. The environmental evaluation factors that were portion of the hazard appraisal included ( Muhlbauer, 2004 ) Land screen type outstrip to nearest lasting surface H2O Required surface H2O quality to prolong current land usage Conservation value habitat preserves Habitats with longer lived biology ( forests, vineries, groves, gardens ) Slope Groundwater Rock type and likeliness of aquifer permeableness and deepness to bedrock every bit good as distance to groundwater extraction points. This appraisal included consideration of costs and troubles associated with reacting to a leak event. Points were assigned for each feature and so grouped into qualitative forms ( low, moderate, high, really high ) ( Morgan, 1995 ) . Schiller et al. , ( 2005 ) presented an algorithm which emulates human expert-decisions on the categorization of sensitiveness categories. This will allow the necessary regular updates of ESI- conclusio n when new field informations become available utilizing automated 92 categorizations processs. Showing a survey on sensitiveness analysis, Hadid and Afra ( 2000 ) carried out a numerical sensitiveness analysis of the site 93 consequence on energizing response of grapevines embedded in some idealised the skinny sedimentations resting on a half infinite covering a broad scope of dirt profiles encountered in pattern and subjected to vertically propagating shear moving ridges. A paper described how HSE has piloted a Geographic Information System ( GIS ) by Brazier and Greenwood ( 1998 ) . To approve up the adept determination doing procedure and to help in guaranting consistent responses within statutory deadlines. It considers both the advantages and disadvantages of a GIS over more conventional methods every bit good as possible developments such as the usage of population informations in sing social hazards, biological restraints and 3D terrain function.1.4. Equivalencies of rece ptorsA trouble in all hazard appraisals is the finding of a harm province on which to establish frequency-of-occurrence estimations. This is farther complicated by the normal presence of several types of receptors, each with different exposures to a menace such as thermic radiation or taint. The overall trouble is sometimes addressed by running several hazard appraisals in analogue, each matching to a certain receptor or receptor-damage province. In this attack, separate hazard values would be generated for, as an illustration, human deaths, hurts, groundwater taint, belongings harm values, etc. The advantage of this attack is in gauging absolute hazard values. The disadvantage is the extra complexness in mold and subsequent determination devising. Another attack is to allow any particular exposure of any threatened receptor govern the hazard appraisal. There is a protocol for class assorted receptor impacts into three sensitiveness countries normal, sensitive, and allergic. This w as developed to execute an environmental appraisal ( EA ) of a proposed gasolene grapevine. Under this classification, an country was judged to be sensitive or allergic if any 116 one of the receptors is defined to be sensitive or allergic. This conservatively uses the worst instance component, but does non see cumulative effectsaa when multiple sensitive or allergic elements are present. A 3rd option in uniting assorted receptor types into a hazard appraisal is to set up equivalencies among the receptors This attack might be more controversial because judgements are made that straight value certain types of receptor amendss more than others. Note, nevertheless, that the other attacks are besides faced with such judgements although they might be pushed to the determination stage instead than the assessment stage of hazard direction. This attack presents another possible marking strategy for some environmental issues and HVAs. In this strategy, the higher tonss represent higher effe cts. This establishes some equivalencies among assorted environmental and other receptors, including population denseness ( Muhlbauer, 2004 ) .

Friday, May 24, 2019

It is difficult for the reader Essay

This Boys Life, set in America in the 1950s, is a compelling memoir by Tobias Wolff, whom recreates the frustrations and cruelties faced throughout his adolescence, as he fights for identity element and self-respect. During this period of era, America underwent major changes in the political and economic spheres, which in turn were responsible for its social makeover. Society in this time was geared toward family marriage and children being part of the national agenda. The 1950s was also an age of male dominance, where even if women worked, their assumed proper place was at home.throughout the memoir, the protagonist, young Jack Wolff, makes it difficult for the reader to feel much affection towards him, as his actions analyze to be trouble approximately and unruly. However, as the memoir progresses, Jacks manage reveal the reasons for his actions which sequentially shape his character, providing the readers with understanding and agreement towards his inexorable situation. The fraudulent lies and deceitful ways of Jack can be frustrating upon the reader though we come to realise that he does this in order to be accepted by the people around him.Jack also engages in fightsand unfaithfully betrays his vanquish friend Arthur, although it becomes distinct that he only does this in order to gain Dwights approval of him. The lack of a real father fingers breadth in Jacks life has a profound impact on him and his desperate attempt to develop his identity, which further supports the readers emotions of sympathy towards him.Jack lies relentlessly in order to escape the grim circumstances of his childhood. His life is fuelled with emotional neglect and verbal abuse Dwight, his indignant step father, being the foremost cause. He desires of transforming himself into the someone that he trulywants to be an image he believes will help him to belong and to be happy. The lies he tells are a constant source of sympathizer for him, as he relies on them to provide stab ility and hope in his otherwise unstable life.I couldnt help but try to cut in new versions of myself as my interests changed, and as other versions failed to persuade, demonstrates an essential part of Jacks character, as he lies in order to fit in. His identity would change with the different people he met, in order to meet their expectations of him and to obtain their acceptance. Thisgreatly contributes to the sympathy matte up for Jack, as he renders the reality that he finds so difficult to accept as a young boy.Among many other lies throughout the memoir, Jack has the intention of creating a new identity for himself. It was truth known only to me, but I believed in it more than I believed in the facts arrayed against it. I believed that in some sense not factually verifiable I was a straight-A student. At this point, Jack takes his re-creation of identity to a new level. Jack is completely aware of what he is doing, although he does not stop.His incessant lies and then bel ieving that they are the actual truth continuously reoccur throughout the memoir. This serves to show his insecurity of who he was, and his imprudent belief that he had the ability to become something better than what he was. Jacks fabricated attempts to re-create new versions of himself, reveal his instinctive lying nature, thus contributing to the annoyance the readers erst in a while feel towards him. However, it becomes clear that Jack is confused he wants to belong. This misperception, and yearn to fit in explicates why feelings of sympathy by the readers towards Jack are inevitable.Jack is coerce to live with his crimson stepfather Dwight. Dwight cruelly exercises authority over Jack, in order to create a sense of dominance over him Dwight would dump a carry of nuts on the floor of the utility room and piece me to work with a knife and pair of pliers until he judged that Id do enough for the night. Because of this, Jack is determined to prove to Dwight, himself and the reader that he is not the person Dwight defines him as. Jack is not hurt by Dwights accusations that he is a thief and liar because I did not see myself that way.However, when Dwight calls Jack a sissy, Jack thinks of Arthur, who is his bestfriend and the biggest sissy in school, and remembers how the volume sparked the fight between him and Arthur. Dwight treated Jack differently for a few days with certain deference Dwight took the calls and explained that the papers had been ruined in a fight, adding that his boy Jack hung a real shiner on the Gayle kid. This was the only time he expressed a genuine interest in Jack that contact on admiration, rather than disgust. Dwight was always associated with hatred and negativity, but because of this certain deference after he fought, Jack felt a certain connection to him as a father figure.He felt as though he finally impressed Dwight, and even felt loved because of Dwights respect towards him. This discloses that Dwights actions had si gnificant influence over Jack, as he continued to