Monday, September 30, 2019

Librarysystem

A PROPOSED COMPUTERIZED LIBRARY SYSTEM USING RFID FOR BARANGKA ELEMENTARY SCHOOL A Thesis Presented to the Faculty of Informatics International College Cainta, Rizal In Partial Fulfillment of The Requirements for Thesis A MEJIA, JEMWARD ALLEN M. AMERICA, EDMAN PAUL R. LUMBAO, JONALYN D. FEBRUARY 2013 TABLE OF CONTENTS THESIS APPROVAL SHEET †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦ ii ACKNOWLEDGEMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iii DEDICATION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ iv ABSTRACT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ v TABLE OF CONTENTS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. vi LIST OF FIGURES AND TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ii CHAPTER 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 Background of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Statement of the Problem †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Scope and Limitation †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Significance of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Research Hypothesis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 CHAPTER 2 EVALUATION DESIGN AND FRAMEWORK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 Theoretical Framework †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 Conceptual Framework †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦14 The Variables, their Definitions and Importance to the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 Definition of Terms †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 CHAPTER 3 RESEARCH METHODOLOGY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 18 Methods of research †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 Locale of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦20 Participants of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Sources of Data †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 Procedure of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 Design Strategy †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 25 Statistical Treatment †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 26 CHAPTER 4 RESULTS AND DISCUSSIONS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 27 CHAPTER 5 SUMMARY OF FINDINGS, CONCLUSIONS AND RECOMMENDATION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 CHAPTER 6 OUTPUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 BIBLIOGRAPHY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 130 APPENDICES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 131 CURRICULUM VITAE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦140 ACKNOWLEDGEMENT We would like to extend our gratitude to the following staff and students of Barangka Elemen tary School who helped us while working on this proposal: Ms. Lourdes Larios, Ms. Violeta Dig, Ms. Aizaleen Marcelo, Jan Bernice Reign Cruz, Arch Gabriel Tesorero, Katya Santos, Patricia Kaye Cervantes, Reylaldo Jose, Kimberlyn Gumaro, Rudelyn Dingding, Eunice Roxas, Claire Erika Samsona, Maria Angelica Ronsairo, Rica Mae Guttierez and Jim Arron Abanos.We would also like to thank our adviser, Ms. Mylene Alvaran who guided us throughout the whole process of this study. To our families who gifted us with education, the rest of our Informatics Marikina family, and last but not the least, to our Lord God. With Him all things are possible. CHAPTER 1 INTRODUCTION The library is always been a â€Å"study room† for the people especially for the students who wants to make studies and researches. We simply define library as a room or building containing a collection of books. Before the advent of omputers, libraries usually used a card catalog to index all the items inside it. For acad emic libraries, if the students want to borrow a book, they should have their library card and they should give it to the librarian for the security of the books and for special libraries you should be member of that institution, organization or association. There are three types of libraries. First public libraries, it describes as large main branch and opens to the public and it is maintained by the local authorities like National Library here in the Philippines.It has the most extensive reference collection (dictionaries, encyclopedia, indexes, historical documents of the Philippines, etc. ) and provides resources such as internet access and databases on CD-ROM. Second type of library is the College Libraries. This type is what all schools have. Sometimes it’s open to the public also and its collection reflects the academic majors and specialties of the school. Lastly, the Special Libraries, its being run by corporations, associations or governments or specialized in a par ticular subject.The existence of a library for every schools, organizations, institution and associations come with much importance, like it can be considered as a store-house of knowledge and renders a great service to the society. It plays a very important role in promoting the progress of knowledge. Foe people who love read books which also called â€Å"bookworms† but can’t afford to buy books, library is the best for them, also a best help especially for students. It is also a very useful for rural youths to spend their time reading books instead of doing evil habits such as gambling and loitering.Nowadays library has been evolving to automated library system (ALS) or also known as Library Management System (LMS). It is use to track all items inside the library and monitor who have borrowed and return books. It uses a software or program that interact with the database and has two graphical user interfaces (GUI), one for user and one for administrator. It is cost e ffective and space saving alternative to other document shelving, and addressing the need for secure and automated document and record handling. Radio-frequency technology has come far from its roots at the beginning of the twentieth  century.Russian physicist  Leon  Ã‚   Theremin is commonly attributed as having created the first RFID device in 1946 (Scanlon, 2003). While Theremin may be recognized for the first successful application of the technology, RFID has earlier roots. RFID is a combination of radar and radio broadcast technology. Radar was developed in the  U. S. in the 1920s (Scanlon, 2003). Scholars noted the relationship between electricity and magnetism, which is a foundation of radio broadcasting, at the beginning of the nineteenth century (Romagnosi, 2009).Harry Stockman wrote a seminal paper in 1948, identifying the vast amount of research and development still needed before â€Å"reflected-power communications† could be used in applications. Interest in implementing RFID in libraries is on the rise (Dorman, 2003). RFID technology has been used to raise efficiency in transport, business and theft-monitoring systems. The evolution of RFID described below suggests that libraries may well benefit from widespread use of this technology. Background of the StudyBarangka Elementary school is located at General Julian Cruz Street, Bonifacio Avenue, Barangka. Marikina City. The school is currently has more than 1000+ book titles and copies. With only a librarian and a teacher librarian handling all transactions thru manual recording and processing, book borrowing and returning as well as master list updating has always been a tedious task. This has been causing delays in processing, organization, and inventory of currently available, currently borrowed, damaged, donated and phased-out books and consumes a lot of time.Other than those problems it can also came up with the result of data mishandling, book records are not updated and lots o f borrowers will have a time waiting for one borrower to another, librarian will be more confused if there will come a time were all students are borrowing a book all at the same time. T0he researchers came up with the idea of developing a Library System that would improve transaction efficiency. Being part of an institution where identification is used not just for efficiency but for safety as well, the proponents decided to make the usage of the library system but the library data files/ documents more secured.The library system may only be used by authorized staff, but it would be better if the library itself was restricted for those who are supposed to benefit from it. By having the need to identify themselves with the use of RFID, everyone who borrows a book in the library is enlisted. Also, it will help the library staff to be able to monitor and distinguish the days and books the library is most used and the statistical details of the library. Statement of the Problem Current Library System of Barangka Elementary School (Manual Library System) 1. The system is inconvenient to use 2.The security of books is questionable 3. Take more effort and time consuming in listing and checking all the books 4. The librarians don’t have any idea about the circulating books. 5. The students and professors don’t know the books information and availability. 6. Sometimes the librarian didn’t know the total amount of fines and date of dues of the students. 7. The librarian can’t have a reports of who borrowed and returned books. 8. The student cant reserve book/s. 9. Sometimes the books were being borrowed by students for more than 2 days. 10. The books were damaged after returning HypothesisThere is no significant difference between the perceptions of the teachers, students and the librarian concerning the Library System using RFID. Scope and Limitation The study took place at the Barangka Elementary School. The researchers conduct a study ins ide the school and ask for permission to gather some information about their library. After that the researchers went to the library and have some study, they went to the Barangka Elementary School on February 22, 2013 to gather some information for the proposed library system using RFID and gathered these following variables to suits the proposal system.These variables that the researchers gathered are student name, address, contact details, and book ID for further explanation student name is needed for the librarian to know who is the borrower and identify the borrower, Address to identify the borrowers current location, contact details to contact the borrower if there is some problems about the book and book id to identify the number of the book and the number of its copy when it is being borrowed. After gathering the variables needed, the researcher needs some programming language in order to use the gathered variables as data to the proposed system.The VB6. 0 or shall we say Vi sual Basic 6. 0 or Visual Basic. Net is being chosen by the researcher as programming language. The researcher also needs some hardware for the proposed system in order to make some testing and runs. For the researchers they choose desktop and laptop computer which is currently installed with vb. 6. 0 and running to an operating system of Windows XP and Windows 7. Significance of the Study In this section, the study benefits the following people inside and outside the organization: 1. Librarian Once the new I.T solution is implemented in the library, the librarian would be able to easily monitor more books that are available or unavailable. He/she can easily identify the borrower with the use of RFID. This means faster access to information and faster processing of book borrowing. 2. Students and faculty Students and faculty members can benefit from this study because with the new automated system, they would be able to easily find the books they want to barrow. They would also bene fit from faster processing of book borrowing since the library staff would be able to easily track borrowers. . School administration The school administration will also benefit from this study because the library system also brings about more secure ways of managing the school’s library collection. This means that the possibility of losing books due to lost borrowing records and security problems will be minimized with the proper implementation of the new system. This new system serves as a good way to protect the school’s investment in library holdings. Chapter 2 EVALUATION DESIGN AND FRAMEWORK Theoretical Framework The association of research libraries (ARL) in North America has collected tatistics related to its member’s libraries for many years ago. These statistics focused on â€Å"input† measure size of collections or number or staff. Subsequently, ARL considered â€Å"Output† measures such as circulation statistics. Shim and Kantor (1996) u sed data envelope Analysis (DEA) to evaluate digital libraries. DEA measures the relative efficiencies of Organizations (â€Å"decision making units†), given multiple inputs and outputs the measurement of efficiency can apply to a single institution over time, or across multiple institutions.As shim and Kantor state â€Å" an efficient library is defined as the one which produces the same output with less input or, for a given input, produces more output. † While this approach advance the notion of evaluation, Kyrillido (2002) points out that the relationships between inputs and outputs within a library are not necessarily clear. Additionally, Shim and Kantor indicate that libraries must describe how inputs are transformed into services, rather than outputs. ARL has acknowledged this need through its New Measures Initiative, which emphasizes outcomes, impacts, and quality, based on user satisfaction.ARL‘s E-metrics projects represents an effort to define and coll ect data on the use and value of electronic resources. ARL’s LibQual+â„ ¢ attempts to measure overall service quality in academic research libraries (Cook et al. , 2001). LibQual+â„ ¢ arose from SERVQUAL, an instrument, based on the gap theory of service quality, which was used to assess private sector institutions. ARL intends to extend LibQual+â„ ¢ to evaluate digital libraries, through the National Science Foundation’s National SMETE Digital Library (NSDL) program.The affirmed Kantor, along with Saracevic, (1997a; 1997b) conducted a long term study to develop a taxonomy of user values for library services and a methodology for applying the taxonomy. They also provide arguments for the importance of used-based evaluation include Norlin (2000) who evaluated user satisfaction regarding references services with surveys to gather demographic data, unobtrusive observations of the delivery of reference services, and follow-up focus groups. Hill et al. (1997) used multiple methods to obtain feedback regarding the Alexandria Digital Library (ADL) at the University of California, Santa Barbara.The study adopted several methods to evaluate user views including: online surveys, ethnographic studies, focus groups, and user comments. The goal of this study was not to compare the value of the library system to its costs, but rather to incorporate the user