Monday, December 30, 2019

Amendment of Plaint - Free Essay Example

Sample details Pages: 10 Words: 2980 Downloads: 2 Date added: 2017/06/26 Category Statistics Essay Type Narrative essay Tags: Act Essay Did you like this example? INTRODUCTION 6 Statement of Problem7 Objectives of the Study 7 Hypothesis of the Study 7 Research Methodology 7 ANALYSIS OF THE RULE à ¢Ã¢â€š ¬Ã…“AMENDMENT TO PLAINTà ¢Ã¢â€š ¬Ã‚ 8 Rules to Amend Plaint 9 Leave of Court when not granted 9 Effect of Amendment 10 Amendment second time 10 Principles of Amendment 11 Don’t waste time! Our writers will create an original "Amendment of Plaint" essay for you Create order JUDICIAL INTERPRETATIONS 12 CONCLUSION 14 Introduction The 22 Act of 2002 instituted the provision of amendment of Plaint under Order VI Rule 17 of the Code of Civil Procedure.[1] Order VI Rule 17 of the Code of Civil Procedure, 1908 (in short `the Code) enables the parties to make amendment of the plaint which reads as under; 17. Amendment of pleadings The Court may at any stage of the proceedings allow either party to alter or amend his pleadings in such manner and on such terms as may be just, and all such amendments shall be made as may be necessary for the purpose of determining the real questions in controversy between the parties: Provided that no application for amendment shall be allowed after the trial has commenced, unless the Court comes to the conclusion that in spite of due diligence, the party could not have raised the matter before the commencement of trial. It confers wide discretion on a Court to allow either party to amend or alter his pleadings at any stage of the proceedings on such terms as it deems fit. This discretionary power to court must, however, be exercised in consonance with the judicial principles, existing laws and with reasoned decisions. The object of the Rule is that the Courts should try merits of the cases that come before them and allow all such amendments that helps in determining the real questions of disputes between the parties of the suit and is a step towards achieving ends of justice, provided it does not cause injustice to other party. The provisions of Rule 17 are not exhaustive in nature i.e. it does not limit the powers of court to grant amendments in specific circumstances. The courts are completely empowered to exercise their discretion in granting the application of amendments in the light of said rule. However, where in cases where parties cannot use this rule and the court faces difficulty application of the said rule, section 151 of the Code acts as resort to the Courts that deals with the inherent powers of the Court. The ins titution of this Rule in the amendment was subject to certain restrictions, unlike the previous rule and determines one of the very strong civil right (with the leave of Court) as well as remedy to the parties. The upcoming part of the article shall deal with the instances and case laws that dealt with the questions relating to amendment of plaint and the related aspects attached to the said topic. STATEMENT OF PROBLEM The Rule with respect to amendments of pleading seems an easily available right on the face of it. But the circumstance under which it has been exercised does not make it easily accessible. The problem lies in the wide discretionary powers of court conferred on them under this rule. There are cases where court has denied this right in the light of various situations that came across. Therefore the study will try to figure out the actual application of the said rule and intricacies involved in it. OBJECTIVE To study the logic behind Order VI Rule 17. To understand its better implementation. To understand the discretionary power laid down in the said rule and its application. HYPOTHESIS The remedy of amendment of plaint is easily available option and can be exercised anytime with regards to trial procedure. RESEARCH METHODOLOGY The research work is confined to the cases of Indian Judiciary with regard to analysis of the application of the discretionary power of the Courts and is is an exploratory doctrinal and library based research that involves case descriptions and their landmark judgments that has vital importance. Number of books has been referred and the online databases information was a part of it. ANALYSIS OF THE RULE à ¢Ã¢â€š ¬Ã…“AMENDMENT TO PLAINTSà ¢Ã¢â€š ¬Ã‚  As a general rule, material facts and arguments must be generally stated in a plaint but many a times party may find it necessary to amend such pleadings in order to increase the accuracy of facts and make the case stronger. It is rightly said à ¢Ã¢â€š ¬Ã…“Fresh information has come to hand; interrogatories have been fully answered by his opponent; documents who se existence was unknown to him have been disclosed which necessitates reshaping his claim or defense. Or his opponent may have raised some well founded objections to his Pleadings, in case it will be advisable for him to amend his pleadings before ità ¢Ã¢â€š ¬Ã¢â€ž ¢s too late.à ¢Ã¢â€š ¬Ã‚ [2] The provisos that came up were to prevent application for amendment being allowed after the trial has commenced, unless the Court comes to the conclusion that in spite of due diligence, the party could not have raised the matter before the commencement of trial. To some extent, it curtails absolute discretion to allow amendment at any stage. Now, if application is filed after commencement of trial, it must be shown that in spite of due diligence, such amendment could not have been sought earlier Amendment cannot be claimed as a matter of right, but still the Courts while deciding such prayers should not adopt a hyper-technical approach. Liberal approach should be the general rule partic ularly, provided that the other side can be compensated with costs. One of the aims of such rule is to prevent multiplicity of suits with same cause of action.[3] Application of the Rule on other proceedings: The Rule 17 apply to several other proceedings such as execution proceedings, insolvency proceedings, arbitration proceedings, election matters, proceedings under the land acquisition act, claim petitions etc. This means that this rule is not restrictive in nature to specific proceedings but the application is universal in nature in the civil legal system. Even when the provisions of the Code are not applicable, courts and tribunals are competent to devise their own procedure consistent with and based on the general principles of justice, equity and good conscience. Rules to Amend Pleadings The Rule confers a very wide discretion on courts in the matter of amendment of pleadings. As a general rule, leave to amend will be granted so as to enable the real question in iss ue between parties to be raised in pleadings, where the amendment will occasion no injury to the opposite party and can be sufficiently compensated for by costs or other terms to be imposed by the order. The rule does not lay down the straight jacket formulae as to when an amendment can be allowed. Due to this judiciary has taken various views and points that can be considered for when to grant leave for amendment. Following are certain principles: Whether the amendment sought is imperative for proper and effective adjudication of the case. Whether the application for amendment is bona fide or mala fide. The amendment should not cause such prejudice to the other side which cannot be compensated adequately in terms of money. This keeps check on the rights of the opposite parties. Refusing amendment would in fact lead to injustice or lead to multiple litigation. Whether the proposed amendment constitutionally or fundamentally changes the nature and character of the case. These are the general rules of amendment of plaint that are allowed by court. Later in the next section, the article shall deal with various judgments that dealt with this subject. When the Leave of Court shall not be granted: This section is rather more important to understand to clear the distinction between when the Court shall grant the leave and when it shall not. It is perceived that the amendment is easily accessible right providing discretion of Court. But there are instances where in the Courts have disallowed the application for amendment due to different reasons. Some of the instances of not allowing the application are: When amendment is not necessary for the purpose of determining the real question in controversy between the parties as the real controversy test is the basic test. If it introduces a totally different, new and inconsistent case or changes the fundamental character of the suit or defence. Where the effect of the proposed amendment is to take away from the other side a legal right accrued in his favor. Where the application for amendment is not made in good faith and the applicant has acted mala fide. Effect of Amendment in Plaint It is general rule that every plaint shall be determined on the facts filed on the date of institution. So as to shorten the course of proceedings, the court allows the amendment and where an amendment is allowed, such amendment relates back to the date of the suit as originally filed. Amendment to Plaint second time This is very crucial aspect with regards to second time amendment to plaint in the same suit. This generally does not occur, but what if certain facts still needs to be inserted in the plaint so as to assure proper adjudication of the matter? This might occur in practice and so it will be important here to refer the case of J. Samuel and Others v. Gattu Mahesh and Others[4], where the apex court held that à ¢Ã¢â€š ¬Ã…“the primary aim of the court is to try the case on its merits and ensure that the rule of justice prevails. For this the need is for the true facts of the case to be placed before the court so that the court has a ccess to all the relevant information in coming to its decision. Therefore, at times it is required to permit parties to amend their plaints. Duly diligent efforts are a requirement for a party seeking to use the adjudicatory mechanism to attain an anticipated relief. The term Due diligence is specifically used in the Code of Civil Procedure so as to provide a test for determining whether to exercise the discretion in situations of requested amendment after the commencement of trial. The term due diligence determines the scope of a partys constructive knowledge, claim and is very critical to the outcome of the suit. Therefore it becomes immaterial that how many times the amendment to plaint is demanded. If the amendment is necessary for the adjudication and does not defeat the ends of justice, then even the 2nd time amendment shall be allowed. Principles of Amendment As the aim of amendment is the effective discharge of the adjudication, so the provisions must be liberally construed and approached. The exercise of judicial discretion must be in the light of judicial considerations and with great care and circumspection. Ordinarily, following principles are followed while amendment: All amendments must be allowed which are necessary for determination of real controversies. The proposed amendment should not alter and be a substitute of cause of action originally raised. Inconsistent and contradictory allegations that will negate the present facts instituted shall not be allowed for amendment. The proposed amendment should not cause prejudice to the other party. Amendment barred by limitation should not be allowed. Technicalities of law should not hinder justice and so the amendment should be allowed to minimize the litigation between the parties. The delay in filing amendment petitions must be duly compensated. Mala fide intentions behind the amendment must be discouraged. Thus, above are the crux of the amendments in pleadings and the views of judicial interpretations on the issue. Judicial Interpretations It is now well-settled by various decisions of this Court as well as those by High Courts that the courts should be liberal in granting the prayer for amendment of pleadings unless serious injustice or irreparable loss is caused to the other side or on the ground that the prayer for amendment was not a bonafide one. In this connection, the observation of the Privy Council in the case of Ma Shwe Mya v. Maung Mo Hnaung[5] may be taken note of. The Privy Council observed: All rules of courts are nothing but provisions intended to secure the proper administration of justice and it is, therefore, essential that they should be made to serve and be subordinate to that purpose, so that full powers of amendment must be enjoyed and should always be liberally exercised, but nonetheless no power has yet been given to enable one distinct cause of a ction to be substituted for another, nor to change by means of amendment, the subject-matter of the suit. Usha Devi v. Rijwan Ahamd and Others[6] Proviso to Order 6 Rule 17 CPC provides that amendment of pleadings shall not be allowed when the trial of the suit has already commenced. For this reason, we have examined the records and find that, in fact, the trial has not yet commenced. That apart, commencement of trial as used in proviso to Order 6 Rule 17 in the Code of Civil Procedure must be understood in the limited sense as meaning the final hearing of the suit, examination of witnesses, filing of documents and addressing of arguments. As noted hereinbefore, parties are yet to file their documents; we do not find any reason to reject the application for amendment of the written statement in view of proviso to Order 6 Rule 17 CPC which confers wide power and unfettered discretion on the court to allow an amendment of the written statement at any stage of the proceedings. Surender Kumar Sharma v. Makhan Singh[7] The prayer for amendment was refused by the High Court on two grounds. So far as the first ground is concerned i.e. the prayer for amendment was a belated one, we are of the view that even if it was belated, then also, the question that needs to be decided is to see whether by allowing the amendment, the real controversy between the parties may be resolved. It is well settled that under Order 6 Rule 17 of the Code of Civil Procedure, wide powers and unfettered discretion have been conferred on the court to allow amendment of the pleadings to a party in such a manner and on such terms as it appears to the court just and proper. Even if, such an application for amendment of the plaint was filed belatedly, such belated amendment cannot be refused if it is found that for deciding the real controversy between the parties, it can be allowed on payment of costs. Therefore, in our view, mere delay and laches in making the application for amendmen t cannot be a ground to refuse the amendment. In Pirgonda Hongonda Patil v. Kalgonda Shidgonda Patil which still holds the field, it was held that all amendments ought to be allowed which satisfy the two conditions: (a) of not working injustice to the other side, and (b) of being necessary for the purpose of determining the real questions in controversy between the parties. Amendments should be refused only where the other party cannot be placed in the same position as if the pleading had been originally correct, but the amendment would cause him an injury which could not be compensated in costs. Rajesh Kumar Aggarwal and Others v. K.K. Modi and Others[8] The object of the rule is that the courts should try the merits of the case that come before them and should, consequently, allow all amendments that may be necessary for determining the real question in controversy between the parties provided it does not cause injustice or prejudice to the other side. Order 6 Rule 17 consists of two parts: Whereas the first part is discretionary (may) and leaves it to the court to order amendment of pleading. The second part is imperative (shall) and enjoins the court to allow all amendments which are necessary for the purpose of determining the real question in controversy between the parties. Mashyak Grihnirman Sahakari Sanstha Maryadit V. Usman Habib Dhuka Ors.[9] Plaintiff took our Chamber Summons for amending the plaint seeking to incorporate the relief of declaration of Conveyance Deed as illegal and malafide. Chamber Summons was dismissed by the Civil Court. Writ petition was filed in the High Court and the HC permitted the plaintiffs to amend the plaint. The issue came up with the apex court with the issue that whether the High Court committed an error of law in setting aside the order passed by the Trial Court and the SC was affirmative saying that the demand of amendment did not fulfilled the basic principles for granting leave for amendment. Conclusion From the above research on the topic is that the Courts possess high discretionary power that determines whether the leave for amendment must be granted or not. It has been seen in various judgments by courts where they have allowed amendment seeing the circumstance of each different matter. The purpose of Order VI Rule 17 is to help in effective adjudication and determination of controversy between the parties. The rights of other parties are kept in mind and so it is checked that in case of delayed amendment is suits, appropriate compensation is given to other parties. The right of amendment is not easily accessible right as court keeps check on the mala fide intention of the parties and various other cons attached with it. Thus the hypothesis proves to be wrong in this case. The amendment to plaint under the Code is an essential aspect of a suit because it is one of the inherent steps of the adjudication to make it better and effective. It is based on the phrase that Justice should not only be done but must be manifested accordingly. Therefore, the amendment forms an essential part of administration of justice in the civil legal system. 1 | Page [1] Available at https://www.legalblog.in/2011/08/amendment-of-pleadings-broad-principles.html , last accessed on May 6th, 2014. [2] C.K. Takwani à ¢Ã¢â€š ¬Ã…“Civil Procedure with Limitation Act, 1963à ¢Ã¢â€š ¬Ã‚ , Eastern Book Company, 7th Edition, 2013, Pg.212. [3]Available at https://www.legalblog.in/2011/08/amendment-of-pleadings-broad-principles.html#sthash.NdOLpWZK.dpuf, last accessed on May 7th, 2014. [4] AIR 2005 SC 3353 [5] [AIR 1922 P.C. 249] [6](2008) 3 SCC 717 [7] (2009) 10 SCC 626 [8] (2006) 4 SCC 385 [9] 2013 (I) CLR (SC)