engage in these ruby fights, in order to demonstrate his masculinity to Dwight. Jacks violent nature is driven by his belief that he has to prove his masculinity to Dwight. This attests annoyance within the reader as Jack claims he defined myself in opposition to him, he ironically shares the traits of Dwight, such as violence and his desire to be regarded as powerful and masculine.However, Dwights deference towards Jack after he fought contrastingly draws sympathy for Jack from the readers, as it reveals his desire to belong his desire to be loved. Jacks friendship with Arthur plays a significant role in the re-creation of his identity. Arthur was recognised as a notorious sissy, and because of this Jack worried of the social implications it would consequently have on him by being friends with Arthur.To put myself in the clear I habitually mocked Arthur, always behind his back, imitating his speech and way of walking, even betrayin g his secrets, demonstrates Jacks desperation to acquire acceptancefrom others, even if it meant denying a part of himself- a friendship- that actually made him happy at times but I had withheld my friendship, because I was afraid of what it would cost me.Jacks perfidiousness of Arthur imparts choler in the reader, as he attempts to impress people who are not his real friends. However his confused identity and lack of self-confidence justify his unpatriotic actions, particularly because of the circumstances he was faced with at such a young age. Parental neglect plays an important role throughout the memoir.This is first evident inthe text when Jack says after all, he was in Connecticut and we were in Utah, signifying the substantial physical and emotional distance between his pay father and himself. Fathers play an important role in their childs upbringing and development. Due to this lacking in Jacks life, the responsibilities of growing up prove to be difficult for him, eviden t through his confused identity and troublesome ways.Furthermore, Rosemarys ex-husband Roy plays a significant role in formative the way Jack thinks and reasons, particularly from such a young and susceptible age. I thought Roy was what a man should be, reveals Jacks naivety atsuch a young age as Roy, abusive and indignant, was in fact the complete opposite of what a man should be. Wolff is once again faced with a man, Dwight, who abuses him and sets a terrible example for him.His violent nature plays a major part in Jacks development, which at last forms his identity. Dwights actions have such an influence that Jack writes about Dwights voice being ever-present in his head and own voice, even as an adult even as a father. I hear his voice in my own when I speak to my children in anger. The sympathy felt by the readers for Jack is inevitable, as his brutal childhood is left with him for the rest ofhis life.Although Jack makes it difficult for the reader to feel much affection towa rds him on some occasions, the abusive, neglectful and violent experiences he is confronted with at such a young and vulnerable age conveys a sense of understanding, which in turn rouse feelings of sympathy towards young Wolff. Jack lies constantly whenever he is presented with the opportunity to. This frustrates the reader is some instances. Generally though, reasons for this are understandable, such as his confused identity due to the violent and emotionally unstable life he lives.The violent fights he associates himself with, and the betrayal of hisbest-friend Arthur, leave the readers in a position to question whether his motives can be justifiable. However, these fights and betrayal are a reflection of his desire to be accepted by others, and the masculine, powerful man Dwights expects him to be.The lack of a real father figure largely affects Jack and all aspects of his character, from his deceitful ways, to his violent involvement in fights. Because of this, compassion and sy mpathy prevails over the occasional frustration felt towards Jack by the readers. In supposition, Jack is a helpless child seeking a happy life an identity he is truly happy with.

Thursday, May 23, 2019

It Report on Networking

CHAPTER ONE 1. 0INTRODUCTION 1. 1BACKGROUND SIWES was established by ITF in 1973 to solve the enigma of lack of adequate practical scientific disciplines preparative for employment in industries by Nigerian graduates of tertiary institutions. The Scheme exposes students to industry based skills necessary for a smooth transition from the classroom to the world of head for the hills. It affords students of tertiary institutions the op port integraly of being familiarized and exposed to the needed experience in handling machinery and equipment which argon usu tout ensembley non available in the educational institutions.Participation in industrial Training is a well-known educational strategy. Classroom studies argon integrated with tuition through hands-on work experiences in a stadium related to the students academic major and line of achievement goals. Successful internships foster an experiential larn process that non wholly promotes c argoner conceptualization but su pplys opportunities for learners to capture skills necessary to become leaders in their chosen professions. One of the primary goals of the SIWES is to help students integrate leadership development into the experiential learning process.Students be expected to learn and develop base non-profit leadership skills through a mentoring relationship with innovative non-profit leaders. By integrating leadership development activities into the Industrial Training experience, we hope to encourage students to actively engage in non-profit management as a professional c beer objective. However, the effectiveness of the SIWES experience will turn bothwhere varying outcomes based upon the individual student, the work assignment, and the supervisor/mentor exigencys.It is vital that distributively internship position description includes circumstantial, written learning objectives to en authoritative leadership skill development is incorporated. Participation in SIWES has become a neces sary pre-condition for the award of Diploma and Degree certificates in specific disciplines in most institutions of higher(prenominal) learning in the country, in accordance with the education policy of government. Operators-The ITF, the coordinating agencies (NUC, NCCE, NBTE), employers of labor and the institutions. Funding-The Federal Government of Nigeria Beneficiaries- Undergraduate students of the followingAgriculture, Engineering, Technology, Environmental, Science, Education, Medical Science and Pure and employ Sciences. Duration -Four months for Polytechnics and Colleges of Education, and Six months for the Universities. 1. 2 OBJECTIVES 1. SIWES will provide students the opportunity to test their interest in a particular c argonr before permanent commitments are made. 2. SIWES students will develop skills in the drill of theory to practical work situations. 3. SIWES will provide students the opportunity to test their aptitude for a particular career before permanent commi tments are made. 4.SIWES students will develop skills and techniques straightway appli ph ane line to their careers. 5. SIWES will aid students in adjusting from college to full-time employment. 6. SIWES will provide students the opportunity to develop attitudes conducive to effective interpersonal relationships. 7. SIWES will profit a students sense of responsibility. 8. SIWES students will be prepared to enter into full-time employment in their body politic of peculiar(a)ization upon graduation. 9. SIWES students will acquire good work habits. 10. SIWES students will develop employment records/references that will enhance employment opportunities. 1. SIWES will provide students with an in-depth knowledge of the statuesque functional activities of a participating organization. 12. SIWES will provide students the opportunity to understand informal organizational interrelationships. 13. SIWES students will realise higher levels of academic mathematical operations. 14. SIWES wi ll increase student earning potential upon graduation. 15. SIWES Students will be able to outline at least five specific goals with several staff members by comparing performance with job duties and develop a draft plan with staff to accomplish performance needs, supervision plan and rewards. . 3BRIEF HISTORY OF THE ESTABLISHMENT OF ATTACHMENT The Information communion Department in the governors office was first established in 2003 as a unit by the hence governor of the recite, Governor Donald Duke. In 2007 it became a Department with Nine Units namely, 1. Training unit 2. Maintenance unit 3. interlockinging unit 4. Information brass application 5. Audit unit 6. notice unit 7. PRS unit 8. Administration 9. Support unit 1. 