Monday, September 30, 2019

Federal Reserve Chair Game

Using the concepts you've been studying, describe how the game shows the use of monetary policy?Based on the monetary policy, the authority controls the supply of money through targeting the interest rate to promote economic growth and stability. Having relatively low price level and less unemployment rate are the main goals. Therefore, this game also adjusts the federal interest rate in order to retain the lowest unemployment rate and improving the economic stability by maintaining low inflation rate that increase the economic stability. So, we can say that this game controls the monetary policy.How can unforeseen circumstances effect the economy? Give examples.If the supply of money is not controlled by the monetary authority, there would be some chances that would affect the economic stability such as high inflation rate and unemployment rate may cause the issue to the current financial need and finally cause the high risk to the country.How does the Fed react to these circumstanc es? Did you get re-appointed? Why or why not?To keep the inflation rate low and stable around 2 percent and unemployment rate account 5 percent are recommended. In this case, it is necessary to have fed rate around 4.5 and also it needs to be revised every 3 months for next four years. If the rate will increase by 7.5 percent, unemployment rate would be around 4.69 percent, inflation rate as 2.26 percent. Therefore, the inflation will be higher as well as the unemployment rate. No, I was dismissed from the high inflation rate because I cannot control the monetary polity even form two times opportunity

Sunday, September 29, 2019

Economics Issues Simulation Paper Essay

The purpose of a managed care organization is to coordinate the costs and delivery of health care. A managed care organization oversees money spent on labor, technology, and facilities such as physician offices and hospitals. A type of managed care organization is a Health Maintenance Organization (HMO). A HMO â€Å"provides medical care for all its enrollees in return for a fixed annual fee per enrollee† (University of Phoenix, 2010, Key Terms and Concepts Section). An HMO tightly oversees the use of health care services thereby reducing costs and controlling utilization. For example, HMO’s reduce costs and control utilization among services are by requiring second opinions, performing pre – admission testing and reviews for continued stays or additional procedures, and allowing generic substitutions for drugs. Managed care organizations can save money by providing lower prices through contracting large volumes of services and reducing the amount of hospitalizat ions (Getzen & Allen, 2011). This essay presents a scenario in which I am a representative of Castor Collins Health Plans responsible for maximizing profits and minimizing risks. Within my job description, I am advised to develop a comprehensive health insurance plan for two entities: ConstructIt and E – Editors. This essay explains the company’s employee demographics, health risk factors, premium amount the company is willing to pay, and what company I chose to offer a health insurance plan. Based upon my analysis of potential utilization, I will provide two reasons for why each plan could be selected as well as explain my reasoning for choosing the plan. Last, I will explain why I did not offer the company a different plan. ConstructIt Employee Profile ConstructIt is a construction company composed of 1,000 employees. ConstructIt is [Avoid â€Å"it is,† etc.] comprised of 550 men and 450 women between the ages of 26 – 42 with 60% having spouses. ConstructIt employees  work profile consist of 32% great physical activity, 25% moderate physical activity, and 43% sedentary activities. The age and gender profile of ConstructIt is as follows: Almost half of the population is between the ages of 26 – 30 years One – third of the population is between the ages of 31 – 35 years Approximately 20% of the population is between the ages of 36 – 40 years Less than 10% ages 41 – 45 years. (University of Phoenix, 2010, Health Profile Section) The health profile of major risk factors among ConstructIt employees is depicted within the following table: Obesity 39% High Cholesterol 19.6% High Blood Pressure 19.3% Allergies 17.7% Migraines 16.8% Respiratory Diseases 13.5% Digestive Disorders 8.4% Thirty – eight percent of the population is diagnosed as having no major health risks. Economic Issues Simulation In addition, a combined 18% of the population smokes (University of Phoenix, 2010, Major Health Risks Section). ConstrucIt has a high number of people diagnosed as not having any major health risks. This is good because it means fewer people will seek health care services resulting in saving money for Castor Collins Health Plans. However, ConstructIt does have a high incidence of obesity rates: 39% of the group. Obesity predisposes a person to developing other serious chronic ailments such as high blood pressure, high cholesterol, and diabetes. The high rate of obese individuals may  increase the risks involved whenever offering health insurance to ConstructIt.   Chosen Company and Plan ConstructIt is willing to pay a maximum premium payout of $4000 per enrollee and E – Editors is willing to pay $4500 per enrollee. However, E – Editors has 600 more employees than ConstructIt, which in turn increases costs and utilization rates. Based upon the health profile of ConstructIt versus E – Editor I have decided to offer ConstructIt the Castor Standard insurance plan because they have lower utilization rates in many areas. I have decided not to offer E – Editor any type of insurance plan through Castor Collins Health Plans because E – Editor has high utilization rates. In addition, E – Editors employee age groups range from 35 – 54 years where as ConstructIt employee age groups range from the ages of 36 to 45 years (University of Phoenix, 2010, Health Profile Section). As a person ages, he or she is much more likely to increase the amount of health care goods and services required to maintain one’s health. In turn, thi s also increases the expected utilization rates. Two Reasons For Why Each Plan Can Be Selected Castor Collins Health Plans contain certain factors affecting the pricing of services. These factors include limitations and exclusions for what Castor Collins is willing to pay. Castor Standard health plan does not cover pre – existing conditions where as Castor Enhanced does provide coverage for enrollees with pre – existing conditions. One reason for why I can offer Castor Standard health plans to ConstrucIt is that the majority of ConstructIt employees are younger in age and almost half the population is free from major health risks. A second reason for why I can offer Castor Standard Insurance plans to ConstructIt is that it costs less while covering more conditions. One reason for why I can offer Castor Enhanced health plans to both ConstructIt and E – Editors is because both companies have employees with pre – existing conditions. A second reason for why I can offer Castor Enhanced health plans is E – Editors contains a larger amount of middl e – aged individuals requiring specialized services. Many pre – existing conditions require specialized services that may be added or customized to the Castor Enhanced health plan. Conclusion In summary, an HMO works in connection with a group of hospitals, physicians, and providers to offer health care services for a fixed annual fee. HMOs tightly oversee the use of health care services to reduce costs and control utilization. I evaluated the employee work and health profiles of two companies: ConstructIt and E – Editors. ConstructIt contains 1000 employees willing to pay out $4000 in premiums per enrollee each year. E – Editors contain1600 employees willing to pay out $4500 in premiums per enrollee each year. E – Editors’ health profile revealed a higher utilization rate among services than ConstructIt. Economic Issues Simulation This prompted me not to offer any health plans to E – Editors at a time whenever Castor Collins Health Plans is trying to maximize profits and minimize risks. However, if E – Editors was willing to pay higher premiums Castor Collins Health Plans may have been able to customize a health plan. I did offer a Castor Standard Insurance plan to ConstructIt because their health profile revealed a lower rate of utilization among services. It is important one evaluates the exclusions and limitations listed within health insurance plans to ensure adequate and correct amount of coverage is available. References Getzen, T. E., & Allen, B. H. (2007). Health Care Economics. Hoboken, NJ: John Wiley & Sons. University of Phoenix. (2010). The Financing of Health Care Simulation [Computer Software]. Retrieved from University of Phoenix, Simulation, HCS440 – Economics: The Financing of Health Care website.

