Saturday, October 5, 2019
Racial Communitarianism Essay Example | Topics and Well Written Essays - 250 words
Racial Communitarianism - Essay Example This is a post-post-modernist development in the sense that it engulfs not only traditions of libertarianism, modernity of civil society and peculiar amalgamation of both these to bring forth something anew as good governance but also its quest for a balanced form of State and social ethos. Racial Communitarianism thus reflects a search and global movement for equal respect and opportunities to people of all races in the pursuance of their duties as human beings and citizens of a global civil society. Rights will then be natural corollary of duties so performed professionally. Communitarianism is also an attempt to work towards fighting various apparently fascist tendencies of libertarianism such as overarching power channels and structures like the Security Council of the United Nations and the all powerful stature of the President of United States despite inherent checks and balances in the political system. Communitarianism is, indeed, an emerging movement to go beyond the shackles of a sovereign nation-state. It is moving ahead into the realms of a global civil society tackling a number of its issues and problems on its own without always looking up to the State for all its solution. Standing on one's own feet, preserving one's self-respect, economic and multicultural empowerment alongwith individual based and logically viable soc
Friday, October 4, 2019
National music of China, Indonesia and Brazil Essay
National music of China, Indonesia and Brazil - Essay Example This "National music of China, Indonesia and Brazil" essay outlines the historical reasons for the national music's uprising. The idea of nationalism was first based on divisions between the German, Italian or French style, most which was seen in the image of the nation. However, this became more prevalent in the 1800s and 1900s, specifically because of the national agenda and political approach. Many leaders were searching for an identity which closed the doors to trade and other aspects of country interference, specifically to gain power over those within the country. Others were trying to shape the image of the nation, specifically so it would produce pride among those in the nation and increase the cultural and production. This led to the main aspects of national pride which were reflected in the music. The concept of patriotism which was pushed by the political leaders and society was followed by several composers experimenting with music and trying to find different ways of exp ressing what was occurring within the society. Composers such as Bartok were renowned for going into the fields and moving into the early fields of ethnomusicology. Folk songs from villages would be recorded then transferred into the classical styles within the nation. Other regions of the world followed this format, specifically with the folk music, combined with the contemporary idioms that were within each of the countries. Countries were able to keep their identity and heritage while associating the different concepts to modern and contemporary styles. This was followed with the continuous nationalism that experimented with modern sounds but announced that the movement of technique was specifically for a region. For instance, the concept of Impression, led by Ravel, was based on the French contemporary aspects in society. These several movements then redefined the approach to nationalism and the way in which it was associated with culture and society (Grosby, Leoussi, 55: 2007). Defining Contemporary Nationalism There are several elements which create a sense of nationalism in society and the contemporary approach which is a part of the music created. This is not only based on the idea of folk music and the presentation of one type of music presenting a country. The definition of nationalism has transcended into defining a country by the sounds which belong to a specific country and create an understanding of the artists which are in this region. This began with the contemporary approach to the modern compositions, which included the French Impressionism. While this wasnââ¬â¢t French, different techniques and theories led several to the belief that it belonged to this region. The ideal wasnââ¬â¢t only associated with the definitions of what it meant to be national through folk music, but also included the several techniques used. Instrumentation, distinct sounds, approaches to the culture and creating a sense of diversity within a given region
Thursday, October 3, 2019
Working Cass Families and Modern Education Systems Redefined under Neo-Liberalism Policies Essay Example for Free
Working Cass Families and Modern Education Systems Redefined under Neo-Liberalism Policies Essay Connellââ¬â¢s (2003) article focuses on the problematic relationship between working-class families, and modern education systems, which is being redefined under neo-liberalism policies. Connell explores this issue in relation to an Australian reform, which was created with an intention to make upper secondary education more inclusive, in particular à ¬Ã¢â¬â through more extensive vocational education opportunities. Connell explains that the level of which working-class youthââ¬â¢s needs have been met, or neglected throughout the past 150 years of mass schooling in advanced capitalist economies remains a core problem of social justice in education. (p. 235) Connellââ¬â¢s argument is that while social class is no longer officially recognised as an issue in Australian life, class inequality and exclusion have a marked influence on education in the present day. (p. 247) Connell states that the nature of which working class families respond to state schooling is a key issue of importance in research on class and education. Connellââ¬â¢s central argument lies in her criticism of the neo-liberal market agenda, which she states is ultimately seeking to ââ¬Ëreconstruct mass education on a ruling-class education organisational modelââ¬â¢. Connell argues that due to the fact neo-liberalism fails to acknowledge that class structure exists, and assumes its market model is universally applicable (an assumption which Connell states is disproven by British research) ââ¬âproblems associated with class structure will continue to go unacknowledged. (p. 37) Connell further argues that many working class families continue to grapple with the ââ¬Ëbureaucratic machineryââ¬â¢ of state education in order to obtain a reasonable education for their children, however as Connell believes ââ¬â ââ¬Ëthereââ¬â¢s still a long way to goââ¬â¢ before this relationship is cohesive and productive for all parties involved. (p. 247) In support of her argument of class still being a key factor of inequality in education, Connell cites authors such as Bettie (2002), Dent and Hatton (1996), Thompson (2002), Lynch Lodge (2002) Teese and Polesel (2003) (p. 235). Connell cites Marginson (1997) to argue that the motives of neo-liberalismââ¬â¢s market agenda in the 1980ââ¬â¢s was to ââ¬Ëpush to privatise educationââ¬â¢, and where public education institutions remained ââ¬ârestructure them to become market competitive. (p. 236) Using largely a methodical approach, Connell draws on close-focus research carried out across four socially and geographically diverse government secondary schools, obtained from the Vocational Education and Equity in Senior Secondary Schooling project, and undertaken by staff of the University of Sydneyââ¬â¢s Faculty of Education, the Department of Education and Training and the NSW Board of Studies. Through a series of qualitative interviews with students, parents and teachers of Years 11 and 12 VET classes over a period of two years, Connell explores the relationship between working-class families and schools today, which operate under this neo-liberalist influence, but which are also attempting to implement social justice reforms, particularly in regards to expanding vocational education options. (p. 238) Connellââ¬â¢s central argument is plausible and relatable in the sense of the extensive field data carried out across schools depicting various class structures. The article being ââ¬Ëpeer reviewedââ¬â¢ also adds more weight to her claims. The central theme of her argument is logically developed throughout the body of the paper, and further solidified in the conclusion, however at times she touches on international research, (for example; the British research she suggests disproves the neo-liberalist market model is ââ¬Ëfar fromââ¬â¢ being universally applicable) (p. 237) without any further details as to why. Adding further detail of the international data Connell cited would have helped to solidify her key points.