4BRIEF DUTIES OF EACH UNITTRAINING UNIT- this unit does the training of students in Computer literacy and a akin runs a certificate program in CCNA and project management, comptia A+ MAINTENANCE UNIT- This Unit is in charge of maintenance of alone(pren ominal) information processing system systems in the department NETWORKING UNIT- This unit is in charge of Ne wittinessinalrk administration in the department and in all(a) the MDAs and the Governors office, this unit takes care of the states cyberspace affairs INFORMATION SYSTEM APPLICATION UNIT- This unit is in charge of the selective informationbase of the establishment Support unit- this unit is in or supports the web unit in electronic net administration.GOALS Vision to be a leash ICT reasonn state in the country Mission to create an information rich, knowledge driven society RESPONSIBILITIES Is to make convinced(predicate) as shooting that we meet our client bringment and need in the various MDA and give them check service delivery CHAPTER TWO 2. 0 LITERATURE REVIEWIn the course of my training with the ICT Department in Governors Office I was privileged to work with the support Unit which is in charge of administration of the Cross River State engagement the Cro ss River State profit this works with the Database Center at the Governors Office where the Ne cardinalrk Operating Centre(NOC) is Located This Units is in charge of the communicate and makes sure that all Ministries Departments Agencies are touch oned to the net income at all times, in carapace of Ne bothrk br all(prenominal) the units does troubleshooting to rectify the problems as fast as possible. . 1NETWORK DOMAIN AND ADMINISTRATION. (SUMMARY ON THE CROSS RIVER STATE NETWORK) Cross River State Network intentions a field of operations to organize the network environment. Domains are groups of PCs on the kindred network and are a method to isolate communications between the members in the domain and the opposite data traffic. Any unmatchable in a domain dirty dog communicate with each former(a)wisewise and out bound, however PCs not de exquisited in the domain preservenot communicate with those in the domain.Basically the network starts from when the orbiter in spac e s intercepts radio signals down to the satellite dish receiver (ku-band, ka-band, c-band e. t. c). This satellite dish receiver is machine-accessible to the private port of the meshing modem thus the public port of the modem is linked to the ISA legion which acts as the gate mien to internet glide path. The ISA innkeeper is committed to a domain controller which controls the domain environment by granting anyone who has a registered account on the domain doorway to the internet recourse.I. e. anyone who does not have an account or valid log on credentials cannot use the internet. Domain controller can too be use to control the network environment by restricting the rights to chance setting on the workstation so that only administrative rights can alter settings. The ISA emcee is withal connected to an antivirus server which monitors the automatic updates and downloading of update for all workstation in the domain with a specific antivirus used for the network installed on them.The ISA server is also connected to a 24 port dislodge which is connected to the various turn console table in each directorate of office buildings (since it is a 24 port switch it take a supreme of 23 directorates, slightly other switch can be connected to the first switch in case of more buildings). Ever building has a locker where local area network (local area network) connections are distributed to different offices. The cabinet comprises of switches and stain panels. The patch panel is a pull that is used as a repeater so that signals dont get loss over a long strain.One of the cable lengths that comes from the main 24 port switch goes to the patch panel therefore a RJ-45 cable is connected from the patch panel to the switch (mostly a 24-port switch) in the cabinet (in case of two switches we have two patch panels. ). The patch panel then distributes the connection in the office or to other offices in the building as LAN port where workstations can be conn ected to by the use of RJ-45 cable (workstations can also be connected directly to the switch). As for wireless(prenominal) connection, a wireless router or access stain is holdingd at every passage way in each building.The wireless access point is either connected to one of the switches in the cabinet or the main 24-port switch. 2. 2 ISA SERVER/PROXY SERVER/GATEWAY The ISA server also acts as a proxy server/gateway. A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the try can ensure protective covering, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxys cache, w hich will improve user response time. A proxy can also do logging. A user on a workstation which is connected to the domain can only view the internet if the manoeuvre and port come up of the ISA server is set in the proxy address and port settings. 2. 3 HOW TO SET THE PROXY SETTINGS STEP 1 Click tools then click internet options on the browser. STEP 2 Click on the connection tab and then click LAN settings. STEP 3 font in the ISA server ip-address (e. g. 192. 168. 2. 1) in the address box and also insert the port estimate (e. g. 3128). 2. 4 HOW TO JOIN A WORKSTATION TO A DOMAIN STEP 1 right-click on my- buildr then clicks properties. STEP 2 click on system properties. STEP 3 Click on calculating machine name tab, click change. STEP 4 Type in the computer name (e. g. pro 10), then click the domain radio button and face in the domain name (e. g. dpetri. net), then click ok.STEP 5 After clicking OK you would prompt with a username and password dialog box where only those with ad ministrative credentials would be able to logon. Type in the user name and password, and then click OK. STEP 5 After clicking OK, you would be prompted with a dialog box welcoming you to the domain. Then take up the system. 2. 5 ANTIVIRUS SERVER The antivirus server is a separate system that is connected to the ISA server. It is used to protect the network from harmful treats like spyware (i. e. worm, virus, adware e. t. c. ).The antivirus server makes use of windows server 2003 operating system, with a network antivirus (e. g. e-trust) installed on it. For any workstation on the network to be protected by the network antivirus server a copy of the network antivirus must be installed on them. To make the antivirus copy work with the antivirus server the proxy settings must be set using the antivirus server Ip-address (e. g. 192. 168. 2. 4) as the address in the proxy settings. 2. 6 MAIN SWITCH The main switch is a switch that is used to distribute the network connection to differen t buildings.A switch is a device that is used to link systems or workstations together. A switch is mainly used in a star network topology. Properties of a switch smasher this is the jamming of signal in a transmission medium. Collision domain this is the environment in which collision occurs. Broadcast this is the s hold backing of signal from a system to the rest of the system connected to the switch. A broadcast is usually s arrest across all the collision domains as one virtual domain. Broadcast domain this is the environment in which a broadcast is send across. Multicast this is the sending of signal from one system to a selected group of systems connected to the switch. Unicast this is a signal that is sent from one system to some other. 2. 7PATCH PANEL A patch panel is a panel of network ports contained together, usually within a telecommunications closet that connects incoming and outstrip lines of a LAN or other communication, electronic or electrical system. In a LAN, the patch panel connects the networks computers to each other and to the outside lines that change the LAN to connect to the Internet or another WAN.Connections are made with patch cords. The patch panel allows lots to be arranged and rearranged by plugging and unplugging the patch cords. The use of a patch panel is necessary because is help to repeat signals travelled over a cable from a long distance to pr regulart data loss. A patch panel is connected to a switch respectively according to the number on each port of both the switch and patch panel. 2. 8 ROUTER/VPN A router is a device or a computer that is used to connect two or more networks together. Routers are physical devices that marry multiple wired or wireless networks together.Technically, a wired or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects networks (as gateways do), and that the router operates at the network layer of the OSI model. A router can also be called a computer b ecause it has a LAN-port, an operating system (OS) and retentiveness. A router has an operating system and a user larboard (depending on the brand of the router). The user interface can be viewed by connecting the router via LAN-cable to a computer. 2. 8 STEPS TO VIEW THE USER port wine OF A ROUTER Know the default IP-address of the router (usually 192. 168. 0. 