Saturday, September 28, 2019

Art Essay Example | Topics and Well Written Essays - 250 words

Art - Essay Example I am not sure if it is because the models are so lifelike or because I don’t have a particular interest in this type of art. I suspect that it is because I don’t have a particular interest. Art to me, is something that inspires imagination. Looking at a body, real or not to me is not inspirational. I actually thought that the piece was disgusting. X-radiology is particularly interesting as it allows the conservationist to see what issues exist and further develops a plan which allows for restoration without intrusion. Unlike the plastics, this too seems a method of art as well. Likewise as applied to the paintings. I think that the restoration of paintings is nothing short of genius. I would imagine that maintaining the integrity of each stroke must be a arduous task but somehow allows the restorer to place themselves into the seat of the original painter. I would love to read a piece by a painting restoration expert to see what their views are and if they find the experience to be

Friday, September 27, 2019

Global Marketing Essay Example | Topics and Well Written Essays - 4000 words - 1

Global Marketing - Essay Example The brand awareness and the brand recollection for Dyson have been very high both in UK and Japan alike, and growing to a great extent in US as well. The company was started with an intension to find a solution for the issues faced by the owners of vacuum cleaners. Over the past 12 years the company has grown to become the world leader in innovative vacuum cleaners and the company believes the products to be ‘beautiful products that work in every case’. The company takes pride in what it does and the products that they produce. Each product of the company is innovative and has created a mark in the countries across the world. It is however essential to also explore other markets that the company can increase their marketing resources into. This is mainly to assist the company expand the business and to develop an equally good position in other markets as well. The company can concentrate on the South East Asian countries and work towards improving the marketing resources here in these countries. There are several reasons for this choice. However before entering into this it is essential to get a brief overview of an essential element that requires to be considered before taking any steps of marketing improvements. With the growing change of economies and the various technological developments, there has also been a clear change which has been required from the companies as well. The needs of humans change over time and taking the example of Maslow’s Hierarchy of needs, it is clear that there is a strong connection between the economic growth and the personal choice in the current economy. In the r ecent ages, with the use of the World Wide Web and the internet, there have been a few changes in terms of the desire for knowledge, which were earlier satisfied by the information economy which provided for answers to the cognitive

Thursday, September 26, 2019

Most important system of critical national infrastructure Essay

Most important system of critical national infrastructure - Essay Example While security may mean guarding the country’s boarders against outside attacks and intrusion, it also encompasses computer technology, which has become a critical part of the modern day activities. The most developed countries have been targeted through computer attacks where fraud committed through these systems has increased in the modern world. This requires a robust governmental strategy to defend its citizens against illegal exploitation through computer related crimes. If these computers are attacked mostly through viruses, other services are affected. This is because while computers are used for most office work in the modern world, they also control other important infrastructures such as the power grid, which would in turn bring devastating effects such as patient deaths since it is used in hospitals to support lives (How government services (GS) work with other critical infrastructures, n.d). Other activities such as banking would also be affected bringing a negative impact to the country’s economy. However, if security has been guaranteed and if the governments are several steps ahead of the criminals with regard to computer technology, the country’s s ecurity would have been catered for from the perspective of information technology. Here, most countries have implemented measures to ensure that their cyber space is as secure as possible so as to prevent disastrous events that may happen. Security infrastructure may also be viewed from the perspective of food security for a country. A government must ensure that its country is secure with respect to available food for its citizens. This would be accomplished by ensuring that resources are available to protect people from hunger if natural disasters such as floods and droughts take place affecting the availability of food. This implies that security incorporates a