feedback in the ongoing design and implementation of the ADL. Talbot et al. (1998) employed a Likert type survey to evaluate patron satisfaction with various library services at the University of California, San Diego. This survey was conducted in response to a comprehensive change in the library management’s philosophy.Chris Borgman at UCLA has written extensively regarding digital libraries from user-centric perspective. One of her recent works, Borgman (2000), provides a multi-disciplinary, holistic, human- centered perspective on the global information infrastructure. Many economists inc luding Hal Varian, Malcolm Getz, and Jeff Mackie-Manson have examined the evaluation of libraries and information. Mackie-Manson, and the others, examined the issue of electronic journals pricing during the Pricing Access to Knowledge (PEAK) 2000 conference.There are numbers of studies that adopt multi-attribute, stated-preference techniques, or some variant of them. Crawford (1994) describes a multi-attribute, stated-preference application for evaluating reference within academic libraries and provides an overview of an earlier study using similar techniques (Halperin and Stradon 1980). Harless and Allen (1999) utilize contingent valuation methodology (CVM), a subset of multi-attribute, stated –preference techniques, to measure patron benefits of reference desk services.Basically, CVM explores user’s willingness to pay in dollar values, for varying levels of services. The most widely cited reference for CVM’s Mitchell and Carson (1989). The Harless and Allen pa per raises the important distinction between use and option value, concepts that have been developed in the context of environmental. Use value reflects the value of benefits as assigned by actual users of specific services. Option value incorporates the additional benefits as determined by users who might use specific services in the future (i. e. individual who had not used the reference service but still placed a value of its existence). Any evaluation study that focuses only on individuals who use a specific service (e. g. , interviewing only patrons as they leave the reference desk) will most probably underestimate the benefit of the service in question. Outside of the US, the eVALUEd project team has implemented a questionnaire designed to collect data regarding evaluation methodologies in the UK. The questionnaire was offered to the heads of Library/Information Services in Higher Education Institutions in UK.The goal eVALUEd is to produce a transferable model for e-library ev aluation and to provide training and dissemination in e-library evaluation. The results of this effort should provide an interesting comparison to efforts based in the US. These studies demonstrate an increasing emphasis on both inter and intra-institutional measures, outcomes rather than inputs, a user-centric perspective, adoption of evaluation techniques from various disciplines, and evaluation of libraries that is published as a software. Conceptual FrameworkThe aim of conceptual model of the study is to visualize the theoretical plans that will be used in the study. It is composed of three blocks, explicitly the input, the process and the output blocks. The Input Block is made up of personal information such as name and address contact details . Book number for the numerical arrangement of book according to its accession number and identification card for serial number purposes. The Process block is made up process where all the variables in the input is being used to make a pr ocess that will definitely return a certain output.The Output block is made up of what will be the outcome when the inputs and process have been done and it is Library system using rfid The Evaluation will now see if the system meets the client’s requirements if it is working properly. It will serve as assembly practice for the comments, feedbacks, and suggestions from the user of the system. Importance to the study The importance of name to the study is to identify who are the borrower / user of the library system. The importance of address in the study is to identify the borrowers / user’s location for security purposes.The importance of contact details in the study is to identify the borrowers/ user’s details whenever there are some arguments about the book that has been borrowed or returned. The importance of the Book ID/ Book Number is to identify the current book status whenever it is in or out of the library. Chapter 3 Methodology Method of Research The p roponents use the following techniques or methods in order to achieve data gathering for this study. First, the researchers use the descriptive method of research that involves a process of observation of events and facts and their description in words and/or numbers.Second, the proponents also use the job analysis method that deals with the assessment of the efficiency and effectiveness of practices, policies, instruments or other variables in work process of an organization. These two methods were used because the tasks in the study involves the observation of perceptions of the respondents and the analysis of existing work practices in order to come up with improvements. Locale of the Study The study took place in Barangka Elementary School, located at Bonifacio Avenue Barangka Marikina City, beside the Barangay Hall of Brgy. Barangka.The library currently uses manual process of borrowing and returning of books, a data base that contains an inventory of books. However the library doesn’t give students and faculty members/ staffs the ability of borrowing and returning of books more secured and much detailed information. The database just helps the librarian in performing regular inventories of books. The researcher then thought of coming up with a solution to help improve the way the library’s collection and book borrowing are managed. For further analysis here a scenario for us to know about the process currently happens in Barangka elementary school library.At first the student will confront the librarian asking for a book and then the librarian will look up to his/ her records of the books. If the book is in the book shelves then the librarian will tell if it is available or out. When the book is available then the librarian will ask if the student will borrow the book and ask for his/ her library card and fill it with the following information. After registering the book as being barrowed the librarian take a look at his/ her records and re cord the book that is being borrowed.And this is the process in the Barangka elementary school library. Participants The participants in this study were librarian, Students and faculty members. During this conduct of study the population of the participants could be broken down to 150 students, 10 faculty members and staff and school librarian with the total of 161 persons. The survey was held to get the general perceptions of the librarians, students and faculty members on the accuracy, efficiency and security of the current library system. Research InstrumentsInterview about the existing library system was done by asking questions related company’s background, existing library process, problems encountered while using the existing system. The answers are answerable by their own insights of the person involved during the interview session. The purpose of the surveys and interviews is for the proponents will know of there will be improvements that they are going to add for th eir proposed project. The proponents used questionnaires for surveys of Barangka Elementary School Library system using rfid.The questionnaire is composed of 4 questions. These are answerable by the numbers which are from their own perceptions and experiences and experiences. Number one (1) is equivalent to always answer, number two (2) is equivalent to often, number three (3) is equivalent to sometimes answer, number four (4) is equivalent to rarely answer and number five (5) is equivalent to never answer. The proponents chose the survey to be answerable by 1,2,3,4 and 5 only because they want it to be more convenient and answerable by the students of the Barangka Elementary School. Data gatheringBefore initiating the study, the researchers requested permission through a letter signed by the adviser, and approved by the school Principal. The questionnaire to be used for the survey was prepared and presented to the adviser for the approval. After the adviser’s approval of the questionnaire, the researchers conducted the survey in the school where the participants include the librarian, students and faculty members. Design Strategy 1. Planning On completing the survey and the data gathering, the researchers started the planning stage in the developing the Library system using rfid.Through the survey and interview, the researchers learned more about the existing manual library system, and how it can be improved through with the use of RFID. During the planning stage, the data flow diagram, entity relationship diagram and flow chart were prepared. 2. Writing The researchers used VB. 60 and VB. net in programming the process and Microsoft Access for the database. Vb6. 0 and Vb. net was selected it can handle a program more reliable, Microsoft Access is selected because it can handle database more efficiently. 3. Testing The Library system using rfid was tested first among the researchers.The librarian, students and the faculty members also tested the system and gave suggestions in improving its usability. 4. Implementation The proponents have launched the Barangka Elementary School Library system using rfid after all testing, analyzing the final results and all the criteria and said goal are accomplished. Should the proponents and benefactors of the said system are not satisfied; the system will then undergo a new evaluation. The implementation has the following stages: 1. Training of staff and librarian – The staff, administrations and librarians will be trained later on time.They’ll learn the security features, how to enter data produce reports. 2. Live run of the System – The proponents will present during this initial live run to troubleshoot possible errors. 3. Turnover of documentation and software – The software and documentation will be turned over to the administrators and librarians of the school as soon as the System was being approved. Chapter 4 Results and Findings This chapter presents the dat a gathered through the survey. The results were analyzed by using the weighted means, and their corresponding verbal interpretations.Table 1, 2, 3, and 4 show the results of the survey conducted for the students and librarian of the Barangka Elementary School, Marikina City on the accuracy, security, accessibility, and usability of proposed library system which is Barangka Elementary School Library System using RFID. They asked 160 respondents including the librarian and faculty staff. Table 1: Perceptions of the students and the librarian on security Question 1| Number of Respondents| WtdX| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The books are well secure. 152| 8| 1| 0| 0| 1. 3| Books are always secure. | The results under the category accuracy gave weighted means ranging to 1. 3 (always). The results indicate that all books were secure Library System School using RFID. Table 2: Perceptions of the students and librarian on the accessibility Question 2| Number of Respondents| Wt d X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The accessibility of the system is applicable. | 154| 6| 0| 0| 0| 1. 15| The accessibility of the user accounts is always applicable. |According to the results under the category accessibility gave weighted means ranging to 1. 15 (Always). The results include that the proposed system has user level accessibility from school staffs to student accounts of campus. Table 3: perception of the students and the librarian on accuracy Question 3| Number of Respondents| Wtd X| Verbal Interception| | 1| 2| 3| 4| 5| | | . The Accuracy in updating account details | 148| 12| 0| 0| 0| 1. 1| The data and settings are always accurate| Under the table of question about accuracy gave weighted means ranging to 1. (Always). The result include that the records / data and settings are always accurate and can give correct and updated information to the users. Table 4: Perceptions of the students and the librarian on usability Question 4| Number of Respondent s| Wtd X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | Usability of the system. (e. g. Features Modules)| 150| 10| 0| 0| 0| 1. 25| The system is always usable or user friendly. | Under the table of usability the weighted means ranging to 1. 25 (Always).The result implies that the users can use the system with minimum trainings or without trainings at all. Chapter 5 Summary, Conclusion and Recommendation This presents the summary of findings, conclusion and recommendations to solve the problems. A. Summary The findings of this study are shown under the categories of accuracy, security, accessibility, and usability. 1. Perception of accuracy According to the perception of the students and the librarian, accuracy of data are well maintained by the system. 2. Perception on security According to the students and librarian, all the books can be secure. . Perception on accessibility According to the students and the librarian, user accessibility of the system is applicable and working prope rly. 4. Perception on usability According to the students and librarian, the system is easy to use with graphical user Interface. B. Conclusion Taking into the account the finding mentioned previously, proponents came up with their conclusion that the system has meet the minimum requirements and important requirements that the client needs. All the modules are working properly and satisfy the users.Although the system is open for future enhancement. C. Recommendation The proponents came up with the following recommendations based on the result of the live run testing of the system; . User Level – logout of the existing account first before another user can login. . Quantity of the books – the total number of books in each category. . Fine computation – computation of fine of each student. . Usability of internet in accessing accounts of the users – using of internet in accessing user accounts. APPENDCES A. Survey Questionnaire Name: __________________ Dat e: _____________Upon using the applied system, indicate if the questions below meet the desired requirements of the users. Check the number of your desired answer. (1- Always, 2- Often, 3- Sometimes, 4- Rarely, 5- Never) Questions| 1| 2| 3| 4| 5| 1. The books are well secured| | | | | | 2. The accessibility of the system is applicable. (e. g borrower type)| | | | | | 3. The account details are updateable| | | | | | 4. Usability of the system(e. g graphical interface)| | | | | | Screenshots Login Page Main Menu Books User Borrower Borrowing Returning Book Reports