1). Connect the router to a computer. Open a browser. Click on the file tab. Click on open then a dialog box appears. Type in the IP-address of the router in the text box and click OK, then a logon dialog box appears. The default username and password are both admin and admin. Type in the username and password then click OK. In the user interface you can change the Ip-address to suit your company setting, change the security protocol (i. e. either WAP, WAP2, WEB e. t. c), router name e. t. VPN A VPN (virtual private network) is a device that uses a series of encryption and algorithms to secure the data genetical over th e public internet. It allows users to work on their company network from their home with a higher level of confidence that no one else can access their work i. e. it provides a level of encryption so that an outsider would not be able to hack in to the network. VPN drop deads distance between two computers and establish a secured connection with two computers. A VPN can also act as a router in the sense that it can be used for connecting two or more networks together.CHAPTER THREE 3. 1 leadenWARE AND MAINTAINNACE During the course of training I was also fortunate to receive lectures and training on comptia A+ that is ironware and maintenance which covered knowledge on system maintenance as a whole approaches on how to prevent system damage. A computer system prefatoryally contains the following lucks/devices arrangement case, Mother board, Processor, Memory, Graphics card, Sound card, Modem, NIC Card, Hard turn CD- need-only storage/DVD-ROM Monitor. SYSTEM CASE A system case is required to hold all your chemical elements together. It houses all the internal component of a system.The system cases come in two form factors which are AT and ATX. Nearly all the cases made nowadays are ATX as the motherboard manufacturers make majority of their motherboard in the ATX form. MOTHERBOARD A motherboard is the central printed circuit board (PCB) in a computer that holds some of the crucial components of the system, epoch providing connectors for other peripherals. The motherboard is sometimes alternatively known as the main board, system board. PROCESSOR The mainframe (central processing unit, for Central Processing Unit) is the computers brain.It allows the processing of numeric data, information entered in binary star form, and the execution of instructions stored in memory. The Central Processing Unit (CPU) is responsible for interpreting and executing most of the commands from the computers hardware and software. It is often called the brains of the comp uter. MEMORY A memory is the name given to a silicon chips that stores volatile computer data. The word Volatile means that the contents of memory will be lost if the motive of the computer switched off. Memory stores some of your operating system and application data period it is being run.The more memory you have in your computer the higher the amount of application you can run simultaneously, and will provide an overall better system performance. Memory comes in different forms. The honest-to-god system uses SDRAM, while figure of speech 3. 1 A typical system board The current system uses DDR-SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory). pattern 3. 2 3. 2. SYSTEM BOARD COMPONENTS Now that you understand the basic attributes of motherboards and their form factors, its time to look at the components found on the motherboard and their locations relative to each other numberure 3. illustrates many of the following components found on a typical motherboard * Chipsets * elaboration slots * Memory slots and external cache * CPU and processor slots or sockets * Power connectors * Onboard disk drive connectors * Keyboard connectors * Peripheral port and connectors * BIOS chip * CMOS battery * Jumpers and DIP switches * Firmware CHIPSETS A chipset is usually designed to work with a specific family of microprocessors. Because it controls communications between the processor and external devices, the chipset represents a crucial role in determining system performance.The manufacturer of a chipset often is independent from the manufacturer of the motherboard. Current manufacturers of chipsets for PC-compatible motherboards include NVIDIA, AMD, VIA Technologies, Intel and Broadcom. There can only be two (2) chipsets in a computer namely Northbridge and Southbridge. NORTHBRIDGE The Northbridge links the CPU to very high- revivify devices, especially main memory and graphics controllers . The communications between the CPU and memory occur over what is known as the front end side slew (FSB), which is just a set of signal pathways between the CPU and main memory.The Northbridge chipsets also manage the communications between the Southbridge Chipset and the rest of the computer SOUTHBRIDGE Southbridge connects to lower-speed peripheral coaches (such as PCI or ISA). In many modern chipsets, the Southbridge actually contains some on-chip integrated peripherals, such as Ethernet, USB, and audio devices. A typical motherboard chipset for Pentium architecture. en mammothment SLOTS The most visible parts of any motherboard are the expansion slots. These look like small plastic slots, usually from 3 to 11 indiumes long and or so 1? 2 inch wide.As their name suggests, these slots are used to install various devices in the computer to expand its capabilities. Some expansion devices that might be installed in these slots include video, network, sound, and disk interface cards. If you look at the motherboard in your computer, you will more than likely count on one of the Main types of expansion slots used in computers now * ISA * PCI * AGP * PCIe Each type differs in appearance and function. In this section, we will cover how to visually identify the different expansion slots on the motherboard. ISA blowup SlotsISA mint first appeared in PC based on 80286 CPU. The idea was to put a bill in interfacing with peripheral devices. In our days this bus is kept for compatibility with legacy peripheral devices such as BIOS ROM, Parallel and Serial Ports, Sound and Modem devices. These devices have historical fixed address range (no Plug and gip option) and arent hurt by low speed of ISA bus (8/16 bit data bus with 8 MHz clock speed). Most modern PCs dont even have spear carrier ISA slots since most peripheral components give wayd to PCI and USB. ISA bus requires 4 bus cycles for each data transfer. Fig 3. intricacy CARD AND SLOT PCI Expansion Slots PCI bus was developed by Intel for high performance periphe ral devices, such as graphic accelerators, disk controllers, data acquisition boards. PCI was supposed to overcome limitations of be ISA bus. 16 bit ISA bus with clock speed of 10 MHz with theoretical bus throughput 2M transfers/sec but practically not more than 500k. PCI bus is much faster in burst mode PCI can transfer 32 or 64 bit data with 33 MHz or 64 MHz clock, that yields transfer rates from 132 MB/sec to 538 MB/sec, PCI supports huge address range 32/64 bit address bus instead of 16 bit ISA.It is a burst oriented bus designed for large transfers hidden bus arbitration among multiple musters is provided on each bus. In theory up to 32 system of logical devices can reside on PCI bus. But practically, a PCI bus is more likely to have maximum 10 devices because of its low-powered, reflected wave-switching. If more devices is desired PCI to PCI bridge is used. PCI devices are automatically assembled in software (Plug and Play option). This eliminates earlier problems with ISA configuration using fixed addresses or user configured switches and jumpers.In recent years some peripheral devices have gotten faster and PCI became too slow for CD and hard disks. Then new interfaces appeared IDE, SCSI. Fig 3. 4 PCI expansion slot AGP EXPANSION SLOTS AGP port When 3D graphics applications became common, graphic devices were still found on the PCI bus. AGP port provides high speed access to the memory and allows communion it with local video memory. AGP is not a bus (no competition between devices sitting on the same bus), but port with a sanctified connection between North bridge and graphic accelerator.Speed is 264 MB/s 1 GB/s Fig 3. 4 An AGP slot PCI EXPANSION SLOTS The newest expansion slot architecture that is being used by motherboards is PCI Express (PCI). It was designed to be a replacement for AGP and PCI. It has the capability of being faster than AGP while maintaining the flexibility of PCI. And motherboards with PCI will have regular PCI slots for ba ckward compatibility with PCI. The diagram below illustrates Pentium IV system. You can see that ISA bus is gone and a new interface introduced PCI Express. LPC is a subset of PCI (low pin count).PCI Express provides advanced features such as better power management, performance and bandwidth increases, enables support for streaming media, TV tuners, cameras, graphics. POWER CONNECTORS In rundown to these sockets and slots on the motherboard, a special connector (shown in allows the motherboard to be connected to the power provide to receive power. This connector is where the ATX power connector plugs in. Fig 3. 