Wednesday, September 25, 2019

International Business Law Essay Example | Topics and Well Written Essays - 2000 words - 1

International Business Law - Essay Example But par (3) of the above section does not exclude inventions that were done outside employment; hence it is still possible that the invention is still free. â€Å"Shabana had reached an advanced stage of invention before her return to Australia. She completed work on the creation of the special widget a week later.† Hence, there is no issue that it was done in 10X during employment. The next question therefore is: â€Å"How would the employer acquire the tied invention? Is it automatic? Must it not do something to acquire the same in addition to employing Shabana? The answer to question is found in the German law which states, (1) Any employee making a service invention shall be under a duty to report the invention to his employer immediately in a special written notice indicating that said writing constitutes the report of an invention. Where two or more employees have contributed to making the invention, a joint notice may be filed. The employer shall inform his employee without delay and in writing of the date the report was received.† It appears on the basis of Section 5 (1), that it is the duty of an employee to report the invention which was not done by Shabana in this case. The facts of the case are clear on this. There was no mention of notice to 10X because the latter had known the invention only upon sale by Shabana. So the next question is: â€Å"What is the consequence of Shabana’s failure to report given the disposition made to Keg. Again the German law provide the answer as follows: (2) On the receipt of a written declaration of a limited claim, a non-exclusive right to use the service invention shall pass to the employer. Should an employer’s right of use unreasonably impede an employee’s further exploitation of his invention, the employee may request that, within a period of two month, his employer either make an unlimited claim to the service invention or release it to the employee. (3) Dispositions of a service invention made by an

Tuesday, September 24, 2019

Terrorist Finance Tracking Program Essay Example | Topics and Well Written Essays - 500 words

Terrorist Finance Tracking Program - Essay Example According to  Terrorist Finance Tracking Program: Fact Sheet  (2006),   The United States â€Å"Treasury department is uniquely positioned to track terrorist money flows and assist in the broader US Government effects to uncover terrorist cells and map terrorist networks here at home and around the world† (PP. 4). In order to ensure the success of this program utilizes SWIFT. According to  Legal Authorities Underlying the Terrorist Finance Tracking Program  (n.d. ). â€Å"SWIFT-a Belgium-based company with U.S. offices that operates a worldwide messaging system used to transmit bank transaction information- seeking information on suspected international terrorists† (PP. 6).The United States government uses subpoenas in order to view this information. Based upon the terms of the subpoenas the United States government is allowed to view this information only in regards to suspected terrorist investigations. The information obtained by SWIFT is legally obtained in accordance with The International Emergency Economic Powers Act. The International Emergency Economic Powers Act was established in 1977. The President only during a time of national emergency may put forth this act in order to investigate financial transfers by means of banks and other relevant financial transactions in reg ards to a foreign individual suspected of being associated or being a terrorist. In regards to the September 11th 2001 terrorist attacks former United States president George W. Bush issued executive order 13224 declaring an international emergency as future terrorist attacks were suspected. Subpoenas issued are in compliance with the United States Constitution’s fourth amendment as investigations of potential terrorists and relevant documents to terrorism are obtainable through subpoenas issued by Congress. In addition neither The Foreign Intelligence

Monday, September 23, 2019

Benefits of Strategic Management Essay Example | Topics and Well Written Essays - 250 words

Benefits of Strategic Management - Essay Example Companies that utilize strategic management can greatly benefit from its implementation. Strategic management allows managers the ability to forecast the future. The proper use of strategic management can increase the productivity and profitability of a business. An example of a strategic management decision is using only a few of the patents a company develops in order to postpone the release of new products for the future. An industry in which this occurs a lot is the pharmaceutical industry. Another benefit of strategic management is that it can be used to change the corporate culture of a company. The use of strategic management can also help an organization gain a competitive advantage. The accounting department benefits from strategic management because it allows the firm to make better budgeting decisions (Hainescentre, 2012). Planning for the future allows a firm the ability to predict future expenditures and income streams. Strategic management can also be used to improve decision making (Robinson, 2005). Robinson, R. (2005). The advantages and disadvantages of strategic management. Retrieved February 10, 2013 from