Sunday, September 29, 2019

Ddos Prevention Best Practices

To begin with, system hardening should be implemented on all University workstations, and especially the Web servers. This means turning off any unused services, closing all ports except those that are specifically needed for the operating roles of the servers, and ensuring that an anta;plus solution Is in place and regularly updated. Additionally, a strong patch management policy and procedure should be used to keep University computing assets up to date.This is to help prevent the exploitation of newly discovered vulnerabilities, and is part of the hardening process. All publicly available services, such as Web facing servers, DNS servers, and application servers, should be separated from private university resources. The separation should include enclosing the public servers in a DMZ. The DMZ should have firewalls in place on both sides of the network, to protect from external threats, and Internal ones. This separation also Isolates the servers from the rest of the network, in th e event one of them is compromised.Furthermore, PLANS should be implemented to break up broadcast domains, and IP subletting used to control outwork traffic, further isolating the public systems from the internal network devices. Also, A split DNS scheme that consists of an external DNS server separate from an Internal DNS server can help limit the Impact of DNS Dos style attacks. Network Address Translation (NAT) should remain in place, as it also has the effect of hiding the internal network from the Internet. Moreover, the blocking of IGMP or ping attempts should be blocked, at least externally, so that attempts to Identify systems from the Internet are reduced.As part of capacity planning, consideration should be made to plan for excess. This should help to absorb any Dodos attacks by having plenty of resources to maintain network operations. This Includes having more than adequate switch and router bandwidth, CAP]. And frame/packet processing ablest. Additional consideration sh ould be made to use different Internet Service Providers (ISP) for redundant connections. In the event of an attack, this has the benefit of having alternate paths to the Internet, providing redundancy and load sharing.When upgrading or replacing network equipment, anta-DoS capable devices should be carefully evaluated and selected. Intrusion Detection/Prevention Systems (DIPS) should be deployed, with the emphasis on prevention at the network perimeter. An inline device will be more effective placed behind the external facing firewall. The firewall is configured to allow only traffic that Is desired, blocking all other traffic, while the DIPS Is designed to block specific traffic and allow the rest. An DIPS device that uses both signature- 1 OFF positives, and therefore a better chance of detecting attacks.The DIPS device should be capable of sending alerts via email, SMS, and pager communication methods to Taft. The DIPS should also be configured to alter the firewall filtering ru les on the fly, in the event an attack is occurring. A period of fine tuning is necessary to reduce false positives, and ensure information is not lost due to miscommunication. Ingress and egress filtering needs to be implemented. This involves configuring the firewalls to block unreliable IP addresses as specified in RFC 1918, using Access Control Lists (Calls).This will help prevent IP address spoofing, and computing assets from being used to attack other organizations outside the University IP address pace. Egress filtering should only allow IP addresses to leave the University that fall within the range of allocated addresses. Log monitoring and review of all network and server devices should be performed regularly. In addition, IT staff should be alerted when suspicious activity or events are detected. For instance, repeated failed attempts to access a network device might indicate a password hacking attack. Performance baselines of essential network and server equipment needs to be documented.This will provide a metric of network utilization under normal operating conditions. Excessive use of resources above equipment baselines might indicate a Dodos attack. Also, establishing a performance baseline will aid in capacity planning and provide data for scalability and growth planning. A honesty with relaxed security should be installed. Its purpose is to draw hackers away from actual University computing assets by providing an easier target. It needs to be completely isolated from all other critical assets. The honesty should also be monitored, as data obtained from attacks can be used to shore up the rest of the network.An Incident Response Plan (RIP) needs to be drafted and provided to all University administrative staff. Potential items in the plan should include Points of Contacts (POCK), and handling procedures if an attack is suspected. In conjunction with the RIP, an Emergency Response Team (RET) comprised of senior network and information security p ersonnel, as well as members of the management team, should formalized. This team will be tasked with the responsibility as first responders to an attack. The RET should also have a Plan of Action (POP) more detailed than the RIP.Items in this Lana should include detailed network documentation, disaster recovery plans, any business continuity plans, ISP support numbers, etc. The combined effect of all of the measures previously described, will significantly lessen the impact of a Dodos attack. By no means is this document complete, and should be considered as a living document. As new threats emerge, additional or even different methods may be required to be put in place. Technology also improves over time, therefore a periodic review of the practices described should be conducted, and this document adjusted accordingly.

Saturday, September 28, 2019

Performance †Dance Essay

Content: the performance we saw was a very simple setting with surprising contemporary dancing. It was a group of 6 dancers but 7 including the choreographer. Some very impressionable moments were when they would do the lifts and floor work all together I felt it was very strong and interesting. Interpretationconnection: three important things I feel the audience should know about the performance is that the piece was a very different modern type of dance, it was based on animal instinct, and there was no specific genre of dance used for the performance to be based on. The most impressionable moment or me was when the dancers were each lined up separately with their backs towards the audience in between the pillars on the back wall up stage, I like this moment because I thought the lighting and spacing really caught everyone in the audiences eye. I felt the modern aspect, the theme of animal instinct and there being no exact genre of dance made me more open to the performance as art because I didn’t try to compare it to anything else I just watched it for what it was. For example at first I felt it was very weird but as it went it went on I grew to be more open to it. Elements of dance: shape- The use of shape in the performance was unlike anything I have ever seen, they used every shape humanly possible but still made it look effortless and keep the audience watching. Space- The performance was well spaced at many times they were perfectly spaced between the large lines on the floor which was very cool looking. Time- There was no specific time ever really used because they has music that had no set beat or time. Dynamic- they used a large amount of emotion for this performance it was unique and really brought the piece to life through there dancing. Overall impression: My impression of the performance is I thought it was a very unique and strong piece of dancing. I liked the use of shape and spacing I thought they were done very well, but I didn’t like the music I didn’t really think it was the best for the dancing and they could have chosen much better music since the dancing was so strong. Overall I thought it was a strong and well done performance.

Friday, September 27, 2019

Motivation; Human Resource Management in the Public Sector Essay

Motivation; Human Resource Management in the Public Sector - Essay Example These needs vary from the public to the private sector and therefore different theories have to be implemented to recognize them (David, 1985). Needs that have been satisfied don’t work as motivators thus the organization has to consistently study the employees using different theories to recognize the next level of need for a motivated workforce. Theorists today have analyzed that the content and process approaches of motivation are congruent to public organizations (Robins, 2000). This method of motivation focuses on the theory that motivation in individuals is caused by the desire to fulfill inner needs. This approach concentrates on the needs that motivate individuals. Identifying the needs of employees using Maslow’s hierarchy of needs that identifies five need levels. At level one are the physiological needs which include food, water and comfort. A public organization can satisfy this need by giving a paycheck to the employee (David, 1985). At level two is safety needs which are feeling secure and stable. These can be satiated with the benefits that accompany the salary like medical coverage etc. social needs are third on the hierarchy which are desires for friendly relationships between employees and a sense of belonging. This is essential in public organizations as good relations and coordination are crucial to the organization as once this is developed the employees would be motivated to work better (Porter, 2000). The next level is the esteem n eeds which are needed for self respect and respect from coworkers. This can be attained by matching the skill of employees with their job assignment. The esteem can be satiated by appreciation of the employee’s work by the public organization. Lastly, self actualization needs of self content and recognition of the employee’s absolute capabilities can be satisfied by giving the employee challenging tasks that utilizes the employee’s

Thursday, September 26, 2019

Argumentative Paper Essay Example | Topics and Well Written Essays - 1500 words - 1