Sunday, December 22, 2019

Homelessness Essay - 1100 Words

Homelessness is a widespread epidemic throughout the United States. This epidemic doesn’t limit itself to the stereotypes such as race, religion, or financial status. According to Sweets (2011), â€Å"there are more than 3.5 million homeless Americans each year within the United States†. Many of these individuals are victims of life-altering events. Homelessness is a solvable problem with the right resources, programs, and funding in place. Some effective ways to address the problem of homelessness are to create affordable housing programs, provide excellent quality health care along with rehabilitation and job training. There are many contributing factors to homelessness in the United States, however, there are numerous programs that have†¦show more content†¦There are numerous fees that come along with trying to replace driver’s licenses and birth certificates that the homeless just simply can’t afford. In many states, to request a new birth certificate, you must have a driver’s license and to request a new driver’s license you must have a birth certificate. It’s a vicious cycle that leaves millions of Americans on the street homeless without any type of aid. According to Wogan (2017), â€Å"New Jersey joins eight other states trying to address the problem by waiving fees for homeless people applying for ID cards and birth certificates. Most of the states with a waiver in place use the same approach as New Jersey and require a third-party service provider to verify that the person is homeless.† With programs like this in place this will eliminat e a large population of the homeless off the streets and able to sign up for housing programs. Providing satisfactory quality health care is another way to end homeless. In some states, the only way the homeless can seek medical attention is by admitting themselves through the emergency department. According to Maness and Khan (2014), â€Å"In a homeless person, the association of one or more chronic illnesses with substance abuse or mental illness appears to increase the risk of early death. Compared with the general U.S. population, homeless persons are three to six times more likely to become ill, their hospitalization rates are four times higher, andShow MoreRelated Homelessness in America Essay608 Words   |  3 Pages Homelessness is not something that was created over night; it has existed for a long time; often we choose not to see the homeless, or bother with them, so we look the other way.  Ã‚  Ã‚   Homelessness is not prejudice toward race, creed, or reli gion--it has no boundaries; all homeless people should not be stereotyped as being drug abusers or the mentally ill that have been released from mental hospitals. Homelessness is not a disease that a person can catch from bodily contact, but it certainlyRead MoreArgumentative Essay On Homelessness1485 Words   |  6 PagesArgumentative Essay Draft 2 Although most American citizens do not typically notice government programs in their daily lives, implemented policies have major effects on American citizens. It is estimated that around 1.35 million children suffer from homelessness due to their families living on the streets (Crook). With this massive housing conundrum, the United States government should increase funding for the McKinney-Vento Homeless Assistance Act. Increased funding would decrease homelessness by loweringRead More Homelessness Essay559 Words   |  3 Pages Homelessness in our society. The existence of homeless people in our society is still evident today. Everywhere you look around our cities, parks and streets it is likely that you will witness a homeless person struggling to survive. This is most certainly a social justice issue, every Australian deserves a secure and comfortable place to dwell, not left on the streets to perish. In society the rich get richer, and the poor get poorer. People today are far to driven by work and money to seeRead MoreEssay on Homelessness1569 Words   |  7 PagesHomelessness is a serious problem in our society. Every night in our nation thousands of people are on the streets. This type of behavior is considered deviant because it does not reflect the norms and values of our society. In many cases the homeless people in our country are treated as total outcasts. Many of these people have severe mental disorders. Some are victims of an economy that has failed them. One may ask how such harsh situations exist in such an advanced society. With all the moneyRead MorePersuasive Essay On Homelessness1074 Words   |  5 PagesAstonishingly, 564,708 people are currently homeless in the United States, according to Social Solutions (Social Solutions, 2016). The topic, â€Å"Living Poor,† has only become much more apparent in the news and in everyday life. Two essays, On Compass ion by Barbara Lazear Ascher and On Dumpster Diving by Lars Eighner, can be evaluated as discussing two different aspects of the homeless situation in America. After close reading, On Compassion more effectively achieves its purpose of defining compassionRead More homelessness Essay497 Words   |  2 Pages All over America, there are people wandering the streets without a home. These individuals are seen as a crowd, a separate collective existence. They are called the homeless, as if that defines who they are, but we too often neglect to add the unspoken word in that title: people. It seems today that the more fortunate citizens of America who have a roof over their heads have forgotten their innate responsibility to watch over those in this world whom are incapable of caring for themselves. TragicallyRead MoreCauses of Homelessness Essay1298 Words   |  6 PagesCauses of Homelessness Bentley Martin BSHS/302 July 16, 2011 Joey Schumacher Causes of Homelessness There are many factors that lead to poverty and homelessness. People often jump to conclusions and form stereotypes to look down upon those who are poor. Stereotypes include poor people who are viewed as lazy, jobless, criminals, or un-educated. When I think of a homeless individual, I would agree with most of the stereotypes and find within the reading and researching that there is more toRead MoreEssay on Solving Homelessness1416 Words   |  6 PagesSolving Homelessness Nationwide homelessness is a growing epidemic across the country. There are many ways an individual can become homeless, for the most part it is poverty. There are also different concentrations of homeless in different types of environments, such as urban or suburban areas. Last, there is the ever-growing homeless population, and how much money it costs us for others to live in poverty. A way we can help find the solution to this problem, is to know the facts about this lingeringRead MoreHomelessness in America Essay1172 Words   |  5 Pagesthe Bush Administration consisting of $528.5 billion for homeless programs (Romeo 1). The problem of homelessness and extreme poverty is not a new occurrence; but in past years more extreme measures have been taken to combat the issue as more people become homeless. Expensive social programs and housing developments for the homeless have been created to help battle the increasing issue. Homelessness is an expensive problem that will never end; f urthermore, the condition of homeless people in AmericaRead MoreHomelessness - Speech Essay628 Words   |  3 PagesHomelessness - Speech Ladies and gentlemen, I would like to begin by telling you a little story. Everyday, on my way to work, I come across this smart and neat young man selling the Big Issue. I never pay much attention to him and in fact would rather he wasn’t there at all making me think about all those people in the UK who, like him, are homeless. How many of you have ever felt that same way? Most of us try to ignore these people living in the streets who are forced

Saturday, December 14, 2019

Monitoring Free Essays

Monitoring is the systematic and routine gathering of data from program and projects for four principle purposes as written in (World Bank, 1980), to gain from encounters to enhance practices and exercises later on (Ben, 2002), to have inner and outer responsibility of the assets utilized and the outcomes acquired, to get informed decisions on get on the future of the initiative and to promote empowerment of beneficiaries of the activity additionally discussed by (John and Khilesh, 2008). Evaluation is the assessing, as systematically and objectively as possible, a completed project or programme (or a period of a progressing undertaking or program that has been finished) Evaluations assess information and data that illuminate key choices, in this way enhancing the venture or program later on unmistakably shown by (Yang, Sun and Martin, 2008). From the perspective of (Pfohl, 1986), assessments should make inferences around five fundamental parts of the mediation: pertinence, adequacy, effectiveness, effect, and maintainability. We will write a custom essay sample on Monitoring or any similar topic only for you Order Now As the global network struggle to improve the advancement results at the nation level, new difficulties emerge in the act of Monitoring and Evaluation (ME). The ponder by (Mintzberg, 1994) trusts that the key arranging models for monitoring and evaluation of network-based undertakings of the 1970s, at last, failed in light of the fact that, they didn’t recognize vital arranging and vital reasoning in monitoring and evaluation of network-based tasks. Citing to from (Miller, 1990), Citing from (Miller, 1990), and Mucai found in their research that the victories and strengths of some community-based projects can often be the cause of their future monitoring and evaluation strategic failure. A few journalists have clarified that despite the fact that numerous assets are put resources into the improvement of M;E frameworks, not every one of them really gets executed or regardless of whether they do, they are just in part actualized because of difficulties experienced amid usage (Groene and Branda 2006, 298). Mahmood et al (2011) indicated the intricacy and in addition poor understanding of M;E frameworks as one of the challenges experienced in its execution. In some cases, the implementation is described as being problematic, as issues such as improper operationalization of outcomes, makes it impossible to measure what is intended to be measured (Groene and Branda 2006, 299). Individual staff inside Organizations make varying understanding and assumptions about the M;E system and place different values on M;E, which results in various institutional rationales towards M;E framework and a more extensive hierarchical inability to quantify advance and think about results. There are additional difficulties among Organization in making an interpretation of wide authoritative objectives into particular task exercises, underscoring strains in execution and constraints in M;E practice (Catherine Benson Wahlà ©n 2014, pp. 77-88) The study by (RM Mthethwa, 2006) contend that; the primary challenges looked by numerous association is that the learning, abilities, and capability required for those aspiring and performing obligations identified with M;E of public projects is limited. Program authorities neglect to comprehend the significance of M;E at the neighbourhood government level of the different tasks. Along these lines, they have neglected to build up an institutional M;E framework (counting M;E designs, pointers and instruments). This uncovers albeit much has been accomplished as far as giving administrations to the larger part of recipients, much still should be done as far as preparing, workshops, exchange on M;E and how reasonable frameworks can be actualized at Organization level to upgrade service delivery. From (UNDP Evaluation site, 2011), its contend that there are a wide range of (delicate, hard and blended) factors that impact the achievement or disappointment of Monitoring and Evaluation system in network-based undertakings, going from the general population who convey or actualize the technique to the frameworks or systems set up for co-appointment and control. These variables should be distinguished and managed to guarantee productivity and viability in Monitoring and Evaluation arrangement of the network-based tasks as suggested by (John and Khilesh, 2008). A significant number of the tasks faces challenges in Monitoring and Evaluation of their activities because of numerous elements. This is as indicated by (Pfohl, 1986). According to Messah and Mucai in their paper, Factors Affecting the Implementation of Strategic Plans in Government Tertiary Institutions: A Survey of Selected Technical Training Institutes, as cited in(Finkelstein, 2003), maps four circumstances in which strategic planning for monitoring and evaluation of community-based projects failure is most likely to occur: Babbie and Mouton (2001, 342), in looking at dimensions of programme management and implementation, cited a number of issues that impact on the implementation of M;E systems. Issues raised include the competencies and abilities of the personnel who are to manage the implementation; the organizational structures available to create an enabling environment for the discharge of M;E duties, personality styles and attitudes of implementation staff (Babbie and Mouton 2001, 344). Despite these challenges, many organizations have begun to recognize the importance of M;E for two key reasons: accountability and improvement (Margoluis et al. 2009). Accountability-focused evaluation serves to ensure that organizations account financially for their activities and implement promised activities and usually stems from a formal process required by the donors. Improvement-focused evaluation aims to improve implementation and organizational, management or project effectiveness. This improvement- focused on understanding and challenges of M;E is the focus of these research. I define M;E as the process through which organizations evaluate their practices and outcomes according to their mission and objectives. How to cite Monitoring, Papers

Friday, December 6, 2019

Compare and contrast the ways in which the directors of Mary Shellys Frankenstein 1994 and Frankenstein 1931 Essay Example For Students

Compare and contrast the ways in which the directors of Mary Shellys Frankenstein 1994 and Frankenstein 1931 Essay Mary Shelly originally wrote Frankenstein in 1816. Since then, it has been re-written many times by authors such as Spike Milligan. It has also been released twice as a film. I am going to compare the opening scenes of the two Frankenstein films, looking at all aspects of film making used; use of camera, sound, editing lighting and colour and mise en scene. James Whales Frankenstein was released in 1931, and was made by Universal Studios. Hollywood was new and young, but was said to be going through its golden age, as everything was very new and impressive to the 1930s audience. James Whale was British born, and had a history of working in theatre when he created the film. It starred Boris Karloff, whose career was based on the success of the film. It is very different to the next adaptation of the book: Kenneth Branaghs Mary Shellys Frankenstein was released in 1994, and made by Columbia. Branagh directed the film, and also starred as Dr. Frankenstein, alongside leading actor Robert DeNiro. Branagh is British born, and has a distinguished background in theatre. He is especially famous for adapting Shakespeares plays. In the opening scene of James Whales Frankenstein the director uses different aspects of film making to create a mood of horror, which sets the audience up for the rest of the film. He uses various sounds in the first scene, though they are all used to create a feel of foreboding, and almost suspense. The first sound the audience hears is a priest reciting a prayer. His voice is solemn, so we know he must be at a funeral. This creates an uneasy feel as the director brings up the lifelong fear that is death. We can also hear a steady bell, which almost hypnotises the audience into the beat, but also reminds us of a death knell, along with the funeral image. The next sound we hear is Dr. Frankenstein and Fritz talking in hushed voices, and the sounds of them digging up the grave. This may create horror in the audience, as they may feel that he is acting against God, a feeling that re-occurs throughout the film. In this first scene, there is only digetic sound used to create a more realistic atmosphere. The editing used in the first scene is only straight cuts. These make the action feel more natural, but were probably used because the film making technology in the 1930s was very basic. I counted only seventeen edits in the whole of the first scene. This scene is quite dimly lit, so the audience have the uneasy feeling that someone may be lurking in the shadows where they cannot be seen. Also the use of shadow on Fritzs face accents his sunken eyes and strange face. The make up and clothes used in this scene play an important part in alarming the audience. Fritzs exaggerated alien-like make up frightens the audience, as his face  looks unnatural and hideous. The scenery generates an eerie atmosphere, as it takes place in a dark misty graveyard. The gestures the actors use add to the terror, from the crying people attending the funeral, to the threatening, villain-like movements of Dr. Frankenstein. In the opening scene of Kenneth Branaghs Mary Shellys Frankenstein the director creates a mood of adventure, as the sweeps across the rows of men working on the ship, lead by a brave, strong explorer. However, as Dr. Frankenstein enters the scene, the mood changes to panic, as he dramatically starts to tell his terrifying life story, and the Monster is introduced. There is a lot of non digetic sound ie, that only heard by the audience, there is nearly always music in the background. He uses dramatic music to build up the drama, and also punctuates the acting. .u2f54f6b1b9e5cb489cc0d896b915e574 , .u2f54f6b1b9e5cb489cc0d896b915e574 .postImageUrl , .u2f54f6b1b9e5cb489cc0d896b915e574 .centered-text-area { min-height: 80px; position: relative; } .u2f54f6b1b9e5cb489cc0d896b915e574 , .u2f54f6b1b9e5cb489cc0d896b915e574:hover , .u2f54f6b1b9e5cb489cc0d896b915e574:visited , .u2f54f6b1b9e5cb489cc0d896b915e574:active { border:0!important; } .u2f54f6b1b9e5cb489cc0d896b915e574 .clearfix:after { content: ""; display: table; clear: both; } .u2f54f6b1b9e5cb489cc0d896b915e574 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2f54f6b1b9e5cb489cc0d896b915e574:active , .u2f54f6b1b9e5cb489cc0d896b915e574:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2f54f6b1b9e5cb489cc0d896b915e574 .centered-text-area { width: 100%; position: relative ; } .u2f54f6b1b9e5cb489cc0d896b915e574 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2f54f6b1b9e5cb489cc0d896b915e574 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2f54f6b1b9e5cb489cc0d896b915e574 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2f54f6b1b9e5cb489cc0d896b915e574:hover .ctaButton { background-color: #34495E!important; } .u2f54f6b1b9e5cb489cc0d896b915e574 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2f54f6b1b9e5cb489cc0d896b915e574 .u2f54f6b1b9e5cb489cc0d896b915e574-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2f54f6b1b9e5cb489cc0d896b915e574:after { content: ""; display: block; clear: both; } READ: A Kestrel For A Knave EssayThe editing is mainly straight cuts, but which are often jumpy, for example when the dogs are being caught. This causes the audience to feel anxious, and also builds tension. The opening scene is very fast, I counted fifty-seven edits, and this builds up the pace of the film. Although Whales version lacks the added bonus of colour, I think that use of digetic sound is much more affective, as he creates a real sense of horror using just the different digetic sounds. However, I think Branaghs use of non-digetic sound is very affective, as he creates a good sense of tension, which is built up using music. Finally, I think that although the scenery i s not very clear in Whales version, the use of sounds to describe what is around the actors for example, the funeral bell, the dog barking makes up for the indistinguishable background. Branaghs version lacks in these descriptive sounds as the audience can clearly see the location, but I think it is a shame these sounds are missing.

