Thursday, October 31, 2019

Michael Jackson Essay Example | Topics and Well Written Essays - 1000 words

Michael Jackson - Essay Example This is exemplified by his keeping of a pet zoo, which was not fully compliant with laws governing animal rights and civic safety. He was also accused and later exonerated of charges of child molestation and abuse. Despite the factuality of these claims, his image was irreparably tarnished by them. Thesis statement: the three main aspects of Michael Jackson’s popularity was his family background, life style and his death. This essay will flesh out this thesis. 2. His Family Background: Michael Jackson was born into a family of musicians. His parents and all his siblings were musicians. Even before he turned 10, he was a star member of the pop group Jackson Five – named after the five Jackson brothers who comprised it. But the flip side of this early fame is the lack of a proper childhood for Michael. He was forced to grow up too fast and as a result his psychological development remained uneven in later life. This explains his fondness for private zoos and strong identi fication with children. That he had retained certain childish qualities well into adulthood is borne by his legendary boyish voice. This most unique gift of Michael’s is smooth, silky and subtle. Right from a young age, his parents recognized the genius of Michael’s talents and made him the central feature of their troop performances. The only other sibling who could rival his great musical gifts is his younger sister Janet Jackson, who went on to have a successful career of her own paralleling that of Michael’s. (Feller 34) ... He was also an extraordinarily talented dancer. The dance sequences to his super-hit songs ‘Billy Jean’, ‘Beat It’, ‘Smooth Criminal’, ‘Black or White’, etc are etched in the memory of all those who were privileged to witness it. The innovative dance move of Moon Walk served as a metaphor for the out-of-the-world inspiration he brought to bear on his songs. 3. His Lifestyle: Michael Jackson’s lifestyle was both colorful and controversial. The kind of attire that Michael wore has become his trademark symbols. The white glove, the slippery hat and the studded leather jacket are all integral parts of his appearance. His dressing sense was as much a source of his appeal as his musical and dancing talent. Just with a twitch of his hand or a tap of his hat, Michael Jackson could bring to his feet. The fast rhythmic R&B and pop numbers of his were particularly popular. They were remarkable in terms of the sheer energy they possessed . Michael’s high pitched voice was suited to this genre, as the pitch carried the energy to the audience. A good indicator of his widespread popularity is the number of impersonators he has had. During the 1980s, doing a moonwalk was a rite of passage for the youth of that generation. That was how they identified themselves as capable and special adults. It was part of their process of identification with a role model and individuation from parental control. (Cole 16) It is fair to say that Michael Jackson was the greatest entertainer of his era. Though there were competitors like George Michael, Madonna, Prince, Tina Turner, etc, Jackson had the greatest fan following due to his global appeal. In other words, while many of his contemporary singers had great fan following within the United States,

Tuesday, October 29, 2019

Identification of managerial, financial, legal and ethical Case Study

Identification of managerial, financial, legal and ethical implications for Problem Identification in the Healthcare Sector - Case Study Example This creates a reluctance to utilize health care services preventatively which has long-term financial implications in terms of hospital and clinic profitability and, ultimately, on general society as well who must support government-sponsored health care. Statistics Immigrant Latino workers experience much higher traumatic injury rates, approximately 33 percent higher than U.S. domestic workers (Molina, 2011). This is due to the fact that immigrant Latinos are often not properly educated with specialized training and therefore are able to land only dangerous jobs in which they are often exploited by their domestic employer (Molina). In this situation, they are not being provided adequate health care insurance and thus have longer recovery times in the event of non-fatal, traumatic injury on the job. Lost productivity is one financial problem for the employer, however their lack of health insurance makes them reliant on government-sponsored systems that strain state and federal level budgets for health provision that impacts society as a whole.