Argumentative Paper - Essay Example How dissimilar is it to coerce her to remain pregnant and eventually become a mother merely due to attempts at birth control by accident failed? From her perspective, the pregnancy is unwanted. From the point of the view of the unborn child, how the pregnancy comes about definitely makes no difference. If obliging a woman to go on with a pregnancy that will almost surely kill her is unacceptable, how different is it to force her to carry on with a pregnancy that will most likely abbreviate her life or a pregnancy that will make her life miserable? Of all the false notions concerned in the abortion debate, none is more relentless than the idea that science has not yet established when life starts. This mistaken belief is well-known but completely unbelievable. For centuries, biologists have already known that an unborn child is living for the duration of the pregnancy. It is the unavoidable conclusion of a principle as fundamental to â€Å"biology as gravity is to physics or the heliocentric solar system is to astronomy† (Marianna, 2002, 83). The main theological subject matter created by the abortion discourse focuses on the personhood of the unborn child. Evangelical Christians who are laboring for a legitimate human existence modification to prohibit abortion claim that the Bible preaches, namely, that the unborn child is a person and that abortion is undoubtedly an act of murder. According to Harold Brown, â€Å"The Bible prohibits the taking of innocent human life. If the developing fetus is shown to be a human being†¦ (or) if human life has begun, then abortion is homicide and not permissible† (Segers, 1995, 102). Although the opening statement is apparently different, Brown’s argument is in fundamental accord with that of the statement of Pope Pius XII: â€Å"Innocent human life, in whatever condition it is found, is

Proposal Assignment Example | Topics and Well Written Essays - 750 words - 3

Proposal - Assignment Example In this regard, this proposal is requesting for a grant to introduce an instruction software, which will easy the work of teachers and enhance the learning process of students using an innovative software, such as the Drill-and-Practice Software. The Drill-and-Practice software offers exercises that allow students to work using examples, one at a time and they receive the feedback immediately, informing them whether they are correct or not. The effective feedback model of the instruction software will allow students to gain quality comprehension of what they will be learning. It will also offer students the technological instruments for exploring the topic they are learning. If appropriately implemented, the program will help teachers comprehend the areas that their students have difficulties, meaning that the relationship between the teacher-students will enhance (Roblyer & Doering, 2013). The teacher will direct the students on the right way to study and comprehend the subject under study. The Drill-and-Practice instruction software has proven to be effective and the outcomes are seen on the deeper comprehension of the topics of study among the students, who will also show tremendous enthusiasm. In addition, the instructio n software will guarantee that students will be more interactive with other innovative utilizations of technology. The Department of Enhancing Educational Through Technology (EETT) offered the class the software grant of $10,000, which will b utilize to enhance the learning process of the students. The Drill-and-Practice instruction software is more of a self-study, whereby students carry out a number of exercises on the topics they have studied. The flash-card activity is the type of drill-and-practice instruction software that will be implemented in the classroom. The students will test

Wednesday, September 25, 2019

Business objectives from an ethical perspective Essay

Business objectives from an ethical perspective - Essay Example Business objectives from an ethical perspective In order to achieve its objectives rightly, there are important measures a business has to refer to in its quest to achieve set objectives, these are the business ethics. Business ethics refers to a certain kind of applied or professional ethics, whose role in business is to make an examination of the manner in which moral values are followed in the business environment. It is important that a business, having set its objectives, devise ethical values to govern the manner in which it conducts its internal and external activities in achieving its set objectives. Business ethics defines the manner in which a business treats its staff, manages their affairs and responds to arising issues satisfactorily. At the same time, business ethics plays an important role in the way a business relates with its external environment, it ensures that competition is done in the best interest of all players in the industry. If a business fails to observe business ethics, then it is bound to affect its i nternal and external business operations including a possible confrontation with its stakeholders. Pfizer being a global company; it has a global vision of researching, manufacturing and delivering medicines for all people around the world. In this understanding, the company has created a statement upon which it operates, that is, â€Å"good health is vital† to all people. It has a major corporate objective of producing medicines that can prevent several diseases, currently; the company is working extensively to produce medicines that can cure and prevent some of the world’s most terminal diseases like Alzheimer’s and cancer among others.

Tuesday, September 24, 2019

Global marketing mix of McDonalds Essay Example | Topics and Well Written Essays - 2500 words

Global marketing mix of McDonalds - Essay Example Reason for selecting this brand is that it employs a unique marketing mix that is based on quality of its product, store ambience, service quality and other parameters. This report will focus on the marketing mix of McDonalds. STEP 2. ANALYSIS OF THE BRAND AND IPT APPLICATION In this step, the marketing mix of McDonalds is analysed. A brief overview of the firm is provided followed by an analysis to assess if the marketing mix is standardised or adapted across international markets. Also discussed is the Internationalisation Process Theory - Uppsala theory for its international operations. 2.1. About McDonalds McDonalds operates in the restaurant sector and its products are fast food items, soft drinks, milk shakes, salads, breakfast, meals and other food items. In 2012, the firm had revenues of 27.56 billion USD. It has more than 34,000 outlets in 118 countries. It employs more than 1.7 million people in its stores and offices. Outlets are operated using different models of as an affiliate, franchisee and directly by the firm. The firm earns its income from royalties, rent, fees from franchises and from sale of food products. Franchise operators are monitored strictly for the service levels and to ensure that the brand image is not spoilt. Outlets have different styles such as counter service and drive-through/ walk through service. It has also opened McCafe, a cafe style of outlet that competes with Starbucks (McDonalds, 2013). 2.2. Assessing the7Ps of marketing mix The marketing mix is a marketing practice and business tool that helps to assess the brand's offer to customers. It combines a set of activities that the organisation must take up so that the target customers are identified and their needs satisfied (Albaum and Duerr, 2011). The earlier marketing mix consisted of the 4Ps and these were called as product, price, place and promotion. For service firms, that offer specific products, another 3 Ps were added to form the 7Ps of marketing mix. These extra Ps are people, performance and processes. For this paper, the 7Ps of marketing for McDonalds is discussed (De Mooij, 2010). Since the global branding practices are under discussion, the efforts of McDonalds in overseas markets is also analysed to assess the consistency of its business practices. 2.2.1. Product Product is a tangible and main offering of a firm and it generates revenue through sale of its products. For a firm to succeed, the product mu st have a unique selling proposition and it must be difficult for others to copy. Product is made of the core product and augmented products and these are packed together to increase the portfolio range. International firms must ensure that there is consistency in product offerings in terms of quality, taste, appearance and delivery (Anderson and Buvik, 2002). McDonalds offers the same range of products across all its outlets. In almost every location, one would see burgers, fries and these are the core products, augmented by milkshakes, coffee and ice creams. Thus, there is sufficient breadth and depth as indicated in the following figure. However, some amount of localisation is done since pork is not served in Middle East and Muslim nations and beef is not served in India. In addition, products in Asia are spicier than similar products in western nations (Vignali, 2010). Thus, McDonalds has standard products that are adapted to suit local conditions. Figure 2.1 Product range of Mc Donalds (Vignali, 2010) 2.2.2. Price Price refers to the money a customer's pays to procure the product. While lower prices could increase sales, it lowers public perception of the product quality besides reducing earnings. Higher price would keep people away (Andrews and Kim, 2007). Since

Monday, September 23, 2019

Case Study Report LVMH in UK Essay Example | Topics and Well Written Essays - 3250 words

Case Study Report LVMH in UK - Essay Example re Performance of Louis Vuitton†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦.14 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦.†¦..14 Appendices†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..17-20 Louis Vuitton Louis Vuitton Moet Hennessy (LVMH) known as the world’s biggest luxury goods merchandiser operates based on four main segments viz. the product categories, manner of distribution of the commodities to the final consumer, promotional activities regarding the finished products for gaining increased consumer attention and setting price points. To this end, Louis Vuitton renders increased stress on the activities concerning product development, distribution management and promotional activities for which activities concerning setting of hi gh price points becomes easily countered. The luxury group through the opening of highly decorative stores in the regions gains the attention of huge number of customers. This aspect caters to the distribution activities of the company. Further, Louis Vuitton makes huge amount of expenditures on advertising activities to make a large number of consumer aware of their shops and product categories and different ranges. However, the price mix followed by Louis Vuitton cannot be said to be customer friendly. Rather, the luxury goods manufacturer through the setting of high price points endeavors to gain a huge margin on the products manufactured and sold through its various outlets. The margin gained by selling the products at high price points is around 40 to 45 percent, which helps it to sustain itself in the luxury market. Focusing on the consumer portfolio of the luxury group, Louis Vuitton Moet Hennessy

Sunday, September 22, 2019

Islam †Annotated Essay Essay Example for Free

Islam – Annotated Essay Essay The article explains the way Islam views life after death. It clearly describes the various tenets that this religion follows when it comes to life on earth and life after death. Islam believes that life on earth has no purpose except to prepare oneself for life after death. The life after death typically consists of three phases: Death, the intermediate and the phase of resurrection. Death is considered to be the first gateway to reach the Garden or Fire. Importance of the custom of singing various verses at the time of death and till the body is buried and the custom of proper ablutions before burial is given due space. The second phase is the most controversial phase for which lot of explanations exist. This is the period when the soul is separated from the body but is not yet resurrected. What the soul does in this in-between phase has many theories, most common being, the souls embarks on a journey similar to the journey made by Prophet Muhammad where He was taken through the seven layers of heaven and made to look down at the tortures of hell. Another commonly accepted theory is the visit of angels Munkar and Nakil, who question the souls about the Quranic verses and their faith. The third phase, that is, the day of Resurrection is believed to be quite spectacular with the destruction of the whole world and the souls entering either the garden or the fire according to their virtues. It is also believed that after resurrection and the destruction of the whole mankind, a new age will begin and justice and righteousness will return to the earth again with a new leader. The idea of punishments or rewards after death, like the author mentioned, do seem having lot of physical attributes. All that has been mentioned seems a bit too dramatic like the tree in hell, Zaqqam which has demons as flowers! It seems, to capture a proper picture of the horror of hell, physical attributes like fire, demons, swords, etc. have been used. This would probably make humans understand better the tortures that they are to undergo if they do not live a life of righteousness. The editor’s note also briefs about the various contributions Islam as a religion has made to the world like ban on liquor, gambling and other vices. It also mentions the equality that Muslim women are credited with in the religion. However, in this present world, they seem to be the most bounded ones. The images of burqa-clad women with no freedom tell quite a different story. The religion, which has beautiful and just tenets to its credit like equal property rights to women, no race and color discrimination, seems to be misunderstood and misinterpreted by the religious heads and the followers for short term benefits. Because of such acts, Islam today is demonized and its contributions to the society are being passed unnoticed. Finally, the article was a comprehensive note of the beliefs in Islam regarding death and after and gave a very brief yet informative idea about the various customs and views on important aspects like fate of non-believers and reincarnation. It did make me a lot wiser about this religion!