The Well Meadows Hospital Management System
The Well Meadows Hospital Management System This document describes an online management system for a small hospital named as wellmeadows. This system creates online data storage for all the information related to the proceedings of the hospital and hence making the information available as well as more reliable to the users. The information becomes easily accessible as well as more secure with the system being secured by user credentials. The hospitals current functionality is based on a register based system that involves the maintaining of every transaction, records of patients, doctors, nurses in huge files that are stored in hospitals store room. It is not only difficult to search for certain information but also very difficult to maintain historical data. The old files are prone to get damaged and it is very difficult to manage this huge collection of documents and keep it organized. The new system is based on a database management system that allows secure, easy and reliable storage of data and retrieval is also very easy. In the old system, a user needed to know in which register particular information is stored but in the new system a user has a graphical interface, where he can simply search for the information by doing some clicks and selecting the correct options (Liang 2010). The ease in accessing information not only improves the information management but also impacts the day to day activities of the hospital. It reduces the delay in information retrieval and the delay in providing necessary treatment to the patients as per their historic records is also reduced that will improve the efficiency and effectiveness of the treatment (Prokosch Dudeck 1995). Intended Audience and Reading Suggestions This document is meant for the users of the system i.e. the administrators and staff of the wellmeadows hospital. This document explains the system design and its usage and not meant for external users. This document not only guides the user how to operate the system but also tells how to use the system efficiently to match with requirements of the user and let him take the profit out of it. This document will also help the developers in the situation where modifications are required in the system. Project Scope The project currently is limited to the internal use of the hospital and is simply meant to store and provide useful information. The system doesnt generate any information or predictions of its own. The system will be helpful in better management of the hospital and will provide all the information in an organized manner. This project is not meant for users outside the hospital and will not allow any person outside the hospital to see the internal and personal information of the people connected to the system. The system will keep the information secure and will keep it limited to people with proper access only. Overall Description Product Perspective This product is a change of methodology for the hospitals and firstly, it will be implemented in the Wellmeadows hospital. There are several similar systems in other big hospitals but this system is designed to meet the cost and utility requirements of the small hospital. This product is an evolutionary product that will be improved in the future and more functionality will be added to it. Product Features The product is useful to the hospital in a number of ways as it provides following features to the hospital:- Easy, storage and retrieval of all patients information that not only helps to maintain track record but also helps the doctors as they can know the treatment history of the patients. Store the entire information about doctors that allow the hospital to decide, which patient will be treated by which doctor. This product not only helps in providing better treatment to the patients but also helps in building trust with patients. It also helps to know about the doctors, who are preferred by patients (Sumathi Esakkirajan 2007). Storage of staffs information that helps in smooth running of the hospital. Storage of all drugs used in the hospital and all drugs being prescribed to the patients that allows more control over the quality of drugs used. It also ensures uniformity among various doctors and to maintain the stock of drugs as per their requirements (Sumathi Esakkirajan 2007). User Classes and Characteristics The system will be used by internal users only and will be accessible to outside users in a limited form. Following are the users of the system: Hospital receptionists: The hospital receptionist will act as system administrators and will make all the entries in the system. They will have access to all the information in system and will take control of the normal proceedings of the hospital. Receptionists will register the patients, allocate staff to various wards, give appointments to patients and will maintain the central stock of medicines and drugs. Charge Nurses: The charge nurses will manipulate the information related to their specific ward and will be able to see all patients information in their ward and provide medication accordingly. They will also be able to see which staff is on duty in their ward and also will be able to see the stock of medicines in their ward. Consultants: The consultants will able to see the patients information and the list of appointments that have been allocated to them. The will be also able to see the wards in which they are assigned duties and will also be able to prescribe medicines to their patients. Patients: Patients will be able to see the appointments they have in the hospital and will be able to see the medicines that have been prescribed to them from the system. Operating Environment The system will be a web based system and can be accessed within and outside the hospital through a link over hospitals website. The users will login the system using a username and password that will be provided to them by the system administrator and the system will be independent of the operating system. Assumptions and Dependencies The system assumes that the information being added to the system is correct and authenticated. It is also assumed that the username and password will be kept secret and will not be shared with anyone. The users will be themselves responsible for losing passwords. This system doesnt include