5 An ATX power connector Central Processing Unit (CPU) and Processor Socket or Slot The brain of any computer is the central processing unit (CPU).This component does all the calculations and performs 90 percent of all the functions of a computer. There are many different types of processors for computersso many, typically, in todays computers, the processor is the easiest component to identify on the motherboard. It is usually the component that has either a fan or a awaken sink (usually both) attached to it. These devices are used to spend a penny away the heat a processor generates. This is done because heat is the enemy of microelectronics. Theoretically, a Pentium (or higher) processor generates enough heat that without the heat sink it would self-destruct in a matter of hours.Sockets and slots on the motherboard are as plentiful and varied as processors. Sockets are basically flat and have several rows of holes arranged in a square, as shown in Figure 1. 10. The processor slot is another method of connecting a processor to a motherboard, but one into which an Intel Pentium II or Pentium IIIclass processor on a special expansion card can be inserted. Fig 3. 6 Processors with a fan and heat sinks Fig 3. 7An example of a CPU socket Modern processors can feature the following OVER CLOCKING Over clocking your CPU offers increased performance, on a processor designed to operate at the over clocked speed.However, unlike with the processor designed to run that fast, you must make special arrangements to ensure that an over clocked CPU does not destroy itself from the increased heat levels. An advanced cooling mechanism, such as liquid cooling, might be necessary to avoid losing the processor and other components. 3. 3 COMPUTER MEMORY Computer RAM is the best known form of memory your computer uses. Every file or application opened is placed in RAM. Any information the computer needs or uses becomes part of a continuous cycle where the CPU requests data from RAM, processes it and then economises new data back to RAM.This can happen millions of times a second. However, this is usually just for temporary file storage, so unless the data is saved somewhere, it is redactd when the files or applications are closed 3. 4 HARD DISK DRIVE A hard disk drive (HDD), commonly referred to as a hard drive or hard disk, is a non-volatile stor age device which stores digitally encoded data on rapidly rotating platters with magnetic scratchs. Strictly speaking, drive refers to a device searching from its medium, such as a tape drive and its tape, or a diskette disk drive and its floppy disk.Early HDDs had removable media however, an HDD today is typically a sealed unit with fixed media. Figure 3. 8 showing a Hard disk and its components. A hard disk drive stores information on one or more rigid, flat, disks. The disks are mounted on a spindle, with spacers in between, and a motor on the bottom end of the spindle. To read and write to the surface of the disks, the drive uses a small electro-magnet assembly, referred to as a head, located on the end of an actuator arm. There is one head for each platter surface on the spindle. The disks are spun at a very high speed to allow the head to move promptly over the surface of the disk.Towards the other end of the actuator arm is a pivot point, and at the end is a voice coil, w hich moves the head. Above and below each voice coil is a rare estate magnet. This allows the head to move towards the center of the disk or towards the outside, in a radial pattern. Fig 3. 9 Describing inside the HDD 3. 5 PREVENTIVE MAINTENANCE OF THE HARD DISK DRIVE The preventive measures are used to improve the performance of the hard disk. The primary tools or utilities available are Scandisk This improvement can be used to conk out surface for media delusions, scan files and folders for data problem.Scan disk is run each time window is not properly shot down. You should run scan disk at least weekly to acquire and repair small error on disk before they become major problem. Disk Defragmentation This utility is use to rearrange your disk files, combined and organized unused disk space so that application run faster. As we modify or delete file on hard disk, file become fragmented. The defragmenter eliminates fragmentation so that data in the file are readily available to p rogram ask for it. Disk Cleanup/delete Unused File This utility remove unnecessary file from your hard disk.This tool scan the disk you designate to fine files that can be removed without affecting the operation of the PC and the Window operating system. Backup Backing up hard disk data to another storage media that can be stored outside the PC is also a preventive maintenance. This usually prevent hard disk against failure, PC problem hardware can be replaced but most often data cannot be recovered, so making a backup copy of your file is a safety device precaution that ensure that your data can be outlive on the device on which it is stored.Empty Recycle Bin The recycle bin should always be emptied at least monthly in direct to remove all deleted data, file, programs that are no longer needed. 3. 6 FLOPPY DISK DRIVES Floppy disks, also known as floppies or diskettes (where the suffix -ette means poor one) were ubiquitous in the 1980s and 1990s, being used on home and personal computer (PC) platforms such as the Apple II, Macintosh, Commodore 64, Atari ST, Amiga, and IBM PC to distribute software, transfer data between computers, and create small backups.Before the popularization of the hard drive for PCs, floppy disks were typically used to store a computers operating system (OS), application software, and other data. Many home computers had their primary OS kernels stored permanently in on-board ROM chips, but stored the disk operating system on a floppy, whether it be a proprietary system, CP/M, or, later, DOS. Since the floppy drive was the primary means of storing programs, it was typically designated as the A drive. The second floppy drive was the B drive.And those with the luxury of a hard drive were designated the C drive, a convention that remains with us today long after the decline of the floppy disks utility. Fig 3. 10 CD-ROM DRIVES Figure3. 10 showing Old 4x CD-ROM DRIVE CD-ROM discs are read using CD-ROM drives, which are now almost universa l on personal computers. A CD-ROM drive may be connected to the computer via an IDE (ATA), SCSI, SATA, Fire wire, or USB interface or a proprietary interface, such as the Panasonic CD interface. practical(prenominal)ly all modern CD-ROM drives can also play audio CDs as well as Video CDs and other data standards when used in conjunction with the right software. 3. 7 INSTALLING THE HARDWARE COMPONENTS OF A COMPUTER SYSTEM Things to get in place before starting Set of screwdrivers and pliers, Piece of cloth, CPU Thermal compound (recommended), PC components. Make sure you have all the components in place and a nice, clean and big enough place to work with. Fig 3. 11 All PC components carry the case Tip CPU Thermal compound is not a necessity but it is recommended to keep your CPU cool under load conditions by hel ping heat dissipate faster.It is a must if you intend to over clock your PC. Installing the motherboard Fig 3. 12. Open the side doors of the cabinet Lay the cabinet on its side Put the motherboard in place Drive in all the required screws Most motherboards come with an antistatic bag. It is advisable to put the motherboard on it for some time and then remove it from the antistatic bag before placing it in the cabinet. Fig 3. 13 Step 1 Installing the CPU CPU is the heart of a computer so make sure you handle it properly and do not drop it or mishandle it. Steps 1 * Lift the CPU lever on the motherboard Place the CPU properly on the motherboard * Pull down the lever to secure the CPU in place Warning Do not try to push the CPU into the motherboard Step 2 Got the thermal compound? Now is the time to use it. Take small amount of it and cautiously apply it on the top surface of the processor. Be careful not to put it on the neighboring parts of the motherboard. If you do so clean it straightway using the cloth. Tip Thermal compounds should be changed once every six months for optimal performance. Step 3 installing the heat sink Fig 3. 15 After installing the processor we proceed to installing the heat sink.There are different kinds of heat sinks that are bundled with the processor and each has a different way of installation. Look into your CPU manual of arms for instructions on how to install it properly. Place the heat sink on the processor Put the jacks in place unshakable the heat sink with the lever After this you will need to connect the cable of the heat sink on the motherboard. Again look into the motherboard manual on where to connect it and then connect it to the right port to get your heat sink in operational mode. Installing the RAM Fig 3. 16 Installing the RAM is also an easy job.The newer RAMs that is DDR RAMs are easy to install as you dont have to worry about placing which side where into the slot. The older ones, SDRAMs are plagued by this problem. Push down the RAM into the slot Make sure the both the clips hold the RAM properly Installing the power supply Fig 3. 