Saturday, September 21, 2019

Personal and professional skills, my weaknesses and strengths

Personal and professional skills, my weaknesses and strengths This report is to examine my personal and professional skills, to identify my weaknesses and strengths and make some personal plans on how to improve and enhance them. Activity 1: Personal Skills Review Decision Making Everyday and every step of the way we are making decision, one way or another. Decision making involves risks, and I would say that it is one of my weaknesses. It could be the culture or the familial orientation I have, where decision making is the responsibility of the father or the husband in the family. I know I have a good understanding and better judgement when it comes to assessing certain situations, but my skills in decision making is not exercised. I want to develop that skill but I had no confidence in voicing out my opinion in the workplace and at home. As Pettinger (2001) said it is impossible to predict with certainty the outcome of decisions, but it is possible to take certain steps to assess the possible range of outcomes. In decision making, it is always coupled with certain risks that the decision maker has to undergo. I should be able to handle and cope with the outcome of the decision I make. I should be prepared to face what could possibly be the outcome of my decisions. There should be an alternative plan if anything goes wrong. Careful planning must be considered before coming up with a decision in order to avoid negative results. I should study and analyse important information relative to the planned activities before making a decision in order to lessen if not to avoid pitfalls in decision making. Taking ample time to review planned activities is one of the best strategies for the managers and supervisors to consider in ensuring successful outcomes. I should enhance my skills in decision making by participating in the planning of activities at home and in the workplace. I lack the determination and the courage for fear of making failures and blamed for it. The lack of courage to stand up and said my piece has shunned all the good opportunities that had come my way. I should try to develop confidence and take some risks in order to achieve what I wanted to accomplish with my life. Effective Communication As an individual I believe that effective communication keeps a healthy personal or professional relationship with the people I am interacting with, be it at home, at work or in any circumstances where my personal opinion is required. There are a lot of ways to communicate and it is not only the idea of transmitting my message but also how I deliver the message effectively. It is clear therefore, that it is not just the words stated or written that are important, but also (Pettinger, 2001): The ways they are spoken or written The context in which they are spoken or written The relationship between those giving and those receiving What is not stated or written What is precise What is deliberately vague Effective communication elicits good relations, improves the quality of life, motivates people and therefore yields better interpersonal relationship at home and at work. In my personal experience, I am successful in transmitting messages verbally and get feedback promptly. I have a good skill in verbal communication and consider this as one of my strengths. It is an advantage, I would say, because I was able to help the small business of my husband and his brother. I may not be a part of the decision making process concerning the business but I was able to attract customers through my ability to communicate effectively. My personal strategy is listening to suggestions made by clients; listen to questions raised before giving my personal opinion about the situation. This could open communication line between me and the customers and create friendly relationship and gain their loyalty and patronage. Negotiating Skills John Hayes (2002) said that we are all negotiators. Negotiation is a process of joint decision making in which people with different preferred outcomes interact in order to resolve. Negotiating is the process of coming to terms of agreement considering the factors of personal relationship, the status, gender, racial, and age differences, reputation, expectations, timing and work pressure. It is the art of discussing with another party to come up with agreeable terms such as determining what I and that of the other party wants and dont want for a particular situation. It is the understanding of what is acceptable to me and for the other party and what is not acceptable. Negotiating is a two-way process. You take and benefit without having the other party being disadvantaged. I have a personal talent in negotiating things and I have applied it to help the business run by my husband and his brother. I build rapport with our clients and customers. Negotiation is a win-win process. In situations like this when the customer demands some things and services relative to the business, I am in the frontline to deal with the situation. I see to it that the demands of the customers will be granted without compromising the generated profit of the company. When customers start to negotiate, they have already in mind the kind of benefit they hoped to get. In negotiating I have to be pleasant in dealing with the person I am making a deal with but sometimes I have to be a little bit aggressive but not intimidating to protect my own desired outcomes. My skill in negotiating has helped a lot in the success of our small business. I gained not only customers but also good friends. My communication skills improved my ability to interact with the people I am dealing with in e veryday life. Even in my own home I practice how to negotiate because children are very good negotiators. It is not giving the desires of the other party while my own interest suffers and vice versa. There is always a common ground of agreement to achieve that would benefit both negotiating parties and that is where my skill in negotiating will take place. Activity 2: Professional Skills Review Coaching Skills Coaching is assessing the people and organizational needs and provided them with the necessary knowledge, skills and expertise to achieve organizational goals. A coach or a mentor is an advisor who guides the person to perform better or to learn new techniques on how to do task effectively. A manager in an organization will help improve the working performance of the employees if the manager possesses the skill on how to coach. Coaching is more than just imparting your ideas, skills and knowledge to your subordinates. According to Zeus, P and Skiffington, S. (2002) coaching also focuses on function and performance of an individual; builds rapport and listening, questioning and reflecting skills; use goal setting and action plan. It is also monitoring the extent of their progress and assesses the area the learner still need to improve. The employees of the Parts and Services Company produce very good services to their clients because they are very skilled in their craft. They have acq uired their skill thru their managers who are very patient in introducing some new skills to them. A good performance reflects a good coach. Employees will have a high regard for themselves if they know the details of how a certain task is done. A productive employee will also produce good results and the credit will go to the manager who serves as a mentor or coach. An effective coaching will help employees to be motivated to learn more not only for purposes of career advancement but also for the companys objectives to be realized. Employee effectiveness also depends how they are trained skilfully, either by coaching or mentoring, and positive counselling. Learning cannot be applied effectively in the absence of one-on-one follow up from the coach. It is necessary for the manager coach to see how much the employee has learned from the personal training given by putting the learner to practice what he has learned. The coaching technique must vary from person to person because there are fast learner people and some need detailed explanation and information. That is why a good coach must possess the quality of being patient. Leadership Skills Through good mentoring and counselling we can produce good leaders. Wikipedia-Dictionary defined counselling as the provision of assistance and guidance in resolving personal, social or psychological problems and difficulties especially by a trained person on a professional basis. In the other hand, mentoring is a personal development tool helping people to progress and realize its potentials. The managers of Parts and Service Company were not only good in their skills in counselling, but are also good mentors. They identify the employees who have the potentials of becoming good leaders and encouraged and helped them to develop their skills through mentoring and counselling. A good leader must have a flexible personality. Leadership skill is acquired, therefore through practice and experience a manager can be a good and effective leader. The success of an organization depends greatly on the leadership of the people managing it. Leadership is the capacity to influence other people in the organization. A good leader is followed and respected by the people he is working with. Parts and Service Company employees look up to their manager not only because he has contributed much to the achievement of company objectives, but because of his manner in leading the people he is working with. He does not only lead people but he also coaches at the same time, imparting to them his expertise that made him the role model in the organization. He leads by example. The qualities of a good leader is characterized by a having a sense of responsibility, work hard to complete a task, determination to achieve goals, exercise initiative in social situations, self confident, the ability to respond positively to stress and the ability to influence other people. (Bernard Bass, 3rd Edition). Employees are encouraged to find some ways to develop and enhance skills. They are motivated to strive and work hard to be as successful as their leader. A leader who does not care about the welfare of the employees can do nothing to meet organizational objectives set by the management. Employees will not get anything good from leaders that think only of their own personal benefit without considering the welfare of other people in the organization. Good leaders are first to approach their staff to give commendations if the job is satisfactorily done and the first to show concern to those who need encouragement. We always look up to a good and successful leader and we want to be influenced by their ability to handle complex things that led to their success. Their ability to cope with stressful situations, to stand and endure failure, to solve problems in the organization is admirable. Successful leaders have gone through a lot of frustrations but managed to overcome it and boost their confidence as an individual. Multi-Tasking Skills Multi-tasking is the ability of the person to do more than one task all at the same period of time. The employees given the responsibility to do this task must be well trained in performing the tasks in order to complete it in a given time. Multi-tasking saves cost and money but the quality of work may suffer as a result. It can benefit the organization because of reduced cost. Likewise it will benefit the employees because it will develop their knowledge and skills in performing some tasks other than what they are familiar doing. Adjustment in the part of the employees performing multi tasking is difficult if the sudden change is introduced. Multi task require a high degree of skill because the employee is placed in a variety of task that he must be ready to perform and complete. It is difficult for the person doing the multi-tasking but in the long run it is beneficial to the person because it will give him the advantage to be recognized if he performs what is expected of him to do . This will give the employee the chance for career advancement. The person doing multi-tasking must be creative and innovative. But the management must take some caution not to overload the person doing the multi-task. The person might be stressed out and cannot perform well. Poor performance will result to poor productivity. Stressed people have the tendency to get sick that could be avoided. Management must follow up the output of the person doing the multi task to know if the person is capable of doing it and see to it that that the person doing is well trained to avoid problems that can affect the performance of the entire organization. Multi-tasking helps the organization in many ways one of which is the financial cost. The task of two people can be performed by one if there is similarity of function in the task. The quality of output will not be affected if the mentors are religiously following and monitoring the performance of the employees. Counselling is important to give encouragement to the employees with overloaded tasks. Mentoring and counselling is important where multi-tasking is introduced to the organization. Task 2: PERSONAL DEVELOPMENT PLANNING Activity 1: Personal audit I requested two (2) of my friends to help me assess my personal skills and to give me pointers on how to develop my weak points. As decision making is my weakness which I wanted to improve, they have given me their personal opinion on how to develop it. They suggested that I should: Assert if I think that my opinion is worth considering Communicate effectively so that my views will be heard Build my confidence Present relevant points of my opinion Assert to present my good ideas The points they have suggested will help develop and enhance my decision making skill. I have good and better ideas when it comes to family matters. My husband has the authority to make decisions in my home I have the tendency to keep silent. I have to be assertive because I want to be a part in the decisions and plans in my family. I have to enhance my communication skills in order to be heard and respected. And I also need to build my confidence in order to have the courage to assert. B. PERSONAL AUDIT QUESTIONNAIRE Please tick the appropriate option on the following rating scale (1-5), 1 being the weakest and 5 being the strongest. Name: ____________________________ Date: ______________________ 1 2 3 4 5 I am confident to talk in front of many people I can express my ideas well I cannot influence people easily I take responsibility of my actions I cannot manage pressure I cannot give relevant ideas on certain topics I can take risk I cannot solve problems easily C. Analysis 1 2 3 4 5 I am confident to talk in front of many people 1 1 I can express my ideas well l l I cannot influence people easily l l I take responsibility of my actions l l I cannot manage pressure ll I cannot give relevant ideas on certain topics ll I can take risk ll I cannot solve problems easily ll Based on the above answers obtained, it was identified that my skills in decision making is the weak points but I have the potentials to become a good decision maker because I can take responsibility well and take risk if needed. I might be observed to be weak in expressing my ideas, but I know I have good ones. I just have to develop my confidence. Solving problems is always a joint process between me and my husband, and I know I can enhance that skill in time. I will consider the suggestions of my friends in order to develop my personal and professional skills. Activity 2: Progression Plan The SWOT analyses Strengths Weaknesses Communication skills Negotiating Multi-tasking Good learner Confidence Stress Management Decision making Handling Conflict Opportunities Threats My opinion is considered Encouragement from my family Support from friends I have good ideas Culture Environment Level of responsibility Arguments and debates Learning Style Application Honey and Mumford have identified four main learning style preferences, namely: Activist persons who like to be involved in new experiences and new ideas. Reflector persons who like to collect data, and review before presenting conclusions. Theorist persons who adapt and integrate observations into complex and logically sound theories. Pragmatist persons who are more practical by nature; likes concepts that can be applied to their job. My goal is to develop my skill in decision making. It wont be hard for me because I have the determination and the potential to give good ideas. In order to achieve this goal I will use the reflector style of learning identified by Honey and Mumford. This style of learning reflects my qualities being careful, thorough, methodical, thoughtful, good at listening and absorbing information and dont jump to conclusion. My learning process will be fast and easy because different kinds of information are accessible. Monitoring I have to monitor the progress of my learning to know if I have improved or not. I have to identify mistakes incurred in the process so that I will be able to correct them. I will provide for myself a diary or activity planner where I can write activities that will help me strengthen my weaknesses. I should incorporate in my diary or planner activities like: where the learning took place; people involved; reason for undertaking the learning; what was learnt; topics covered and skills developed My family and friends will also help me in the learning process by asking them comments if I have improved skilfully and intellectually. In monitoring I should be able to identify my priorities for personal and professional development. I will also see if there are opportunities for developing my skills. I will create an action plan and evaluate my personal performance. From time to time I will ask a colleague or family member who can honestly assess the progress of my learning. The feedback will help me see the areas I still need to improve and the skills I have to enhance.