Sunday, October 27, 2019

A Case Study Of Barclays Bank Marketing Essay

A Case Study Of Barclays Bank Marketing Essay Marketing is the process of planning and executing the developing, pricing, promotion and distribution of good and services to satisfy individuals needs and organisational goals. This simply means that marketing deals with general public by identifying their needs and wants through the research process to anticipate the future to make such a product that satisfies the required needs and generate reasonable profit for the organisation. During the past banking era their was no need of marketing strategies which include creativity, innovation, customer relations, public relations, promotions and marketing research. Businesses operates in such a market where little or no attempt was made to care much about customers needs, however products are sold as a result of less availability of substitute goods. But in the recent years banking industry has been evolved by the intense competition, due to the deregulation in the financial system of the economies. Banks realised the role of marketing in understanding needs of individuals and provision of the services accordingly. In todays competitive world where every one wants to get value for their hard earned money Banks has recognised that marketing is the only tool towards the sustainable life of banking system. Keeping in mind the customers sovereignty more attention has now been given to the consumers. This situation creates more need for adopting various marketing strategies to satisfy customers. To create a good impression with the use of marketing strategies, variety of promotional activities have to be inculcated in banking system, to get customers attention, to prompt advertisement and public relations to induce the interest of the public. Generally provided services by the banks to the customers are in the form of depositing money and then subsequent credit to the customers account, provision of loans, factoring services to companies, overdraft facilities and advances to the clients. In conclusion, now banks have to do more emphasis on marketing strategies in Oder to fulfil their obligations towards, customers, public, shareholders, stakeholders, employees, and the whole nation in general. PART 1 Project objectives and overall research approach Background of the Company: Barclays is one of the major and world wide famous global financial service providers, founded in 1690, headquartered in London, United Kingdom. Its is a universal bank which is engaged in retail and commercial banking, debit cards, credit cards, investment banking, investment and wealth management, and corporate banking etc with more then 300 years expertise in banking Barclays have extensive existence in more then 50 territories including Europe, Asia, America and Africa and have more the 48 million customers. In 2008 Barclays has signed an agreement to purchase the investment-banking and trade divisions of Lehman Brothers, a United States financial Institute who got bankrupt. In that deal Barclays acquired the headquarter building of Lehman Brothers bases in New York. Reports show that in 2009 the UK government offered to inject  £40  billion (US$69  billion) into three banks including Barclays, which may look for over  £7  billion. Barclays later confirmed that it refused that offer and raised  £6.5  billion of new resources ( £2  billion by annulment of dividend and  £4.5  billion from private investors). Barclays has developed very advanced and extremely diverse portfolio of financial services in the provision of services to customers in managing their money in such a way that benefits them most. Barclays bank operates within two business clusters: Corporate and Investment Banking and Wealth and Investment Management; and Retail and Business Banking. An overview of financial services provided by Barclays bank includes: World wide banking Barclays card Barclays Capital Barclays Wealth Retail banking and commercial banking Global Investors Strategic Overview of Barclays: The ambition of Barclays bank is to become the leading global financial service provider of all universal banks. By this statement means providing a wide range of retail and commercial services to consumers throughout the world. Barclays Strategies follows a simple principle: fulfilling needs of its customers, by providing excellent customer service and helping them in achieving their goals. Barclays bank has a clear overview of the growth sources in financial service industry, to align them in terms of capability to capture the opportunities arose from the investment trends. Organisational Structure of Barclays: Sir David Walker is the Group Chairman who joined the board in 2012, and Antony Jenkins is the Group Chief Executive since 2009. The topic selected and its context: The topic selected for the Research and Analysis Project is about the marketing strategies of an organisation and its effectiveness. Barclays bank has been chosen for the Research and Analysis Project in the context of An evaluative report on Barclays bank to overview its marketing strategies and in depth analysis of their effectiveness. Reasons for selecting this topic: Marketing concept is the business philosophy that states that customers want and satisfaction is the economic and social justification for a firms existence. Once a service has been offered with specific distinctive features customer appeal, the customer is prepared to buy the service/product and switch from other providers to the one with the appeal. By focusing on that philosophy following are the reasons of selecting this topic. As an student I get the opportunity to explore more about the marketing strategies of world re-known organisation especially while studying the topic in preparing towards exam, where this topic was briefly discussed I have sufficient knowledge to determine the business strategies used and figure out its effectiveness in the growth and profitability of the organisation. Instead of this point can we add below point Can we say My studies in the areas of Accounting and Finance and business and management work experience advantaged me with good business and management knowledge which certainly help me to devise business strategies and evaluate their contribution towards the growth and profitability of the organisation however the research will develop my knowledge and understanding about the use and effectiveness of marketing strategies in the perspective of financial institutions which are normally not associated with marketing area. The marketing strategy of an organisation and its effectiveness is not only the vital part of syllabus, but also advocates the organisation to satisfy customers needs rather then to persuade the customer to buy what they provide. (Link Marketing and Finance such as Marketing attract customers and make sales happen which eventually generates finance therefore Being in the area of Accounting and Finance it is important to have good knowledge about Marketing in order to manage and predict companies financial position accurately. ) Adopt the red highlighted area if you consider it appropriate. To evaluate the marketing strategies of an organisation and measuring its effectiveness, both business and financial analysis are very important. Financial analysis only tells how a business is doing and its financial position and business analysis explains the businesss strategy about how the business has gained such a financial position. So the combination of both analyses is the best way to analyse the businesss position. 