a mailing feature and hence the user should not lose their passwords in any case. The passwords will have to be reset by the database administrator only. System Flow A data flow diagram as its name suggests represents the flow of data in any system. There is a huge flow of data and information in any information system. This flow is analyzed with the help of data flow diagrams. Data flow diagrams can be used for visualization of data processing. On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink via an internal process (Calmet Pfalzgraf 1996). A data flow diagram is composed of several components: Entities: Entities are the sources of information in any system. These entities are the external sources of information in any system. It is very important to mention all the entities in a system. This ensures the proper flow of information in a system. These also act as external sinks for the system (Dennis, Wixom Roth 2006). Database or data store: A database stores the information in any system. These act as internal data sources for a system. It stores the information from one process and provides information to other processes. It also acts as internal sinks in the system. Processes: A process is a function performed by the system. Each process helps to access the information from database or an entity and provide the information back to the entity or database (Dennis, Wixom Roth 2006). The DFDs are represented in several levels. With increase in each level the details in the diagram also increased. Level-0 would contain minimum details, while level 1 would contain more details than level 0 and so on. This section explains flow of the system, how the system operates and its functionalities with the help of data flow diagrams. The level of details increases with each diagram. The system at the highest level is nothing but a hospital management system; the inner details are not specified in the data flow diagram level-0 (Johns 2002). Here is the zero level data flow diagram (DFD level: 0) The above diagram shows the four entities that will be involved in the system- patients, doctors, hospital staff and nurses. These are the four main sources of information in the system. As the system is broken down into several modules, these entities match up their desired roles (Johns 2002). This breakdown gives us the exact information about the operations performed by the system and the entities involved in each operation. (DFD level:1) In the DFD level -1, the system is divided into three major domains namely patient management system, stock management system and staff management system. Patient management system is related to patients that includes two types of patients- inpatients and outpatients. Inpatients are those, which get admitted in the hospital and stay there while the outpatients take appointments and visit the hospital at given date and time (Johns 2002). The second major section of the system is stock management system. In this, the requirements of the hospital are analyzed and accomplished such as clinical and non clinical requirements like drugs, bandages and other requirements. This part also maintains the division of these items among various wards and among various departments of the hospital. The third section of the system is about the staff allocation system that ensures that all staff is being assigned proper duties and each wards getting proper number of employees and nurses for its daily operations and also for emergency situations. It also ensures that the consultants are visiting the wards on time and each patient is getting proper attention. External Interface Requirements User Interfaces The user interface is simply a web interface, which is presented to the user through a web browser. This allows user to enter data and select from various drop down menus. These drop down menus show the content read from the database. By simply clicking to submit buttons, user can save data into database. The user interfaces will also implement checks for null values being entered into database (Galitz 2009). It displays the format for date values to be entered, but doesnt validate them. If there is any error in entering any values to the database, the system generates the error message and asks the user to retry. This helps the user to be ensured that the values have been entered and hence a consistency in the system is maintained (Galitz 2009). Hardware Interfaces As the system is a web based system, the website will be hosted on a central server machine with other machines getting access to it through the network. The other machines could be simple computers or especially dedicated machines that provide access only to the content. For our current implementation, we will rely on general desktop systems. Communications Interfaces The system uses HTTP (hypertext transfer protocol) for sending and receiving data over the internet (Groth, Skandier, Lammle Tedder 2005). When the system is used within the hospital, it is presented on same network hence its generally faster as the server is also located within the hospital, but outside the hospital the system is accessible via internet and hence a domain is needed to be registered with the DNS servers hosted at the ISP. Data Model This section explains the data model used for the system. The section begins with recognizing all the entities to be used in the system and their relationships and then converting those entities and relations to tables. These tables will be normalized to 3NF form. This section captures the cardinality and referential integrity rules needed to ensure that the data is of good quality for the users. The main aim of data models is to support the development of information systems by providing the definition and format of data. Entity-relationship model The E-R (entity-relationship) data model views the real world as a set of basic objects (entities) and relationships among these objects (Bai 2010). It is intended primarily for the DB design process by allowing the specification of an enterprise scheme. If the information system, being designed, is based on a database then the conceptual data model will later be mapped on to a logical data model, which in turn will be mapped on to a physical model during the physical design process (Bai 2010). The E-R diagram shows all objects involved in