Sunday, September 22, 2019

Business arena Essay Example for Free

Business arena Essay Recent years have demonstrated that a lack of unity exists within the business arena compared to the synergistic methods in which trade unions execute their policies. This must be considered another of the drawbacks of the existence of interest groups. This has resulted in costly political campaigning for Australian businesses (Bell, 0000). The number of organisations that attempt to represent their interests at the political level has become such a complex and tangled web that it is often unprofitable for to do business in such a scene (Matthews). Such action often bring great expense and yet offer little real guarantee of success (Coutskorais, 0000, p. 80). Such organisations in Australia as the Minerals Council of Australia (which represents the particular industry) and Surfer’s Paradise Chamber of Commerce (which represents regional membership) exist for the profitable purpose of (among other things) promoting competition among businesses and the consequent improvement of policies (Matthews, 0000, 75) Despite the clear benefits that interest groups can provide, some drawbacks do exist when one considers their impact on the politics of a country. It is usually necessary to be careful that certain interest groups do not become too powerful and end up coercing government to adversely affect policy changes (Apollonio Bero, 2007). The two Australian interest groups previously mentioned are cases in point, as they represent very powerful organizations that have at least a large potential to urge the implementation of any of the policies they devise. Care must be taken that the policies they advocate really do consider the interest of the public. One major reason why such care must be taken is the fact that these interest groups are never guaranteed to possess equity in their actions. Because they take a particular stand on an issue, their interest is likely to exclude the interest of several others who have opposing views. Furthermore, interest groups have the general privilege of making donations to political parties. This is a lobbying technique that has been around for decades, but may give a political edge to such groups that have the greatest means of funding such campaigns (2007). Some interest groups have outsider status, and this means that they attempt to influence policy by altering public opinion (Evans, year. p. 84). Such groups may prove both beneficial and detrimental to the politics of a country. The detriment comes where such groups falsify or misrepresent information to the public in order to convince them (and their political candidates) to act in the behalf of the group. One group which has historically been seen in this light is the tobacco industry-front group. According to researchers Appollonio Bero, â€Å"The tobacco industry has a history of misrepresenting scientific evidence† (2007, p.419). The researchers go on to point out that the industry has created what seems to be an unaffiliated interest group which presents â€Å"its antiregulation agenda as an expression of popular will, and allowed industry lobbyists access to policymakers who were otherwise unwilling to work with them† (2007, p. 419). This presents a very unfavourable view of political interest groups. However, positive effects of this attempt to influence the public may occur in the form of debates between/among opposing groups, through which the public becomes more informed about the policies being advocated by each. Furthermore, since each group represents a social movement made up of people who share values and see eye to eye on certain matters of concern, these groups provide a forum or network of communication that has the potential to provide a series of checks and balances amongst themselves and within the government (Marsh, 2000). Overall, the action groups that exist within Australia to lobby for the interests of the people have a predominantly positive impact on the Australian society. Such organizations as the Boy’s Club, Gay rights, and animal liberation groups offer protection and a voice for these minorities in the decision-making sectors of the government. Such groups also speak for such issues as gun control, military disarmament, and the protection of the environment. These interest groups possess the expertise and the experience to speak persuasively in the behalf of their interests, and also have the ability to aid in the execution of policies once they have been adopted by the political bodies. The media has the positive effect of promoting the accountability of the government, and of other businesses that my have formed ties with members of the government. However, the highly structured and powerful nature of certain interest groups, while they have the power to get things done within the government, also have the power to wrongly influence the government on their behalf. It is therefore necessary to take care in the freedom with which such groups are allowed to act. References van Acker, E. Curran, G. (eds. ) 2004, Governing Business and Globalisation, (2nd edn. ) Pearson, Frenchs Forest. Ang, J C. Boyer. 2007, â€Å"Finance and politics: the wealth effects of special interest group influence during the nationalisation and privatisation of Conrail. † Cambridge Journal of Economics. vol. 31, no. 2, pp 193-216. Apollonio, D. E. L. A. Bero. 2007, â€Å"Finance and politics: the wealth effects of special interest group influence during the nationalisation and privatisation of Conrail. † American Journal of Public Health. vol. 97, no 3, pp 419-428. BCA. (2007). â€Å"Our Structure. † Business Council of Australia. Melbourne, VIC. Retrieved on May 8, 2007 from http://www. bca. com. au/Content. aspx? ContentID=100827 Hague, R. M. Harrop, S. Breslin. 1994, Political Science: A Comparative Introduction. St. Martin Press, New York. Gray, V. D. Lowery. 2000, Population Ecology of Interest Representation : Lobbying Communities in the American States. University of Michigan Press, Ann Arbor. Greenemeier, L J. N. Hoover. 2007, â€Å"Advocacy, Inc. † InformationWeek. no. 1121, pp 38-46. Hollander, R. â€Å"Name of Chapter or Essay. † (2006). Eccleston, R, Williams, P. Hollander, R. (Eds. ). Foundations of Australian Politics. Pearson Education, Sydney. Marsh, I. 2000, â€Å"Gaps in Policy-making capacities; interest groups, social movements, think tanks and the media. † in M. Keating, J. Wanna P. Weller (eds. ) Institutions on the Edge: Capacity for Governance. Allen Unwin, St Leonard’s. Parkin, A, Summers, J. Woodward, D. (eds. ) 2006, Government, Politics, Power and Policy in Australia, (8th ed. ) Pearson, French’s Forest. Chapter 17. Singleton, G et al. 2006, Interest Groups’ in Australian Political Institutions. 8th edn. Pearson, French’s Forest.. Ward, I. R. G. Stewart. 2006, Ch. 12, ‘Pressure Groups and Social Movements’ in Politics One, 3rd edn. , Palgrave. Macmillan, South Yarra. Weitzel, P. 2004, â€Å"Joining with non-media organization can help win access battle. † The Quill. vol. 92, no 7, pp 20-21.