17 Installing the power supply as the components we install after this will require power cables to be connected to them. There is not much to be done to install a PSU. Place the PSU into the cabinet Put the screws in place tightly Tip Some PSU have extra accessories that come bundled with it. Consult your PSU manual to see how to install them.Step 6 Installing the video card Fig 3. 18 First you will need to find out whether your video card is AGP or PCI-E. AGP graphics cards have become redundant and are being phased out of the market quickly. So if you bought a spanking new card it will certainly be a PCI-E. * Remove the back plate on the cabinet corresponding to the graphics card * Push the card into the slot * Secure the card with a screw * Plug in the power connection from PSU (if required) High-end graphics cards need dedicated power supply and if your graphics card needs one then connect the appropriate wire from PSU into the graphics card.Step 7 Installing the hard disk Fig 3. 19 Hard disk is another fragile component of the computer and needs to be handled carefully. Place the hard drive into the bay Secure the drive with screws If the jumpers or switches are set for the only hard drive or master role, move on. If the jumpers or switches are not configured correctly, move them to the correct position with your needle-nose pliers or your tweezers. Connect the power cable from PSU Connect the data cable from motherboard into the drive If your hard drive is a SATA one then connect one end of SATA cable into the motherboard and other into the SATA port on the hard disk.If your hard disk is PATA type then use the IDE cable instead of the SATA cable. Tip If your PSU does not support SATA power supply then you will need to get a converter which will convert your standard IDE power connector to a SATA power connector. Fig 3. 20 Testing the Hard disk installation Verify that a monitor, keyboard, and mouse are connected to the PC. Make sure the power cord is connected and that the computer is receiving power. P ower up the unit and watch the thrill. Step 9 Connecting various cables Fig 3. 21 First we will finish setting up internal components and then get on to the external ones.You will need to consult your motherboard manual for determination the appropriate port for connecting various cables at the right places on the motherboard. Connect the large ATX power connector to the power supply port on your motherboard. contiguous get hold of the smaller square power connector which supplies power to the processor and connect it to the appropriate port by taking help from your motherboard manual. Connect the cabinet cables for power, reset button in the appropriate port of the motherboard. Connect the front USB/audio panel cable in the motherboard Plug the cable of cabinet fansYou are done with installing the internal components of the PC. Close the side doors of the cabinet and get it upright and place it on your computer table. Get the rest of the PC components like monitor, keyboard, mou se, speakers etc. which we will connect now. Connect the VGA cable of the monitor into the VGA port If mouse/keyboard is PS/2 then connect them to PS/2 ports or else use the USB port Connect the speaker cable in the audio port Fig 3. 22 Plug in the power cable from PSU into the UPS Also plug in the power cable of the monitor You are now done with setting up your PC.Power on and see your PC boot to glory. Step 10 Installing Operating System Here are some useful steps enter your BIOS settings instruct the computer to boot from the CD ROM, insert a bootable disk fold your arms and watch your PC boot to Glory. CHAPTER FOUR 4. 1 NETWORKING AND NETWORK CABLES Knowledge gained on Networking Network is a group of connected computers. This can be as small and unbiased as two (2) computers connected together or as large and labyrinthine as a multisite network that supports thousands of computers and printers and other device.Networking allows for increased communication (video conferencing, real-time chats, e-mailing etc), hardware and software resources sharing (printers, drives, data, files application etc) and Data back up and retrieval. Network models can be any of peer-to-peer or client/server model. Types of network include LAN (Local Area Network), WAN (Wide area network), MAN (Metropolitan Area Network), Virtual LAN, Virtual Private Network, (VPN). 4. 2 NETWORK DEVELOPMENT COMPONENTS Components used to develop a network can be classified broadly into 2 that is computer hardware and software The Hardware components include * Computers Modems * Interfaces * Peripherals * Networking cards * Cabling UTP, STP, Fiber Optics, coaxial * Interconnecting devices, e. g. repeaters routers, hubs, NIC, switches, bridges The software includes operating system (such as MS Dos, UNIX, protocols and other software tools keep the data communication across the network. The number of components (software and hardware) depends on a number of factors like, type of Network to be use d, number of workstation, hosts, PC terminals other peripheral devices to be connected to the Network, data volume, speed of transmission, application program and services required. . 3 MAIN TYPES OF NETWORK TOPOLOGIES In networking, the term topology refers to the layout of connected devices on a network. This article introduces the standard topologies of computer networking. One can think of a topology as a networks virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a rope in a family room, but it would be highly unlikely to find an actual ring topology at that place. Network topologies are categorized into the following basic types * Star Topology lot Topology * Bus Topology * guide Topology * Mesh Topology * Hybrid Topology More complex networks can be built as hybrids of two or more of the above basic topologies. Star Topology Many hom e networks use the star topology. A star network features a central connection point called a hub that may be a hub, switch or router. Devices typically connect to the hub with unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computers network access and not the entire LAN. If the hub fails, however, the entire network also fails. ) See the object lesson of Star Network Topology. Fig 4. 1 Advantages of a Star Topology * Easy to install and wire. * No disruptions to the network then connecting or removing devices. * Easy to maintain faults and to remove parts. Disadvantages of A Star Topology * Requires more cable aloofness than a additive topology. * If the hub or concentrator fails, nodes attached are disabled. * More expensive than linear bus topologies because of the cost of the concentrators. The protocols used with star configurations are usuall y Ethernet or Local Talk.Token Ring uses a analogous topology, called the star-wired ring. Star-Wired Ring A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring. The Token Ring protocol uses a star-wired ring topology. Ring Topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either clockwise or anticlockwise).A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses. See the case of Ring Topology. Fig 4. 2 Bus Topology Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector.A device missing to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient role actually accepts and processes the message. Ethernet bus topologies are relatively easy to install and dont require much cabling compared to the alternatives. 10Base-2 (Thin Net) and 10Base-5 (Thick Net) both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result.In addition, if the backbone cable fails, the entire network effectively becomes unusable. See the parable of Bus Network Topology. Fig 4. 3 Advantages of a Linear Bus Topology * Easy to connect a computer or peripheral to a linear bus. * Re quires less cable length than a star topology. Disadvantages of a Linear Bus Topology * Entire network shuts down if there is a break in the main cable. * Terminators are required at both ends of the backbone cable. * Difficult to identify the problem if the entire network shuts down. * Not meant to be used as a stand-alone solution in a large building.Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus and each hub functions as the root of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone. See the illustration of Tree Network Topology. Fig 4. 4 Advantages of a Tree Topology Point-to-point wiring for individual segments.Supported by several hardware and software vendors. Di sadvantages of a Tree Topology Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies. Mesh Topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction. Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others. See the illustration of Mesh Network Topology. Fig 4. 5 Hybrid Topology A combination of any two or more network topologies. Note 1 Instances can occur where two basic network topologies, when connected together, can still retain the basic network character, and therefore not be a hybrid network.For example, a tree network connected to a tree network is still a tree network. Therefore, a hybrid network accrues only when two basic networks are connected and the resulting network topology fails to meet one of the basic topology definitions. For example, two star networks connected together show hybrid network topologies. Note 2 A hybrid topology always accrues when two different basic network topologies are connected. 