Thursday, November 28, 2019

History of Fiscal Administration and the Theory and Purpose of Taxation Essay Sample free essay sample

Fiscal Administration is non hard to specify. In simple footings. financial disposal is the subdivision of economic sciences that trades with the grosss and outgos and their impact on the economic system. It is the mode of roll uping something from the components and disbursement it besides for the components. And the exact definition harmonizing to hypertext transfer protocol: //www. wisegeek. com/what-is-fiscal-administration. htm. financial disposal is the act of pull offing entrance and surpassing pecuniary minutess and budgets for authoritiess. educational establishments. non-profit-making organisations. and other public service entities. Components charge leaders. whether governmental or organisational. with set uping financial policy as portion of their responsibilities in relation to responsible financial disposal. Fiscal policies are tools for the development of financial be aftering budgets. based on the reception of awaited support. As fund expense in the signifier of pays heet. purchases. or other disbursals occur. direction studies appropriate accounting information back to organisational leaders. We will write a custom essay sample on History of Fiscal Administration and the Theory and Purpose of Taxation Essay Sample or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Historical information. future gross projections. and current budget demands determine needed accommodations. The full procedure forms the footing for future financial disposal determination doing. Leaderships of authorities. not-for-profits. and other public service entities have a fiducial duty to those who put them in office. persons better known as components. Efficaciously pull offing the financial disposal of an entity contributes to its overall fiscal wellness and ability to go on functioning components. As such. Torahs dictate much of the specifics with respect to fixing fiscal statements. entering minutess. and equilibrating budgetary demands for such organisations. Fiduciary duty dictates that these studies demonstrate responsible direction and recording of all activities affecting monies paid to or spent by the organisation. Government financial disposal. specifically federal financial disposal. creates many chances for mistake. By their very nature. governmental organisations are big and complex. necessitating legion divisions. sections. commissions. and other organic structures. While gross watercourses follow merely a few waies through these many sections. expenses and disbursals come from all countries. With so many beginnings of information refering pecuniary minutess. mistakes and skips may easy steal through unnoticed. making compromising and hard to decode jobs. The complexness and sheer volume of information necessary to happen such mistakes explains how corruptness frequently goes unnoticed in certain authorities sectors. Private sector organisations. such as non-profit-making bureaus and public postsecondary schools. besides experience troubles decoding mistakes in financial disposal. While these organisations are besides big and complex. public coverage paperss require far less clip to analyse. For this ground. jobs with fiscal direction in a non-profit-making or public university normally present faster than governmental bureaus. This term paper does non merely take to uncover the definition and history of financial disposal but every bit good as revenue enhancement being one of the beginnings of the financess being used in the financial disposal. The writer of this term pa per wants to happen out the undermentioned inquiries: What are the phases of clip occurred developments in fiscal disposal and revenue enhancement? When was revenue enhancement started? Why is revenue enhancement of import in fiscaladminitration? As we begin the treatment on the financial disposal it would be better if we start with the development of Fiscal Administration. As discussed in the book of Leonor Magtolis Briones entitled Philippine Public Fiscal Administration. the development of public finance establishments simply reflects the development the development of organized society. peculiarly the province. Changes in constructs of what should be the maps and duties of the province have to a big extent shaped constructs of what the ends of public finance ought to be. For after all. public finance rises and spends gross for the maps of the province. These maps have been altering with the development of the society. Therefore. following the development of public finance establishments necessitates an scrutiny of the development of organized society itself. Early on Public FinanceIf we are to follow the beginnings of public finance establishments. we would likely get down with the beginnings of the province under the slave societies. Under the crude societies. there was non likely much public finance to talk of. The crude folks were on subsistence footing. with barely any excess. Whatever was acquired signifier hunting and fishing was instantly consumed. Battles over districts. the gaining control of defeated folks who were turned into slaves. Te development of settled agribusiness and fundamental progresss in the production of goods led to the great imperiums of Asia. Africa and Europe. The early public finance establishments of these slave societies served as foundations for modern establishments and patterns. Ancient public finance provided some of the basic instruments of public fiscal direction. Medieval public finance further refined some of these constructs. condensing their basic facets by an expanded application to medieval public ends and conditions. It besides introduced some basic tools like accounting and auditing. The thought of financing public ends and activities is every bit old as the organisation of public authorization. Logically. the beginnings of public finance started from the creative activity of the province. The province was created by necessity to protect and supposedly promote the public assistance of adult male. Basically. the province was comprised of: the authorities. the people. district. and sovereignty. Public finance was supposed to continue the province and advance the ends of society. In peculiar it financed the activities of authorities. Medieval Public Finance ( 395 A. D. -1500 )The development of mediaeval public finance closely followed the alterations in political construction of the province during the Middle Ages. These alterations encompassed the weakening of the monarchy ( cardinal authorities ) at the beginning of the mediaeval period. the subsequent atomization of public authorization ensuing in the system of feudal system. and the rise of limited monarchy at the terminal of the epoch. The displacements in the signifier of authorities were gradual. Hence. the establishments of political authorization and their economic. societal. and cultural branchings were merely diverse but overlapping. Furthermore. mediaeval conditions were greatly varied in range and nature among the different European States. While mediaeval conditions reinforced some of the basic construct in ancient public finance. the complexnesss of province administration greatly transformed the finance establishments in footings of signifier and application. In the face of altering conditions. the signifier and construction of revenue enhancements and other gross instruments were adapted to changing beginnings and topics of levy. While retaining its traditional intents. i. e. . for public concerns. public outgo changed in footings of range and composing. Accounting and Auditing bit by bit acquired touchable signifiers. Public adoptions became institutionalised due to increased outgos of the authorities germinating a gloss of debt direction. It was the system of feudal system which exerted the most important impact on mediaeval public finance. FeudalismFeudalism was basically the system of economic relationship based upon land term of office. among the king the Godhead. and the lieges. The male monarch still theoretically owned all lands within his sphere. But he could non administrate them straight. Furthermore. due to the lifting outgos for defence against occupying savages. aggravated by political disbursement. the male monarch was forced to allow lands in return of immediate grosss ( AIDSs or parts ) . Inevitably. the public sphere was divided into legion feudal legal powers ( feifs ) over which ruled. more or less independently. the feudal Godheads. The Godheads parceled the lands to sub-vassals or helot to whom they granted permission to cultivate. agreement protection. and administered justness. In return. the helot cultivated the lord’s lands. served on particular juncture. gave a portion of their green goods and paid revenue enhancements. One characteristic of the feudal system. the suzerain-lord relationsh ip implied the duty of the feudal Godheads to back up the male monarch with grosss for the latter’s public outgos. More frequently. the male monarch was progressively forced to exist chiefly upon the income from the belongings he straight owned. In add-on. the male monarch derived grosss from the bona vacantia. The public maps of cardinal authorities were normally confined to national wars and disposal of royal sphere. Due to the weakening of cardinal authorization and its limited to finance its public maps. public concerns became de facto duties of the feudal Godheads. Government maps and necessarily public finance were parochialized. The feudal Godhead became an active financial director. He assessed and collected revenue enhancements from his helot. He levied licence fees on merchandisers and bargainers who passed by his manor. He collected gross green goods revenue enhancements. heritage revenue enhancements and matrimony fees for the care of his tribunal. Tolls on rivers. Bridgess or roads were levied. He besides collected AIDSs when his eldest boy was knighted or his eldest girl married when he set on campaigns. and when the male monarch requested parts on exigencies. Where some national revenue enhancements were retained under the cardinal authorities. gross appraisal and aggregation were confounding and in confusion due to the absence of cardinal accounting system and record-keeping. In consequence. the cardinal authorities or monarchy relied more and more on the feudal Godheads as local gross agents. Gross raising and outgos occurred at two levels-at the degree of the male monarch or the cardinal authorities and at the degree of the feudal Godheads. During this period. most of the traditional maps and privileges of the male monarch were assumed by the feudal Godheads. The latter provided the basic services and in the processed collected most of the revenue enhancements. The male monarch was chiefly involved in national wars and disposal of his estate. The feudal system and its manner of revenue enhancement was transported by the European states to their settlements. Get downing of Capitalism and the Rise of the Cardinal GovernmentThe modernisation of public finance at the national degree developed at the same time with the rise of the cardinal authorities. The demands of strong cardinal authoritiess included the enlargement and rationalisation of national fundss. The turning cost of authorities compelled the post-feudal provinces to raise more grosss. The return of the national gross powers to cardinal authorities led to enlargement of the traditional national revenue enhancements and the debut of the new 1s. The revenue enhancements introduced during the post-feudal epoch were really legion. Some of them were poll revenue enhancement. hearth revenue enhancement. window revenue enhancement. salt revenue enhancement. and more.The reemergence of cardinal authoritiess. peculiarly in Europe after their feudal period brought about important alterations in public finance establishments the income revenue enhancement emerged as the major beginning of national gross. A broad assortment of indirect revenue enhancements was besides introduced. Besides. the rule that revenue enhancements can non be imposed without consent was integrated into the system. Accounting and audit establishments developed in the class of increased demands for answerability. Public borrowing emerged as a major activity in public finance. MercantilismMercantilism refers to those policies particularly protectionist and pecuniary. which the European provinces pursued during 16th. 17th and 18th centuries in their attempts to enrich a great state by trade and industries than by the cultivation and betterment of land. instead by industry of the towns than that of the state. Sing revenue enhancement and gross disposal. the accretion of coinage ( metal ) enabled the cardinal authorities to coin money for domestic usage. The usage of money. in bend facilitated the aggregation of revenue enhancements. custom responsibilities and other grosss. thereby increasing aggregation and simplifying disposal. Internal revenue enhancement was used to command the agricultural sector. to back up industrialisation pushs. Internal duties were normally used to modulate nutrient supply and merchandises for exports. Therefore high duties and low export rates were imposed when the agricultural sector produced an glut of goods. To further monopolise trade. high imposts fees and charges were imposed on foreign ships go throughing or docking at the mercantilist state.Public expenditures at the clip expanded tremendously because of the wide-ranging mercantilist concerns of the authorities. the enlargement of national authorities and bureaucratisms. and the care and protection of its ventures in the settlements. The accretion of coinage besides gave rise to the development of a money economic system which facilitated exchange and increase large-scale concern activities. To prolong spread outing economic endeavor. the province actively allocated public financess to help the industries. A immense portion of the province budget was normally allotted for capital extract. subsidies. and public plants. Mercantilism had exerted many influences on public finance. First. it highlighted the necessity of province intercession in the economic life of the mercantilist state. Second. the mercantilist accent on financial instruments to steer economic activities towards prosperity. has broadened the utilizations of the revenue enhancement and budget in the economic domain. Third. the concern of the mercantile province to continue to increase its bullions by aggressive exportation of place merchandises and the corresponding limitation of imports through high duties evolve into a set of financial rules known as the â€Å"balance of trade† . Fourthly. the experience of mercantile system. exemplified by England and some Western States in the ulterior portion of the period. showed the mere acquisition of gold and Ag was non the exclusive determiner of national wealth. CameralismCameralism. like mercantile system. was concerned with how to do the province powerful and affluent. However. unlike the mercantilists who every bit emphasized the accretion of bullions through restrictive trade. cameralists were more partial to the development of a nation’s internal resources through efficient disposal and control of economic activities. Physiocracy The physiocrats were by and large concerned with revenue enhancement and its stableness and certainty. They agreed that the lone manner to establish a stable system of revenue enhancement was to establish it on a sector which produced a net net income or excess. Through their analysis of the shifting and incidence of revenue enhancement load. physiocrats held that agribusiness entirely produced a excess which formed the footing for revenue enhancement. To guarantee the certainty of grosss. physiocrats argued. all bing revenue enhancements should be abolished and a individual direct revenue enhancement on the land-rent income accruing from agricultural excess which sustained the flow of income and goods in the economic system. was the best foundation for a permanent system of revenue enhancement. CapitalismEconomic relationships changed from land-based minutess to industrial relationships ; from the relationship of the feudal Godhead and renter. to that of the capitalist and the worker. Ideas about the nature and maps of the province correspondingly changed. So did thoughts on public finance. The mercantilist doctrine of authorities intercession gave manner to laissez faire policy of minimal intervention. In the feudal system. the known universe revolved around the feudal Godhead ; in capitalist economy. the adult male of the hr was the capitalist and the enterpriser. Keynesian Public FinanceThe economic depression of the late 1930’s changed all these positions. To their discouragement. economic experts realized that the industrial economic systems would non react any longer to the prescriptions of the classical economic experts. They discovered that economic systems under the capitalist or free endeavor system are capable to cyclical fluctuations and to the depredations of rising prices. stagnancy and recession. John Maynard Keynes insisted that the authorities could and should act upon the monetary values of goods and services. sum and the ingestion. the grade of employment and the distribution of national income through revenue enhancement. adoptions and purchase and sale of trade goods and labour. Keynes developed the tool for rectifying instabilities in the economic system. He emphasized its importance as a stabilizing and compensatory tool. Keynes demolished the position that governmental activity should be limited merely to a few basic activities ; he insisted that public finance should travel beyond mere working of the economic system. Therefore. revenue enhancements for illustration would be imposed non merely for the exclusive intent of raising gross but for economic aims like act uponing ingestion and redistribution of income and wealth every bit good. Fundss would be expected non merely for the intent of distributing limited services but to impact the income and employment degrees as good. Borrowings would be engaged in non simply to equilibrate the budget but to carry through economic aims like wipe uping up disbursals liquidness and transferring of resources from one sector to another. It could besides be used to finance productive activities in cases where the private sector has been weakened and needs revival. Of all keynes’ public finance positions. possibly shortage funding was the most controversial at that clip. Keynes’ construct of aggregate economic sciences or macroeconomics. and his basic terminologies-fiscal policy. pecuniary policy. shortage funding. compensatory financing-are now portion and package of public finance vocabulary. These are criterion tools which policy shapers of assorted economies-whether the nonsubjective be stableness or development. MarxismKarl Marx approximately sketched out his construct of post-capitalist society. Communism could non be achieved instantly after the revolution. for â€Å"between capitalist economy and communist society lies the period of the radical transmutation of one into the other. There corresponds besides to this political passage a period in which the province can be nil but the radical absolutism of the labor. † The passage to communism would be marked by two cardinal procedures: First. the agency of production would be owned by the society. and the merchandises of human labour would no longer be straight appropriated by a individual processing category. Since the division of society into categories was mostly determined by ownership or non-ownership of the agencies of production. this would be bit by bit abolished. in the sense that there would no longer be a political instrument for category society† would society be able to â€Å"inscribe n its streamers: from each har monizing to ability. to each harmonizing to his demands. † Marxist part to our apprehension of society in general and political economic system in peculiar has been huge. Marx’s emphasis on the economic factor in society and his analysis of categories have had great influence on public finance in modern times. Basic Features of Socialist Public Finance1. The primacy of Central Planning. Planning plays a important function in socialist public finance. in contrast to authoritative capitalist theory which places trust on the market mechanism for the production and distribution of goods and servicer. 2. The Role of Taxation in Revenue-Raising. Unlike the assorted economic systems where revenue enhancement usually accounts for most authorities gross. revenue enhancement usually accounts for most of authorities gross. revenue enhancement plays a really minor function in socialist public finance. 3. Budget Deficits. It is claimed that budgets of socialist states do non hold shortages but have excesss of gross over outgo. This characteristic is in crisp contrast with shortages in assorted economic systems which are regular characteristics of the budget. This ends the treatment on the history on financial disposal cited in the book Philippine Public Fiscal Administration by Leonor Magtolis Briones.