1.3 Project objectives To analyse the marketing strategies of Barclays bank and forming an in-depth discussion of how these are directly related to the revenue, profits, customers satisfaction, losses, controvercies, cash balances, and stock prices of Barclays plc. To evaluate the factor s that lead to the direct effect on growth rate of the Barclays plc. To ascertain the macroeconomic as well as microeconomic factors those affect the financial performance of Barclays plc. To understand the global trends and fashions adopted in the industry as well as viewing the Barclays as playing a key role in global aviation industry. Observation of the effects of modern technology on the performance of Barclays on financial and economic grounds. 1.4 Question Selected for Research: In the history of banks failure and as a result its impact on the overall economy are the reasons why banks are unable to fulfil their obligations towards their employees, customers, shareholders and stakeholders. Financial service industry has lost the confidence reposed on them by the customers because of the incompetent service, impersonal treatment and inability to satisfy the effective demand of the community for bank services. All these result in customers dissatisfaction and disgust. In reaction, the success of the financial service industry depends largely on the application of marketing techniques in their day to day operations in meeting the challenge of competitive business environment. Since competition was more or less unknown in the immediate past banking era there was a little or no need for marketing strategies which include innovation into consumers needs and wants through marketing research, new service development, public relations and sales promotions. Banks then concentrated mainly on the advertising as their only marketing strategy. In pursuing this research endeavour, the researcher has focused on the marketing strategies which play an important role in competing in the market place to adopt the marketing concept towards achieving aims and objectives of Barclays plc. 1.5 Rationale of the Research With the help of this research, the researcher tried to explore the strategies that lie within the organisation. By focussing on the Barclays plc, the researcher has tried to bring out the benefits of marketing techniques adopted which helped them being one of the re known bank of the world. Thus, this research can really prove to be beneficial as it has highlighted the effectiveness in terms of customer satisfaction towards Barclays plc. 1.6 Methodology used for Research: An organized effort ensures profiting results. Therefore, a well-planned and organized research effort promises worthwhile outcomes. Research Methodology is basically à ¢Ã¢â€š ¬Ã‚ ¦the manner in which we attempt to solve problems in a systematic effort to push back the frontier of human ignorance or to confirm the validity of the solutions to problems others have presumably resolved (Leedy, 1985). This gets the researchers involved into the decisions of the technical and practical considerations regarding the particular research endeavour. Mouton and Marais (1988) regards it à ¢Ã¢â€š ¬Ã‚ ¦the logic of the application of scientific methods to the investigation of phenomenonà ¢Ã¢â€š ¬Ã‚ ¦the logic of the decision making process in scientific research. In short, the research methodology is a decisive outline of the intended study, its philosophy, design or, the techniques and the tools that are to be used to collect and analyse the primary data, the sampling from the population, and the contemplation for the reliability, validity and ethical considerations. It also includes how the researcher is going to present t he data in the easily comprehendible manner. All these things compliment the research topic chosen and opted for (Goddard, 2004). It is the concern for the researcher to get an effective and reliable data for research work. In this regards both primary data and secondary data has been used. It was observed by the researcher that only single method employed may not be enough for res I used various methods to collect data and information which was required for the research project. The worthiest way was the meeting with the financial director which answered most of my research questions to achieve the research objective and it also helped me to understand the business objective of the company. I did a lot of search through internet search engines to analyze and interpret my research questions and without this I wouldnt have been able to achieve my objective. Comment: This section informs what research methodology is but does not tell us what methodology has been adopted whether research will be carried out through quantitative, qualitative or mixed methods. Please specify that you justify why a particular methodology will be adopted. PART 2 Information gathering and accounting/business techniques For the information gathering different approached has been used for the research and analysis project: see my comment highlighted in blue in 2.2. Internet is one of the main secondary sources of quick information and research, which has been widely, is used in doing this project. It took considerable time to separate the related data from the information available. I also used the companys website for collection of information where most of information was available. Further information was also collected regarding marketing policies and strategies, ethical issues and their impact on the business and economy. ACCA Professional level Manuals, namely P1 (Professional Accountant) and P3 (Business Analysis) also helped in my understanding of ethical issues and their impact on the business. Conventional library research: soon after choosing the topic for my research and analysis, I started to read relevant reports from different books, in articles published in business magazines and journals and existing reports on the company. All research was carried out in libraries across London such as British Library, City Business Library, and Ilford Central library London, This process enabled me to gather and analyses the information relating to Barclays plc. Questionnaires for getting the general views and opinions of the general public has been used as primary source of information, which is more reliable as research has put a lot of effort to administer them as accurate as possible to get best outcome, which could justify with the project as well as could be helpful for Barclays in future. 2.2 Methodology used to collect information Based on the Research and Analysis project objectives of the research primary and secondary data collection techniques, a questionnaire will be formed in order to collect the primary data for this research project. Comment: This statement should be presented in the beginning of Part 2 of your report above. You have to elaborate the Primary and Secondary sources that what techniques will be applied for primary and secondary data. (Merge this section with above and explain primary and secondary sources separately. You gain need to make sure it links with your chosen research methodology (qualitative, quantitative or mixed methods). 