the system as entities and the function among them as relationships. Here is a description of entities used in our system:- Entity: An entity is nothing but an object that exists and is distinguishable from other objects. Entities could be concrete such as a person or it could be an abstract entity that is nothing but a concept (Stallings 2008). An entity could also be considered as a source of information for the system. There are following entities in well meadows:- Doctor or consultant (concrete) Change nurse (concrete) Patients (concrete) Wards (abstract) Drugs (concrete) Administrator (concrete) Staff (concrete) Qualification (abstract) Inpatient (concrete) Outpatient (concrete) Attributes: Attributes are unique qualities that can be possessed by both relationships and entities. Attributes are represented by ovals that are connected to the entity sets that possess them by a line. With the exception of weak entities, all entities have to a minimum amount of attributes. These make up the primary key of the entity (Stallings 2008). Following are the attributes of the various entities described above:- Doctor: id, name, address, telephone, duty shift, date of birth Change nurse: id, name, address, telephone, date of birth, ward allocated. Patients: id, name, address, telephone, date of birth Ward : ward_num, ward_name, location, in charge nurse, number of beds Drugs: id, name, type, dosage, methodology, price, stock Administrator:- username, password, name, address, telephone, date of birth Staff: id, name, address, telephone, date of birth, ward allocated. Qualification:- institution name, qualification name Inpatient:- id, name, address, telephone, date of birth, date of admit, expected stay, expected date of leaving, actual date of leaving Outpatient: id, name, address, telephone, date of birth, date of appointment, consultant name, location, time of appointment. Here is an entity relationship diagram for the given system:- (Entity Relationship Digram) The patients are categorized into inpatients and outpatients as explained above while the staff has two categories doctors and nurses. The remaining staff is covered under staff itself. Wards are there in the hospital that is controlled by the nurses while drugs are referred by the doctors and they are taken by the patients. Both the inpatients and outpatients are treated by the doctors, while inpatients have a separate relationship with wards that they are admitted to it. Database design and normalization Normalization can be defined as the process in which data is taken from problem and reduced to a set of relations through data integrity and elimination of data redundancy (Gunderloy Jorden 2008). Data integrity: The data in the database is consistent and satisfies the all integrity constraints. Data redundancy Data redundancy incurs if it is found in two different locations (direct redundancy). At the same time the calculation of data from other items (indirect redundancy) also creates redundancy (Oppel 2004). First normalized form: The multi valued attributes are removed that facilitate a single value at the intersection of each row and column in a table. Second Normal form: In second normal form, all the non key attributes must be dependent on complete primary key and not on a single part of primary key. Third normal form: In a third normal form, all the non keys are determined only by the primary keys (Oppel 2004). Boyce-Codd normal form: The anomalies have been removed that resulted from the functional dependancies (Gunderloy Jorden 2008). The normalized schemas of the tables used in our database are given below:- Drug drug_ID drug_name description dosage method Stock Reorder cost Patient patient_id First Name Last name Address telephone Date of birth Sex Marital status Date of registration Staff Staff_id First Name Last name Address telephone position Inpatient id Patient_id Ward number Bed number Date placed Expected Stay Expected Date of leaving Actual date of leaving Ward Ward number Name location extension Charge nurse id(staff.staff id) Outpatient id patient id Consultant id Date Time location Qualification id Staff_id Type Institution Completion date Weekly allocation Ward number Staff id shift date Prescription Patient_id drug_id Start Date Units per day End date Database implementation The database defined above needs to be implemented over a database system. We use a relational database management system as our designs are based on relational model. Considering the requirements of hospital that are not very large, we can use an open source, free of cost database management system named as MySQL. MySQL is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. It works on most of the available operating systems and is generally the most popular choice for implementing small database applications. It also has a plug-in named as phpmyadmin that provides a GUI access to the database (Lambrix 2010). Here are the implementations of SQLs for the database:- phpMyAdmin SQL Dump version 3.2.4 http://www.phpmyadmin.net Host: localhost Generation Time: Dec 12, 2010 at 08:58 AM Server version: 5.1.41 PHP Version: 5.3.1 SET SQL_MODE=NO_AUTO_VALUE_ON_ZERO; /*!40101 SET @[emailprotected]@CHARACTER_SET_CLIENT */; /*!40101 SET @[emailprotected]@CHARACTER_SET_RESULTS */; /*!40101 SET @[emailprotected]@COLLATION_CONNECTION */; /*!40101 SET NAMES utf8 */; Database: `hospital` Table structure for table `drug` CREATE TABLE IF NOT EXISTS `drug` ( `drug_num` int(11) NOT NULL AUTO_INCREMENT, `name` varchar(100) NOT NULL, `description` varchar(100) NOT NULL, `dosage` varchar(100) NOT NULL, `method` varchar(100) NOT NULL, `stock` int(11) NOT NULL, `reorder` int(11) DEFAULT NULL, `cost` decimal(10,0) NOT NULL, PRIMARY KEY (`drug_num`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1 ; Dumping data for table `drug` Table structure for table `inpatient` CREATE TABLE IF NOT EXISTS `inpatient` ( `inpatient_id` int(11) NOT NULL AUTO_INCREMENT, `patient_id` int(11) NOT NULL, `expected_stay` int(11) NOT NULL, `date_placed` date NOT NULL, `date_leave` date DEFAULT NULL, `actual_leave` date DEFAULT NULL, `ward_num` int(11) NOT NULL, `bed_num` int(11) NOT NULL, `spouse_id` int(11) DEFAULT NULL, PRIMARY KEY (`inpatient_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=2 ; Dumping data for table `inpatient` INSERT INTO `inpatient` (`inpatient_id`, `patient_id`, `expected_stay`, `date_placed`, `date_leave`, `actual_leave`, `ward_num`, `bed_num`, `spouse_id`) VALUES (1, 1, 5, 2010-08-12, 0000-00-00, 0000-00-00, 1, 45, 0); Table structure for table `outpatient` CREATE TABLE IF NOT EXISTS `outpatient` ( `appointment_num` int(11) NOT NULL AUTO_INCREMENT, `consultant_id` int(11) NOT NULL, `patient_id` int(11) NOT NULL, `date` date NOT NULL, `time` time NOT NULL, `location` varchar(100) NOT NULL, PRIMARY KEY (`appointment_num`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1 ; Dumping data for table `outpatient` Table structure for table `patient` CREATE TABLE IF NOT EXISTS `patient` ( `patient_id` int(11) NOT NULL AUTO_INCREMENT, `firstname` varchar(50) NOT NULL, `lastname` varchar(50) NOT NULL, `address` varchar(500) NOT NULL, `tel` varchar(20) NOT NULL, `dob` date NOT NULL, `sex` varchar(10) NOT NULL, `mar_status` varchar(20) NOT NULL, `reg_date` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP, PRIMARY KEY (`patient_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=3 ; Dumping data for table `patient` INSERT INTO `patient` (`patient_id`, `firstname`, `lastname`, `address`, `tel`, `dob`, `sex`, `mar_status`, `reg_date`) VALUES (1, yash, yash, yash, 7799, 0000-00-00, Male, UnMarried, 2010-12-08 00:03:10); Table structure for table `prescription` CREATE TABLE IF NOT EXISTS `prescription` ( `prescription_id` int(11) NOT NULL AUTO_INCREMENT, `patent_id` int(11) NOT NULL, `drug_num` int(11) NOT NULL, `units per day` int(11) NOT NULL, `startdate` date NOT NULL, `enddate` date NOT NULL, PRIMARY KEY (`prescription_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1 ; Dumping data for table `prescription` Table structure for table `qualification` CREATE TABLE IF NOT EXISTS `qualification` ( `q_id` int(11) NOT NULL AUTO_INCREMENT, `staff_id` int(11) NOT NULL, `type` varchar(100) NOT NULL, `institution` varchar(100) NOT NULL, `date` date NOT NULL, PRIMARY KEY (`q_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1 ; Dumping data for table `qualification` Table structure for table `requets` CREATE TABLE IF NOT EXISTS `requets` ( `request_id` int(11) NOT NULL AUTO_INCREMENT, `ward_num` int(11) NOT NULL, `drug_num` int(11) NOT NULL, `quantity` int(11) NOT NULL, `date` date NOT NULL, `processed` int(11) NOT NULL DEFAULT 0, `process_date` date DEFAULT NULL, PRIMARY KEY (`request_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1 ; Dumping data for table `requets` Table structure for table `staff` CREATE TABLE IF NOT EXISTS `staff` ( `staff_id` int(11) NOT NULL AUTO_INCREMENT, `firstname` varchar(50) NOT NULL, `lastname` varchar(50) NOT NULL, `address` varchar(500) NOT NULL, `sex` varchar(10) NOT NULL, `dob` date NOT NULL, `tel` varchar(20) NOT NULL, `position` varchar(50) NOT NULL, PRIMARY KEY (`staff_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=4 ; Dumping data for table `staff` INSERT INTO `staff` (`staff_id`, `firstname`, `lastname`, `address`, `sex`, `dob`, `tel`, `position`) VALUES (1, abcd, pqrs, asasd, Male, 0000-00-00, 123123, Charge Nurse); Table structure for table `staffhier` CREATE TABLE IF NOT EXISTS `staffhier` ( `id` int(11) NOT NULL, `description` varchar(100) NOT NULL ) ENGINE=MyISAM DEFAULT CHARSET=latin1; Dumping data for table `staffhier` INSERT INTO `staffhier` (`id`, `description`) VALUES (1, consultant), (2, Charge Nurse), (3, physiotherapist), (4, nurse); Table structure for table `tblusers` CREATE TABLE IF NOT EXISTS `tblusers` ( `username` varchar(50) NOT NULL, `password` varchar(50) NOT NULL, `name` varchar(50) NOT NULL, `wrong_count` int(11) NOT NULL DEFAULT 0, PRIMARY KEY (`username`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1; Dumping data for table `tblusers` INSERT INTO `tblusers` (`username`, `password`, `name`, `wrong_count`) VALUES (admin, 123456, administrator, 1); Table structure for table `ward` CREATE TABLE IF NOT EXISTS `ward` ( `ward_num` int(11) NOT NULL AUTO_INCREMENT, `ward_name` varchar(50) NOT NULL, `location` varchar(100) NOT NULL, `ext` int(11) NOT NULL, `num_beds` int(11) NOT NULL, `nurse_id` int(11) NOT NULL, PRIMARY KEY (`ward_num`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=2 ; Dumping data for table `ward` INSERT INTO `ward` (`ward_num`, `ward_name`, `location`, `ext`, `num_beds`, `nurse_id`) VALUES (1, ank, asasd, 6666, 3, 1); Table structure for table `weeklyallocation` CREATE TABLE IF NOT EXISTS `weeklyallocation` ( `allocation_id` int(11) NOT NULL AUTO_INCREMENT, `staff_id` int(11) NOT NULL, `ward_num` int(11) NOT NULL, `shift` varchar(50) NOT NULL, `startdate` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP, PRIMARY KEY (`allocation_id`) ) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=4 ; Dumping data for table `weeklyallocation` INSERT INTO `weeklyallocation` (`allocation_id`, `staff_id`, `ward_num`, `shift`, `startdate`) VALUES (1, 1, 1, EARLY, 2010-12-07 18:52:40), (2, 1, 1, NIGHT, 2010-12-07 23:33:40), (3, 0, 1, , 2010-12-08 00:05:25); /*!40101 SET [emailprotected]_CHARACTER_SET_CLIENT */; /*!40101 SET [emailprotected]_CHARACTER_SET_RESULTS */; /*!40101 SET [emailprotected]_COLLATION_CONNECTION */; This script will create the database and will make few entries in the tables as well. The username and passwords are stored in a table named as tblUsers. The admin password is also stored in the same table. This is the dump of the database exported by using phpmyadmin. Same script can be executed using the tool or also can be imported using the import option in phpmyadmin (Lambrix 2010). This will setup the database and the application can now be configured. System implementation The software package we choose for this system is XAMPP. Xampp is a software package that is used for hosting websites and the combination of four software packages namely php, apache, mysql and phpmyadmin. Xampp is a simple program that can be run on any machine; it does not require any specific hardware. Xampp is free software and it is available for various operating systems such as Linux, Windows, Mac OS, and Solaris etc. The programs sets up a mysql server on the system as well as an apache web server on the machine. The package also configures php for the machine and also provides phpmyadmin for managing the mysql database (Newman Thomas 2008). Xampp provides a root directory named as htdocs that works for