Monday, November 25, 2019

The Present Participle and Continuous Tenses

The Present Participle and Continuous Tenses The Present Participle and Continuous Tenses The Present Participle and Continuous Tenses By Maeve Maddox The present participle, together with a the verb to be, is used to create continuous tenses. Although a form of the verb, the present participle cannot be used as the main verb of a sentence. Trying to use it that way results in a sentence fragment: Playing in the lake. To function as a verb, the present participle must be used with a helping verb: The children are playing in the lake. Continuous tenses, also called progressive tenses, are used to describe a continuing action. The present, past, and future continuous tenses are formed with the present, past, or future of the verb to be and the present participle, i.e., the form of the verb that ends in -ing: I am running for my life. We were sitting in the hotel lobby. This time next week, we will be celebrating your birthday. In the comments to a post I wrote on the uses of sit and set, a reader brought my attention to an odd usage current in Britain. He provided this example: â€Å"The boy was sat on a rock by the harbour when the ship docked.† The meaning of the sentence calls for a continuous tense: â€Å"The boy was sitting on a rock by the harbour when the ship docked.† The action of sitting was going on at the time the ship docked. A post at the Oxford Dictionaries blog indicates that, while the usage may be popular among many speakers of British English, it’s not considered standard usage: I’ve noticed several instances of [] ‘She’s sat at the table eating breakfast’ or ‘we were stood at the bar waiting to be served’.   Aarrgghh!!!   This construction is still regarded as non-standard.OxfordWords blog â€Å"Was sat† for â€Å"was sitting† seems to be a dialect form that has crept into the British mainstream. It is to be hoped (OK, I hope) that it won’t catch on with U.S. speakers. According to the OED blogger, the aberration is limited to the verbs sit and stand: It is 2pm and  I am sat  in my parents’ living room, talking to one of the cats. We were stood at the bar waiting to be served. If the action is continuous and uncompleted, you need an -ing verb: It is 2pm and  I am sitting  in my parents’ living room, talking to one of the cats. We were standing at the bar waiting to be served. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:Inquire vs Enquire45 Synonyms for â€Å"Old† and â€Å"Old-Fashioned†How to Treat Names of Groups and Organizations

Thursday, November 21, 2019

Business - Business Environment Essay Example | Topics and Well Written Essays - 750 words

Business - Business Environment - Essay Example Profit and not for-profit organizations are very essential and play important role in U.S economy. Although both have some similarities, they also have differences. For-profit organizations are some of the prime movers of the economy in that they are responsible for a big share of capital generation. For-profit organizations utilize natural, artificial and human resources to generate profits. Most of for-profit organizations are involved in generation of products and services for the population. Notably, for-profit organizations are able to harness and utilize resources at a large scale therefore benefiting from economies of scale. Therefore, they are able to provide goods and services at a low cost. For-profit organizations are responsible for provision of employment to the greatest percentage of the U.S workforce. On the other hand, not for-profit organizations provide human empowerment services to the U.S population without generating profit. They play a pivotal role in economy in that they provide free or affordable services that would otherwise have cost the population a lot of money. Additionally, not for-profit organizations provide employment to approximately 10 percent of U.S workforce. Although they do not necessarily make profit, they provide mechanisms in which money flows through the economy. There are two primary ways in which economy can be regulated. The first one is through fiscal policies and the second one is through monetary policies. Whereas monetary policies are implemented by the central bank, fiscal policies are economic regulations implemented directly by the government. Monetary policies have either short term or long-term effects on the economy. Restrictive monetary policies seek to slow down economic activities to avert a possible inflation in the future. On the other hand, stimulative fiscal policies seek such as reduction in tax, increased spending aim at rejuvenating economic activities. Fiscal policies on the other hand, regulate the economy by use of government regulations that are sourced from acts of congress. This is done through regulation of government spending and tax structures both at federal and state levels. It is assumed that business cycles are controlled by aggregate expenditures. This is mostly reflected on business sector and government spending. Therefore, the government implements policies aimed at controlling the flow of capital in business sector as well as government spending. Therefore, the government controls government purchases or spending and taxes on business sector. This way, the government is able to regulate the economy. Air transport service is one of the most widely used forms of global transport. It accounts for the greatest percentage of inter country transport. Whereas air transport is a lucrative and profitable business, accessing global markets is usually a challenging endeavor. This is because the business rests on different market structures with have different and som etimes, contrasting interests. The most appropriate strategy for accessing global market would be to access the travel and transport needs for different countries in which the air transport service is to be provided. Different cultural and societal needs for all countries need to be assessed. It will thus be possible to access these markets by

Wednesday, November 20, 2019

The School as a Social System and the Application of Theories Essay

The School as a Social System and the Application of Theories - Essay Example There are 430 students currently enrolled in Pottsboro High. Aside from them, they also have a set of teachers, administrators, staff and maintenance personnel who interact with each other almost during the major part of the year. We can also consider the parents and guardians of the children as an integral part of the school thereby sufficing this condition. It is common to think that teachers influence their student's learning and behavior and the process is only one way. However, teachers are in fact influenced also by their students. One can say that the process is mutual wherein the teacher grasps more fully the meaning of life thru the acts and behavior committed by his students. Furthermore, if there were no maintenance personnel then the student and teacher would not find a suitable learning environment and the absence of a teacher and a student eliminates the need to have a maintenance personnel. In retrospect, each element contributes to the system: the teachers with their knowledge, the students with their acts and achievements, the administration with their management skills, the maintenance personnel with their service and the parents with their support in the development of the children and the school. They, however, also receive something which for the employees is salary and fulfillment. Pottsboro High aims to provid... The school is goal oriented. Pottsboro High aims to provide the students the opportunity to develop themselves to their full mental and physical capacity. They try to achieve this with activities such as sports and academic competitions. The teachers and administration also meets regularly to discuss performance and resolve issues all for the better functioning of the institution. The school has structure. Looking at the organizational chart of the school, one can see that the overall head is the principal. It then branches out to different heads of the department such as administration, teaching staff for a certain field such as Math and Science, Student Guidance and Relations and Security and Maintenance. The students are also divided into classes and levels that serve as an additional evidence that Pottsboro has a structure. The school is normative. When we say normative, we mean that there are certain norms that exist in the school. Rules and guidelines regarding behavior, use of school property and grading system are present and are made as reference by all the segments of the school. The school bears sanction. Erring, troublesome and cheating students are called to the disciplinary office or made to stay after class. The employment of underperforming teachers and staff can be terminated. These are just a few of the sanctions that the school can impose on its members when the rules and guidelines were not followed. The school also has a political facet and power relation inevitably enter into social relations. As earlier stated, Pottsboro has a structure and the higher the person is in the organizational chart, the more power he can exercise. Since this is the case, the Principal's decision is always final and executory.

Monday, November 18, 2019

Action report 1 Article Example | Topics and Well Written Essays - 250 words

Action report 1 - Article Example The introduction part of the article offers an insight of the general views of the two schools and what led to their views. The fatalists’ view is mostly persuaded by technology (Klein 1). In the conclusion part, both fatalists and redistributionists conclude that the government has not brought about inequality (Klein 1). According to them, social services and taxes have not changed all that much, and; therefore, raising taxes or enhancing infrastructure spending, for instance, will not fix it either. The only issue is that redistributionists argue that fatalists are not aware of how the government has aided inequality through cutting taxes on wealthy people and not considering the poor (Klein 1). In the mitigation theory, Fieldhouse argues that greater taxes on the rich might do more to restrain inequality than people notice (Klein 1). Finally, in the wider appeal section, it discusses how the Federal Reserve’s choice to prioritize low inflation above full employment is a regime intervention of staggering significance, even though it is hardly ever presented that way (Klein

Friday, November 15, 2019

Business And Marketing Plan For A Italian Restaurant Marketing Essay

Business And Marketing Plan For A Italian Restaurant Marketing Essay The location is very good as the CITYPRIDE multiplex is situated in KOTHRUD which is the fastest developed suburb in Pune.It is located close to the market area with Proximity to a number of colleges,schools and IT business establishments.CITYPRIDE is the only multiplex in the area.It also has a mall which leads to high footfalls on A daily basis.With this concentration of customers.there are no Italian restaurants that offer Pizzas and Pastas in Kothrud and a tremendous need for an upscale family restaurant that offers these items for both the adults and children. The turnkey operation seats 150 customers and is the perfect size for an Italian Restaurant.With the current lease and the fitout time of three months it will be very easy to procure all the required equipments and commence operations at the earliest.The growth in the number of high income families in the KOTHRUD area is also projected.ITALIA would be a perfect neighborhood restaurant in the perfect Neighborhood. Introduction- Company Description-PEEGEE Co,a Pune based company, will operate ITALIA, a single unit, medium-size restaurant serving healthy, contemporary style food. The restaurant will be located at shop No;4,CITYPRIDE MULTIPLEX,KOTHRUD,PUNE-411038 Mission Statement-The companys goal is that of a multi-faceted success. Their first responsibility should be to the financial well-being of the restaurant. They must meet this goal while trying to consider; 1) the effect of their products on the health and well being of their customers (and their staff), 2) the impact that their business practices and choices will have on the environment, and 3) the high quality of attitude, fairness, understanding, and generosity between management, staff, customers, and vendors. Awareness of all these factors and the responsible actions that result will give our efforts a sense of purpose and meaning beyond their basic financial goals. Development Status The company was incorporated in December 2010. The founders are Pravin Malhotra and Vikas Malhotra. Both are the managing partners of the co. They have put Rs 10,00,000/- each towards the initial investment for research and start-up costs.The remaining will be funded by the banks. A suitable site for the first restaurant was found last month and lease negotiations are in the final stages. The location will be in CITYPRIDE MULTIPLEX,in Kothrud which is biggest and the fastest developing suburb in Pune. When the lease is signed there will be three months of free rent for construction and in that time the balance of the start-up funds must be raised. With that phase completed, ITALIA Restaurant can then open and the operations phase of the project can begin. Future Plans If the business is meeting its projections by month nine, they will start scouting for a second location and develop plans for the next unit. Their five year goal is to have 3 restaurants in the PUNE area with a combined annual profit of between RS 50 LAKHS To Rs 100 Lakhs. The SWOT Analysis Strength-The strength of the company lies in the fact that Mr Pravin Malhotra the managing director of the company is a graduate from the Institute of Hotel Managent, Aurangabad.He is very honest and hardworking and has worked with the Le Meridien group of hotels as a F B manager for the last three years.His experience in the hotel industry would be very helpful in the day to day running of the restaurant.In addition the fact that both the directors are putting in Rs 10 lakhs each from their own savings is also very helpful.The need for additional capital will not be very much and it Could be procured from the banks easily. WeaknessThe fact that the promoters have no previous business experience could be a major drawback for the them.This weakness can be overcome by meticulate planning and Execution. OpportunityThis business plan reflects the opportunity on the part of the promoters to lease the premises offered by the owners of the CITYPRIDE multiplex.They had put up an advertisement in the local newspaper seeking persons interested in running a restaurant at their famous multiplex.The promoters took this opportunity and immediately approached the owners.They were the first ones to do so .They liked the premises instantly since it was located right at the entrance of the multiplex .The promoters immediately took a descision and signed the lease by giving a suitable deposit to the owners of the multiplex.. The promoters saw huge opportunity in opening up an Italian restaurant in the place. This was due to the fact that there was not a single Italian restaurant in the entire suburb of Kothrud which is the largest and the fastest growing suburb of the Pune city.Pune has itself grown into a very large metropolitan city in the past five years with the advent and growth of the IT sect or,In addition Pune has always been an educational hub since the last twenty years boasting of a large number of schools ,colleges and post-graduate management and other institutes.No wonder it is called the OXFORD of the east. Threats-There are a couple of renowned food chains within close range of the CITYPRIDE multiplex.These include the McDonalds restaurant which is located around a Kilo Meter from the place and the SUBWAY which is a mere half KM away from us.These could Provide us with stiff competition and could be a threat to the growth of the restaurant.In additions threat may also be posed by someone who might opt to open another Italian Restaurant in the vicinity. THE PEST ANALYSIS The Political AnalysisThe political environment in the country is very much stable and is conducive to the growth of the industry in general and the hotel industry in particular.The Indian government is taking huge steps to promote local as well as international tourism in the country. The Economical AnalysisThe total investment required for this project is 57,80,000/-. For deposit to the owner of the premises, advance rent of one month, as well as kitchen equipment, for interiors and also starting salary to the staff. The company promoters have pooled in Rs 20,00,000/- from their personal Savings ,The remaining amount of Rs 37,80,000/- will be raised by securing a loan from any of the nationalised banks.The promoters shall mortgage one of their personal property for the same. Social AnalysisAlthough the restaurant industry is very competitive, the lifestyle changes created by modern living continue to fuel its steady growth. More and more people have less time, resources, and ability to cook for themselves. Trends are very important and ITALIA is well positioned for the current interest in lighter, healthier foods at moderate to low prices. The food service business is the third largest industry in the country. The average PUNEITE spends 15% of his/her income on meals away from home. This number has been increasing for the past seven years. In the past five years the restaurant industry has out-performed. The reasons given are 1) lifestyle changes, 2) economic climate, and 3) increase of product variety. There are new restaurants opening every month and more needed to keep pace with increasing demand. The predicated growth trend is very positive both in short and long-term projections. As modern living creates more demands, people will be compelled to eat more meals away from home. Estimates are as high as 30% over the next five years. It is understood that: Consumers will spend a greater proportion of their food Rupee away from home. Independent operators and entrepreneurs will be the main source of new restaurant concepts. Nutritional concerns will be critical at all types of foodservice operations, and food flavors will be important. Environmental concerns will receive increased attention. Technological analysis ITALIA will be 150 seat restaurant.It will cater to the students as well as the business establishments and families of the area.It will require to adopt latest technological equipments to help serve the customers better.The seating arrangement and the chairs and tables must be of high quality and great care must be taken in designing and furnishing the interiors. PRODUCT AND SERVICE PLAN IMPLIMENTATIONS-ITALIA Restaurant will be offering a menu of food and beverages with a distinctive image. There will be three ways to purchase these products; table service at the restaurant, take-out from the restaurant, and delivery to home or office. The Menu The ITALIA menu (see appendices) is moderate sized, and moderate-low priced offering a collection of Italian items with a common theme healthy (low-fat, low cholesterol, natural ingredients), flavorful, and familiar. Their goal is to create the image of light satisfying and still nutritious food. Production Food production and assembly will take place in the kitchen of the restaurant. Fresh vegetables, meat and dairy products will be used to crate most of the dishes from scratch. The chef will exercise strict standards of sanitation, quality production, and presentation or packaging over the kitchen and service staff. Service There will be three ways a customer can purchase food. They may sit down at one of the 150 seats in the dining room and get full service from a steward. A separate take-out counter will service those who wish to pick up their food. Future Opportunities There is a market segment that prefers to eat this type of cooking at home although they do not have the time to cook. There are already caterers and even mail order companies that provide individuals and families with up to a months supply of pre-prepared meals. This opportunity will be researched and developed on a trial basis. If successful, it could become a major new source of income without creating the need for additional staff or production space. The Target Market The market for ITALIA products covers a large area of diverse and densely populated groups. Although it will be located in a downtown urban setting, it is an area where people travel to eat out and one that is also frequented by CINEGOERS. It is also an area known for and catering to the demographic group they are targeting. Market Location Customers -The CITYPRIDE MULTIPLEX is the best multiplex in the area.It is one of the most desirable retail locations hosting an independent Mall.In addition it is close to Colleges and universities. The customer base will come from 3 major segments; Local population the city of PUNE with a year-round population of 45 lakhs is centrally located in the Maharashtra state and is within 15 minutes drive of 8 major suburbs. Colleges and Universities PUNE alone has 6 different schools within walking distance of Citypride. In addition 5 more colleges near the square have large student bodies. Tourism à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ There are number of tourists coming to Pune all the year long. Local businesses à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ Kothrud is a very big suburb of Pune boasting of a huge number of business establishments. The food concept and product image of ITALIA will attract 3 different customer profiles; The student more and more young people have developed healthy eating habits. Some also go through a health food phase while in college. The health conscious person of any age or sex this includes anyone on a restricted or prescribed diet or those who have committed to a healthy diet. Curious and open-minded if you try it, you will like it. Through marketing, publicity, and word-of-mouth, people will seek out a new experience and learn that nutritious food can be tasty, fun, convenient, and inexpensive. Market Trends The Future The population and demographics of PUNE have grown tremendously in the last 15 years.Pune which is called the Oxford of the east is famous for its educational institutes.In addition the economy of Pune has grown leaps and bounds with the Booming of the IT sector.With more and more families becoming nuclear and both the spouses working the people no longer have time to cook at home.Hence the lifestyles of people have changed. The idea of a health consciousness through nutritional awareness and dietary change has been slowly building for the last 5 years. The extensive government studies and new Food Guide Pyramid have given everyone a new definition of a balanced, healthy diet. This is not a fad but a true dietary trend backed by the scientific and medical community, the media, the government, and endorsed by the big food manufacturers. As people want to stay home more and cook less our strategy of delivering prepared meals on a weekly or monthly arrangement may be a widespread accept ed new way of eating The CompetitionThere are over two dozen restaurants in the KOTHRUD area that sell food at similar prices. Although there is no exclusive Italian restaurant this presents an obvious challenge in terms of market share, it also indicates the presence of a large, strong potential. ITALIA will make a successful entry based on an innovative concept or novelty. ITALIA will offer an innovative product in a familiar style at a competitive price. The co must make aggressive plans of take-out and delivery that will also give them an advantage to create a good market share before the competition can adjust or similar concepts appear. Competitors Profile Competing with ITALIA for the target market are these categories of food providers: Independent table service restaurants. Chain restaurants like McDonalds and SUBWAY, Commercial foodservice companies serving students directly. Independent operators include FIVE SEASONS RESTAURANT, MCDONALDS, and The SUBWAY. There are couple of companies which sell food directly to the students as well. Competitive Strategy-There are three major ways in which they must create an advantage over their competitors; product identity, quality, and novelty, high employee motivation and good sales attitude, innovative and aggressive service options. ITALIA will be the only restaurant among all the competition which focuses the entire menu on Italian food. Pizzas and Pastas are a major hit amongst the students as well as the IT public in Pune.Each of the competitors offers only one or two Italian dishes on their menu.ITALIA will be the exclusive Italian restaurant in the entire suburb of Kothrud. Once they have tried the restaurant, their experience will be reinforced by friendly, efficient, knowledgeable service. Return and repeat business will be facilitated by accessible take-out and delivery options. Marketing Plan Sales Strategy Market Penetration Entry into the market should not be a problem. The store has high visibility with heavy foot traffic all day long. The local residents and students always support new restaurants and the tourists do not have fixed preferences. In addition, Rs 1 lakh has been budgeted for a pre-opening advertising and public relations campaign. Marketing Strategy Focusing on the unique aspect of the product theme (healthy, tasty foods) a mix of marketing vehicles must be created to convey their presence, their image, and their message. Print media local newspapers, magazines and student publications, Broadcast media local programming and special interest shows, Hotel guides, concierge relations, Chamber of Commerce brochures, Direct mail subscriber lists, offices for delivery Misc. yellow pages, charity events. A public relations firm has been retained to create special events and solicit print and broadcast coverage, especially at the start-up. The marketing effort will be split into 3 phases; Opening An advanced notice (press packet) sent out by the PR firm to all media and printed announcement ads in key places. Future plans and Strategic Opportunities Catering to offices (even outside of our local area) may become a large part of gross sales. At that point a sales agent would be hired to directly market our products for daily delivery or catered functions. Operations Facilities Offices The restaurant at CITYPRIDE MULTIPLEX is a 2400 Square foot space. It was formerly a restaurant and needs on minor structural modifications. The licenses and codes issues are all in order. New equipment and dining room furnishings will be purchased and installed by the general contractor. Offices of the corporation are presently at MR PRAVIN MALHOTRAS home but will be moved to the restaurant after opening. Hours of Operation The restaurant will be open for lunch and dinner 7 days a week. Service will begin at 11:00 AM and end at 11:00 PM. Employee Training Education Employees will be trained not only in their specific operational duties but in the philosophy and applications of our concept. They will receive extensive information from the chef and be kept informed of the latest information on healthy eating. Systems Controls A big emphasis should be placed on extensive research into the quality and integrity of their products. They will constantly be tested for their own high standards of freshness and purity. Food costs and inventory control will be handled by their computer system and checked daily by management. Food Production Most food will be prepared on the premises. The kitchen will be designed for high standards of sanitary efficiency and cleaned daily. Food will be made mostly to order and stored in large coolers in the basement. Delivery Catering Food for delivery may be similar to take-out (prepared to order) or it may be prepared earlier and stocked. Catering will be treated as deliveries. Management Organization-Key Employees Principals-PRAVIN MALHOTRA AND VIKAS MALHOTRAS are the managing partners of the company.They will initially look after the setting up of the restaurant.The restaurant will have a cashier,a FB manager and a team of stewards and waiters to look after the customers. Compensation Incentives ITALIA will offer competitive wages and salaries to all employees with benefit packages available to key personnel only. Management to be Added They must search for a general manager and executive chef. These key employees must be well chosen and given incentives for performance and growth. Management Structure Style Mr Pravin Malhotra will be the Chief Operating Officer. The general manager and chef will report to him. The assistant manager and sous-chef will report to their respective managers, and all other employees will be subordinate to them. Long-Term Development Exit Plan-Goals-ITALIA is an innovative concept that targets a new, growing market. We assume that the market will respond, and grow quickly in the next 5 years. Our goals are to create a reputation of quality, consistency and security (safety of food) that will make us the leader of a new style of dining. Strategies-The marketing efforts must be concentrated on take-out and delivery, the areas of most promising growth. As the market changes, new products may be added to maintain sales.-Milestones-After the restaurant opens, they must keep a close eye on sales and profit. If they are on target at the end of year 1, they will look to expand to a second unit. Risk Evaluation-With any new venture, there is risk involved. The success of the project hinges on the strength and acceptance of a fairly new market. After year 1, we expect some copycat competition in the form of other independent units. Chain competition will be much later. Exit Plan-Ideally, ITALIA will expand to five units in the next 10 years. At that time, we will entertain the possibility of a buy-out by a larger restaurant concern or actively seek to sell to a new owner. CONCLUSION- From the above mentioned analysis and the plans formulated therein we can come to the Conclusion that: Pune is the most favoured destination for IT companies,students and the business community.The economy of Pune has grown with leaps and bounds in the last decade. The popularity of The Italian foods like pasta and pizza have grown with the students and the families. Kothrud is the fastest developing suburb in the Pune city.It does not have an Italian restaurant.Hence there is a tremendous scope for the setting up of an exclusive Italian restaurant which will cater to the student and the IT community. The premises chosen by the company is very good and it attracts a large number of footfalls daily. The footfalls increase dramatically during the weekends. The owner Mr Pravin Malhotra being a hotel management graduate and having a work experience of a fb manager at a reputed hotel is well versed with the job of running a restaurant.Altough he has no business experience ,his work experience may see him through. The owners of the company have a strong financial base and have invested about 20 lakh rupees for setting up the restaurant. In addition they have a personal property that can be mortgaged to the bank for a loan. Although there is a presence of other food chains like the McDonalds and Subway the project may still be a huge success because of the fact that there is not a single restaurant serving a complete Italian menu. With a proper marketing plan and strategy adopted by the company the project is bound to succeed. The owners have also hired quality chefs and managers who in turn will hire quality service staff which will provide healthy and nutritious food to the people.