2.3 The limitations of information gathering Although there was a huge sum of information available about marketing techniques, the objective of researcher was to only gather information related to the service industry. While collecting the data some limitations was considered: Most of the information researcher has used to produce this repost is collected from the books, questionaries and internet Researcher focused on using of secondary data for project which was conveniently available and reliable but some problems with secondary data included: Data out of date Incomplete Data Format incompatible for peers comparative information Data inaccessible / not presented in useful form Sometimes the information about the current marketing techniques which are highly sensitive for any company was not readily available and it appeared to be very difficult to arrange a meeting with the management of company. At times, some information may have characteristically been overlooked due to human error which may have not resulted in the desired results in information gathering. Some of the information required specialist knowledge to understand and may be difficult for public to understand. The management of the most of the organization is reluctant to provide any information which is publicly not available. So I have to rely on the data which is publicly available through different sources. Another problem with information gathering was that organizations normally never publish information which could have an adverse impact on their image. In view of this, I gathered the information from secondary sources although it may have proved relatively less reliable and fair. 2.4 Ethical issues arose during information gathering and their solutions Some of the ethical issues arose in information gathering processes are: I got some of the information from different articles which were published about Barclays plc. The ethical issues to look out for in the articles were any possible examples of potentially misleading advertisements, or complaints of customers. Most of the information collect and utilized by the researcher used in report is unbiased. Researcher did not get any information or feedback of questions which could have been ethically wrong. Researcher has tried to get feedback and opinion from the public through questionnaires but some members of the public were reluctant to give their views, although some were not aware of the terminology. Researcher has tried to gather information from individuals who could have had an influence in the economic forums / discussions / financial industry and marketing managers of financial service providers about marketing strategies; however they appeared to be more concerned about economic wealth and companys individuality. Researcher of the project tried to gather some of information from staff members of the company, based at Barclays plc. Main branch in, London but that was very hard to approach them regarding the topic chosen for the research and analysis project. 2.5 The accounting/business techniques used and their limitations I used internet search engines Google search. I found Google search to be a very good tool to get answers from different websites. It returned relevant web results to my search queries and directed me to various websites, newspapers and books. And I also put my questions on Yahoo Answers and got different answers from different panels. This was very useful tool as it helped me a lot on different occasions. I used MS Excel to create a questionnaire in the form of a check list, and marked relevant boxes with (Æ’-) or ( ´) depending on my findings. The sheet can be seen in Appendix 1. For this information I visited the companys websites for both Barclays plc. And read all information which provided answers to the questionnaire prepared in the Excel sheet. Graphical presentation of data obtained from the questionnaires of the general opinion of the public has been which helped me understand the strategic view point about marketing and customers thinking and approach of banks and financial services. It also indicated how the banks plan to achieve their targets by operational efficiency and new technology. PART 3 Results, analysis, conclusions and recommendations 3.1 The United Kingdom Financial System: It is very difficult to highlight the importance of banks in todays economic system to have a good relationship between banks and other sectors of the economy. This is because of the crucial role that banks plays in an economys financial system. According to Adam Smith in 1934 the banking system was one of the key agents in the whole process of development. Banks speed up the process of economic development by mobilizing the available resource and making more funds for them as well as for economy. Financial system stability assessment, prepared by the Monetary and Exchange affairs and the European I Departments, Approved by Stefan Ingves Micheal Deppler Feburary 7, 2003. This financial system stability assessment (FSSA) is based on work of an IMF mission that visited United Kingdom (UK) as part of financial sector assessment programme (FSAP) in February, May and July, 2002. In addition, mission members visited supervisors in New York and Germany to discuss cross border supervision related issues related to the UK, and undertook work related to global market in London during an international Capital Markets Department mission in there March 2002. Follow up discussions on the FSAP findings took place from November 21-27. 2002 in the context of the 2002 Article IV consultation. Potential risks for the UK banking system arise from both domestic and International sources. Slower than envisaged recovery in global demand or further declines in global equity prices are the major risks for UK banking system. On the domestic side, high household and corporate debt levels have so far been offset by effects on servicing capacity of low interests rates and a relatively mild slowdown in activity in late 2001 and early 2002. However, risk to the financial system could arise from deteriorating domestic economic conditions, rising unemployment, or higher interest rates than currently expected, especially if these are accompanied by significant declines in property prices from their current high levels. These factors also need to be seen against the trend towards some narrowing in profit margins at least among the bigger banks, due in part to continuing competitive pressures, regulatory pressures to limits some service fees, and rising loan loss provisions. 3.2 The Market Concept and Service Marketing: The growth of services industry is not only because of marketing development but due to economic growth and advanced standards of living. Initially service sector of the economy is not marketing oriented. Marketing factor has been ignored and lagged behind as compared to the product sector of the economies. And generally been slow in promotional activities, strategies and marketing techniques. By the research on this project few reasons for the lacking of marketing in service industry could be identified. Services are intangible and hence create difficult marketing challenges for service industry. Services providers such as in banks think themselves as a creator rather than as a marketer of financial services. They emphasise to equate marketing with selling and they fail to consider other part of the marketing system. Now most of the successful banks adopted advanced marketing strategies in order to achieve their objectives, as from the past experiences it has been noticed that marketing in both sectors is very crucial. Now we can see the established marketing function, and research in marketing and development is emphasised. 