Saturday, September 21, 2019

Traditional Housewife Essay Example for Free

Traditional Housewife Essay The power of the woman comes from her spontaneity, presence and being who she is? She has been the tower of strength, patience and perseverance. History of nations worldwide is the proof of her significant role. She has been viewed as the nurturer, nurse and caregiver. Her image is the personification of love and tolerance. She creates, she gives and she embraces her family members unconditionally. She takes care of her home, her children and her family. She is there, always ready to serve and care. She cooks, cleans and procures supplies for everyday living. This pillar of strength is the traditional housewife, who has faded into background of modern day needs, emerging technology and growing industrialization. Until industrial revolution of nineteenth century, most mothers in Europe and America not only stayed home to tend their children and house, they also worked side by side with their husbands to make financial contribution to the family. There was division of labor based on childbearing and strength, but without women, the crops would not have been harvested, food would not have been stored for winter months and people would not have had clothes to wear. The success of economy rested on the capable shoulder of the women. She fulfilled her role not out of necessity, but out of long, â€Å"real† tradition and great skill. (Byington, 2001) The power which women had as traditional housewife came from her valued contribution to household. With advent of industrialization and modern age technological evolution, the need for this traditional housewife got submerged. The priorities changed, expectations grew and her role was not valued any more. She was thrust into the background of anonymity. She had to emerge as the savior of the household in a new role. She emerged as a working woman of 21st century, walking side by side with men, braving the role of care provider on her capable shoulders. References Byington, Jill. Whats a Traditional Mom, Anyway?. Look Smart. Find Articles. 2001. 16 Feb 2007 findarticles.com/p/articles/mi_m0IUK/is_2001_Summer/ai_78177298. (Byington,2001)