Wednesday, November 13, 2019

Volcanoes and Climate Change Essay -- Geology Global Warming

Missing Graphics Volcanoes and Climate Change Introduction: Since the beginning of time, volcanoes have been wreaking havoc on the world, as we know it. Yet in the more recent times, there has been a great amount of debate regarding the effect of volcanic eruptions on world climate change. In this report, the effects of these volcanoes will be explored, particularly in regards to cooling and the depletion of the ozone. Table of Contents: Introduction General Information on Volcanoes Effect of Volcanoes on Cooling Effect of Volcanoes on Ozone Depletion Specific Volcanic Eruptions and their Effects Debate over Connection between Volcanoes and Global Climate Change Works Cited General Information on Volcanoes: Volcanoes arise when magma, liquid rock within the earth, reaches the surface. Volcanoes then erupt because of their bouyancy and gas pressure. On account of this buoyancy, the hot liquid magma rises toward the surface through the more dense rock. Gas pressure from within the magma also exerts a force on the surrounding rock. This cracks the rock, located above the magma, and then moves into the crack. This process is repeated over and over again until the magma reaches the surface. There are a few different types of volcanoes, and each erupts a bit differently. Shield volcanoes usually produce a fountain of molten lava that reaches high into the air, anywhere from 10 to 500 meters. In some eruptions, though, there is little fountaining; in these the lava just flows slowly away from the vent. There are also more explosive volcanic eruptions in which the gas pressure builds until it is extremely high and the viscuous lava can no longer stand i... ...because these volcanoes are located in different areas of the world or because El Nino occured during the year of the eruption of El Chichon. All of these evidences are still being compiled and scrutinized in order to verify the true relation between volcanic eruptions and climate change. Works Cited: Angell, James. "Stratospheric Warming Following Volcanic Eruptions." http://capita.wustl.edu "The Effects of Volcanic Eruptions on Earth's Climate." http://www.geo.mtu.edu Garrett, Chris. "Global Cooling." http://tiger.chm.bris.ac.uk Mattox, Steve. "How are volcanoes born and what makes them erupt?" http://volcano.und.nodak.edu "NASA Facts." http://www.nasa.gov Rowland, Scott. "What happens when a volcano erupts?" http://volcano.und.nodak.edu "The Science of Climate Change: The Aerosol Effect." http://www.panda.org/resources/publications