4. 4 Network Adapters There are many different names for network adapters, including network cards, Network Interface Cards, NICs. These are all generic terms for the same launch of hardware.A network cards job is to physically attach a computer to a network, so that the computer can participate in network communications. The first thing that you need to know about network cards is that the network card has to match the network medium. The network medium refers to the type of cabling that is being used on the network. Wireless networks are a science all their own, and I will talk about them in a separate article. At one time making sure that a network card matched the network medium was a really big deal, because there were a large number of competing standards in existence.For example, before you built a network and started buying network cards and cabling, you had to decide if you were going to use Ethernet, coaxal Ethernet, Token Ring, Arcnet, or one of the other networking standards of the time. Each networking technology had its strengths and weaknesses, and it was important to figure out which one was the most appropriate for your organization. Today, most of the networking technologies that I mentioned above are quickly becoming extinct. Pretty much the only type of wired network used by small and medium sized businesses is Ethernet. This is what an Ethernet card looks likeFig 4. 6 4. 5 UTP CABLE TYPES UTP cabling, terminated with RJ-45 c onnectors, is a common blur-based medium for interconnecting network devices, such as computers, with intermediate devices, such as routers and network switches. Different situations may require UTP cables to be wired according to different wiring conventions. This means that the individual wires in the cable have to be connected in different orders to different sets of pins in the RJ-45 connectors. The following are main cable types that are obtained by using specific wiring conventions * Ethernet Straight-through Ethernet Crossover * Rollover Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place. This is a common error in the lab and checking that the device connections are correct should be the first troubleshooting action if connectivity is not achieved. Unshielded twisted-pair (UTP) cabling, as it is used in Ethernet LANs, consists of four pairs of color-cod ed wires that have been twisted together and then encased in a flexible plastic sheath.The twisting has the effect of canceling un urgencyed signals. When two wires in an electrical circuit are placed close together, external electromagnetic fields create the same interference in each wire. The pairs are twisted to keep the wires in as close proximity as is physically possible. When this common interference is present on the wires in a twisted pair, the receiver processes it in touch yet opposite ways. As a result, the signals caused by electromagnetic interference from external sources are effectively cancelled. 4. 6UTP CABLING STANDARDSThe UTP cabling commonly found in workplaces, schools, and homes conforms to the standards established jointly by the Telecommunications Industry Association (TIA) and the Electronics Industries Alliance (EIA). TIA/EIA-568A stipulates the commercial cabling standards for LAN installations and is the standard most commonly used in LAN cabling envir onments. Some of the elements delimit are * Cable types * Cable lengths * Connectors * Cable termination * Methods of testing cable There three (3) types of unshielded twisted pair Ethernet cables and they are Ethernet Straight- throughEthernet Crossover Rollover The figure below shows the color combinations for producing these cables Fig 4. 7 CABLE TYPE STANDARD APPLICATION Ethernet straight- through Both end T568A or both end T568B Connecting a network host to a network device such as a switch or hub. Connect a computer to a cable/DSL modems LAN portConnect a routers WAN port to a cable/DSL modems LAN port. Connect a routers LAN port to a switch/hubs uplink port. (normally used for expanding network)Connect two (2) switches/hubs with one of the switch/hub using an uplink port and the other one using normal port. Ethernet crossover One end T568A, And the other end T568B. Connecting two network hosts. Connecting network intermediary devices such as (switch- to- router) or (router- to-router)Connect 2 switches/hubs by using normal port in both switches/hubs. Rollover cisco proprietary Connect a workstation serial port to a router console port, using an adapter. Making Ethernet UTP cables WHAT YOU NEED Fig 4. 8 Cable- Be sure the cable(s) you are using is properly rated for CAT 5. It should state clearly on the jacket of the cable, what it is rated at.One option that you have when selecting your cable is to use a pre-made normal straight through cable, and but whack off one of the ends, and replace with a new Crossed Over end. For the purpose of this report, though, we arent going to go that route. We are going to make the whole thing from scratch using bulk CAT 5 cable. Connectors Crossover cables are terminated with CAT 5 RJ-45 (RJ stands for Registered Jack) modular plugs. RJ-45 plugs are similar to those youll see on the end of your telephone cable except they have eight versus four contacts on the end of the plug.Also, make sure the ends you select ar e rated for CAT 5 wiring. There are also different types of jacks which are used for different types of cabling (such as Solid Core wire). Make sure you buy the correct jacks for your cabling. Crimper You will need a modular crimping tool. Fig 4. 9 Stripper There are several specialize tools, which can be used to strip the jackets off of cabling. If you do not have access to one of these tools, cautious use of a razor web or knife should work just fine but keep in mind if you go the razor blade / knife route, extra special care must be used as to not damage the wires inside the jacket.Cutters You need a pair of cutters that will allow you to cut a group of cables in a straight line. It is very important that all the wires are the same lengths, and without proper cutters, this can be a difficult task. Fig 4. 10 LAN Tester You need the LAN tester to test the cable after crimping to ensure the functionality of the cable. Connect the cable to the tester and see if all lights turn green. If all lights turn green, your cable is working properly. If they do not, cut the RJ-45 connector off and re-terminate the ends of the cable with a new one.Fig 4. 11 1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at this point, as to not snick or cut into the wires, which are inside. Doing so could alter the characteristics of your cable, or even worse render it useless. Check the wires, one more time for nicks or cuts. If there are any, just whack the whole end off, and start over. Fig 4. 12 2)Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do not want the wires to become untwisted down inside the jacket.Category 5 cable must only have 1/2 of an inch of untwisted wire at the end otherwise it will be out of specification Fig4. 13 Up to this point, things have been pretty easy. Things will get a little bit tricky here, but dont worry well get through this together. We are at a point in this report where a decision needs to be made. You need to decide which end of the cable you are making at this point in time. If you are making your cable from scratch like I am doing while writing this report, you have 2 end jacks, which must be installed on your cable.If you are using a pre-made cable, with one of the ends whack off, you only have one end to install the crossed over end. Below are two diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point which end you are making and examine the associated picture below. Fig4. 14 develop to untwist the twisted exposed wires on your cable. Use caution so that you do not untwist them down inside the jacket. Once you have all the wires untwisted begin to arrange them in the proper order based on the pictures above.This stage can be a frustrating one, especially some of the middle wires. Once you get all the wired arranged in the proper order, make sure your wire c utters are within reach then grasp them right at the point where they enter the jacket. Make sure you keep them in the proper order Grab your cutters now. Line them up along your prepared wires about 1/2 inches above the jacket. Be sure at this point that you are both 1/2 inches above the jacket, and that your cutters are aligned straight across the wires. You want to make a clean cut here also make sure you dont let go of that jacket / wiresFig4. 