Friday, September 20, 2019

Type Of Microprocessors For Desktop Computer Science Essay

Type Of Microprocessors For Desktop Computer Science Essay This reports body is divided into two main sections. One section will explain a different topic from another. In each section, there are introductions to the topic, explanation, conclusion, and FAQ (Frequently Asked Questions). Section one will explain about memory management in operating system, which is Windows 7 32-bit. There are 2 memories that will be covered in this section including their technology in management also, physical memory and virtual memory. Analysis about limitations of the technologies and solutions to overcome them are included. Section two will cover about the design and performances of microprocessors. There is a list, consisted of 5 major trends affecting the microprocessor performance. Besides that, microprocessors are explained further through the types of modern microprocessor, which are separated into the usage in desktop, laptop, or server. The differences in design and features between the desktops, laptops, servers, and embedded systems are included at the end of the section. Section 1 (One) : Operating System Memory Management Introduction Windows 7 is the latest release of operating system which is introduced by Microsoft in July of 2009 It was preceded by Windows XP and Windows Vista. The purpose of the development of Windows 7 is on personal computers, including desktops, laptops, and tablet PCs. Windows 7 has not so much difference from predecessor Windows Vista. Windows 7 adapts some features that Windows Vista already introduced before, but 7 was intended to be more focused on improvement compatibility with applications and hardware with which Vista already compatible. Microsoft also always tries to improve security in each generation of Windows operating system. Since the generation of Windows Vista, it actually works. Windows operating systems have become more secure and more susceptible from viruses, especially Windows 7. This report will cover about Windows 7 32-bits memory management. This report will also explain further about Windows 7s management of physical memory and virtual memory. Memory Management Memory management is planned organization of programs and data into the memory. The objectives of memory management are not only to easier for programs to find space to be loaded and executed, as simple as possible, but also to maximize the use to reduce memory waste. There are two kinds of memory management, physical memory management and virtual memory management. Physical memory, known as RAM (Random Access Memory), is a form of dynamic computer storage. RAM allows the computer to store data for quick retrieval and run multiple programs at once. This memory has capacities and types which vary and will depend on the computers motherboard. Virtual memory on the other hand, has the work to compensate the lack of RAM needed to run an application or an operation. Virtual memory combines the computers RAM and the temporary space on hard disk together. When RAM runs low, virtual memory will move data from RAM to a space called a paging file. Then it moves the data to and from the paging file to free up RAM. Physical Memory Management Physical memory  management is a memory management technique that uses RAM (Random Access Memory) as its resource to handle all of the processes in the computer. So, all the processes will be divided into smaller parts and they will be loaded into physical memory that later will be processed. System Paging In System Paging, the operating system or Windows will retrieve the data from secondary storage called as pages, and then Windows will use the paging file as a temporary storage for the memory dump. As the system reboots, Windows will copy the memory dump into a separate file, and then frees the space that was used before. Since Windows Vista onwards, Windows operating system had been improved a lot better in its physical memory management as in improvements for input-output speed and performance and more efficient and effective memory management. Windows 7 implements a technique related to physical memory management which is called Microsoft SuperFetch. Microsoft SuperFetch Microsoft SuperFetch is a technology that helps Windows to manage the amount of RAM (Random Access Memory) in the machine it runs on more efficiently. SuperFetch was introduced first in Windows Vista and still holds an important part in Windows 7s physical memory management. A less capable version, called PreFetcher, is included in Windows XP. SuperFetch tries to make sure often-accessed data can be read from the fast RAM instead of the slow hard drive. SuperFetch has two goals. The first is, it will decrease boot time as in SuperFetch will record which data and files need to be accessed at which times, and stores this data in a trace file. During consecutive boots, this information is used to make the loading of files become more efficient, resulting in shorter boot times. The Second goal is SuperFetch will make sure the applications that you use the most will be loaded more efficiently. SuperFetch will also adapt itself to your usage patterns and put it into account. SuperFetch does this by pre-loading your most often used applications in your main memory, based on not only usage patterns, but also on when  you use them. For example, if a user has the same routine every morning, he will run the Mozilla Firefox and browse the Facebook, SuperFetch will pre-load these into memory in the morning. And then comes the evening, the routine will be different, like he will run iTunes and plays his playlist, SuperFetch will adapt, and load those in memory instead during the evening. Analysis Microsoft SuperFetch can give memory manager a hand to divide an often used program into priorities. So it will become more responsive and of course save some time. Despite on its advantages, SuperFetch has some limitations. The limitation is that SuperFetch will spend the leftover free memory on a low-priority applications and processes. The effect will occur when the user tries to run a high resolution video or high performance game, the effects will slow down the computer because there are no more or very few free memories left. Solution Microsoft SuperFetch need to have some reserved memory for some applications that require a lot of memory in their processes. SuperFetch should allocate the free memory for the high performance processes also, without neglecting the existence of low priority processes in the free memory. It does not have to be balance exactly, but an equal allocation for processes is a must. Virtual Memory Management Virtual Memory Management is a memory management technique that is made of various hardware memory devices such as RAM modules and disk storage drives. Virtual memory is used to help physical memory to execute more processes because some pieces of processes are loaded to physical memory and other pieces will be loaded into virtual memory, so physical memory can handle more processes and will be in ready state at any particular time and also virtual memory can handle a process that may be larger than physical memory by loading some required pieces and then the rest pieces of processes will be loaded onto virtual memory. Demand paging Demand paging is one of the virtual memory management technique that load some part of the processes into virtual memory instead of load all part of the processes into physical and virtual memory and later the part of the process from virtual memory will be brought it into physical memory when its need the rest of parts of process. Operating System such as Windows is using demand paging as its virtual management technique but there are some problems in managing virtual memory in the demand paging at Windows XP and previous versions had and the solutions has been provided by Windows 7. Kernel address space Windows Kernel virtual address space is allocated into 2 sections, which are User address space and Kernel address space. Important resources in Kernel address space are adjusted according to the operational requirements. The sizes and locations of the resources are included as a management of virtual memory arranged by the operating system. Analysis In Windows XP and its previous versions, Kernel address space had been allocated statically into some fixed sizes and locations, so it will have some major problems in case that one or more of the resources oversized than its size allocation. The processes will not work well as usual in result. In Windows Vista and 7, the problems have been overcome by expanding the size and provide the size and location for the resources together. Nowadays, in Windows 7, Kernel address space shares the same space and is no longer divided into some sections. But it still have some limitations, the space is not dynamic enough to handle a very oversized resource. The same result of previous version of Windows still might be occurred. Solution Kernel virtual address space should be dynamic enough to overcome any possibilities. The user address space is a space that will not be unavailable each time, so it does not mean it cannot be available to handle some oversized-resources problem. The virtual memory space should be dynamic enough to let user address space to share a little space for the Kernel address space. Conclusion Windows 7 uses same techniques in memory management with previous versions of Windows which are System Paging in physical memory management and Demand Paging in virtual memory management. Microsoft develops a technology to help physical memory manager to work more efficient, which is called Microsoft SuperFetch. For the virtual memory manager itself, the allocations of the Kernel address space has been better since the introduction of Windows Vista and better in Windows 7 though it still has some limitations. FAQ What is Windows 7? Answer: is the latest release of Microsoft Windows for use as an operating system on personal computers, including home and business desktops, laptops, netbooks, and tablet PCs. What is the benefit of Microsoft SuperFetch? Answer: Microsoft SuperFetch can give memory manager a hand to divide an often used program into priorities. So it will become more responsive and of course save some time. How exactly the virtual memory works? Answer: Virtual memory is used to help physical memory to execute more processes because some pieces of processes are loaded to physical memory and it can handle a process that may be larger than physical memory by loading some required pieces and then the rest pieces of processes will be loaded onto virtual memory. Section 2 (Two) : Microprocessors Introduction Microprocessor is the main brain of a computer. Microprocessor is also known as the Central Processing Unit (CPU) that has main function to respond to and to generate arithmetical and logical operations.   