Monday, November 11, 2019

Introduction to Computers by Peter Norton 6th Ed

Q e SPECIAL INDIAN EDITION [ J^ ^ S ix t l^ d it io n INTRODUCTION TO COMPUTERS PETER NORTON In te rn S n H T M l Office For Sale in India, Pakistan, Nepal, Bangladesh, Sri Lanka and Bhutan only Uploaded By : M. Kamran Hanif E-mail : mk. [email  protected] com Website : www. kamran. hk. ms Information contained in this work has been obtained by Tata McGraw-Hill, from sources believed to be reli ­ able.However, neither Tata McGraw-Hill nor its authors guarantee the accuracy or com pleteness of any infor ­ mation published herein, and neither Tata McGraw-Hill nor Its authors shall be responsible for any errors, omissions, or damages arising out of use of this Infor* mation. This work is published with the understanding that Tata McGraw-Hill and its authors are supplying in ­ formation but are not attempting to render engineering or other professional services. If such services are re ­ quired. the assistance of an appropriate professional should be sought m Tata McGraw-HillPE T ER NORTON’S * INTRODUCTION TO CO M PUTERS Indian Adaptation done by arrangement with the McGraw-Hill Companies Inc.. NewYbrk Sales territories: India. Pakistan, Nepal, Bangladesh, Sri Lanka and Bhutan. Ninth reprint 2008 RYXDCDRXRB8YA Copyright (D 2006 by The McGraw-Hill Companies, inc. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc.. including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning.Some andllaries, including electronic and print components, may not be available to customers outside the United States. ISBN-13:97S4M>7-0S9374*9 ISBN-10:0-07-059374-4 Published by the Tata McGraw-Hill Publishing Company Limited. 7 W est Patel Nagar, New Delhi 110 008. typeset m Tim es at Script Makers. 19, A1-B. DDA Market, Pashchim Vlhar, New D elhi 110 063 and printed at Pashupati Printers, 1/429/16, G ali No. 1, Friends Colony. G. T. Road, Shahdara, Delhi 110 095 Cover Printer: SD R Printers Cover Design: Kapil Gupta The M cG raw -H ill Contponies Ez& sscr PH M TPM TQ AT A Cl IWindows 7 Check Your UnderstandingChapter 1: Introducing Computer Systems Lesson 1A: Exploring Computers and Their Uses Lesson IB : Lookina Inside the Computer Svstem Chapter 2: Interaction with Your Computer Lesson 2A: Using the Kevboard and Mouse Lesson 2B: Inputting Data in Other Wavs Chapter 3: Secinq, Hearing, and Printin') Data l;ctnn 3A; Virfpo and Snunri Lesson 3B: Printinq Chanter 4: Processing Data Lesson 4A: Transfbrmina Data into Information Lesson 4B: Modem CPUs Chapter 5; Storina Data Lesson SA: Types of Storaqe Devices Lesson SB: Measurinq and Improving Drive Performance Chapter 6: Usina Ooeratinu Systems Lesson 6A: Oporatinq Svstem Basics lesson 6B: Survev of PC nd Network Operatino Systems Chanter 7: Networks Lesson 7A: Networkinq Basics 2 3 24 48 49 68 88 89 1 07 124 12S Ufi m m 107 Chapter 0: Working in the Online World Lesson 9A: Connectinq to the Internet Lesson 9B: Doinq Business in the Online World Chapter 10: Workinq with Application Software Lesson 10A: Productivity Software Lesson 10B: Graphics and Multimedia Chapter 11: Database Management Lesson 11A: Database Manaqement Systems Lesson 11B: Survey of Database Systems Chanter 12: Software Proaramminq and Development Lesson 12A: Creating Computer Proqrams Lesson 12B: Proaramminq Lanauaoes and the Proqramminq Process Chanter 13: Protectina Your Privacy. Your Computer, and Your Data 330 331 345 382 263 383 400 401 42Q 438 439 456 478 477 497 518 528 532 538 SS8Lesson 13A: Understanding the Need for Security Measures 204 Lesson 13B: Takina Protective Measures 205 Appendix A: Creating Your Own Web Paae 22k Appendix B: Buyinq Your First Computer 242 Appendix C: Computer Viruses Annendix D: History of Microcomputers 243 267 Appendix E: Self-Check Answers Ch apter ; Presenting the Internet Lesson 8A: The Internet and the World Lesson 8B: E-Mail and Other Internet Services 284 286 312 Urheberrechtlich geschutzies ^ aterial FEATURE ARTICLES At Issue Computerized Oisease Manaqement Computer Votinq—Is It a Good Thinq? 36 62 10? 134 192 228 252 316 336 372 414 450 490 Productivity Tig Choosinq the Riqht Tool for the Job Savinq Time with Keyboard Shortcuts The Care and Feedinq of Printers Do You Need M n RAM? ; Backino Up Your Data Do-It-Yourself Tech Support The Telecommuter's Checklist—————- — Evaluatino the Reliability of Search Results and Web Sites Sharinq an Internet Connection Automatinq Your Work with Macros 0atahaoard, mouse,and microphone are commonInputdevices. Microphone Keyboard Speakers Monitor Printer :: FIGURE 1B. 11 Themonitor, primer,and speakers are commonou? put devices. 30 Chapter 1 Some types of hardware can act as both input and output devices. A touch screen, for example , is a type of monitor that displays text or icons you can touch. When you touch the screen, special sensors detect the touch and the computer cal ­ culates the point on the screen where you placed your finger.Depending on the lo ­ cation of the touch, the computer determines what information to display or what action to take next. Communications devices are the most common types of devices that can per ­ form both input and output. These devices connect one computer 10 another—a process known as networking. The most common kinds of communications de ­ vices are modems, which enable computers to communicate through telephone lines or cable television systems, and network interface cards (NICs), which let users connect a group of computers to share data and devices. Storage Devices A computer can function with only processing, memory, input, and output de ­ vices.To be really useful, however; a computer also needs a place to keep program files and related data when t hey are not in use. The purpose of storage is to hold data permanently, even when the computer is turned off. You may think of storage as an electronic file cabinet and RAM as an elec ­ tronic worktable. When you need to work with a program or a set of data, the computer locates it in the file cabinet and puts a copy on the table. After you have finished working with the program or data, you put it back into the file cabinet. The changes you make to data while working on it replace the original data in the file cabinet (unless you store it in a different place). Novice computer users often confuse storage with memory.Although the func ­ tions of storage and memory arc similar; they work in different ways. There arc three major distinctions between storage and memory:  » There is more room in storage than in memory, just as there is more room in a file cabinet tlian there is on a tabletop.  » Contents are retained in storage when the computer is turned off, whereas programs o r the data in memory disappear when you shut down the computer.  » Storage devices operate much slower than memory chips, bur storage is much cheaper than memory. Nor Formore formation onsorage U V C 3 Visit 3S 8. http://www. mhhe. ccm/ petemorton There are two main types of computer storage: magnetic and optical. Both are covered in the following sections.Magnetic Storage There are many types of computer storage, but the most common is the magnetic disk. A disk is a round, flat object that spins around its center. (Magnetic disks are almost always housed inside a case of some kind, so you can’t see the disk itself unless you open the case. ) Read/write heads, which work in much the same way as the heads of a tape recorder or VCR, are used to read data from the disk or write data onto the disk. The device that holds a disk is called a disk drive. Some disks are built into die drive and are not meant to be removed; other kinds of drives enable you to remove and replace disks (see Figure IB. 12).Most personal computers have at least one nonremovable hard disk (or hard drive). In addition, there is also a diskette drive, which allows you to use removable diskettes (or floppy disks). The hard disk serves as the computer’s primary filing cabinet because it can store far more data than a diskette can contain. Diskettes are used to load data onto the hard disk, to trade data with other users, and to make backup copies of the data on the hard disk. Introducing Computer Systems sch :: FIGURE 1B. 12 Standard PCs haw a buB-in hart disk and a octette dim The hard dfck is bult into the computer's case. Diskettes can be inserted into and removed from the diskette drive. Optical StorageIn addition to magnetic storage, nearly every computer sold today includes at least one form of optical storage—devices that use lasers to read data from or w rite data to the reflective surface of an optical disc. The CD-ROM drive is the most common type of optical stor age device. Com ­ pact discs (CD s) arc a type of optical storage, identical to audio CDs. U ntil re ­ cently, a standard CD could store about 74 minutes of audio or 650 M B of data. A newer breed of CDs can hold 80 minutes of audio or 700 M B of data (see Fig ­ ure 1B. 13). The type used in computers is called Compact Disc Read-Only Mem ­ ory (CD -RO M ). As the name implies, you cannot change the inform ation on the disc, just as you cannot record over an audio CD.If you purchase a CD-Recordable (CD-R) drive, you have the option of creat* ing your own CDs. A CD-R drive can w rite data to and read data from a compact disc. To record data w ith a CD-R drive, you must use a special CD-R disc, which can be written on only once, or a CD-ReW ritable (CD-RW ) disc, which can be written to m ultiple times, like a floppy disk. An increasingly popular data storage technology is the Digital Video Disc (D V D ), which is revolutionizing home entertainment. Using sophisticated com ­ pression technologies, a single DVD (which is the same size as a standard compact disc) can store an entire full-length movie. DVDs can hold a minimum of 4. 7 G B of data and as much as 17 G B.Future D VD technologies promise much higher stor ­ age capacities on a single disc. DVD drives also can locate data on the disc much faster than standard CD-ROM drives. DVDs require a special player (see Figure IB . 14). M any DVD players, how ­ ever, can play audio, data, and DVD discs, freeing the user from purchasing dif ­ ferent players for each type of disc. D VD drives are now standard equipment on many new personal computers. Users not only can install programs and data from their standard CDs, but they also can watch movies on their personal computers by using a DVD. FIGURE 1B. 13 Software nakers commonly sel Oier productson CDbecauseof the dsc's high storage capaoty. Software Brings the Machine to LifeThe ingredient that enables a computer to perform a specific task is software , which consists of instructions. A set of instructions that drive a computer to per ­ form specific tasks is called a program. These instructions tell the machine’s phys ­ ical components what to do; without the instructions, a computer could not do anything at a ll. When a computer uses a particular program, it is said to be run ­ ning or executing that program. Although the array of available programs is vast and varied, most software falls into two major categories: system software and application software. ONLINE FormoreInformation on computersoftware, visit http://www. mhhe. com/ petemorton 32 Chapter 1 System SoftwareSystem software is any program (hat controls the computer’s hard ­ ware or that can be used to maintain the computer in some w ay so that it runs more efficiently. There are three basic types of system software:  » An operating system tells the computer how to use its own com* poncnts. Examples of operating systems include Windows, the Mac intosh Operating System, and Linux (see Figure IB . 15). An operating system is essential for any computet; because it acts as an interpreter between the hardware, application programs, and the usee When a program wants the hardware to do something, it communicates through the operating system. Sim ilarly, when you want the hardware to do something (such as copying or printing a file), your request is handled by the operating system. A network operating system allows omputers to communicate and share data across a network while controlling network op* erations and overseeing the network’s security. A u tility is a program that makes the computer system easier to use or performs highly specialized functions (see Figure IB . 16). U tilities arc used to manage disks, troubleshoot hard* ware problems, and perform other tasks that the operating sys ­ tem itself may not be able to do.  »  » FIG U RE 1B. 14 DVDplayersare now standardon many PCsand are foundin marryhome enterta inmentcentos. Application Software Application software tells the computer how to accomplish specific tasks, such as word processing or drawing, for the user.Thousands of applications are available for many purposes and for people o f all ages. Some of the major categories of these applications include  »  » Word processing software for creating text-based documents such as newsletters or brochures (see Figure IB . 17). Spreadsheets for creating numeric-based documents such as budgets or bal ­ ance sheets. FIG U RE 1B. 15 Windowsis Ihe mostpopular cf aS PC operatingsystems, runningonabout BagiEBEBBjBSi 90 percentof al personalcomputers. Introducing Computer Systems 33 Urheberrechtlich geschutzles M «  » Database management software for building and manipulating large sets of data, such as the names, addresses, and phone numbers in a telephone directory.Presentation programs for creating and presenting electronic slide shows (see Figure 1B. 18). Graphics programs for design ing illus ­ trations or manipulating photographs, movies, or animation. Multim edia authoring applications for building digital movies that incorporate sound, video, anim ation, and interactive features. Entertainment and education software, many of which are interactive multime ­ dia events.  »  »  »  » FIGURE 1B. 16  » Web design tools and Web browsers, and other Internet applications such as newsreaders and e-mail programs.  » Games, some o f which arc for a single player and many of which can be played by several people over a network or the Internet.Thereare hundreds of utility programs available forpersonal computers. This one. caled ParttlonMagic, helps you manage jour hard cfisKto getthe most from it Computer Data You have already seen that, to a computer, data is any piece of information or fact that, taken by itself, may not make sense to a person. For example, you might think of the letters of the alphabet as data. Taken individually, they do not mean a lo t. But when grouped into words and sentences, they make sense; that is, they become information (see Figure IB . 19). Sim ilarly, basic geometric shapes may not have much meaning by themselves, but when they arc grouped into a blueprint or a chart, they become useful information. n o * a  « ‘ – f o lflJJ e†¢ IS*H*M  »*a* n o t – * *†¢- t *-†¢* jlK  » z j* / u-*-ai-:. *— . ; – f t ir – V * ‘* – * n, i. 4r  »  ¦ ~ { _ k___ _ l l 1 I FIG U RE 1 B. 1 ? Word processing software s designed (or creating documentsthatconsistprimarily of text, but also lets youadd graphcs and sounds to your documents. It also provides layout features that letyou create brochures. newsletters,Web pages, and mom . 34 Chapter 1 M i 3 —  « I H w fcn  «h Haw*M**AH «a4 «M* M M ptflw W lM A to A M Ih m k B m V Dmm*mS. xa NvMrHtwMMk  ¦ M r itM m i l « h  » M ld  »  »  »  « * llh i » ^ f c n 1 ilfilw >  » à ¢â‚¬â€ n TW  « t iW * *  » lW fa m i w d p u l— n le y— d w t ‘t i i w l a Ml  ¦M l  ¦ ‘*  ¦ * -1________________________B lw f lja ! ______ ‘‘  ¦; ! .. C uitrom A K lM M T . U . ATTOOCTBATLAW 1002 AIMMBSB8ZT sunu;,iL4nw C i A Urheborrechtlich geschOtztes M FIGURE 1B. 18 :: T oil rtyt Sj ;fca f Presentation software is mostoften used torcreating sales presentations,aXtvxjgh I can be effectivetorany typeol electronicside show.  « H i n ^ X iM ; . i W h;i; :' V! J i 1 jwufinm :. ^  ¦ H o? drrnfi! ^Viis,-S* The Keyboard The Mouse Variants of the Mouse Ergonomics and Input Devices Lesson 2B: Inputting D ata In O ther W ays  »  »  » Devices for the Hand Optical Input Devices Audiovisual Input Devices LESSON v m Overview: T he K eyboard an d M ouseIf you think of the CPU as a computer’s brain, then you might think of the input devices as its sensory organs—the eyes, ears, and fingers. From the user’s point o f view, input devices are just as important as the CPU, perhaps even more important. After you buy and set up the com* putcr, you may take the CPU for granted because you interact directly with input devices and only indirectly with the CPU. But your ability to use input devices is critical to your overall success with the whole system. An input device docs exactly what its name suggests: it enables you to enter information and commands into the computer. The most com* monly used input devices arc the keyboard and the mouse.If you buy a new personal computer today, it w ill include a keyboard and mouse un ­ less you specify otherwise. Other types of input devices arc available as well, such as variations of the mouse and specialized †alternative† input devices such as microphones and scanners. This lesson introduces you to the keyboard and the mouse. You w ill learn the importance of these devices, the way the computer accepts input from them, and the many tasks they e nable you to perform on your PC. Using the Keyboard and Mouse OBJECTIVES :: > Identity the five key groups on a ; †¢ standard computer keyboard. > Name six special*purpose keys found on all standard computer keyboards.  » List the steps a computer follows when accepting input from a keyboard. Describe the purpose of a mouse and the rote it plays in computing.  » Identify the five essential techniques for using a mouse.  » Identify three common variants of the mouse.  » Describe five steps you can take to avoid repetitive stress injuries from computer use. Urheberrechtilch g eschutztes Material The Keyboard O N L IN E For mote information on computer-based keyboard tutooals, vs* http://wvrw. mhho. com/ petemortoa The keyboard was one of the first peripherals to be used with computers, and it is still the primary input device for entering text and numbers. A standard keyboard includes about 100 keys; each key sends a different signal to the CPU.If you have not used a comp uter keyboard or a typewriter, you w ill learn quickly that you can use a computer much more effectively if you know how to type. The skill of typing, or keyboarding, is the ability to enter text and numbers with skill and accuracy. Certainly, you can use a computer without having good typing skills. Some people claim that when computers can interpret handwriting and speech with 100 percent accuracy, typing w ill become unnecessary. But for now and the foreseeable future, keyboarding remains the most common way to enter text and other data into a computer: The Standard Keyboard Layout O N L IN E For more miormaiion on computer keyboards and keyboard manufacturers, visit http://www. mhhc. com/ petemortal Keyboards come in many styles.The various models differ in size, shape, and feel; except for a few special-purpose keys, most keyboards arc laid out almost identi ­ cally. Among IBM-compatible computers, the most common keyboard layout is the IBM Enhanced Keyboard. It has about 100 keys arranged in five groups, as shown in Figure 2A. 1. (The term IBM-compatible computer refers to any PC based on the first personal computers, which were made by IBM . Today, an IBMcompatible PC is any PC other than a Macintosh computer. ) The Alphanumeric Keys The alphanumeric keys—(he area of the keyboard that looks like a typewriter's keys—are arranged the same way on almost every keyboard.Sometimes this com ­ mon arrangement is called the Q W ERTY (pronounced KWER-tcc) layout be ­ cause the first six keys on the top row of letters are Q, W, E , R , T, and Y. Along with the keys that produce letters and numbers, the alphanumeric key group includes four keys having specific functions. The t a b , CAPS LOCK, ba c k  ­ spa c e , and e n t e r keys are described in Figure 2A. 2. FIGURE 2A . 1 Most BM com pattie PCs use a keyboard like M s one. Mar/ keyboards feature a number of specialized keys, am)keyboardscan vary in size and shape. But nearly e l standard P C keyboards include the keys shewn here. The Modifier Keys The SHIFT, ALT (Alternate), and CTRL (Control) keys are called modifier keys be ­ cause they modify the input of other keys.In other words, if you hold down a modifier key while pressing another key, then you are changing the second key's Alphanum keys eric 50 Chapter 2 Theto key m ovesyouto predefined tabstops In m applicationprogram any s (suchas wordprocessors). Thebackspace keyerases characters youhavejusttyped. Forexam ina ple, word processingprogramyoucan press baosmce to â€Å"backover† an Incorrect character anddelete it Thecaps lock keylets you†lock* the alphabetkeys sotheyproduceonly capital letters. The ehter key letsyou finalize dataentry inm typesof appBcatkmprogram any s. Ybualso can usewtw tocboosecom ands m andoptionsin m program and at any s various places in anoperatingsystem's Interface. FIGURE 2A . 