Friday, September 20, 2019

Factors That Influence Person Self Concept Sociology Essay

Factors That Influence Person Self Concept Sociology Essay I have been asked to reassess a case study on Isaac Barlow and Zac Barlow. In my assessment I shall include aspects that influenced the brothers self concept. Also, I shall include an outline how these factors can influence the growth of their self esteem. Finally, I shall include an explanation on how these factors can influence the development of their self concept. (P3) State factors that influence an individuals self-concept and give a clear and full account of the factors that might have influenced the brothers self-concept. I shall state the factors that influence an individuals self-concept and I will give a clear and full account of the factors that might have influenced the brothers self-concept. Factors that can influence an individuals self-concept are education, media, appearance, culture, abuse, relationships, gender, income and age. Education: Education can influence an individuals self-concept by having supportive teaching staff who continues to encourage a student to keep up the good work. Also, another factor that can influence an individuals self-concept is the lack of employment due to having a poor education. Education can impact on a persons self-esteem if they cannot get into employment and the person will get a negative self-image and low self-esteem. Media: Media can influence an individuals self-concept through provision of educational sources such as, promoting enrolment on academic courses and information on current situation happening in our society. A further reason that can influence an individuals self-concept is displaying of images of models or celebrities being underweight. For example, pictures of Victoria Beckham and Nicole Richie. Appearance: Appearance can affect an individuals self-concept both constructively and harmfully. For example, appearance constructive influence will be pictures displayed by sports encouraging individuals to keep up a healthy lifestyle. Further to point, appearance can have a negative influence on a persons life through advertising photos of underweight models and this can influence young women to try to seem very thin. Culture: Culture is a belief that you have or self values. This can influence our self concept if we do not endorse other individuals culture. Cultural diversity can have a positive influence if we embrace the differences of others, but if differences are used to discriminate against others, its harmful. Example req. Also, this can be the way you were brought up by your parents or a guardian. Abuse: There are different types of abuse; they are physical, emotional, neglect and sexual. These or any type of abuse can be detrimental to a person, however, abuse can influence a person if they have been neglected and they will develop a low self esteem. In addition, a person has been neglected may feel socially excluded and may suffer from mental health conditions. Relationships: Relationship can influence an individuals self concept if you do not have a supportive family, peers. This will may lead the individual to have a negative self concept with socialisation. Furthermore, having high expectations can also have a negative self concept of an individual, additionally if the person has been compared to other peer groups or siblings can have a negative influence. Gender: Gender is characterised by being a man or woman. This categorisation can influence a persons self-concept of stereotyping job roles for both genders. For example, men should play football and women should stay at home and cook the meals also take care of the children. Finally, I believe that these factors may influence an individuals self-concept everyone should be treated equally regardless of their gender. Income: Income can influence individual self concept if they do not have enough income they may be despair that they cannot afford to live a normal life. For example, with insufficient low income a person cannot maintain their lifestyle factors, such as paying their rent, afford heating facilities within their home plus have a balance diet. Age: It can be said that self-concept can fluctuate throughout different life stages, for example. Also, age can influence a persons self concept during childhood and adolescent development. Through comprehending his ideal self receiving peer pressure. Self concept is the way an individual visualise them self. For example, self concept can be very influential in the way we see our self; by receiving critical comments by peers or family member, which can cause low self esteem. Self concept is made up of factors such as self image, ideal self and self esteem. Haworth et al (2010) suggests that there are numerous factors that can affect your self- concept. They are age, education, media, appearance, culture, abuse, relationships, gender, and income. These factors are also known as socioeconomic factors. (M2) Outline how factors can influence the development of an individuals self-concept, or Outline how the factors that influenced the brothers self-concept. (D1) Describe how the factors influenced the brothers self-concept. Factors that influenced Zac Barlow self-concept Age: During Zacs infancy years he was unable to distinguish what gender he was. During Zacs childhood years he was able to distinguish his family. During he was able to identify that he was a student and what year he was in school and able to identify his likes and dislikes. He was able to tell who is friends were and express his emotions. During adolescent life stage he was able to compare himself with others and express his relationship with peers. Also, he was able to describe his beliefs and acknowledge what is right from what is wrong. During his adulthood life stage he should become more confident within his personal relationship and establish himself within a particular career. Appearance: Zacs appearance seems to have been influence negatively, because he was not interested in sports. This may have impacted on him because within the norms males are expected to do physical activities. Also, this will have an impact on his self esteem, although his self image might be different on what others think about him. He may not feel attracted to form any relationship with the opposite sex at school because of his appearance. Moreover, his self concept may decrease due to how others perceive him. He had a very thin physique which might be an influence from the media. He may be affected by his appearance. His appearance may affect by how he attires or carries himself and called gay; he may feel within his ideal self that he is gay. Also, hearing negative words all the time can make him believe whatever they mimic him and this will lead to negative social interaction with his peers. Media: The media may have an impact on how he feels about himself. Media may impact on his appearance. May has impacted the way he feels about himself or may have an impact on his image which may encourage him to keep his body built. Contribute to self concept development; social, academic, emotional physical may impact on his appearance which is his ideal self. Media can also provide positive educational opportunities which can help to develop a persons academic growth. Culture: He believes he was the norm. In the western culture boys meant to be masculine and girls meant to be feminine. His culture can be influenced by his family also by his peers. He did not have a girlfriend at school plus how he was brought up might impact on his self esteem. Gender: He was male. He meant to have masculine physiques. He faces gender stereotype because he was not taking part in sport activity at school. Because of his gender stereotype it decreases his academic performance at school. At a certain age people can identify or chose which group to follow so he hangs out with older boys. Education: He was influenced by his parents to study because he did not have a choice. He was influenced by teachers, peers and parents to study. May start to compare himself with his peers including siblings. Receiving additional support from the school could help to develop his self concept. Being compared to other pupils or siblings can affect his views on himself. Been teased Zac may feel unwanted and be ashamed of who he is as a person and as a part of that he would have a low self esteem which he may possibly continue through to adulthood. This may also affect his relationships and employment prospects. Constant teasing can affect Zac overall mood and that is why he was unsociable. Because of this he may lose interest in sports activities and was able to build a relationship with older boys. He will also develop mental health issues such as depression and anxiety. He may feel reluctant to try and build relationships with his peers. Being teased can also has a significant consequence on his academic performance, reason being, he has been teased and this will make him divert from paying attention on his studies. This will have a result on his academic study by not making it into six forms or college. Also because he has been teased he did not want to take part in certain lessons. There is no indication of how long the teasing took place but there was speculations of Zac being bullied by his peers. Additionally, if he have been bullied this will show signs that his teasing was going on for a while then potentially lead to bullying. Furthermore, this will allow Zac to be in fear and have a negative self-concept about himself or have a negative self-image, self-esteem, self-value and ideal self. These mental scars can affect Zac in both past and present conduct and decrease his chance of academic and psychological hardship throughout school and into adulthood. Income: He was raised in a middle class family. So his parents had enough money to live an above normal lifestyle. Having brought up in a middle class family, would mean that some of his needs were financially. Also, been used to a lot of money during his development he may be used to materialistic things. He may influence to steal because he cannot afford his lifestyle needs which can have a negative self image. Relationship: There are different types of relationships, which are family, mutual, ect. He did not have a good relationship with his peers because they taunted him. He did not have good relationship with school staff as he always gets into trouble at school He may introvert his social behaviour. He did not have a good relationship with his parents as he has been neglected and he would not speak to them. He did not have good social interaction with any of his peers family and staff at school. He develops relationship with older boys as they share similar value this will strengthen his self concept and extrovert his social conduct. Abuse: He was verbally abused by peers which will have an emotional impact on his self esteem. He was neglected by his parents, for example, his emotional needs were neglected. He may be abuse by the older boys which influenced him to smoke because he was vulnerable. He may be stereotyped because of his role of his gender, for instance, males meant to be muscular and females were meant to be gorgeous. Factors that influence Isaac Barlow self-concept Age: Isaac self-concept changes throughout his life. Age: He is the eldest of his siblings. Appearance: Media: Culture: Gender: Education: Income: Relationship: Abuse: Self-image: this is how a person thinks about or see them self. Ideal self: this is what you would like to be Self-esteem: this is how you value yourself. Conclusion