the web server. Xampp is the easiest way to host a website. Xampp is very easy to install and uninstall as compared to the separate installation and configuration of the services it provides. Xampp also includes support for filezilla, mercury etc. Developers Xampp is open source software developed by www.apachefriends.com. Apache friends were founded in 2002 by Oswald and Kay. Oswald is their webmaster, while Kay is the maintainer of apache for windows. Apache friends have Xampp as their only project (Newman Thomas 2008). There are no new projects till date. The software package is available through Sourceforge that hosted the download files on their website www.sourceforge.net and made this whole project possible. Benefits Xampp has several benefits that make web hosting easy. These are as below: It is available in many languages such as English, Dutch, Italian, French, Portuguese and Chinese etc. It makes database management very easy with support of phpmydmin. The sup
Wednesday, October 2, 2019
Ethics on the Internet Essay examples -- Ethics Internet Computers Ess
Ethics on the Internet In today's society, there are many ethical issues on the Internet. Some of the biggest issues and concerns seem to be hacking and viruses, copyright infringements, spam, privacy, and cyberporn. Internet ethical issues affect a wide variety of individuals and almost all people today are affected in some kind of a way. Until recently, most computer users had not been very concerned with questions of ethics and may not have been aware of something being seen as an ethical issue, but this depends on every individual's position. However, today there are many concerns about these issues and some organizations are trying to get laws approved protecting individuals in today's society. Copyright infringements now are an extremely large issue. Illegal distribution of software over the Internet damages the software market, causes prices to go up, slows new software development, and hurts job creation in software development. It is currently reported that 40% of the world's software is pirated. Computer software is one of the most valuable technologies in our society. Since software is so valuable and because computers make it easy to create an exact copy of a program in seconds, software piracy is widespread. From individual computer users to professionals who deal wholesale in stolen software, piracy exists in homes, schools and businesses. Software pirates not only steal from the companies that make the software, but it causes the company to have less money towards their research and development of new software and it ends up hurting all users. The software piracy industry is growing due to the number of PCs and Internet users growing. The Business Software Alliance believes that new techn... ...ography Ethics and Electronic Information in the Twenty-First Century, by Lester J. Pourciau (Editor), G. T. Mendina Business Software Alliance, http://www.bsa.org/usa/">http://www.bsa.org/usa/ Internet Ethics by Duncan Langford, catalogue/catalogue.asp?Title_Id=0333776267 Journal of Consumer Marketing, Vol. 16, No. 6, 1999, pages 590-602, Targeting Children Online: Internet advertising ethics issues AMA American Management Association, http://www.amanet.org/index.htm">http://www.amanet.org/index.htm Web101, Making the Net Work for You, Second Edition, by Wendy G. Lehnert, Copyright 2003 Ethics and the Conduct of Business, Fourth Edition, by John R. Boatright, Copyright 2003 Ethics on the Internet by Michael A. Covington, Copyright 1997, Gernsback Publications, http://www.ai.uga.edu</em>~mc/ethics.html">http://www.ai.uga.edu/~mc/ethics.html </ol>
The Significance of Gender Roles in Shakespeares The Taming of the Shr
Gender roles are undeniably a fundamental topic of critique in literature, particularly since expected gender roles have evolved in recent years. More importantly, the transcendence of these gender expectations indicates the possibility for transformation and increasing liberation in society. History explores many different stages for the sexes and their respective roles, from traditional anti-feminist times in which certain roles were strictly enforced, to more modern beliefs entailing free will and a lack of restrictions. In spite of this progress, there are always those who expedite the process while there are others that hinder development from occurring, even when it is necessary. Literary works in particular serve as a showcase for the progression of gender roles, but nonetheless reveal that through time certain elements remain consistent. Two authors who wrote in radically different time periods, William Shakespeare and Lorraine Hansberry, wrote plays that pose a threat to expected and traditional gender roles. The Taming of the Shrew (1623) is an example of an earlier work, which involves characters that manage to defeat their expected roles by acting out of the ordinary. A shrew, which is literally defined as either a small rodent-like animal or a woman with a harsh and nagging temperament (American Heritage Dictionary 1285), is used in reference to Katherine, the daughter of Baptista, who counters the expectation of women to act submissive by being loud and outspoken. In the end, even though Katherine seems to have submitted herself to societyââ¬â¢s expectation of women, she is really only conforming in order to benefit her social role, since she realizes that accepting her role in society will be easier than counteri... ...ple are cruel, she still has big dreams of going to Africa with Asagai and becoming a doctor. In their plays, Shakespeare and Hansberry share a common element, which seems to say that some things, such as society and its expectations, are timeless. Society sets up expectations that are accepted and preferable to other members of society, and Katherine and Beneatha serve not only to demonstrate this ideology but also to argue against it and draw attention to the perpetual gender expectation of society. Works Cited Hartwig, Joan. ââ¬Å"Horses and Women in The Taming of the Shrewâ⬠. 45. 4. (1982:Autumn): 285- 294. Newman, Karen. ââ¬Å"The Taming of the Shrew A Modern Perspectiveâ⬠. 229-238. ââ¬Å"Shrewâ⬠. American Heritage Dictionary. 4th ed. 2002. Wilkerson, Margaret B. ââ¬Å"A Raisin in the Sun: Anniversary of an American Classicâ⬠. 38.2. (1986: Dec): 441-453.