2 nput in some way. For example, if you press the Jtkcy, you input a small letter/. ‘ B ut if you hold down the sh u t key while pressing the J key, you input a capital /. M odifier keys arc extremely useful bccausc they give all other keys multiple ca ­ pabilities. Figure 2A. 3 describes the modifier keys and their uses. Functionsofthe tab,catsloo. v o s ta , andtwin keys The Numeric Keypad The numeric keypad is usually located on the right side of the keyboard, as shown in Figure 2A. 1. The numeric keypad looks like a calculator's keypad, with its 10 digits and mathematical operators (+, -, *, and Whenpressedalong with analphanumerickey,smft forcesthe /).The numeric keypad also features a NUM computerto outputa capital letterorsymbol sun is also a LOCK key, which forces the numeric keys to in ­ m ocfifierkey in someprogram forexam youcan presssnft s; ple, put numbers. When NUM LOCK is deactivated, alongwtthcursor-m ovem keys toselect textforediting. ent the numeric keypad's keys perform cursormovement control and other functions. The Function Keys The function ke ys, which are labeled F l, f l, and so on (as shown in Figure 2A. 1), are usu ­ ally arranged in a row along the top of the key ­ board. They allow you to input commands without typing long strings of characters or navigating menus or dialog boxes. Each func ­ tion key's purpose depends on the program you are using. For example, in most programs, F l is the help key. When you press it, a special window appears to display information about = OnThecm (control) key producesdifferent results dependingonthe programyouare using. In m Windows-based program any s, cm-key combinationsprovideshortcuts for m com ands. Forexam the enu m ple, combinationcnuo enables youto open a newfile. n Them j (mjcmmu) keyoperates Skethectrl key,but producesa different set of results. In Windowsprogram Mi-key s. combinations enableyouto navigate m enus anddialog boxeswithoutusingthe m ouse. FIGURE 2A . 3 Fuvtionsoftheshft, emuanda lt keys. Interacting with Your Computer 51 the program you are using. Mos t IBM-compatible keyboards have 12 function keys. Many programs use function keys along with modifier keys to give the func ­ tion keys more capabilities. The Cursor-Movement KeysMost standard keyboards also include a set of cursor-movcmcnt keys, which let you move around the screen without using a mouse. In many programs and op* erating systems, a mark on the screen indicates where the characters you type w ill be entered. This mark, called the cursor or insertion point, appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line. Figure 2A. 4 describes the cursor-movcmcnt keys and Figure 2A. 5 shows an insertion point in a document window. Special-Purpose Keys In addition to the five groups of keys described earlier, all IBM*compatible key ­ boards feature six special-purpose keys, each of which performs a unique func ­ tion. Figure 2A. describes these spccial-purposc keys. Since 1996, nearly all IBM-c ompatible keyboards have included two additional special-purpose key’s designed to work with the Windows operating systems (see Figure 2A. 7):  » start . This key, which features the Windows logo (and is sometimes called the Windows logo key), opens the Windows Start menu on most computers. Pressing this key is the same as clicking the Start button on the Windows taskbar. s h o r t c u t . This key, which features an image o f a menu, opens an on-screen shortcut menu in Windows-based application programs.  » One of the latest trends in keyboard technology is the addition of Internet and multimedia controls.Microsoft's Internet Keyboard and MultiMedia Keyboard, for example, feature buttons that you can program to perform any number of tasks. For example, you can use the buttons to launch a Web browser, check e-mail. Depending onme program,you maybe able to press nomcto movethe cursorto the beginning ofa line and br>to moveto the endof a line. The mccu and hm o o w keys let you â€Å"flip† p * through a document, screen by screen, Hto turning the pages of a book. Press m et w to lump to the previous screen; press m gedonn to jump to the next ___ I The arrow keys move the insertion point up or down a single line, or left or right one character space. FIGURE 2A . 4 The airsor-movement keys. FIGURE 2A . Thecursor, orinsertionpoW, shews wherethenextletter typedwit appear. 52 Chapter 2 The cursor, o r insertion point, in a document eberrechtlich M The(softkey's functiondependsonyour programoroperatingenvironment Typically, the csckeyis usedtoâ€Å"backup†onelevel in a multilevel environm ent. ThenmT scREBtkey sRom the user10 s capture whatever b shownon thescreen as anim Thiskeydoes notwork with al age. program s. In som programs,scrou. lockcauses the e cursorto remainstationary onthescreen, andthe document'scontentsm aroundIt. ove Thiskeydoesn'tfuncttonatal in som program e s. In som programs,themuse key can b e e usedtostopa co m In progres s. m and 1 5 M i I I I | ? :. a . 5 is  ¦Bill r I I* J†TheM keyBatches som programsfrom SEm e Insert m ode† (in wtiich textis inserted into thedocum at the cursor) toâ€Å"overtypem ent ode (in whichnewtextis typodover existingtext), andvice vena. m —N A 4 f I 6 ‘ m n ?  » 6 a [? | 3 i* J removesonecharacterat a time at thecursor's location, cam erases characterstothe right otthecursor. FIGURE 2A . 6 SpecU jwpose keysonm standard ost keyboards FIGURE 2A . 7 ThosafiT keyandtheatofiran toy appear frequencyontherwwer keytnordsthat are sdldwAhWndcMiS' basedcom puters. 2Z and start your most frequently used programs. Multimedia buttons let you control the computer’s CD-ROM or DVD drive and adjust the speaker volume. Many key* board makers offer such features on newer models (see Figure 2A. 8). How the Computer Accepts Input from the KeyboardYou might think the keyboard simply sends the letter of a pressed key to the computer—after all, that is what appears to happen. Actually, the process of ac ­ cepting input from the keyboard is more complex, as shown in Figure 2A. 9. When you press a key, a tiny chip called the keyboard controller notes that a key has been presxd. The keyboard controller places a code into pan of its memory. Interacting with Your Computer 53 B i f a ‘S Q ill FIGURE 2A. 8 called the keyboard buffer, to indicate which key was pressed. (A buffer is a tem ­ porary storage area that holds data until it can be processed. ) The keyboard con ­ commonplace on newer keyboards. roller then sends a signal to the computer's system software, notifying it that something has happened at the keyboard. Q A key is pressed onthe keyboard When the system software receives the signal, it determines the appropriate response. When a keystroke has occurred, the system reads the Q Thesystemsoftwareresponds to memory location in the keyboard He Interruptby reading thescan code fromthe keyboardbuffer. buffer that cont ains the code of the key that was pressed. The sys ­ K EYBO RD A SYSTEM tem software then passes that BUFFER SOFTWARE code to the CPU. 0 The keyboard controler e The keyboardcontroller The keyboard buffer can store Q The system software sends an interrupt sendsDiescan code passes the scan code many keystrokes at one time.This request to the forthe key tothe tothe CPU capability is necessary because keyboardbuffet system software. some time elapses between the pressing of a key and the com ­ FIGURE 2A. 9 puter’s reading of that key from the keyboard buffer. W ith the key ­ How Input is recawd from the keyboard strokes stored in a buffer, the program can react to them when it is convenient. O f course, this all happens very quickly. Unless the computer is very busy handling multiple tasks, you notice no delay between pressing keys and seeing the letters on your screen. In some computers, the keyboard controller handles input from the computer's keyboard and mouse and stor es the settings for both devices.One keyboard set ­ ting, the repeat rate, determines how long you must hold down an alphanumeric key before the keyboard w ill repeat the character and how rapidly the character is retyped while you press the key. You can set the repeat rate to suit your typing speed. (You w ill learn how to check your keyboard’s repeat rate in the lab exer ­ cises at the end of this chapter. ) internet and muftmeda features are The Mouse A personal computer that was purchased in the early 1980s probably included a keyboard as the only input device. Today, every new PC includes a pointing dcvicc as standard equipment, as shown in Figure 2A. 10. Full-size PCs usually include a mouse as the pointing dcvicc.A mouse is an input dcvicc that you can move around on a flat surface (usually on a desk or keyboard tray) and controls the pointer. The pointer (also called the mouse pointer) is an on-screen object, usually an arrow, that is used to select text; access m enus; and interact with programs, files, or data that appear on the screen. Figure 2A. 11 shows an example of a pointer in a program window. FIGURE 2A. 10 Most modern personal computers are eqlipped w ti a mctse. 54 Chapter 2 The mechanical mouse is the most common type of pointing de ­ vice. A mechanical mouse contains a small rubber ball that proW trades through a hole in the bottom of the mouse's. case (see Figure 2A. 12). The ball rolls inside the case when you move the mouse around on a flat surface.Inside the mouse, rollers and sensors send signals to the computer, telling it the distance, direction, and speed of the ball's motions (see Figure 2A. 13). The computer uses this data to position the mouse pointer on the screen. Another popular type of mouse, the optical mouse, is nonmechanical. This type of mouse emits a beam of light from its underside; it uses the light's reflection to judge the distance, direction, and speed of its travel (see Figure 2A. 14). The mouse offers two main benefits. First, the mouse lets you position the cur ­ sor anywhere on the screen quickly without using the cursor-movement keys. You simply move the pointer to the on ­ Rdlers screen position you want and press the mouse button; the cursor appears at that location.Second, instead of forcing you to type or issue commands from the key ­ board, the mouse and mouse-based operating systems let you choose com ­ mands from easy-to-use menus and dialog boxes (see Figure 2A. 15). The result is a much more intuitive way to use computers. Instead of remembering obscure command names, users can figure out rather easily where com ­ mands and options arc located. FIG U R E 2A. 11 Anexam ola pointeras it m ple ight appearona com puterscreen. ^ o r ^ f f c iN E For m Inform ore ationonm ice andm ousemanufacturers,vsil http://www. mhhe. com/ petemoiton. FIGURE 2 A . 1 2 Thepartsofa mechanical m ouse,seen fro Vieb m m otto . NortO N L IN E Formoreformation onoptical mice, visit h ttp://wvrw. mhhe. com/ petemorion Q Whenthe mouse mom†¦ ^ †¦ he rolling mouse bail spins me rollers Q Thertormafa i from the spinning roMereIs sent to the system software,wNcti controls the pointer. FIGURE 2A. 13 H them ow ousecontrolsthepointer. Interacting with Your Computer 55 1 Urheberrechtlich geschi i: FIGURE 2A. 14 The underside ol anoptical mouse. If you use a drawing program, you can use the mouse to crcatc graphics such as lines, curves, and freehand shapes on the scrccn. The mouse has helped establish the com* purer as a versatile tool for graphic designers, starting w hat has since bccome a revolution in the graphic de* sign field. Using th e Mouse For more MormaUcn on mouse techniques, w sl http://www. mhhe. com/ petemortonYou use a mouse to move the pointer to a location on the screen, a process called pointing. Everything you do with a mouse is accomplished by com bining point ­ ing w ith these techniques:  » Clicking  » Double-clicking  » Dragging à ‚ » Right-clicking :: FIGURE 2A. 15 Using the mouse to choose a command Irom a menu. r*e Cdt ym ?e «xh ? o fcsownarks Ctrl+N ( New U*vn)4lCir SVQctow N&† *I Ofwn Web Location†¦ CtrHSMt+l Qpen Fie†¦ 0 SM CblfO Qrl+W OrM-S CdtPaga Send Page†¦ OrUâ‚ ¬ Q rffP Print P is WoifcCffine _  » fe t Q jW } 1 Pointing means pushing the mouse across your desk. O n the scrccn, the pointer moves in relation to the mouse (see Figure 2A. 16).Push the mouse forward, and the pointer moves up. Push the mouse to the left, and the pointer moves to the left. To point to an ob ­ ject or location on the scrccn, you simply use the mouse to place the pointer on top of the object or location. The mice that come w ith IBM-compatible computers usually have two buttons, but tech ­ niques such as clicking, double-clicking, and dragging arc usually carried out w ith the left mouse button (see Figure 2A. 17). In m ulti ­ button mice, one button must be designated :: FIGURE 2A. 16 Usi ng the mouse to control the on-screen pointer. The pointer moves in relation tothe mouse's movements. 56 Chapter 2 Urheberrechthch geschutztes Ma s the â€Å"primary† button, re ­ InWindows and m any The left mouse button Windows programs, the ferred to as the mouse button. is usualy the primary right mouse button Some mice can have three or button. can be used in more buttons. The buttons' manyways, too. uses arc determined by the computer's operating system, application software, and mouse-control software. To click an item w ith the mouse, you move the pointer to the item on the scrccn. When the pointer touches the object, quickly press and release the primary mouse button once â€Å"d c k † {see Figure 2A. 18). Clicking— or single-clicking, as it is also called— is the most important mouse action. To select any object on the screen, such as a menu, com mand, or button, you click it.Double-clicking an item means pointing to the item with the mouse po inter and then pressing and releasing the mouse button twice in rapid succession (see Figure 2A. 19). Double-clicking is prim arily used with desktop objects such as icons. For example, you can double-click a pro ­ †¢click click† gram's icon to launch the program. Dragging an item means positioning the mouse pointer over the item, pressing the primary mouse button, and holding it down as you move the mouse. As you move the pointer, the item is â€Å"dragged† along with it across the scrccn (see Figure 2A. 20). You can then drop the item in a new position on the screen. This technique is also called drag-and-drop editing, or just drag and drop. Dragging is a very handy tool.In a wordprocessing program, for exam ­ -and release the button ple, you can drag text from one Hold down the when you finish dragging. primary button 4 location to another in a docu ­ a s you move ment. In a file-managemcnr th e m o u se.. program, you can drag a docu ­ ment's icon and d rop it onto a printer's icon to print the docu ­ ment. W indows and many W in ­ dows programs support rightclicking, which means pointing to an item on the screen, then pressing and releasing the right mouse button (see Figure 2A. 21). Right-clicking usually opens a shortcut menu that contains commands and options that pertain to the item to which you arc pointing.A wheel mouse has a small wheel nestled among its but ­ tons (see Figure 2A. 22). You can use the wheel for various purposes, one o f which is scrolling through long docu ­ ments. N ot all applications and operating systems support the use o f the wheel. FIGURE 2A. 17 Standardbutton configuration ona tw obuttonmouse. FIGURE 2A. 18 Clicking a mouse. FIGURE 2A. 19 DoUbie-dlcWnga mouse. FIG URE 2A. 20 Bragging with a mouse. FIG URE 2A. 21 RiQht-dictonga mouse. Interacting with Your Computer 57 U rheberrechtlich g esch u tz tes al Nor Mouse Button Configurations m IN E For m tatorm ore atJononthecare andusageofrrtce. v isit http://www. mhhe. com/ pctemorton FIGURE 2A. 22 Avrfieel mouse.The mouse usually sits to the right of the keyboard (for right-handed people), and the user maneuvers the mouse with the right hand, pressing the left button with the right forefinger. For this reason, the left mouse button is sometimes called the primary mouse button. If you are left-handed, you can configure the right mouse button as the primary button (as shown in Figure 2A. 23). This configuration lets you place the mouse to the left of the keyboard, control the mouse with your left hand, and use your left fore* finger for most mouse actions. Newer mice enable you to configure buttons to perform different tasks than clicking. You might configure a button to delete selected text, for ex ­ ample, or to open a program that lets you search for files.Such settings may lim it the usefulness of the mouse but can be helpful if you need to perform a certain task many times. m 3 MW^waau^MOUl Variants of the Mouse Althou gh the mouse is a handy tool, some people do : MMbi not like using a mouse or have difficulty maneuvering 1(0* one. For others, a mouse W D i W tfW w : requires too much desktop jo* space—a real problem when you are not working at a deskl Uw aJi | tM For these reasons and others, hardware makers have developed devices that Cm * k 1 m * 1  « duplicate the mouse's func ­ tionality but interact with the user in different ways. The primary goals or these â€Å" mouse variants'* are to provide case of use while taking up less space than a mouse.They all remain sta ­ tionary and can even be built into the keyboard. Trackballs A trackball is a pointing device that works like an upside-down mouse. You rest your index finger or thumb on an exposed ball, then place your other fingers on the buttons. To move the pointer around the screen, you roll the ball with your in ­ dex finger or thumb. Because you do not move the whole device, a trackball re ­ quires less space than a m ouse. Trackballs gained popularity with the advent of laptop computers, which typically are used on laps or on small work surfaces that have no room for a mouse. Trackballs come in different models, as shown in Figure 2A. 24.Some track ­ balls are large and heavy with a ball about the same size as a cue balL Others are much smaller. Most trackballs feature two buttons, although three-button models http://www. mhhe. com/ pctemorton 58 Chapter 2 Urheberrechlllch geschOtztes Ma SELF-CHECK :: Circle the correct answer for each question. 1. Themost com onkeyboard layout hasabout this manykeys. m a. 10 a. s t/ h i k e y h. 100 b. sh o rtc u t k e y c. 110 c. a lte rn a je key IB il 2. Wfochspecial keyboardkey has a picture of theWindows logoonit? 3. Most full-si2e PCs feature oneof these as the pointingdevice. a. Keyboard b. Mouse c. Scanner † p w | are also available. Trackball units also are available in right- and left-handed models. TrackpadsThe trackpad (also called a touchpa d) is a stationary pointing device that many people find less tiring to use than a mouse or trackball. The movement of a finger across a small touch-sensitive surface is translated into pointer movement on the computer screen. The touch-scnsitivc surface may be only 1. 