The microprocessor is the heart of any normal computer, whether it is a  desktop machine, a laptop, or a server. Microprocessor is a complete computation engine that is fabricated on a single chip. The first microprocessor was the Intel 4004 which is introduced in 1971. The 4004 was not very powerful. But at that time it was quite an invention since everything was on one chip. Even though the 4004 powered one of the first portable electronic calculators, all it could do was to add and subtract. Nowadays, there have been a lot of improvements in modern microprocessors. This report will cover some areas such as major trends affecting microprocessor performance and design in recent years and differences between microprocessors design goals for laptops, servers, desktops and embedded systems. Microprocessor Performance Since microprocessor has an important main role in the entire computers work and performance, then it is also important to concern about the performance of the processor itself. As time goes by, performances of microprocessor have always been improved to be better in architecture, faster in speed, smaller in size, and lower in energy consumption. Microprocessor at this time is built and developed to meet those requirements. In purpose to meet those requirements, there are some measurements and factors that affect microprocessor performance. Some of the major trends affecting the microprocessors performance are: Clock speed Microprocessors job is to process tasks/instructions and executes them. How fast a microprocessor can do its job to complete a cycle of task from when its retrieved from its  memory, determines what actions the instruction requires, and carries out those actions matters because it measures the performance of the microprocessor itself. The clock speed is stated in megahertz (MHz) or gigahertz (GHz), and is a measure of how many instructions the processor can execute in one second. For example, a three Gigahertz (GHz) processor can operate at a rate of three billion cycles per second. The more cycles a processor can handle per second, the faster the clock can pump the current and the better the performance of the microprocessor. Number of Cores Number of cores will first determine whether it is a single-core microprocessor or multi-cores microprocessor. Multi-cores microprocessor is designed to have more than one core integrated to a single chip. Multi-cores microprocessor allows a complex instruction to be divided into some simple instructions to each of its cores, so that the instructions can be executed faster. Microprocessors such as Intel core i7 and AMD Phenom II X4 are examples of modern multi-core microprocessors. Instruction Set Architecture (ISA) Instruction set tells how to execute duties and works in the processor. Together with processor architecture will affect performance so it means the better instruction set and processor architecture the better performance of processor will get. Instruction Per Clock (IPC) IPC is the average number of  instructions executed for each clock cycle. IPC massively depends on the architectural design of the microprocessor and its number of transistors. A microprocessor with high clock speed is meaningless without IPC. It is pointless to have a fast-speed microprocessor if it can only execute four or five instructions. On-Board Cache Processors have resources to get their data from, which is the computers Random Access Memory (RAM). After the data is retrieved by the processor, it will copy and send it to a cache. The cache acts as a temporary information way station. Nowadays, the architecture of a microprocessor provides an on-board cache which is internal RAM that is built directly into the processor. Rather than requesting data from the RAM continuously, the CPU is allowed to access used data directly from its own on-board memory instead. This way, CPU can access and process data faster and more accurate. Its very effective for the applications that need high performance such as games, video player, etc. Type of Microprocessors for Desktop, Laptop, and Server Desktop Intel Core i5 (2nd Generation) Intel Core i5 (2nd Generation) is included in the family of Intel Core Processors. It is a newly-developed processor after being preceded by the first generation. Intel Core i5 (2nd Generation) was launched first at January 9th 2011 together with Intel Core i7 (2nd Generation) and are based on Sandy Bridge microarchitecture, unlike the first generation. This microprocessor has features such as, Intel Turbo Boost Technology 2.0, a later version which is better at accelerating performance than the first generations version 1.0; Intel HD Graphics 3000 that integrates high-performance graphics and media processing on the processor, putting the two components which is CPU processing and graphics on a single chip. Laptop Inter Core i5 Mobile (2nd Generation) Intel Core i5 Mobile (2nd Generation) does not have much differences from Intel Core i5 (2nd Generation) except it is designed for laptops so that there will be a difference in its design and architecture that will adapt with the power consumption and energy efficiency. This microprocessor also has the same features like the desktop version, for example Intel Turbo Boost Technology 2.0 and Intel HD Graphics 3000. Server Intel Xeon E7 Intel Xeon E7 is multi-core microprocessor that is targeted for non-customer, server and workstation markets. It has 10 cores processing that enables improved virtualization performance and increasing system utilization. This microprocessor is also based on the newly-developed Sandy Bridge microarchitecture which is up to 17% faster clock-for-clock compared to Nehalem microarchitecture processors of the previous generation. Differences between Microprocessor Design for Desktops, Laptops, Servers, and Embedded Systems Desktops Desktop computers can be said as normal media in computer usage. Desktops have advantages in their access to AC electricity as power source. So, theyre become beneficial to users who want to utilize the best performance of computer. That is why desktops microprocessors do not have to limit their clock speed and referring to the spaces that desktops have for cooling fans, heat problem will not become an issue. Desktops microprocessors are designed to improve the computers performance. So, they will consume more energy than laptops. But the size of them is still smaller than microprocessors that are designed for servers. Laptops Laptops are designed to be used on the go. The criteria are to be flexible so it can be brought anywhere, anytime. So, battery power is the main source of a laptops life. Other than that, overheating is also a main issue since laptops size that does not provide a large space for cooling fans. These criteria and issues become a consideration of why there must be a differentiation in laptops microprocessors. Laptops microprocessors are designed to minimize the power consumption, so that the battery life could last as long as possible. In purpose to overcome the heat problem, laptops processors usually have lower clock speed than the desktop version. As the clock speed is lower, the laptops processors may have a lower bus speed as well. Most of the modern mobile microprocessors have some components to the chips, such as wireless networking cards. Desktop microprocessors could have these as well, but the space requirements of a laptop make these integrated chips way much more popular in laptops. Servers Servers must be available and stable every time. Servers have an important role to store and load important data so everyone in the company can access the server every time. Server microprocessors are designed to overcome issues such as, stability, server uptime, and energy consumption. Servers are usually high-end computer since there are a lot of heavy tasks that needed to be completed. The size of the microprocessors is usually a bit larger than desktops and laptops, regarding to handle the tasks and the electricity consumption. That is also a cause of why server microprocessors will become more sensitive to the heat issue. Overheated- microprocessor will decrease servers performance, so there is another method to take care this issue, like putting the server computers in a room with air conditioners in it to maintain the heat issue. Embedded Systems Embedded systems are predefined systems that specifically can do one or more functions but they are limited based on the purposes. Embedded system cannot be changed by the end user because in case if that is changed, then the embedded system will not run appropriately. Examples of the embedded systems are such as, handphone, calculator, etc. Embedded system will need the microprocessor based on the functionality that it held, the more functions it held, a more powerful the processor that it will need. This happens because the microprocessor will run a lot of instructions from the user, and it will need a capable microprocessor which can do a lot of processes in a short time. The less function it held, there will be reasons to have such a standard microprocessor to save more energy and production cost. Conclusion Microprocessor has an important role as the main brain and operates the processes in computer. Without a microprocessor, a computer cannot do anything. That is why the performance of the microprocessor itself becomes the main priority for the user. There are some major trends affecting the microprocessor performance, which are clock speed, number of cores, instruction set architecture, instruction per clock, and on board cache. Though its main function is the same, computers type varies because of their purposes. So the type of microprocessors will vary also based on their purposes. Type of microprocessors will have a slight difference between one and another because of the design. There are each design for laptops, desktops, servers, and embedded systems. FAQ What is microprocessor? Answer: Microprocessor is the main brain of a computer. Microprocessor is also known as the Central Processing Unit (CPU) that has main function to respond to and to generate arithmetical and logical operations. Microprocessor is a complete computation engine that is fabricated on a single chip. Which are major factors that affecting microprocessors performance? Answer: a. Number of Cores b. Clock Speed c. Instruction Set Architecture d. Instruction per Clock e. On-Board Cache How different are microprocessors for desktops, laptops, and servers? Answer: Microprocessors are different in for what purpose the computers are used. Microprocessor for desktops will optimize the performance, for laptops will consider about energy saving and power consumption, and for servers will have more than 6 cores considering the quantities and weight of the processes. Appendices The picture above is a diagram that shows the division of Kernel address space