Tuesday, October 1, 2019
Examine the dramatic significance of the theme ââ¬Åfair is foulââ¬Â in Macbeth Essay
There are many themes in ââ¬Å"Macbethâ⬠, not surprising given the playââ¬â¢s richness of character, language and events. These themes include goodness and evil, deceptive appearances and reality and the supernatural. They are all linked to the idea of ââ¬Å"fair is foulâ⬠, as are the characters. I will now try to examine in more detail the dramatic significance of ââ¬Å"fair is foulâ⬠in Shakespeareââ¬â¢s ââ¬Å"Macbethâ⬠. It is believed that the play was written with King James in mind. ââ¬Å"Mabethâ⬠was written sometime between 1603 and 1606, years during which King James (6th of Scotland and 1st of England) was on the throne. Many of Jamesââ¬â¢ interests were included in the play, for example kingship, loyalty and most importantly his fascination with supernatural (he even wrote a book called Demonology, on the subject). The idea of the supernatural and witchcraft in particular are very important during the play. The witches also known as the ââ¬Å"Weird Sistersâ⬠, Act 1 Scene 3 Line 34, represent evil and temptation in the play. In Shakespeareââ¬â¢s day there was widespread belief in the existence of witchcraft and demonology. People feared that witches attempted to corrupt Godââ¬â¢s natural order, and thus in 1604 its practice became punishable by death. However they were still uncertain on the power of witches. This uncertainty can be seen in the play. We never know whether the witches have any real power or whether they can only persuade and suggest things to others. The Gunpowder plot seems to have been added to the play. It was an action taken to remove the king, very similar to Macbethââ¬â¢s actions. Again it gives the idea of Godââ¬â¢s natural order being destroyed. They believed that the king ruled by Divine Right i.e. they were Godââ¬â¢s chosen one. Therefore killing him, to obtain unrightful kingship would definitely shatter the natural order. The fact that they are evil is shown in their final couplet. It is, as mentioned above, the three witches who chorus the line ââ¬Å"fair is foul and foul is fairâ⬠. It can be translated as ââ¬Å"good is bad and bad is goodâ⬠, a slightly difficult phrase to understand. An important thing to note is that ââ¬Å"Fair is foulâ⬠¦Ã¢â¬ is a paradox. That is a statement, which appears to contradict itself but can contain a truth. It is this line that sets the tone for the rest of the play; the way things appear may not be the way they really are! Their line however can also be used to describe themselves and their predictions. When they tell Macbeth his future it all sounds good, ââ¬Å"â⬠¦All hail Macbeth, that shalt be King hereafterâ⬠. However it is these predictions that lead to his fatal actions and drastic downfall destruction. So really, these future visions arenââ¬â¢t good at all but bad. The witches never tell lies but because they speak in puzzling riddles, its possible that Macbeth hears what he wants to hear, by believing only the positive aspects. In Shakespeareââ¬â¢s ââ¬Å"Macbethâ⬠, the protagonist is lured to murder the King, Duncan, by witchââ¬â¢s predictions, his wifeââ¬â¢s encouragement, and by his own ambition. He commits a trio of wicked murders in the course of the play. It is possible to forget that the character described as ââ¬Å"â⬠¦brave Macbethâ⬠¦Ã¢â¬ is the one later described as a ââ¬Å"tyrantâ⬠. Macbethââ¬â¢s character is also one that is linked to the idea of ââ¬Å"fair is foul and foul is fairâ⬠. Prior to his encounter with the witches (Act 1, Scene 3) Macbeth is a hero, a loyal warrior in service of the legitimate, King of Scotland, Duncan. He is described as a noble valiant and fearless warrior and ââ¬Å"Bellonaââ¬â¢s bridegroomâ⬠, husband of the goddess of the war, worthy to be God of War. It appears that he has many positive characteristics but soon enough we find he has a fatal weaknessâ⬠¦ambition. He was easily influenced by, witches prophecies and his wifeââ¬â¢s persuasion, to follow the ambitions that he secretly desired to chase, ââ¬Å"Thus thou must doââ¬â¢ if thou have itâ⬠, in other words he must do it (kill King Duncan) if he wants the crown. He allowed his ambitions to suppress his good qualities and the end of the play describes him as ââ¬Å"a tyrantâ⬠, ââ¬Å"a dwarfish thiefâ⬠, and ââ¬Å"hellhoundâ⬠. Macbeth is obviously one of the clearest and simplest examples of the theme ââ¬Å"fair is foulâ⬠. By this I mean he is a character who fits the idea, things that look good may turn out to be evil. However I donââ¬â¢t think it is fair to call him completely evil. He did after all have a conscience, which played a major part throughout the play. It was his conscience that held him back from drastic actions, but not enough to stop him from murders that in the end he carried out. Lady Macbeth is also a good example of the theme ââ¬Å"fair is foulâ⬠. In the world of Shakespeare tragedies she has come to represent feminine treachery. Her ambition, foulness and rejection of female values, mark her as a heartless villain more monster than woman! ââ¬Å"Come to my woman