5 or 2 inches square, so the finger never has to move far. The trackpad's size also makes it suitable for a notebook computer. Some notebook models feature a built-in trackpad rather than a mouse or trackball (sec Figure 2A. 25). Like mice, trackpads usually are separate from the keyboard in desktop com ­ puters and are attached to the computer through a cord.Some special keyboards feature built-in trackpads. This feature keeps the pad handy and frees a port that would otherwise be used by the trackpad. Trackpads include two or three buttons that perform the same functions as mouse buttons. Some trackpads arc also â€Å" strike sensitive,† meaning you can tap the pad with your fingertip instead of using its b uttons. FIGURE 2A. 24 Trackballscomeinm shapes and any sires. Form infcxm on ore ailon tracl; ad andintegrated p s porting devces. vis* http://www. mhhe. com/ petemorton Pointers in the Keyboard Many portable computers now fea ­ ture a small joystick positioned near the middle of the keyboard, typically between the G and H keys.The joy ­ stick is controlled with either fore ­ finger, and it controls the movement of the pointer on screen. Because users do not have to take their hands off the keyboard to use this device, they can save a great deal of time and effort. Two buttons that per ­ form the same function as mouse buttons are just beneath the space ­ bar and are pressed with the thumb. Several generic terms have emerged for this device; many manu ­ facturers refer to it as an integrated FIGURE 2A. 2S Trackpad Soma notebookcomputersanddesktop keyboardsfeatire a buiK-intraefcpod Interacting with Your Computer 59 M , I Pmdunthvily Tip Saving Tim e With Keyboard Shortcu tsIn the 1980s, as programmers began packing more features into PC software, they also developed ways for users to is ­ sue an ever-increasing number of commands. Software packages came with long lists of commands, all of which had to be entered at the keyboard. (This was before the mouse came into common use. ) As a result, the computer keyboard rapidly became a valuable tool. Programmers began devising keyboard shortcuts that allow users to issue commands quickly by typing a short combination of keystrokes. Keyboard shortcuts involve using a modifier key (such as aut or cm. ) along with one or more alphanumeric or function keys. To print a document in many applications, for example the user can press ctri+p.Function keys also became important The Fl key, for ex ­ ample, became the universal way to access online help. IBMcompatible computer keyboards originally had 10 function keys; eventually the number of function keys was expanded to 12. Another common type of keyboard short cut involves pressing the a u key to access a program's menu system. When running any Windows program, you can press alt to activate the menu bar, and then press a highlighted letter in a menu's name to open that menu. Stilt a keyboard can hold only so many keys, and the lists of keyboard shortcuts became unmanageable. A single program could use dozens of â€Å"hotkeys,† as these shortcuts were called. If you used several programs, you had to learn different shortcuts for each program.Finally, the Common User Access (CUA) standard led to the standardization of many commonly used hotkeys across different programs and environments. With this standard for commonly used hotkeys, users have fewer hotkeys to remember. Despite such standards, pointing devices (such as the mouse) came along none too soon for hotkey-weary com ­ puter users. Microsoft Windows and the Macintosh operating system gained popularity because of their easy-to-use, mouse-oriented graphical interfaces. By ope rating the mouse, users could make selections visually from menus and dialog boxes. Emphasis rapidly began shifting away from the keyboard to the screen; today, many users do not know the purpose of their function keys! pointing dcvicc, while others call it a 3-D point stick.On the IBM ThinkPad line of notebook computers, the pointing device is called the TrackPoint (see Figure 2A. 26). Ergonomics and Input Devices Any officc worker w ill tell you tliat working at a desk all day can be extremely uncomfortable (see Figure 2A. 27). Sitting all day and us ­ ing a computer can be even worse. Not only docs the user's body ache from being in a chair too long, but hand and wrist injuries can result from using a keyboard and mouse for long periods. Eyes can become strained from staring at a monitor for hours. Such injuries can be extreme, threatening the user’s general health and ability to work. Much is being done to make computers easier^ safer, and more comfortable to use.Ergono mics, which is the study of the physical relationship between people and their tools—such as computers— addresses these issues. Now more than ever before, people recognize the impor ­ tance of having ergonomically correct computer furniture and using proper posture and techniques while working with computers. (The term ergonomically correct means that a tool or a workplace is designed to work properly with the human body, and thus reduces the risk of strain and injuries. ) TrackPoint : FIG U RE 2A. 26 IBM's ThinkPad computers feature the TrackPoint pointing device, and smtar donees are found in many otter portable PCs. 60 Chapter 2 Press cm+a To Toggle bold character formatting on or off for the selected or inserted ext; make letters bold or unbold Toggle italic character formatting on or off for the selected or inserted text; make letters italic Toggle underline character formatting on or off for the selected or inserted text; underline letters Oecrease font size fo r the selected or inserted text Increase font size for the selected or inserted text Remove paragraph formatting for the selected paragraph or paragraphs Remove character formatting for the selected text Copy the selected text or object Cut the selected text or object Paste text or an object Undo the last action Redo the last action c tilh Pointing, however, can slow you down. As menus and di ­ alog boxes become increasingly crowded, commands can be hard to find and their locations can be as difficult to re ­ member as keyboard shortcuts. Many computer users over ­ come these problems by using a combination of keyboard shortcuts and a pointing device. You use one hand to issue many basic shortcuts (such as cnti+f and ctrl+s) or to launch macros. A macro is a series of commands that a pro ­ gram memorizes for you. Macros enable you to issue an en ­ tire set o t commands in just a few keystrokes.Using these techniques minimizes keystrokes and leaves a hand free to use a poin ting device. The following table lists some of the shortcut keys avail ­ able in Microsoft Word. ctri-hi ctm >shift*< ct «l+shih+> CTRi+o ctri+smcebar cm -K ctri+x ctri+y ctri+z ctrl+ y Repetitive Stress Injuries The field of ergonomics did not rcccivc much attention until a ccrtain class o f in ­ juries began appearing among clerical workers who spend most o f their time en ­ tering data on computer keyboards. These ailments are called repetitive stress injuries (RSIs) or repetitive strain injuries and result from continuously using the body in ways it was not designed to work.One type of RSI that is especially well documented among computer users is carpal tunnel syndrome, a wrist or hand in ­ jury caused by using a keyboard for long periods of time. W C IW E For moreinformationon ergonomics andavok&ig computer-relatedinjuries, v a i http://www. mhhe. conj/ petemorton FIGURE 2A. 27 Experience showslhat office worftcan pose speofc healti risks. Interacting with Your Compu ter 61 Urheberrechtlich geschulzles M Transverse Cross Section of NormalW rit! FlexorTendons and Sheath . † :â„ ¢ . Inflamed Inflamedtendon sheath presses against median nerve carpal?. : : * Bones FIGURE 2A . 2 8 Carpel tunnel syndrom affectsthe e nervesrunningthroughthe carpal tunnel of thewrist. The carpal tunnel is a passageway in the wrist through which nerves pass (see Figure 2A. 28).In carpal tunnel syndrome, tendons in the tunnel bccome inflamed because the victim has held his or her wrists stiffly for long periods, as people tend to do at a keyboard. When the tendons become inflamed, they press against the nerves, causing tingling, numbness, pain, or the inability to use the hands. Carpal tunnel syndrome is the best-known repetitive stress injury. It can become so de ­ bilitating that victims can miss weeks or months of work. In extreme cases, surgery is required. Avoiding Keyboard-Related Injuries If you use a computer frequently, you can avoid RSIs by adopting a few good work habits, and by making sure that your hardware and workspace are set up in an ergonomically friendly way. At Jssue Com puter Voting— Is It a Good Thing?The dispute over electronic voting is as heated as a debate between presidential candidates. The risks versus the bene ­ fits are discussed, investigated, and argued. But what are the facts that lie beneath the fuss? The key function of an electronic voting system is to ob ­ tain voter preferences and report them—reliably and accu ­ rately. Some assert that electronic systems are safer than other methods of voting because they implement security checks and audit trails, and are tougher to tamper with than paper ballots. One of the most widely used electronic voting systems. Diebold Election Systems (http://www. diebold. com/ dieboldes/accuvote_ts. tm), boasts some 33,000 voting stations in locations across the United States. Dieboltfs AccuVote-TS system is a voter-activated interactive touch ­ scre en system using an intelligent Voter Card as the voter interface. The interface allows voters to view and cast their votes by touching target areas on an electronically gener ­ ated ballot pad. Each unit provides a direct-entry computerized voting station that automatically records and stores ballot infor ­ mation and results. While classified as a direct record entry (ORE) device, the AccuVote-TS system has additional capa ­ bilities. The tabulator is a multifunctional interface that counts and abulates the ballots at precincts on election day and communicates with the host computer at Election Central for accurate and timely jurisdictionwide results. However, electronic voting systems have generated con ­ cern because their work is not readily accessible for inspec ­ tion; what goes on behind the screen is a mystery to the general public and therefore causes uneasiness. With com ­ puter voting, voter records are intangibly stored on a hard drive, with voting results re corded in electronic memory. Indeed, a July 2003 analysis of the Diebold touch screen by computer researchers from Johns Hopkins and Rice uni ­ versities (found at http://www. newscientist. oin) showed that the software was riddled with errors and open to fraud. However, even with the possibility of fraud, electronic 62 Chapter 2 Urheberrechllich oesch When setting up your computing workspace, make it a prior ­ ity to choose a comfortable, ergonomically designed chair (sec Figure 2A. 29). Your office chair should  »  »  » Allow you to adjust its height. Provide good lower-back support. Have adjustable armrests. Your desk also should be well-suited to computer use, like the one shown in Figure 2A. 30. The desk should hold your key ­ board and mouse at the proper height, so that your hands are at the same height as your elbows (or a few inches lower) when you hold them over the keyboard.Here arc some other tips that can help you avoid RSIs while working with your keyboard and mouse:  » Use an Ergonomic Keyboard. Traditional, flat keyboards arc not well-suited to the shape of human hands. An ergonomic keyboard allows you to hold your hands in a more natural position (with wrists straight, rather than angled outward) while typing (see Figure 2A. 31).  » Use a Padded Wrist Support. If you type a lot, a wrist support can be helpful by allowing you to rest your hands comfortably when you are not actually typ ­ ing. Remember; however, that FIGURE 2A. 29 Anergonom ically designedcom puter chairanddesk. FIGURE 2A. 30 A propertydesignedcom puterdesk featuresa Udl-insfieB or traytohoWffw keyteard andm ouse. ystems may still be safer than prior methods of voting be ­ cause they implement redundant security checks and audits and may be more difficult to tamper with because of the size and nature of their tabulating components. Another argument in favor of paper ballots, or at least paper receipts, is that in order to verify an election, all you need to d o is gather up the ballots and tabulate them a sec ­ ond (or third, as the case may be) time. However, auditing paper ballot systems is not always as easy as it sounds. Bal ­ lots, particularly punch-cards, sometimes provide ambigu ­ ous results, as seen in a recent presidential election. They are easily forged and they must be physically handled and transported, which provides the opportunity for substitu ­ tion or loss.Whether computerized or traditional, no election system is infallible, and in truth, perhaps it doesn't need to be. As some have said, every safe has the capability to be cracked. The same is true for voting systems. The issue is not whether they are 100 percent secure, but whether they pre ­ sent adequate safeguards to give us faith in the integrity of our elections. n Interacting with Your Computer 63  »  »  »  » you should never rest your wrists on anything—even a comfortable wrist support—while you type. Use the support only when your fingers are not moving over the keyboard. Keep Your Wrists Straight. When typing, your hands should be in a straight line with your forearms, when viewed either from above or from the side (see Figure 2A. 32).Keeping the wrists bent in cither direction can cause mus de fatigue. Sit Up Straight. Avoid slouching as you type, and keep your feet flat on the floor in front of you. Avoid crossing your legs in front of you or under your chair for long periods. Learn to Type. You w ill use the keyboard more efficiently and naturally if you know how to type. If you M hunt and peek,† you are more likely to slouch and keep your head down while looking at rite keyboard. This tech ­ nique not only slows you down, but it leads to fatigue and stiffness. Take Frequent Breaks. Get up and move around for a few minutes each hour, and stretch occasionally throughout the day. FIGURE 2A. 31Anexam ol anergonom keyboard. ple ic FIGURE 2A. 32 Whent> in . your handsshouldbein pg & eWin yourforea rm al all tonesand n s whenviewedfromanyantfe. 64 Chapter 2 Urheberrechlllch geschutzte Review Summary ::  » A standard computer keyboard has about 100 keys.  » Most keyboards follow a similar layout, with their keys arranged in five groups. Those groups include the alphanumeric keys, numeric keypad, function keys, mod ­ ifier keys, and cursor-movement keys.  » When you press a key, the keyboard controller places a code in the keyboard buffer to indicate which key was pressed. The keyboard sends the computer a signal, which tells the CPU to accept the keystroke. The mouse is a pointing device that lets you control the position of a graphical pointer on the screen without using the keyboard.  » Using the mouse involves five techniques: pointing, clicking, double-clicking, drag ­ ging, and right-clicking.  » A trackball is like a mouse turned upside-down. It provides the functionality of a mouse but takes less space on the desktop.  » A trackpad is a touch-sensitive pa d that provides the same functionality as a mouse. To use a trackpad, you glide your finger across its surface.  » Many notebook computers provide a joystick-like pointing device built into the keyboard. You control the pointer by moving the joystick.On IBM systems, this de ­ vice is called a TrackPoint Generically, it is called an integrated pointing device.  » Continuous use of a keyboard and pointing device can lead to repetitive stress injuries.  » The field of ergonomics studies the way people use took. This study leads to bet ­ ter product designs and techniques that help people avoid injuries at work.  » Ergonomically designed keyboards are available to help users prevent repetitive stress injuries to the wrists and hands. Key Terms :: alphanumeric key, 60 buffer, 54 carpal tunnel syndrome, 61 click, 57 cursor, 52 cursor-movement key, 52 double-clicking, 57 drag and drop, 57 drag-and-drop editing, 57 dragging, 57 ergonomics, 60 function key. 51 insertion point 52 integrated pointing device. 9 keyboard buffer, 54 keyboard controller, 53 keyboarding, 50 mechanical mouse, 55 modifier key, 50 numeric keypad, 51 optical mouse, 55 pointer, 54 pointing, 56 pointing device. 54 repeat rate, 54 repetitive stress injury (RSI), 61 right-dicking, 57 trackpad, 59 TrackPoint 60 wheel mouse, 57 Interacting with Your Computer 65 Urheberrechtlich g esch u tztes M « | tLg §g @ 8 0 K ey Term Quiz :i Review Complete each statement by writing one of the terms listed under Key Terms in each blank. 1. In computer use, the skill of typing is often referred to as 2. IBM -com patible PCs have 10 or 1 2______________ keys. . 3. In many programs, an on-screen symbol called a(n )___________ or a(n )____________ shows you where you are in a document 4.A(n) is a temporary storage area that holds data until the CPU is ready for it. 5. In addition to pointing, the four primary mouse techniques are and___________ _ 6. You use a mouse (or one of its variants) to position a (n )_____ 7. In many Windows applications, you can open a shortcut menu by. on the screen. ______ the mouse. 8. Many laptop computers feature a small joystick between the c and k keys, which is called a(n) a(n )———-9. is the study of the way people work with tools. 10. _____ is a common type of repetitive stress injury among computer users. Multiple Choice is Circle the word or phrase that best completes each statement. 1.Some people claim that when computers can interpret handwriting and speech with 100 percent accuracy, this will become unnecessary. a. mice a. special-purpose keys b. typing b. function keys c. pointing device c. typing keys †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ – – layout. d. special-purpose keys d. alphanumeric keys d. QWERYT d. iadsmce 2. These keys make up the part of the keyboard that looks like a typewriter's keys, 3. The common keyboard arrangement is called the a. QWERTY b. QEWTYR 4. Which of the following is not a modifier key? a. shift b. cm c. ait 5. In most programs, you can press this key to get help, a. csc a. keyboard a. C C S b. r l b. keyboard buffer b. f1 c . alt c . keyboard controller C. SM CEBAR d . no d. keyboard CPU d.S O T U H RCT 6. When you press a key, this device notifies the system software, 7. In many Windows applications, you can use this key as an alternative to the right mouse button. c. QYWERT 66 Chapter 2 Urheberrechtlich geschutztes Material | 8. This type of mouse uses reflected light to measure its movements. c. mechanical a. optical b. laser 9. In a multi-button mouse, one button must be designated as the c. primary a. first b. left 10. You can__ a. point to a program's icon to launch the program. b. double-click C. right-click button. d. user d. drag Review d. wheel Review Questions :: In your own words, briefly answer the following questions. 1.Host standard keyboards include five major groups of keys. List them. 2. Why are most standard keyboards called â€Å"QWERTY† keyboard s? 3. What does the ctrl key do? 4. What is the purpose of the start key, which appears on many IBM-compatible keyboards? 5. What happens when you press a key on the computer's keyboard? 6. What is the purpose of the mouse pointer? 7. How does a mechanical mouse work? 8. Describe two benefits of using a mouse. 9. What does the term dragging mean and how do you do it? 10. Describe the cause and effect of carpal tunnel syndrome. Lesson Labs :: Complete the following exercises as directed by your instructor. 1. Test your typing skills in Notepad.Click the start button, point to All Programs, click Accessories, and then dick Notepad to open the Notepad text-editing program. Notepad opens in a window. Have a classmate time you as you type a paragraph of text. The paragraph should be at least five lines long and should make sense. (For example, you could type a paragraph of text from any page in this book. ) Do not stop to correct mistakes; keep typing until you are finished typing the se lection. 2. Inspect your system's mouse settings. (Do not change any settings without your instructor's permission. ) Use the following steps: a. Click the start button to open the Start menu; then click Control Panel.The Control Panel window opens. b. Double-dick the Mouse icon to open the Mouse Properties dialog box. Click the tabs in this dialog box and inspect your settings. c. Experiment with the Pointer Speed and Show Pointer Trails tools. How do they affect your mouse's performance. When you are finished, dick Cancel Interacting with Your Computer 67 M U R B Overview: O ptions for Every N eed a n d P referen c e Although the keyboard and the mouse arc the input dcviccs that people use most often, there are many other ways to input data into a com ­ puter. Sometimes the tool is simply a matter of choice. Some users jusr prefer the feel of a trackball over a mouse.In many cases, however, an ordinary input device may nor be the best choice. In a dusty factory or warehouse, for example, a standard keyboard or mouse can be dam* aged if it becomes clogged with dirt. Grocery checkout lines would slow down dramatically if cashiers had to manually input product codes and prices. In these environments, specialized input devices tolerate extreme conditions and reduce the risk of input errors. Alternative input devices are important parts of some specialpurpose computers. Tapping a handheld computer's scrccn with a pen is a much faster way to input commands than typing on a miniature key ­ board. On the other hand, a specialized device can give new purpose to a standard system.If you want to play action-packed games on your home PC, for example, you w ill have more fun if you use a joystick or game controller than a standard keyboard or mouse. This lesson examines several categories of alternative input devices and discusses the special uses of each. You may be surprised at how of ­ ten you see these devices, and yo