3.3 Features of Financial Services: Specific nature of financial service creates specific marketing challenges and opportunities. These results in strategic marketing programs which are generally different from product marketing. Some of the important features of financial services are: Intangibility Heterogeneity Fluctuating Demand Inseparability Barclays Marketing definition is Marketing stretches you right from the beginning of a marketing process to launch. (Robin Martin, 2011 Future Leader Marketing and Products) 3.4 Evaluation of services provided by Banks: Banks are doing lot of effort to attract retail businesses as well as individuals. For the customers continence banks credit cards have been introduced. More advanced and upgraded services such as insurance policies, monthly bills payments methods, personal financial help, 24 hour money withdrawal facilities and e banking have been launched. Some of the highlighted services of banks for individuals, and business customers are: Debit cards Cash dispenser and automated teller machine Investment management Safe custody and safe deposit Finance provision for businesses Money transfer facilities Insurance policies Advisory services. 3.5 Marketing Processes: As it is obvious that customers are central to the marketing so banks or any financial institutes have to do continuous research to identify and respond to the needs of the customers profitability. In the marketing process starting point is to recognise the individuality and recognising their importance, which they differ from each other and hence their needs and wants are different from each other. A bank cannot satisfy all needs of the customers, so the second stage in the marketing process is recognising which customers and which needs would be potentially profitable for them. Marketing is a continuous process and for effective and successful marketing, banks needs to make their purpose clear also strategies they employee to accomplish their objectives. Bank Marketing Objectives Banks Strengths and Weaknesses Opportunities and ThreatsThe overall marketing process starts with the corporate objectives of the Barclays as illustrated in the figure, in the context of mission statement, as the directional beacon provides the strategies and objectives for the realisation of the objectives.Consedring other aspects of strategic management, the process involves continuous discussion, analysation, evaluation, review feedback and decision to reconcile and harmonize the marketing techniques with corporate objectives from which the marketing objectives derive. Environmental Analysis Bank Marketing Organisation Bank Marketing Strategy Appraisal Relocation of Sources Strategic Planning 3.6 Approach of marketing of financial services: Developing marketing programme in service industry is very challenging, however as in product marketing management should first define its marketing objectives and its target markets. For that management should develop, design and implement marketing mix strategies to figure out its markets and fulfil marketing goal. Marketing manager of financial services should understand the component and population and income as they affect the market for the services. They need to determine for each market segment, why customers buy the given services. Market segmentation for the financial services enables the banks to select the potentially most profitable segment, and to concentrate resources on the segment chosen, thus making activity better focussed and less wasteful. 3.7 Planning and Developing Strategies of Services: In the marketing process of planning and developing new services, management should select appropriate strategies regarding: What services will be offered. What will be the length and breadth of the services mix offered? What needs to be done in the way of service attributes such as customer relations or providing guarantees? It is impressive to take into account consideration the centrality of the customer and what makes him need the services. Whether corporate or personal, customers needs vary and change throughout their lifetime. Design, audit, producing and developing the service require continuous research and regular review of it features, the use of packaging with other associated services and the trend in the market place. Competitors services and their effects similarly require continuous marketing research, as do the changes in the consumer preferences, so that new and modified services can be introduced to meet anticipated changes in demand and consumer requirements. 3.8 Pricing Strategies of services: Price is very important factor for customer consideration. Subject to regularity constraints, price is relatively flexible element in the market. The elasticity of demand for financial services should influence the price set by the seller. 3.9 Channel of Distribution of Services: In recent years, some organisations have realised that the characteristics of inseparability is not an insurmountable limitation to a sellers distribution system. The location of the service seller or the sellers agent should be conveniently accessible to customers. Banks have increased their businesses their business by installing 24-hour mechanical tellers and by setting up teller windows for drive in customers. The laudable week 3.10 Customer Relations: As on the one hand government provides the legislative and regulatory environment, same like on other hand customers provides the market. As suppliers of the stock in trade deposits and consumers of the services, customers constitute the pillar and lifeline for banking. Therefore they make the greatest demand on banks, the most important being getting their money back when they want it and some of the banks money when they need it. In the market place customers are broken down into groups with different ideas of what they want. The largest group is the one looking for a low-price, no frills services- but of course low prices often go hand in hand with low profits. The group who are prepared to pay for exceptional quality is small, but probably more profitable for the company. The company has to decide where its own strengths lie in terms of meeting customer expectation, and then decide whether it is able to meet the needs of its chosen target group better than the competition can do it (Jim Blythe, Principle Practice of Marketing, 2005, p-178) In these different groups of customers, the Barclays plc lies in the group D, which customer are willing to pay more for exceptional quality, because the airline are operating at premium services. Premium customers also want reliability and consistency in the services and like the increased flexibility. 3.11 Statistical Tools Applied in Data Analysis: Questionnaires as a primary source of information are used in collecting data. In the questionnaires both the open ended and close ended form of questions has been used to control and guide the respondents from deviating unnecessarily from the subject of the research and to prevent them from giving irrelevant views about the subject matter. The data obtained from the questionnaires is administered and analysed accurately, but to the concern of the researcher is to obtain the desired result from the diverse opinion and multiple suggestions. Different tools such as tables, charts, pie charts, diagrams and other mathematical and statistical calculations involving averages, ratios, and percentages have been used to analyse and evaluate the data obtained from the questionnaires. Comments: Part 3 is a major part and it is very weak. You mentioned that questionnaire will be used. Then where is the analysis of those questions asked in the questionnaire. That analysis should be presented in this section. The project is related to accounting therefore you would have presented some factual information through Balance Sheet or Profit and Loss statement and indicate how much expenses organisation is making on Marketing. It would be good if some rations are used to calculate that the expenditures on marketing is producing some profits for the company. The information can be collected from internet ot other sources etc. Overall project should be for 60