Thursday, September 19, 2019

The Truth is Out There do we Wish to Know :: Free Essay Writer

The Truth is Out There do we Wish to Know The Heart of Darkness The search for truth and knowledge consumes us all at some point in our lives, but we don’t always find what we are looking for in Truth. We wish it to be definitive, but more than that, we search for it with the strong belief that we will find it and be pleased, pleasantly enlightened, and will live better lives for it. In Heart of Darkness, it is shown that this is seldom true. Kurtz was destroyed by the truth he discovered about himself and the world he lived in. He had known and believed a "white" truth about the world he knew. His white truth was one of civilized, genteel ideas and actions. Living amongst the privileged few, the artists, musicians, orators, and other cultured people, he knew nothing of the dark depths of the human heart. When confronted with those horrible realities, he was forced to learn the "black" truth about life and people. His mind couldn’t comprehend the truths he had to accept; it was totally contradicting to what he knew, and so he crumbled, selling his soul to sit among demons and devils. He was hollow inside, had no sense of moral or social responsibility, and the black truth he discovered ate away and destroyed him. He regressed to savage behaviors he had previously repressed and let the darkness fill the cold void within him. Because he knew so much blackness, he was unable to live in society again. He cros sed over and relinquished all ties to the civilized world, for he had lived the white truths to an extreme, so did he live the black truths. Kurtz showed what happens when the white truths and lies of society are taken away. Kurtz lived and found sustenance in that reality, when it vanished and was replaced by another, darker world, he folded. In our society, we live by restraint. For Kurtz in Africa, all the restraints were removed and he was allowed to have as much candy as he wished, even before dinner. This proved to be too much for him, he went to an extreme and was destroyed by the excesses he craved, the very excesses that drove him to the top of the tribes and peoples he conquered.

Wednesday, September 18, 2019

Analyse The Streingths and Weaknesses Of The Boston Matrix As An Aid T

In this essay I will look at the strengths and weaknesses of using the Boston Matrix to help make decisions in business. I will first briefly explain the Boston Matrix and then analyse its effectiveness as an aid to making a marketing strategy. Like Ansoff's matrix, the Boston Matrix is a well known tool for marketing managers. It was developed by the large US consulting group and is a way that a business can compare all of its products. The two aspects it looks at are market share (relative to that of competitors) and market growth. To use it you would look at all of your products and sort them into 4 categories, stars (products with a high market growth and a high market share), cash cows (high market share in a market with little growth), problem children/question marks (low market share in a growing market) and dogs (low market share in a market with no growth). There needs to be an equilibrium of the different types in your product portfolio. Never have any dogs, but try and keep the same amount of the other 3 types. This means that funds can be evenly distributed between the 3, money generated from cash cows needs to be spent turning problem children into stars, which will eventually become cash cows, and the cycle continues. Some problem children will become dogs, and money from cash cows m ay also have to be spent compensating for these failures. The Boston Matrix is commonly used to try and help plan the future of a company as well as simply categorising products. Bu...