breasts and take my milk for gall, you murdering ministersâ⬠. Unlike Macbeth, it is easily noticed that she has an evil hunger for power from the start. ââ¬Å"â⬠¦chastice with the valour of my tongue All that impedes thee from the golden crownâ⬠¦Ã¢â¬ just a section of her words from the first time we meet her (Act 1 Scene 5). However Shakespeare uses dramatic irony, in that the audience know she is evil but many characters fail to see this. Many are fooled by her deceptive acts. ââ¬Å"Fair and noble hostessâ⬠, are the words Duncan used to describe Lady Macbeth, who turned out to be involved in his murder later that night. The audience get a taste of her hunger for power by her reaction to the letter from Mabeth, it is both powerful and dramatic. As soon as she has finished reading the letter (including details of the witches premonitions) she decides to make sure Macbeth will become King. She knows her husband is ambitious but also considers his lack of ruthlessness- ââ¬Å"yet I do fear thy nature It is to full oââ¬â¢ thââ¬â¢ milk of human kindnessâ⬠. She claims that ruthlessness o is ââ¬Å"the illnessâ⬠that Macbeth doesnââ¬â¢t have in him. She decides that to gain the throne Duncan must be killed. To her great delight, she hears that the King is coming that very night. She invites the spirits of evil to enter her body- â⬠Come you spirits That tend on mortal thoughts! unsex me here, And fill me from the crown to the toe top-full Of direst crueltyâ⬠. Any thoughts of doubt that she has some good inside her are totally unquestionable, at this point. How can a woman want the very characteristics that make her a woman, i.e. love and care, to be taken away just so that she can complete a wicked murder? The language she uses from lines 32-47 (Act 1 Scene5), are very similar to those used in a spell or chant. She is calling spirits to take away and feelings she may have, and fill her with murderous thoughts, ââ¬Å"Come u spiritsâ⬠¦you murdering ministersâ⬠. The language used gives the effect of dark magic and incantations, symbolising Lady Macbeth as a witch. As said above the line ââ¬Å"fair is foulâ⬠gives the impression of deceptive appearances and reality. Lady Macbeth, displays this idea very well, when she is fooling her guests. When King Duncan, arrives at the castle, he comments on how nice the atmosphere is, ââ¬Å"the air Nimbly and sweetly recommends itselfâ⬠. It was planned by Shakespeare to have an ironic effect, that King Duncan should say that, when taking into consideration Lady Macbethââ¬â¢s words and plans from the previous scene. She is a great deceiver, falsely exchanging pleasant conversation, very successfully. It is also Lady Macbeth who advises her husband to put on a false appearance, ââ¬Å"look like the innocent flower. But be the serpent underââ¬â¢tâ⬠. This was one of Shakespeareââ¬â¢s many metaphors. The flower resembles goodness and purity while the snake is a dark and evil creature. This also links in with the idea of reality vs. appearances. We are constantly reminded that things arenââ¬â¢t what they seem in the play. Shakespeare warns us not to be fooled by appearances, there are many examples of this during the play. One of the main examples is the floating dagger. Is it real or is it just a deceptive illusion luring Macbeth to do the unthinkable? There are other deceptive illusions during the course of the play, a main one being Banquoââ¬â¢s ghost. Macbeth believes the ghost, which hovers over Banqoââ¬â¢s empty chair, has gone to haunt him and accuse him of itââ¬â¢s murder. The witches say that the forest will comes to him, ââ¬Å"Great Birnam wood to high Dunsinane hill Shall come against himâ⬠. How is this possible? In reality no part of nature in form of lands and forests ever moves! Macbeth is also told ââ¬Å"none of woman born Shall harm Macbethâ⬠. Macbeth doesnââ¬â¢t know that Macduff wasnââ¬â¢t born normally, and so believes he cannot be harmed. We must doubt how reliable these premonitions really are! While Banquo doubted what the witches said and preceded to question them, Macbeth had near complete faith in them. I think he believed them, because deep inside thatââ¬â¢s what he wants, and the premonitions give him hope of achieving an impossible target. The theme ââ¬Å"fair is foulâ⬠is a paradox, although it appears to contradict itself it does contains a truth. This can be seen in the first act when the Thane of Cawdor is sentenced to death. Looking at the execution it would appear to be a foul act. However when considering the reason of execution, being disloyal to your King, it can also be seen as fair. This is very similar to what happens to Macbeth. His head was carried around the crowds, proving he had been killed. Yes, a very foul act but not completely unfair. After all this was a man who had committed many unforgivable crimes, and caused disorder all over a settled country. I think that for a line so confusing at first it appears to be the roots of the play! It is associated with nearly all the themes of the play, and all the characters especially Macbeth and Lady Macbeth.
Subscribe to:
Posts (Atom)