15 5. Grab those crimpers because not all crimpers are exactly the same your pictures may not match exactly what you see below. Be sure to keep a good grip on that jack and the cable. Insert the jack into the crimper. It should only go in one way, so you dont have a whole lot to worry about inserting it. Begin to compress those crimpers. You will more than likely hear a clicking sound. Keep squeezing. If you try to let go too early, nothing will happen. They will not release. Keep going until they stop clicking / stop moving all together .At this point, you should be able to let go of the jack, and the crimpers. The crimpers should release now leaving you with a crimped jack. If the crimpers do not release, you probably didnt press hard enough. Fig4. 16 6)Its time to examine what we have done. If you look at the end of the jack you should see that the copper connectors should not be pressed down into the wires. Toward the back of the jack (where the jacket meets the jack) it should be crimped securely holding the jacket / cable in the jack. If something has gone wrong, dont worry, its not the end of the world.Grab those cutters, and just whack the whole jack off and start back at step 1 (a frustrating one I know, but its better to have a cable that works, than to spend hours trouble shooting your PC trying to figure out why you cant see the other machine). If everything is cool, all you have to do now is make the other end of the cable so go back to step one, and make the other end as I have explained in this report . Fig 4. 17 Good Fig4. 18 WRONG WAY Note how the blue plastic screen is not inside the connector where it can be locked into place. Fig4. 9 WRONG WAY Note how the cables do not go all the way to the end of the connector. 4. 7 CONNECTING TWO COMPUTERS USING CROSSOVER CABLES Fig 4. 20 Plug in network card each to computer and then install network card driver for each computer. Connect the cable to both computers network card. Here comes the network configuration, lets create a simple network by assigning following network info to each computers network card Computer A IP Address 10. 1. 1. 1 Subnet mask 255. 255. 255. 0 Gateway DNS Servers Computer B IP Address 10. 1. 1. 2 Subnet mask 255. 255. 255. 0 Gateway DNS ServersSince these 2 computers are directly connected, no gateway and DNS servers are needed. After assigning IP address, try to ping the other computer from command prompt, you should be able to ping each other and then sharing printers or files as you wish. 4. 8 USING PING TO TROUBLESHOOT NETWORK PROBLEM Sometimes if your network connection is down, you can use ping to troubleshoot network problem and then fix it. Ping is a program used to check whether a host is up and active in network. Its very simple and usually used to troubleshoot network problem. Here is typical technique for pinging and it applies to wireless network as well. . First thing you need to do is to make sure there is light on network card with cable connected. Sometimes network down is due to disconnected network cable or unfounded cable connection. If you notice no light on your network card after connecting with network cable, make sure the network cable is working. If you see the light, then proceed to step 2. 2. Go to Start and click on Run. Type CMD, and hit Enter or click OK. Fig 4. 21 Type ping in the Command Window. fritter away the space bar once. Type the IP or website address that you want to ping. For example, if you want to ping eBay, type www. ebay. om a fter the space. Hit Enter. If the website is up and actively responding, you receive replies back from the server that you pinged with the following information The IP address The number of Bytes sent The time it took in milliseconds The TTL is Time to eff (This indicated the number of hops back from the computer pinged from that computers initial TTL value. ) Fig4. 22 4. 9HUBS AND SWITCHES As you can see, computers use network cards to send and receive data. The data is transmitted over Ethernet cables. However, you normally cant just run an Ethernet cable between two PCs and call it a network.In this day and age of high speed Internet access being almost universally available, you tend to hear the term broadband thrown around a lot. Broadband is a type of network in which data is sent and received across the same wire. In contrast, Ethernet uses Baseband communications. Baseband uses separate wires for sending and receiving data. What this means is that if one PC is sending data across a particular wire within the Ethernet cable, then the PC that is receiving the data needs to have the wire redirected to its receiving port. You can actually network two PCs together in this way.You can create what is known as a cross over cable. A cross over cable is simply a network cable that has the sending and receiving wires reversed at one end, so that two PCs can be linked directly together. The problem with using a cross over cable to build a network is that the network will be limited to using no more and no less than two PCs. Rather than using a cross over cable, most networks use normal Ethernet cables that do not have the sending and receiving wires reversed at one end. Of course the sending and receiving wires have to be reversed at some point in order for ommunications to succeed. This is the job of a hub or a switch. Hubs are starting to become extinct, but I want to talk about them anyway because it will make it easier to explain switches later on. There are different types of hubs, but generally speaking a hub is nothing more than a box with a bunch of RJ-45 ports. Each computer on a network would be connected to a hub via an Ethernet cable. You can see a picture of a hub, shown in Figure C. Fig 4. 23 A hub is a device that acts as a central connection point for computers on a network A hub has two different jobs.Its first job is to provide a central point of connection for all of the computers on the network. Every computer plugs into the hub (multiple hubs can be daisy chained together if necessary in order to accommodate more computers). The hubs other job is to arrange the ports in such a way so that if a PC transmits data, the data is sent over the other computers receive wires. Right now you might be wondering how data gets to the correct destination if more than two PCs are connected to a hub. The secret lies in the network card. Each Ethernet card is programmed at the factory with a unique Media Access Control (MAC) address.Wh en a computer on an Ethernet network transmits data across an Ethernet network containing PCs connected to a hub, the data is actually sent to every computer on the network. As each computer receives the data, it compares the destination address to its own MAC address. If the addresses match then the computer knows that it is the intended recipient, otherwise it ignores the data. As you can see, when computers are connected via a hub, every packet gets sent to every computer on the network. The problem is that any computer can send a transmission at any given time.Have you ever been on a conference call and accidentally started to talk at the same time as someone else? This is the same thing that happens on this type of network. When a PC needs to transmit data, it checks to make sure that no other computers are sending data at the moment. If the line is clear, it transmits the necessary data. If another computer tries to communicate at the same time though, then the packets of data that are traveling across the wire collide and are destroyed (this is why this type of network is sometimes referred to as a collision domain). Both PCs then have to wait for a haphazard mount of time and attempt to retransmit the packet that was destroyed. As the number of PCs on a collision domain increases, so does the number of collisions. As the number of collisions increase, network efficiency is decreased. This is why switches have almost completely replaced hubs. A switch, such as the one shown in Figure D, performs all of the same basic tasks as a hub. The difference is that when a PC on the network needs to communicate with another PC, the switch uses a set of internal logic circuits to establish a dedicated, logical path between the two PCs.What this means is that the two PCs are free to communicate with each other, without having to worry about collisions. Fig4. 24 A switch looks a lot like a hub, but performs very differently Switches greatly improve a networks effic iency. Yes, they eliminate collisions, but there is more to it than that. Because of the way that switches work, they can establish parallel communications paths. For example, just because computer A is communicating with computer B, there is no reason why computer C cant simultaneously communicate with computer D.In a collision domain, these types of parallel communications would be unrealistic because they would result in collisions. 4. 10 PLANNING AND CABLING NETWORKS. When planning the installation of LAN cabling, there are four physical areas to consider Work area Telecommunications room, also known as the distribution facility Backbone cabling, also known as vertical cabling Distribution cabling, also known as horizontal cabling do Cable Length For UTP installations, the ANSI/TIA/EIA-568-B standard specifies that the total combined length of cable spanning the four areas listed above is limited to a maximum distance of c meters per