Tuesday, September 17, 2019

The Return: Shadow Souls Chapter 36

â€Å"What?† shouted Damon over the music, while adding: Run – go! telepathically to Elena. If it had merely been Elena's life, she would have been glad enough to die here with the thunderous beauty of Firebird all around her, rathr than facing those steep, invisible steps alone. But it wasn't just her life. It was Stefan's life, too. Still, the flower maiden didn't look particularly menacing, and Elena couldn't summon up enough adrenaline to try making it down that hidous stairway. Damon, let's both go. We have to search the Great Ballroom outside. Only you're strong enough†¦. A hesitation. Damon would rather fight than face that enormous, impossible green field outside, Elena thought. But Bloddeuwedd, despite her words, was now spinning the room around them again, so that she, at the edge of some invisible walkway, could find the exact orb she wanted. Damon lifted Elena in his arms and said: Shut your eyes. Elena not only shut her eyes, but put her hands over them as well. If Damon was going to drop her, she wasn't going to help matters by shouting â€Å"Look out!† as he did it. The sensations themselves were sickening enough. Damon leaped from step to step like an ibex. He seemed barely to touch the steps in going down and Elena wondered – quite suddenly – if anything were after them. If so, it was information she needed to know. She began to lift her hands and heard Damon whisper-snarl â€Å"Keep them shut!† in a voice that few people liked to argue with. Elena peeked out between her hands, met Damon's exasperated eyes, and saw nothing following them. She clamped her hands back together and prayed. If you were really a slave, you wouldn't last a day here, you know, Damon informed her, taking a final leap into space and then setting her down on invisible – but at least level – ground. I wouldn't want to, Elena sent coldly. I swear, I'd rather die. Be careful what you promise, Damon flashed his splendid smile down at her suddenly. You may end up in other dimensions trying to fulfill your word. Elena didn't even try to one-up him. They were out, free, and racing through the glass house down to the stairs to the lower floor – a little tricky in her state of mind, but bearable – and finally out the door. On the grass of the Great Ballroom they found Meredith and Bonnie†¦and Sage. He was actually in white tie as well, although his jacket strained at his shoulders. In addition, Talon was sitting on one – so the problem might be taken care of fairly soon, as she was ripping the material and drawing blood. Sage didn't seem aware of it. Saber was at his master's side, looking at Elena with eyes too thoughtful to be mere animal eyes, but without malice. â€Å"Thank God you came back!† Bonnie cried, running to them. â€Å"Sage came and he has a marvelous idea.† Even Meredith was excited. â€Å"You remember how Damon said we should have brought a diviner? Well, we have two now.† She turned to Sage. â€Å"Please tell them.† â€Å"As a rule, I don't take these two to parties.† Sage reached down to scratch under Saber's throat. â€Å"But a little bird told me that you might be in trouble.† His hand moved up to stroke Talon, ruffling the falcon's feathers slightly. â€Å"So, dites-moi, please: Just how much have you two been handling the half-key you do possess?† â€Å"I touched it tonight and in the beginning, the night we found it,† said Elena. â€Å"But Lady Ulma handled it and Lucen made a chest for it and we've all handled that.† â€Å"But outside the box?† â€Å"I've held it and looked at it once or twice,† said Damon. â€Å"Eh bien! The kitsune smells should be much stronger on it. And kitsune have very distinctive smells.† â€Å"So you mean that Saber – † Elena's voice gave out for pure faintness. â€Å"Can sniff out anything with the smell of kitsune on it. Meanwhile, Talon has very good eyesight. She can fly overhead and look for the glint of gold in case it's in plain sight somewhere. Now show them what they will be searching for.† Elena obligingly held out the crescent shaped half-key for Saber to sniff. â€Å"Voil! And Talon, now you take a good look.† Sage backed away to what was, Elena supposed, Talon's optimal seeing distance. Then when he came back, he said, † Commen;ons!† and the black dog exploded away, nose to ground, while the falcon took off in grand, high, sweeping circles. â€Å"So you think the kitsune were on this grass?† Elena asked Sage, as Saber began racing back and forth, nose still just above the grass – and then suddenly veered out onto the middle of the marble steps. â€Å"But assuredly, they were here. You see how Saber runs, like a black panther, with his head low, and his tail straight? He has business in hand, him! He is hot on the scent.† I know someone else who gives off the same feeling, Elena thought as she glanced back at Damon, who stood with his arms folded, motionless, coiled like a spring, waiting for whatever news the animals would bring. She happened to glance at Sage at the same moment, and she saw an expression on his face that – well, it was probably the same expression she'd been wearing a minute ago. He glanced at her and she blushed. â€Å"Pardonnez-moi, Monsieur,† she said, looking away quickly. â€Å"Parlez-vous fran;ais, Madame?† â€Å"Un peu,† Elena said humbly – an unusual condition for her. â€Å"I can't really keep up a serious conversation. But I loved going to France.† She was about to say something else, when Saber barked once, sharply, to attract attention and then sat bolt upright at the curb. â€Å"They came or left in a carriage or litter,† Sage translated. â€Å"But what did they do in the house? I need a trail going the other way,† Damon said, looking up at Sage with something like raw desperation. â€Å"All right, all right. Saber! Contremarche!† The black dog instantly turned around, put its nose to the ground as if it afforded him the greatest delight, and began running back and forth across the stairs and the lawn that formed the â€Å"Great Ballroom† – now becoming pitted with holes as people took shovels, pickaxes, and even large spoons to it. â€Å"Kitsune are hard to catch,† Elena murmured into Damon's ear. He nodded, glancing at his watch. â€Å"I hope we are, too,† he murmured back. There was a sharp bark from Saber. Elena's heart leaped in her chest. â€Å"What?† she cried. â€Å"What is it?† Damon passed her, grabbed her hand, and dragged her in his wake. â€Å"What has he found?† Elena gasped as they all reached the same point simultaneously. â€Å"I don't know. It's not part of the Great Ballroom,† replied Meredith. Saber was sitting up proudly in front of a bed of tall, clustering pale lavender (deep violet) hydrangeas. â€Å"They don't look like they're doing too well,† said Bonnie. â€Å"And it's not below any of the upper ballrooms, either,† Meredith said, stooping to get at Saber's height and then look up. â€Å"There's just the library.† â€Å"Well, I know one thing without a question,† Damon said. â€Å"We're going to have to dig up this flower patch and I don't fancy asking Ms. Larkspur-eyes-Now-I-have-to-kill-you for her permission.† â€Å"Oh, did you think they were larkspur, her eyes? Because I thought of bluebells, rahthah,† said a guest behind Bonnie. â€Å"Did she really say she had to kill you? But why?† another guest, nearer to Elena asked nervously. Elena ignored them. â€Å"Well, let's put it this way, she's certainly not going to like it. But it's the only clue we've got.† Except, I suppose, if the kitsune meant to leave it here, but then took off in a coach, she added voicelessly to Damon. â€Å"So that means the show can commence,† cried one of the young vampire fans, stepping toward Elena. â€Å"But I don't have my amulet back,† Damon said flatly, moving in front of Elena like an impenetrable wall. â€Å"But you will in minutes, surely. Look, couldn't some fellows backtrack with the dog to wherever the bad guys came from – came to the estate from, if you get me? And meanwhile we can be getting on with the show?† â€Å"Can Saber do that?† Damon asked. â€Å"Follow a carriage?† â€Å"With a fox in it? But of course. Actually, I could go with them,† Sage said quietly. â€Å"I could make sure that these two enemies are caught if they are on the other end of the trail. Show them to me.† â€Å"These are the only shapes I know.† Damon reached out two fingers and touched Sage's temple. â€Å"But, of course, they'll have more forms, possibly infinite ones.† â€Å"Well, they are not our priority, I assume. The, ah, amulet is.† â€Å"Yes,† Damon said. â€Å"Even if you don't land a blow on them, get the key half and race back.† â€Å"So? Even more important than revenge,† Sage said softly, shaking his head in wonder. Then he added quickly. â€Å"Well, I will wish us good luck. Any adventurous types who want to go with me? Ah, good, four – very well, five, Madame – is enough.† And he was gone. Elena looked at Damon, who was looking back with blank, black eyes. â€Å"You really expect me to do – that – again?† â€Å"All you need to do is stand there. I'll make sure you lose as little blood as possible. And if you ever want to stop we can have a signal.† â€Å"Yes, but now I understand. And I can't handle it.† His face went cold suddenly. Shutting her out. â€Å"You're not required to handle anything. Besides, isn't it enough if I say it's a fair bargain for Stefan?† Stefan! Elena's entire body went through some sort of elemental change. â€Å"Let me share it,† she begged, and knew that she was begging and knew what Damon was going to say. â€Å"Stefan is going to need you when we get out. Just make sure you can handle that.† Stop. Think. Don't bash his head in, Elena's brain told her. He's pushing your buttons. He knows how to do it. Don't let him push your buttons. â€Å"I can handle both,† she said. â€Å"Please, Damon. Don't treat me as if I were – one of your one-nighters, or even your Princess of Darkness. Talk to me as if I were Sage.† â€Å"Sage? Sage is the most frustrating, cunning – â€Å" â€Å"I know. But you talk to him. And you used to talk to me, and now you're not. Listen to me. I can't bear to go through this scenario again. I'll scream.† â€Å"Now you're threatening – â€Å" â€Å"No! I'm telling you what will happen. Unless you gag me, I'll scream. And scream. As I would scream for Stefan. I can't help it. Maybe I'm breaking down†¦.† â€Å"But don't you see?† Suddenly he had whirled around and taken hold of her hands. â€Å"We're almost at the end. You, who've been the strongest all along – you can't break down now.† â€Å"The strongest†¦Ã¢â‚¬  Elena was shaking her head. â€Å"I thought we were right there, on the verge of understanding each other.† â€Å"All right.† His words came as hard chips of marble now. â€Å"What if we do five?† â€Å"Five?† â€Å"Five strokes instead of ten. We'll promise to do the other five when the ‘amulet' is found, but we'll run when we do find it.† â€Å"You would have to break your word.† â€Å"If it takes that – â€Å" â€Å"No,† she said flatly. â€Å"You say nothing. I'll tell them. I'm a liar and a cheat and I've always played with men. We'll see if I can't finally put my talents to good use. And there's no point in trying any of the other girls,† she added, glancing up. â€Å"Bonnie and Meredith are wearing gowns that would fall right off if you slashed them. Only I have a bare back.† She pirouetted in place to show off how her dress met only very high at the neck in a halter and very low in the back in a V. â€Å"Then we're agreed.† Damon had a slave refill his goblet and Elena thought: we're going to be the tipsiest act in history, if nothing else. She couldn't help but shiver. The last time she had felt an inner trembling was from Damon's warm hand on her bare back as they danced. Now, she felt something much icier, just a draft of cold air perhaps. But it drew her mind to the feeling of her own blood running down her sides. Suddenly Bonnie and Meredith were there beside her, forming a barricade between her and the increasingly curious and excited crowd. â€Å"Elena, what's happened? They said a barbarian human girl was to be whipped – † began Meredith. â€Å"And you just knew it had to be me,† completed Elena. â€Å"Well, it's true. I don't see how I can get out of it.† â€Å"But what have you done?† Bonnie asked frantically. â€Å"Been an idiot. Let some fraternity-type vampire boys think that it was a sort of magic act,† Damon put in. His face was still grim. â€Å"That's a little unfair, isn't it?† Meredith asked. â€Å"Elena told us about the first time. It sounded as if they jumped to the conclusion that it was an act all by themselves.† â€Å"We should have denied it then. Now, we're stuck with it,† Damon said flatly. Then, as if he were making an effort, â€Å"Oh, well, maybe we'll get what we came for, anyway.† â€Å"That was how we found out – some idiot came running down the steps yelling about an amulet with two green stones.† â€Å"It was all we could think of,† Elena explained wearily. â€Å"It's worth it for Damon and I to do this if only we can find the other half of the key.† â€Å"You don't have to do it,† Meredith said. â€Å"We can just leave.† Bonnie stared at her. â€Å"Without the fox key?† Elena shook her head. â€Å"We've already been through all that. The unanimous decision was to do it this way. She looked around. â€Å"Now where are the guys that wanted to see it so much?† â€Å"Looking in the field – that used to be a ballroom,† Bonnie replied. â€Å"Or getting shovels – lots of 'em – from Bloddeuwedd's gardening compound. Ow! Why'd you pinch me, Meredith?† â€Å"Oh, my, did that pinch? I meant to do this – â€Å" But Elena was already striding away, as eager now as Damon was to get it over with. Half over with. I just hope he remembers to change into his leather jacket and black jeans, she thought. In white tie – the blood – I won't let there be any blood. The thought was sudden and Elena didn't know where it came from. But in the deepest reaches of her being, she thought: he's been punished enough. He was trembling in the litter. He thought about another person's well-being from minute to minute. It's enough now. Stefan wouldn't want him to be hurt any more. She glanced up to see one of the Dark Dimension's small, misshapen moons moving visibly above her. This time the surrender she made to it was bright red, a feather shining in sullen crimson light. But she gave herself up to it unreservedly, body and soul, and it rested on the hallowed spring of eternal blood that was her womanhood. And then she knew what she had to do. â€Å"Bonnie, Meredith, look: we're a triumvirate. We have to try to share this with Damon.† No one looked enthusiastic. Elena, whose pride had been entirely broken from the moment she first saw Stefan in his cell, knelt down in front of them on the hard marble step. â€Å"I'm begging you – â€Å" â€Å"Elena! Stop that!† Meredith gasped. â€Å"Please get up! Oh, Elena – † Bonnie was a breath away from tears. And so, it was small, softhearted Bonnie who turned the tide. â€Å"I'll try to teach Meredith how. But anyway, we'll at least share it between the three of us.† Hug. Kiss. A murmur into strawberry hair, â€Å"I know what you see in the dark. You're the bravest person I know.† And then, leaving a stunned Bonnie behind, Elena went to collect spectators for her own whipping.