Friday, October 25, 2019

Hucks Contradiction in The Adventures of Huckleberry Finn Essay

Huck's Contradiction in The Adventures of Huckleberry Finn      Ã‚  Ã‚   In Mark Twain's The Adventures of Huckleberry Finn Huck was a boy who thought very little of himself, but had a huge impact on others.   His moral standing was based on what is easier, right or wrong.   He lived the way he wanted to live, and no one told him otherwise.   He had the adventure of a lifetime, and yet he learned along the way. Although Huck has certain beliefs about himself, his actions and decisions contradict these beliefs.      Ã‚  Ã‚  Ã‚  Ã‚   Huck may consider himself lazy, but in reality, he is a very hard worker.   At one point, Huck wants to get away from his father so he comes up with a scheme to fake his death and escape from his cabin:   "I out with my saw and went to work on that log again. I took the sack of corn meal and took it to where the canoe was hid and shoved the vines and branches apart and put it in. I had wore the ground a good deal, crawling out of the hole and dragging out so many things.   So I fixed that as good as I could from the outside. Then I fixed the piece of log back into its place. I took the ax and smashed in the door-I beat it and hacked it considerable, a-doing it.   I fetched the pig.and laid him down on the ground to bleed. Well, last I pulled out some of my hair, and bloodied the ax good, and stuck it on the back side, and slung the ax in the corner" (24).   If Huck were lazy, he would not have gone through all that trouble to escape, if he escaped at all.   A lazy person would have just stayed there and not worried about what happened.   At another point in the novel, Huck and a runaway slave, Jim, are on an island where th... ...x, James M. From Mark Twain: The Fate of Humor (Princeton University Press, 1966) "Southwestern Vernacular" pp. 167-184. Copyright @1966 by Princeton University Press. Rpt. Twentieth Century Interpretations of Adventures of Huckleberry Finn Ed. Claude M Simpson. Englewood Cliffs,N.J. 1968.    Fishkin, Shelley Fisher, Phd. "Teaching Mark Twain's Adventures of Huckleberry  Ã‚  Ã‚  Ã‚   Finn", 1995, July Summer Teachers Institute, Hartford, Connecticut @1995    http://www.pbs.org/wgbn/cultureshorck/teachers/huck/essay.html    Leavis, F.R. "Three New Approaches to Huckleberry Finn". (London: Chatto and   Windus, Ltd., 1955) Rpt. Twentieth Century Interpretations of Adventures of  Ã‚   Huckleberry Finn Ed. Claude M Simpson. Englewood Cliffs,N.J. 1968.    Twain, Mark. The Adventures of Huckleberry Finn. Berkeley: University of California Press, 2001.   

Thursday, October 24, 2019

Coffee Shops Essay

Whenever I am in need to study or just want to find a place to hangout, what instantly springs to my mind is a coffee shop. There are many different coffee shops around me, but only one is my absolute favorite. My favorite coffee shop is Beca House. Beca House is a locally owned business and is only about twelve minutes from my house. It is the coziest little nook, where I usually spend my mornings before class eating breakfast and drinking my favorite espresso coffee drink. After all, coffee is the best way to wake up and get the body moving. As I walk into Beca House every morning, the strong bitter aroma of ground coffee beans drift through the air, soaking into my clothes as I make my way to the counter to place my order. The smell was circulating because the coffee bar is located near the left side of the shop. The first attraction for me was the baked goods. They are tidily placed in the transparent glass cabinet, lining up and waiting for me to eat them all. There were all different types of baked goods like muffins, streusels, cheesecakes, cookies, and biscotti’s. Up above near the ceiling of the bar, there were an assortment of coffee beans packed into brown bags. The barista takes my order, large campfire frappe, double espresso. On a cooler day, I order a hot vanilla cappuccino. The delicious smell of coffee generates from the espresso machines. There is also a blackboard on the counter near the menu with a quote written with chalk that will change from day to day. The barista hands me my custom beverage order, and I stroll back to the front of the coffee shop to find a place to get comfortable. All along the walls of the shop are strategically placed vintage paintings and inspirational quotes. Dim lights shine on the spaced out vintage furniture, making for a very soothing and quiet atmosphere. No two pieces of furniture are the same, big couches, small wooden chairs, dark colored pillows, and rustic end tables. I like admiring this type of environment: soothing and calming, yet still inviting. In comparison to most restaurants, coffee shops are by no means a noisy place. The sound of chatters and laughter blends together with the background music playing around the shop, and the volume is set at a medium tone. Coffee shops provide a comfortable, yet sociable gathering spot for people of all ages. I often find peers of my own studying for big tests, writing papers, or maybe just reading a new book and relaxing. The Beca House is my favorite part to my day. I cannot start without it. Even on days that I do not have class, I find myself getting my daily cup of coffee at the crack of dawn, just before work. Stopping at Beca House has become part of my daily routine, and I do not see it being cut out any time soon. I know I go there a lot when the barista’s know my order when I walk through the door. There’s something so perfect about it being just me, my thoughts, and my morning cup of coffee.