Thursday, September 19, 2019

The High Price of Love in Shakespeare’s Romeo and Juliet Essay

In one of Shakespeare’s most masterful pieces, he depicts a tragic love story in which love conquers all†¦but at what cost? The truth is in this play, love is the victor, but with horrible consequences. Love lives on, love survives, but only at the loss of life. Not only in this play, but in many other Shakespearean works, the constant theme stands that any kind of marriage or deep emotional bond which is solely based on love ends tragically. Othello’s passionate love for Desdemona is the same passion that causes him to end her life. Antony, under the suspicion that Cleopatra has died, tries to commit suicide to only find out soon after that she is alive and in hiding, but all in vain for the fatal wound has already pricked it’s victim. Shakespeare constantly relates love with tragedy, stating that love is in fact fleeting and impermanent. The only way for love to live forever is if it dies young. Initially, there is an underlying struggle of duty verses love. Both families of the â€Å"star-crossed lovers†, especially the Capulets, focus on a successful marriage having an emphasis on d...

Wednesday, September 18, 2019

Students With Auditory Challenges and Mainstream Schools Essay

Students With Auditory Challenges and Mainstream Schools Hearing-impaired and deaf students can better succeed in life when educated in mainstream schools than being segregated in special schools because though they have special needs, they learn to communicate better with hearing individuals and can still attend special programs where teachers with special training can help them in their educational journey. Heather Whitestone, a deaf ballet dancer from Alabama, became the first Miss America with a disability, and Marlee Matlin fulfilled her dream of becoming a famous actress, despite her hearing disability. While many may look at these women in awe, by today’s standards, they are not handicapped. While they may be auditory challenged, the stereotypic disability label has been removed in lieu of a more descriptive, less demeaning alternative. Further, the way they view themselves and the way the public sees them weighs heavily upon their ability to live in a vociferous world. For deaf and seriously hearing-impaired children, many issues surface, particularly when considering educational. For many disabled children proper curriculum is not implemented in their education. Johnson has documented that deaf education largely fails, suggesting a lack of linguistic access to curricular content as well as low expectations. He proposes a new model, which encourages the early use of American Sign Language (ASL). Johnson, and other researchers at the Gallaudet Research Institute, insist that ASL will encourage both the ability to develop cognitive skills and improve the child’s chances to learn English (Johnson 45-7). The proposal includes teaching sign language as the child’s first language and encou... ... Markova, Dawna, PhD. How Your Child is Smart. Berkley: Conari Press, 1992. Marschark, Marc. Raising and Educating a Deaf Child. New York: Oxford University Press, 1997. Sawyer, Richard J. and McLaughlin, Margaret J., et al. â€Å"Is Integration of Students with Disabilities Happening?† Remedial & Special Education, 1 July 1994: 204. Schmetzke, Axel. â€Å"Disability-related Resources on the Internet.† Intervention in School& Clinic, 1 Nov. 1996: 69. Schwartz, Sue, PhD. Choices in Deafness: A Parents Guide. New York: Woodbine House, 1987. Vaughn, Sharon-Elbaum and Batya, E., et al. â€Å"The Effects of Inclusion on the Social Functioning of Students with Learning Disabilities.† Journal of Learning Disabilities 1 Dec. 1996: 598. Wilcox, Daryl J. and Wigle, Stanley E. â€Å"Mainstreaming Revisited: 20 Years Later.† Education 22 March 1997: 371-81.