Wednesday, October 23, 2019

Design and Implementation of a Network Based Security Information System

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Table of contents 1. INTRODUCTION 1. 1Security information 2. Objectives 3. Justification CHAPTER TWO 2. Security concept 2. 1Definition of security 2. Security threats 3. Security & Information CHAPTER THREE 3. Description of the exiting security information system 3. 1Organizational structure 2. Fact finding method 3. Objective of the existing system 4. Programs of the existing system 5. Equipment of the existing system 6. Forms CHAPTER FOUR 4.Design of the network-based security information system 4. 1Method of data collection 2. System design – input, processing, output, information storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming language 2. Program flowchart of security record system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendati on ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.It also airs the different machines used in information processing system to reduce the much-engaged manual efforts. The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization. The proposed system is a network based expert system. All the work in the system will at the end achieve: -Data security -Handling of files -Speedy collection of information for security analysis -Storage of information for subsequent usage. – A forecast for the future security A dependable standard for decision taking on security matters as well as planning and control measures. -Existing equipment for security information listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.In this work â€Å"DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM† I will take a case study of â€Å"B’ OPS COMMUNICATION OF POLICE SHQ ENUGU† as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of th e executive and law enforcement management system.Another objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of s ome of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that anything has to be secured must have value. Things of less importance to humanity and therefore anything that pose threat to life must also be prevented.Security is a very important issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian computer society’s conference of 2002 st ated that an organization with 98 percent security is actually 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are criminal acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely private rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? According to the BLACKSTONE, crime is violation of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is capable of being followed by a criminal proceedings having one of the types of outcome – Punishments. Also Hulsbury’s Law (adopted by the House of Lord’s in Board of Trade V.Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.Some acts are obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but there are many others about which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the sec urity or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.This ALLEN’S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen can, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF CRIMESThere is a problem that exist in the crime reporting system in Nigeria and especially the B’OPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as ‘felony’ and ‘misdemeanor’.Crime classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. Crime against persons include: -Murder and non-negligent manslaughter -Aggravates assault forcible rape -Forcible rape -Robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that w orks without an information technology system. In fact security of a given society is to a high degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a camera system on focus connected to a visual display unit for monitoring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their task of decision taking, plannin g and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its efficiency replace the much engaged manual system in crime data analysis. The B’OPS COMMUNICATION of the Nigerian Police, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the B’OPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave radio sets (use d in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the signal strength of information at various stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is done manually by writing or talking with the recipient on the set. Signal register form B2 – This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 – This is a form used to write down events that took place at course of operation suc h as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: B’OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and fairly bases as demanded by the administrators for security actions. 3. 1FACT FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified period under investigation.Another source of inter nal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the B’OPS COMMUNICATION also fellow’s suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basi c information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of information. The process of dispatching the received information in the B’OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human en gagement in this task. Mist of the wireless operators managing this information network are not properly trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. Barely all the form’s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of informat ion for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by studying the various operations performed and their relationships within the system and examination of a business activity with a view to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding meth od here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B’ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processi ng. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include: Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish adult from juvenile crime s tatistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM CHOICE OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming languages, I choose QBASIC programming language considering a lot of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min menu, is a software restriction called PASSWORD which must be obeyed before acces s to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE RECORD INPUT MODULE, FILE MAINTENANCE MODULE, REPORT GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and pr epared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work t o the society. I simply and concisely made drawing from my own exceptional experience and the information obtained from the B’ OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B’ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls Finish $ = â€Å"N† Do while finish $ =†N† For J = 1 To 24 Locate J, I For I = 1 To 80 Print CHR $ (178): Next I Next J R = S : C = 20 For I = 1 To 31 Print CHR $ (219) Next IFor I = 0 To 8 Locate R + I, C-I : Print CHR $ (219) Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â₠¬Å"***† Locate R + 3, C: Print â€Å"1, Record Input ***† Locate R + 4, C: Print â€Å"2, File Maintenance ***† Locate R + 5, C: Print â€Å"3, Report Generation & Printing† Locate R + 6, C: Print â€Å"4, Statistical Presentation† Locate R + 7, C: Print â€Å"5, Exit † Mychoice = 0 Do while mychoice < 1 or Mychoice > 5 Locate R + 10, C: Input â€Å"Your Choice Please (1-5):†, Mychoice Loop Select Crime Mychoice Crime 1 Call Recinput Crime 2 Call Filemain Crime 3 Call Reportgn Crime 5 Finish $ = â€Å"EN† End selectLoop Locate J, I For I = 1 To 80 Print CHR $ (178); Next I Next J R = 5 : C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219); Next I For I = 0 To 10 Locate R + I, C-I : Print CHR $ (219); Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â€Å"*Report Generation*† Locate R + 3, C: Print â€Å"1, Generate Monthly Report† Locate R + 4, C: Print â€Å"2, Generate Annual Report† L ocate R + 5, C: Print â€Å"3, Generate forecast Report† Locate R + 6, C: Print â€Å"4, Print Monthly Report† Locate R + 7, C: Print â€Å"5. Print Annual Report† Locate R + 8, C: Print â€Å"6. Print Forecast Report† Locate R + 9, C: Print â€Å"7. Exit †The Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: Input â€Å"Your Choice Please (1-7)†, the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = â€Å"EN† End select Loop End Sub Sub Annual RP ‘Annual RP. BAS ‘ Annual Statistics Printing Program Dum M $ (28) Cls Open â€Å"I†, $ 1, â€Å"Annualst. FIL† Input $ 1, EN$ Close $ 1 Do Locate 10, 10: Input â€Å"Output To Screen or Printer (P or S):†;K$ K$ = U Crime$ (K$) Loop Until K$ = â€Å"P† or K$ = â€Å"S† Cls Open â€Å"I†, $ 1, â€Å"Annu alst. FIL† If K$ = â€Å"S† ThenPrint â€Å"B† OPS Police Communication† Print â€Å"Annual Crime Statistics Report† Print: Print â€Å"For The Year;†: EN$ Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å"Jan† Locate 5, 44 : Print â€Å"Feb† Locate 5, 56 : Print â€Å"Mar† Locate 5, 68 : Print â€Å"Apr† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† Locate 6, 66 : Print â€Å"M† Locate 6, 72 : Print â€Å"F† R = 7 : I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input #1, M15, M16, M17, M18, M19, M20, M21, M22Input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print â€Å"May† Locate 5, 44 : Print â€Å"Jun† Locate 5, 56 : Print â€Å"Jul† Locate 5, 68 : Print â€Å"Aug† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call Get Key L ocate 5, 32 : Print â€Å"Sep† Locate 5, 44 : Print â€Å"Oct† Locate 5, 56 : Print â€Å"Nov† Locate 5, 68 : Print â€Å"Dec† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print â€Å"Total† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GETKEY ELSE L Print â€Å"B’ OPS Police Communication† L Print â€Å"Annual Crime Statistics Report† L Print : L Print â€Å"For Each Division† EN$ L PrintL Print â€Å" SN† : Tab (3); â€Å"Offences†; Tab(31); â€Å"Jan†; Tab (39); â€Å"Feb† L Print Tab (47); â€Å"Mar†; Tab (55); â€Å"Apr†; Tab (63); â€Å"May†; L Print Tab (71); â€Å"Jun†; Tab (79); â€Å"Jul†; Tab (87); â€Å"Aug†; L Print Tab (95); â€Å"Sep† ; Tab (103); â€Å"Oct†; Tab (111); â€Å"Nov†; L Print Tab (119); â€Å"Dec†; Tab (127); â€Å"Total† Col 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) Cls OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN â€Å"O†, #2, â€Å"FORECAST. FIL† OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Do While Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ‘ Store Values For Males In The A – Array Ready ‘ For Gaussian EliminationA (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ‘ Estimate the figures for males for the ‘next three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ‘Store values for females in the A? Array ‘Ready for gaussian elim ination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ‘Three months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, â€Å" † ; C$; â€Å" †; F$; â€Å" †; Fm1; â€Å" †; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ‘Forecarp . Bas ‘Forecast Figure Printing Program Dm M$ (9) Cls Open â€Å"1† , # 1, â€Å"Forecast . Fil† `Input # 1, YY$ Close #1 Do Locate 10, 10 : Input â€Å"Output to Screen (P or S) : â€Å" ; K$ K$ = U Crime $ (K$) Loop Until K$ = â€Å"P† Or K$ = â€Å"S† Cls Open â€Å"1† , #1, â€Å"Forecast. Fill† If K$ = ‘S† Then Print â€Å"B’ OPS Police Communication† Print : P rint â€Å"For The Year : YY$Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å" Jan† Locate 5, 44 : Print â€Å" Feb† Locate 5, 56 : Print â€Å"Mar† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1Loop Close #1 Else L PRINT â€Å"B’ OPS POLICE COMMUNICATION† L Print : LPrint â€Å"For the Year : â€Å"; YY$ Lprint Lprint â€Å"SN†; TAB(3); â€Å"Oddwnxwa†; Tab(31); â⠂¬Å"Jan†; Tab(39); â€Å"Feb† Lprint Tab (47); â€Å"Mar† Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End ifClose #1 YY$ = Input $ (1) End Sub SUB GET KEY Locate 24, 10 : Print â€Å"Press Any Key To Continue† Do A$ = INKEY$ Loop Until A$ < > â€Å" † END SUB ———————– FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = â€Å"N† Dowhile finish $ = â€Å"N† For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? â€Å"Main Menu† Locate R + 2, C:? â€Å"1. Record Input† Locate R + 3, C:? â€Å"2. File Maintenance† Locate R + 4, C:? â€Å"3. Report generation and Printing† Locate R + 5, C:? â€Å"4. Statistical Presentation†Locate R + 6, C:? â€Å"5. Exit† MYCHOICE = 0 DO WHILE MYCHOICE < 1 OR MYCHOICE > 5 LOCATE R + 10, C:INPUT â€Å"YOUR CHOICE PLEASE (1-5):† MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = â€Å"Y† End selected Locate 24, 10 Print â€Å"Press Any key To† â€Å"Continue† Do A $ = In keys Loop until A$ â€Å" â€Å" END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = â€Å"KEY† â€Å"Murder† â€Å"Suicide† â€Å"Wounding† â€Å"Assault† â€Å"Kidnapping† â€Å"Rape† â€Å"Armed Robbery† â€Å"Stealing† â€Å"Burglary† â€Å"Arson† â€Å"Narcotics† â€Å"Traffic Offeence† House Breaking â €Å"Store Breaking† Miscellaneous† STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = â€Å"y† DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = â€Å"y† Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT â€Å"DIV†; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP