Saturday, August 31, 2019

For-Profit Colleges

â€Å"The Booming Business of For-profit Colleges† Higher education is a very profitable field, and because of that, for-profit schools have been placed under scrutiny. In the documentary College Inc. , Michael Smith, the correspondent, investigates the promise and tremendous growth of for-profit colleges in the higher education industry. With the student's best interests in mind, many people have begun to question the integrity of these schools.However, they do not take into account the benefits that these for-profit colleges can offer to non- traditional students, giving them the opportunity to obtain a quality education, and arketable Job skills. For-profit colleges are continuously accepting the abundance of students who have realized that they need to go back to school because Jobs are scarce, and education is needed. Advertising plays a huge part in the large number of students enrolled in for-profit colleges.Successful colleges typically spend twenty to twenty five perc ent of their total revenue on advertising. This marketing encourages students to take the next step and enroll themselves in a college that they may not be academically or financially ready for. Because College Inc. presents he audience with interviews from multiple sources including former students, school executives, government officials, and enrollment advisors, it effectively portrays the many different perspectives of the industry, and the tension within it.Michael Clifford, a former musician who never went to college, purchases struggling traditional colleges, and turns them into for-profit companies. He believes that it takes the three M's to turn a college around: Money, management, and marketing. To fund these turnaround projects, Clifford presents to his investors the benefits of putting money into fixing these colleges. From an investor's point of view, for-profit colleges can be a huge source of income. Jeffery Silber, a senior analyst at BMO Capital Markets, says  "From a business perspective, it's a great story. miou're serving a market that's been traditionally underserved. And it's a very profitable business it generates a lot of free cash flow. † But from a student's perspective, it is not fair for their education to be turned into a business. Enrollment advisors play a huge role in the success of for-profit colleges. They are required to recruit a large number of students. The pressure to grow has presented questions about nrollment techniques. Some colleges have been accused of using high pressure sales tactics to get students to fill out application papers.Many of these colleges say they do not have quotas, but Tami Barker, a former enrollment advisor at Ashford University, says she was instructed to make 1 50 calls a day, and close on at least twelve students a month. â€Å"l didn't realize Just how many students we were expected to recruit. † says the former enrollment counselor. â€Å"They used to tell us, you know, â €˜Dig deep. Get to their pain. Get to what's bothering them. So, that way, you can convince hem that a college degree is going to solve all their problems. † Enrollment advisors convince students that attending college will be easy and affordable even when they are not academically, or financially capable. Dan Golden says â€Å"The concern is that they're bringing in students who can't succeed or graduate, loading them with debt. † The documentary College Inc. presents its audience witn a great deal ot students who felt that they were mislead by these enrollment advisors. The debt load of for- profit students is more than twice the amount of students at traditional schools.Anne Cobb, a former student at The University of Phoenix, says an enrollment advisor at the university helped her get a student loan even though she was swimming in bills. Sherry Haferkamp, a graduate from Argosy University-Dallas says she believed a lot of lies that were told to her, and it was no t until after the fact that she realized they were anything but the truth. When she talked to an enrollment counselor at Argosy, he said â€Å"You know, instead of applying for the master's program, go ahead and apply for the doctorate program. They've got two spots available, so you better apply right now.After obtaining her degree, and accumulating over 100,000 dollars in federal student loans, Sherry finds out that her degree is not even accredited by the American Psychological Association. She feels that she is at a dead end, and filed a lawsuit claiming that she was defrauded. The documentary College Inc. , was effective in its purpose of showing the importance of for-profit schools. A large number of students who would never have been accepted into a traditional college, have now been given the opportunity to obtain a degree. Investors who have put money into these failing colleges have profited a great deal.Michael Clifford turned traditional colleges that were in a downward spiral, and close to shutting down into successful for-profit schools. Even though the documentary shows a few students who are unhappy with their experiences, it seems that more people have benefited from these colleges than those who have not.

Friday, August 30, 2019

Cpk Case Essay

California Pizza Kitchen, Inc. (CPK) is a United States based dining restaurants chain. The company primarily offers a mixture of assortments of hearth-baked pizzas, a wide variety of unique appetizers, desserts, pastas, salads, soups and sandwiches. CPK operates across more than 253 locations in 32 states, the District of Columbia and 10 foreign countries. It owns 205 and 48 franchised restaurants across the world and is headquartered at Dover, Delaware. An external analysis of the California Pizza Kitchen reveals several challenges facing the business: Political, economical, social and technological changes to be specific. CPK’s communication strategy focuses on marketing the California Pizza Kitchen brand through many creative and non-traditional avenues. As one of the pioneers of premium pizza, they continue to benefit from national media attention featuring their co-founders and co-CEOs, Richard Rosenfield and Larry Flax, this is believed to provide CPK with a noteworthy competitive advantage. New restaurant openings, high-profile fundraisers and media events currently serve as the focal point of their public relations and media outreach efforts. As early as 2009 CPK landed a sponsorship agreement with the Los Angeles Angels of Anaheim and the Los Angeles Kings to promote California Pizza Kitchen at Angel Stadium and STAPLES Center, respectively. In the same year their public relations efforts led to coverage on a national level in various outlets including the Business Week Magazine, ESPN the Magazine, Los Angeles Times, USA Today, Wall Street Journal, The View, FOX National News and CNBC Power Lunch. CPK’s objective is to expand its leadership position in the restaurant and premium pizza market by selling original, high quality pizzas in addition to creative salads, distinctive pastas and related products and by providing extraordinary customer service, thus building a high degree of customer loyalty, brand awareness and superior returns for stockholders. To reach these objectives, CPK plan to increase the market share by expanding their restaurant base in new and existing markets, leveraging their partnerships in non-traditional and retail channels and offering inventive menu items. CPK is pursuing a disciplined growth strategy that, to be successful, depends on the ability and the ability of franchisees and licensees to open new restaurants and to operate these new restaurants on a profitable basis. Successful growth depends on numerous factors including: the hiring, training and retention of qualified working ersonnel, especially managers; competition for restaurant sites; negotiation of favorable lease terms; timely development of new restaurants, including the availability of construction materials and labor; management of construction and development costs of new restaurants; securing required governmental approvals and permits; competition in our markets; and general economic conditions

Thursday, August 29, 2019

Storm Born Chapter Six

I turned the light back on. â€Å"Hey, Volusian, how's it going?† He stepped forward, blinking with annoyance at the light, just as I'd known he would. He was shorter than me, very solid and humanoid in shape, which indicated a fair amount of power. He had smooth, almost shiny black skin and those narrow red eyes that always unnerved me a little. His ears had a slight point to them. â€Å"I am the same as always, mistress.† â€Å"You know, you never ask how I am. That hurts.† He answered my lazy smile with a long-suffering scowl. â€Å"That is because you are also always the same. You smell of life and blood and sex. And violets. You are a painful reminder of all the things I once was and all the things I will never be again.† He paused thoughtfully. â€Å"Actually, the scent of sex is stronger than usual. My mistress has been†¦busy.† â€Å"Did you just make a joke?† I said this partially to deflect the sex issue but also to keep teasing him. Volusian was about as damned as a soul could be. I didn't know what he'd done when alive, but it had been evil enough that someone had cursed him from ever entering the world of the dead. His soul would never find any peace. So he had haunted my world and the Otherworld until I'd discovered him tormenting a suburban family. He was so powerful, as was his curse, that I had not been strong enough to destroy him and send him on. The best I could have done was cast him to the Otherworld, but I had no guarantees he wouldn't return. So I'd done the next best thing I could: I'd enslaved him. He was bound to me until I released him or lost control. This way, I dictated his actions. I usually kept him in the Otherworld until I needed him. Teasing him was a way to project confidence in my control, like I wasn't worried at all. I couldn't show any weakness with him. He had made it perfectly clear a number of times that he would kill me horrifically if he ever broke free. He didn't respond to my last comment. He simply stared. He was only obligated to answer direct questions. â€Å"I need some advice.† â€Å"I do as my mistress commands.† There was an implied until I can choke the breath from her body at the end of that seemingly subservient statement. â€Å"I'm going to be crossing over into the Otherworld soon. Physically.† That almost surprised him. Almost. â€Å"My mistress is foolish.† â€Å"Thanks. I have to find a human girl that some horny gentry abducted.† He reconsidered. â€Å"My mistress is brave and foolish.† â€Å"She was taken by a guy named Aeson. Do you know him?† â€Å"He is king of the Alder Land. Powerful. Very powerful.† â€Å"Stronger than me?† Volusian stayed silent, thinking. â€Å"Your powers do not diminish in the Otherworld, as some humans' do. Even so, he will still be at his full strength. It would be a close battle. Were you to fight him in this world, there would be no contest. He would be weaker by far.† â€Å"I don't think I can manage that. What about you guys? I'm going to bring you along. Will it help?† â€Å"I feared my mistress would say that. Yes, of course it will help. You know my binds force me to protect you, no matter how much angst it causes me.† â€Å"Aw, don't sound so glum. Think of it as job security.† â€Å"Make no mistake, mistress. I may protect you now, but as soon as I have the chance, I will rip the flesh from your body and tear your bones apart. I will ensure you suffer so gravely that you will beg me for death. Yet, even then, your soul will not find relief. I will torture it for all eternity.† He spoke in a flat tone, not as a threat, but simply as a statement of fact. Honestly, after my week of propositions, statements about my impending death were kind of a refreshing return to normality. â€Å"Looking forward to it, Volusian.† I yawned and sat on the bed. â€Å"Anything else constructive you've got to offer? In rescuing the girl, I mean.† â€Å"I suspect my mistress is too†¦set in her ways for my advice, but you could solicit help.† â€Å"Solicit it from whom? I don't have anyone else to go to.† â€Å"Not in this world you don't.† It took me a moment to get what he was saying. â€Å"No. No way. I'm not going to some gentry or spirit for help. Not like they'd give it anyway.† â€Å"I would not be so certain of that, mistress.† Gentry were petty and dishonest. They had no regard for anyone but themselves. No way would I appeal to one. No way would I trust one. Volusian watched me. When he saw I would not respond, he said: â€Å"It is as I thought. My mistress will not hear anything she doesn't want to. She is too stubborn.† â€Å"No, I'm not. I'm always open to things.† â€Å"As you say, mistress.† The look on his face somehow managed to be angelic and scream you fucking hypocrite all at the same time. â€Å"All right,† I said impatiently, â€Å"let's hear it.† â€Å"There is another king, Dorian, who rules the Oak Land. He and Aeson hate each other – in a polite-faced, political manner, of course.† â€Å"No surprise there. I'm surprised they aren't all turning on each other. That doesn't mean he'd help me.† â€Å"I believe Dorian would be very happy to see someone come and kill off Aeson. Especially if he did not have to actually do it himself. He might offer a great deal of assistance to see you do it.† â€Å"‘Might' being the operative word. So you're suggesting I just show up at his door and ask for help?† Volusian inclined his head in the affirmative. â€Å"Have I ever killed or cast out any of his people?† â€Å"Likely.† â€Å"Then I think it's ‘likely' he'd kill me the moment I set foot on his land. I can't imagine any gentry's keen on letting their biggest assassin in the door.† I wasn't touting ego in that statement. Much like Volusian's death threats, I simply stated a fact. I knew my own worth and reputation as far as the Otherworld was concerned. I mean, it wasn't like I was reaching genocide levels or anything; I just had more notches on my belt than most. â€Å"Dorian has†¦an odd sense of humor. It might amuse him to welcome an enemy like you. He would enjoy the sensation it would cause among others.† â€Å"So he uses me for entertainment and then kills me.† I couldn't believe Volusian was even suggesting a plan like this. He hated me, but he also knew me. If he hadn't had such a stick up his ass, I would have sworn he was messing with me. Yet, his bindings forced him to sincerely give the best of his counsel if I asked it. â€Å"If he gives you his word of hospitality, he is honor-bound to keep you safe.† â€Å"Since when do gentry keep their word? Or have honor?† Volusian regarded me carefully. â€Å"May I speak bluntly, mistress?† â€Å"As opposed to usual?† â€Å"Your hatred of the gentry blinds you to their true nature. You are also blind to the only thing that might let you escape this mad scheme alive – not that I would mind if you were torn to bloody shreds by Aeson's people. But whatever else you believe, one of the gentry will stake his life on his word. They keep their oaths better than humans.† I honestly didn't believe that. No matter how much I might need help with this, it wasn't worth it. I would not make a deal with the devil. â€Å"No. I won't do it.† Volusian gave a small shrug. â€Å"As my mistress wishes. It makes no difference if you speed your own death. I cannot die, after all.† I stared at him in exasperation. He stared back. Shaking my head, I stood up for another summoning. â€Å"Okay, if that's all, I'm gonna call the rest of the gang.† He hesitated. â€Å"May I†¦ask my mistress a question first?† I turned in surprise. Volusian was the epitome of don't-speak-until-spoken-to. He only answered what was asked of him. He did not seek out other information. This was new. Wow. What a week of earth-shattering events. â€Å"Sure, go ahead.† â€Å"You do not trust me.† â€Å"That's not a question, but no, I don't.† â€Å"Yet†¦you came to me for advice first. Before you spoke to the others. Why?† It was a good question. I was about to summon two other minions. I didn't trust them either, but they had more reason to show loyalty than Volusian. They did not describe my graphic death on a regular basis. â€Å"Because no matter what else you may be, you're smarter than they are.† I could have elaborated on that, but I didn't. That was really all there was to it. He thought about this for a long time. â€Å"My mistress is less foolish than she normally appears.† I think it was the closest he could come to thanking me for a compliment – or giving one. I took out the wand and summoned my other two spirits. I didn't bother with candles or darkness because these ones were easier to call – especially since I was technically only â€Å"requesting† one to come, not ordering him. The coldness and pressure came again, and then two other forms appeared. Volusian stepped back, arms crossed, not looking impressed. The two newcomers glanced around, taking note that I had gathered all of them. The three of them never interacted much in my viewing, but I always wondered if maybe they hung out for coffee or something in the Otherworld and made fun of me. Kind of like how people make fun of their boss after work during happy hour. Still affecting unconcerned, lazy control, I unwrapped a Milky Way and sat back on my bed again. Leaning against the wall, I surveyed my team. Nandi was less powerful than Volusian, so she had a less substantial form in this world. She appeared as a translucent, opalescent figure that seemed vaguely female in shape. Centuries ago, she had been a Zulu woman accused of witchcraft by her people. They had killed her and, like Volusian, cursed her from finding rest. Unlike Volusian's, I could break this curse and send her on to the land of death. I had encountered her haunting this world, more frightening than harmful, and bound her in service to me in exchange for eventual peace. I had demanded three years of loyalty, one of which she had fulfilled. When the other two were up, I would let her pass on. Whereas Volusian always seemed sullen and sarcastic, Nandi was always sad. She was the poster child for a lost soul. A real downer. Finn, however, was a different story. Of the three, only he looked happy to be here. He too was not powerful enough to have a solid form. He translated to this plane as small and glittering, barely there, much like how humans perceived Disney-type pixies. I had no claims on Finn. He had started hanging around because he found me entertaining. So he popped up from time to time, followed me, and would generally come when called. I had the power to force his service, but – even as much as I disliked all things from the Otherworld – I was hard-pressed to do so without provocation. I didn't entirely trust anyone who offered help so freely, but he had never given me reason to doubt him either. Indeed, he'd always been very helpful. I had no idea what his story was, if he too was a cursed spirit. I'd never pressed for the details. His shining body settled upon my dresser. â€Å"Hey, Odile, what's new? Why do you smell like sex? Did you get some? Why are we all here?† Too much exposure to my world and television had given him a better grasp of our slang than the others. I ignored the questions. â€Å"Hey, Finn, hey, Nandi.† The female spirit merely nodded in acknowledgment of the greeting. â€Å"So,† I said in my best boardroom voice, â€Å"I'm sure you're all wondering why I called you here today.† None of them found that funny, so I just kept going. â€Å"Well, brace yourselves: I'm going to be paying you guys a visit. In the flesh. The real deal.† Nandi showed no reaction whatsoever. Finn leapt up in excitement. â€Å"Really? Truly? When? Now?† Nice to know someone appreciated me. I debriefed them, telling them the story. Volusian leaned against my wall, letting his body language convey to me what an utter waste of his time it was to have to hear this all again. Finn's enthusiasm diminished a little. â€Å"Oh. Well. That's ballsy but also kind of†¦Ã¢â‚¬  â€Å"Foolish,† said Nandi in her typically gloomy monotone. â€Å"It will end in despair. Dark, bitter despair. You will die, and I will never know peace. My suffering will be without end.† â€Å"Never thought I'd hear you two agree with Volusian.† Finn shrugged. â€Å"It is a good cause, honest. But you can't really just walk into Aeson's castle and take the girl. Not that I'm saying you aren't tough enough or anything. You'll just need a plan. A really good one. Yeah. What's your plan?† â€Å"Um, well†¦to walk into his castle and take the girl.† Volusian sighed loudly. It was hard to tell with those red slits, but I think he rolled his eyes. I shot him an angry glance. â€Å"Hey, it's a hell of a lot better than your plan. Would you like to share it with the rest of the class?† He did. When he finished, Finn said, â€Å"Now, that's a good plan.† I threw my hands up. â€Å"No, it's not. It's a horrible plan. I'm not asking one of the gentry for help.† â€Å"King Dorian might help you,† offered Nandi, â€Å"although his help would most likely only offer a brief flaring of hope, which would then make our ultimate defeat that much more tragic.† â€Å"Stop with the maudlin crap, Nandi.† I wished they made ghost Prozac. â€Å"Anyway, it's a moot point. We're taking on Aeson directly. End of discussion.† I gave them the time and location of our meeting spot, binding them to silence about the plan. I had to take it on faith that Finn wouldn't let the cat out of the bag, but once he'd reconciled himself to my possible demise, he seemed pretty stoked about the whole idea. â€Å"I have one more question for all of you before I release you. In the last week, three denizens from the Otherworld knew my name. What's going on? How many of them know who I am?† None of the spirits answered right away. Finally, in a voice that sounded like he couldn't believe I was asking, Finn said, â€Å"Why, everyone. Well, almost everyone. Everyone that counts. It's all they've been talking about for the last couple of weeks. Odile Dark Swan is Eugenie Markham. Eugenie is Odile.† I stared. â€Å"Everyone's been talking about this?† The three spirits nodded. â€Å"And none of you – none of you! – thought this was worth bringing to my attention?† More silence. Finally Nandi, compelled to answer any direct question, merely said, â€Å"You did not ask, mistress.† â€Å"Yes,† agreed Volusian dryly. â€Å"Had you summoned us and asked, ‘Is my name known in the Otherworld?' then we would have readily answered.† â€Å"Smartass.† â€Å"Thank you, mistress.† â€Å"It wasn't a compliment.† I ran a hand through my hair. â€Å"How did this happen?† â€Å"Maybe someone guessed,† said Finn. Volusian cut him a glance. â€Å"Do not be an even bigger fool than you already are.† The dark spirit turned back to me. â€Å"Not all creatures come to this world to fight you. Some may have spied. For someone quiet, discovering your identity would not have been so difficult.† â€Å"What are they saying, then? Are they all going to try to kill me?† â€Å"Some are,† said Finn. â€Å"But most of them are weak. You could probably take them in a fight.† â€Å"Unfortunately,† added Volusian. Great. This was not good news. Some part of me had been hoping only a few knew, but now it seemed my identity was the gossip du jour in the Otherworld. I wondered if it would be worthwhile to find a local witch and set wards around my house. I could also keep the spirits on permanent guard duty, but I didn't really know if my patience was up for large doses of their idiosyncrasies. â€Å"All right, then. Get out of here. Come back at the time we set up. Oh, and if any of you hear anything that might be useful about Aeson and the girl, come tell me. Do not wait until I explicitly ask you.† Those last words were a growl. Finn vanished instantly, but Nandi and Volusian watched me expectantly. I sighed. â€Å"By flesh and spirit, I release you from service until next I call. Depart to the next world in peace and do not return until my summons.† The spirits faded into nothing, and I was left alone.

Wednesday, August 28, 2019

Microsoft Essay Example | Topics and Well Written Essays - 750 words - 2

Microsoft - Essay Example the CSR initiatives on stakeholders, and how these initiatives influenced the corporate image and reputation for the MNE and; recommendations to improve CSR initiatives within the company. The paper finds out that the outcomes from Microsoft adopting CSR integration are far much profitable and has helped the company in upholding employee loyalty thereby increasing productivity. Commercial Social Responsibility is progressively vital section in the commercial world. The major impression that several persons have in the direction of organizations is that industries are taking gain on customers in addition to the society. In their attentions, they contemplate that trading are entirely about money-making, and they caution less about the people, the surroundings, and human moralities issues. They see not to donate abundant to society. In detail, numerous businesspersons want to wipe away the undesirable image. Commercial Social Duty Chan 2 of organizations in-built in people’s thoughts and substantiate that by means of their actions. The drift of corporations engaging in generally liable actions is increasing. Companies, comprising small and average sized businesses, are currently at work to launch various platforms and plans that can balance both areas of cost-effectiveness and social responsibility (Mullerat & Brenman, 2011). In the subsequent units, I will first outline corporate societal accountability and chat the significance of being a answerable corporate civilian to Microsoft company. Microsoft is among the major Multinational enterprises that has involved in incorporating CSR, in their operation. One of the major motive for Microsoft to adopt CSR is to boot the corporations reputation and rises brad attentiveness (Kotler and Lee, 2013). The firm becomes further standout, associated to others contained by the similar business even when they piece similar rate and merchandise quality. This also uplift auctions as clients will be further likely select the

No topic Essay Example | Topics and Well Written Essays - 250 words - 10

No topic - Essay Example A question is asked on the manner of averting Home Depot from commencing. Devoid of a written accord, how can one stipulate if cheating is a sincere mix-up or intentional cheating? With these aspects of the above depiction, it follows that there are similarities between the difficulties of organizing cartels and the challenges of other forms of international cooperation (PrÃŒÅ'ibram, 35). International corporations face challenges like the identification of a true market requirement and the dilution of a brand-name power. For instance, the success of a business is keyed to the offering of services and goods needed by a customer. Since the customer’s problem needs a solution, the product or the service used should have the capability of solving the consumer’s wants. The capability of the product to provide a solution should be effective in a way that its significance are easy to communicate. It is, therefore, a very hard task to meet this challenge since customer needs are unlimited. Due to the different methods of entertainment in the internet, the culture of Americans and their corporate symbols are famous brand-names in the world. However, this is no indication that American products will be popular in other countries. Gaining of trust is from other countries is a very complicated task (Fear,

Tuesday, August 27, 2019

Analyze a situation in which you were faced with a moral dilemmaof Essay

Analyze a situation in which you were faced with a moral dilemmaof whether or not to obey a figure of authority or yield to group pressure - Essay Example Individuals have little or no time to make weight sides and make decisions accurately. This makes it even trickier considering that each of the options has its own results. In addition, none of the options can be referred to as illegal but rather unethical. Such dilemmas range from very simple acts such as completing an assignment or copying it from the internet to very complex situations that may involve loss of life Everyone is forced by events to make preferences or decisions on a daily basis. More often than not, such conditions may be uncomfortable or embarrassing and need complicating judgement. Such conditions usually necessitate answering the question; what is the ethically better choice? Such situations come about there being no situation that is wholly ethical in itself. Through ethical interpretation, individuals consider the possible implications and consequences of actions in response to principles or ethical dilemmas. Multiple moralities are a major issue in moral dilemmas especially because distinct to the legislature, morals are not clearly stipulated and often change depending on issues like religion and location. There are some rare cases of multiple moralities whereby individuals may be faced by ethical dilemmas due to overlap in moral believes. In such cases, it becomes even trickier since the person has to forego one or more of the choices. Multiple modalities may also come up as a result of representing people with different cultural backgrounds and thus different moralities. Such cases are difficult to resolve due to the time constraint. In the case of an ethical dilemma, an individual regards himself as having moral background to do either of the actions. Noteworthy is the fact that it is impossible to do both actions simultaneously. This further defines a moral dilemma in ethical terms. The fundamentals of a moral dilemma may include: a situation where an individual (agent) is obligated to do every one of

Monday, August 26, 2019

How to find a good job Essay Example | Topics and Well Written Essays - 500 words

How to find a good job - Essay Example I believe that following a few easy rules will help everyone to become successful in their search for a proper job. To begin with, let’s find out what a â€Å"good† job means. For most people the best position is the one with the highest salary. But do not be confused by this global delusion. A real â€Å"good† job should be a combination of 3 most important factors: money, pleasure and time consumption. To be more persuasive I would like to illustrate you some examples. Imagine that you have successfully found a well-paid job, but it just does not suit your preferences. If a person does not like what he or she is doing, than he or she will not be dedicated to the job, they will not fulfill it properly and, in the end, they might get fired. Now think about another situation. You were lucky to find a well-paid job that you really enjoy doing. But the problem is that it takes all your spare time and you do not have any opportunity simply to have a rest. After first few weeks of such intense work you will be tired and exhausted and will think about leaving such a job. Furthermore, a â€Å"good† job should imply career growth. We are all mature people and everyone should think about future prospects when choosing a job. All the pains and dedication at work must be rewarded somehow, and the best way to do this is promotion. So, a proper job is also the one that ensures encouragement and stimulation in a form of career growth. Now, as we have figured out what a â€Å"good† job is, it is time to hunt for it. You should be aware that we all live in a world of extreme competition. Job market is pretty severe and we do not have a choice, except for adjusting to its tough conditions. Even if you are a good and skilled professional, an employer will not come and knock at your door one day with an offer of a wonderful job position. You will have to search for it yourself, attend dozens of job

Sunday, August 25, 2019

Content Writing Essay Example | Topics and Well Written Essays - 13500 words

Content Writing - Essay Example It must be well written and properly and consistently presented. Good presentation is usually combined with excellence of analysis and intellectual grip on the sources that form a key element in the papers. To make papers a good one, several criteria are necessary: A lucid position of the writer on the thesis paper: the writer must take a position. That is, the papers will not simply investigate a topic, or build a generalized statement about a topic, supporting the both sides; such as: "Many people feel that Shakespeare deserves his place in the canon, but some critics believe he has been over-rated." Instead, the papers should take a definite stance on one side or other providing reasonable arguments. A good analysis: There should be analysis of the thesis statement rather than evaluation. It should not be like the review of a paper or evaluation like â€Å"Reading Rainbow†. Such as, "This beautiful story engages readers because of its sensitive handling of emotional relationships." Rather A first-class thesis work is one that relies upon the work itself to support intriguing insights into its reading. Again, thesis help should be used in order to expose sufficient logics establishing its own opinion. Specificity of the topic: must focus on a specific topic. It should not make a grand, sweeping, or vague statement like "All through history, writers have produced great literature". It is too vague. With the massive growth of the world knowledge if a research work is made without specificity of a topic. It will not be a reasonable one to cover the necessary analysis of the topic due to the vastness of the topic. Sometimes it is felt reluctant to choose too narrow a topic, fearing it wont be possible to find enough to write about. But its usually better to choose a narrow topic, and analyze it closely, however, than to choose too broad a topic and only scratch its surface. There must be arguable

Saturday, August 24, 2019

Financial economics Essay Example | Topics and Well Written Essays - 2500 words

Financial economics - Essay Example Theories that have brought about pop assume that at some circumstances, it would cost exactly the same number of for exampleUs dollars to buy euros and then to use the proceeds to purchase the same basket as it would cost to use those US dollars directly in buying the market basket of goods. For example, a cake that sells for C$1.50 in Australian city should cost US$1.00 in a U.S. city when the exchange rate between Canada and the U.S. is 1.50 USD/CDN. (Both cakes cost US$1.00.) Therefore, the fundamental for PPP is the "law of one price". Consequently, on elimation or assumptiontransportation and other transaction costs, competitive markets will have same price for identical good in two countries, on expressing the prices of involved countries into the same currency. The concept and principle of purchasing power parity enables and aids in estimation of what the exchange rate between both currencies should be in order for the exchange to be the same with the purchasing capability of the currencies of the two countries. Thus, when a countrys domestic price level is increasing as it is in the case when it is experiencing inflation that countrys exchange rate must depreciated so as to stabilize the PPP. PPP exchange rates is significant in that it helps to avoid inaccurate and erroneous international comparisons that arise due to use of market exchange rates. A good example is when two countries output similar physical amounts of goods in two separate years. Due to adverse fluctuation in market exchange rates when the GDP of one country (measured in its own currency is converted to the other countrys currency using market exchange rates) one country can be deemed to have higher real GDP than the other country in one year but relatively lower in the other; both of these comparisons wouldmiss-reflect the reality of their relative levels of

Friday, August 23, 2019

Medieval history significance Essay Example | Topics and Well Written Essays - 500 words

Medieval history significance - Essay Example By the start of the eleventh century most of Europe was christianized, and the earlier period of Viking invasions and barbarian ransacking of Christian communities had ceased. Religion was an increasingly a key factor in the middle of the medieval age, and it affected daily life by providing stability, education and a cultural framework which covered almost the whole of the territory which had been claimed by Charlemagne in the ninth century. In 1056 religious unity was broken by a split between the Western and Eastern areas of Christendom and this resulted in the two separate Church traditions which we still have today: The Roman Catholic and the Eastern Orthodox Churches. The Norman conquest brought French ways and culture to England after the Battle of Hastings in 1066. William the Conqueror decided to have a survey made of England, and this resulted in the Doomsday Book of 1086. This event was important because it provided a unique record into the lives of everyday people in medi eval England.

Thursday, August 22, 2019

Background of Benjamin Franklin Essay Example for Free

Background of Benjamin Franklin Essay â€Å"The Autobiography of Benjamin Franklin† was thought by himself to be â€Å"the bold and arduous project of arriving at moral perfection†. It refers to when he was in his twenties, around 1726, he found himself jobless; penniless; in debt and suddenly a single father. He was very intelligent and he knew there was definitely something wrong in his life and he was eager to make a change. So he wrote this autobiography not only to tell his son about his life but also to improve his financial situation and to provide a model for self-improvement for anyone interested. In order to achieve his goal, Franklin developed and committed himself to a personal improvement program that consisted of thirteen virtues. Actually, Franklin found twelve virtues out of thirteen in the reading (124). And another one was from the suggestion of his friend (133). Franklin made a list of thirteen virtues as follow: silence; order; resolution; frugality; industry; sincerity ; justice; moderation; cleanliness; tranquility; chastity and humility (125-126). The first eight virtues relate to people’s attitudes towards their daily activities and their challenges, which belongs to personal virtues . The last five virtues that Franklin stated concern one’s attitudes toward people with whom one has to be dealings, which fall into social virtues. Franklin set forth the thirteen virtues in a very practical and rational way. Simultaneously, he gave reasons for the order of these virtues (126). He put temperance at the top of the list, while humility came last. If a person can conquer temperance, such a primal urge for food or drink, he can keep a cool and clean mind to do something more important, thus making self-development in other virtues. Overall, his rational arrangement for the virtues makes each prior virtue help Franklin acquire each following virtue. In order to acquire these thirteen virtues, Franklin charted his daily progress, focusing his attention on one virtue each week, so after thirteen weeks he had completed all the virtues (127-128). Keeping track of his successes and failures in a small book, he kept it with him at all times for many years. Every night before going to bed, he would reflect and evaluate himself on what he had acquired and what he had failed. His goal was to minimize faults in his life, thus indicating he was moving toward living a more virtuous life free of mistakes. Although Franklin tried to follow the virtues himself, he sometimes strayed from his good intentions. The most troublesome virtue he met with was order (130-132). It was partly because Franklins good memory made order not as necessary. When he was young he remembered whenever he left anything. As he grew older, his memory became poorer and poorer, which caused him problems with order. Partly because he was a business man to be interrupted from the public frequently so that he could not focus on something as it was expected. Another troublesome virtue Franklin confronted with was humility (133). Virtually, Franklin was born to be proud, but he had to pretend to be humble in public so that he could establish a good social status. Though Franklin admitted in his autobiography that he often fell short, he believed the process helped make him a better man and contributed to his success and happiness (131-132). For example, temperance contributed to his long life and good health. As for persisting in Industry and Frugality, he accumulated a lot of wealth and gained a large scope of knowledge to do scientific research. All those virtues together had shaped Franklin’s very pleasant personality. Furthermore, the autobiography indicates Franklin was very intelligent. Initially, he could list out these virtues in the reading (124) and the method of virtues was very rational for people to follow(127). In all his life, Franklin had followed his plan of virtues and become a person full of virtuousness. He also set a good model for the descendants to follow and expressed his good will for them (132). As for the autobiography itself, I completely agree with his consents â€Å"the bold and arduous project.† It means that it was not easy for people to follow. But Franklin himself had proved to be very successful in many fields by following his plan of thirteen virtues. Franklin was also a very responsible person because he educated and raised his son on his own. He was passionate about science, that’s why he had made great contribution to our society, making a lot of inventions: lighting rod, Franklin’s stove and odometer, so on and so forth. The autobiography can be of great use to others. If only we descendants can follow his virtues, we can make great self-improvement in our own fields and in moral standards. I have been reckoning how Franklin made his own name? When he was twenty-two years old, he was strikingly impoverished and a single father. But by the age of forty-two, Franklin had achieved all his goals, which were not acquired by accident, but by his strong faith in his virtues. For more than twenty years, six days a week with dirty hands, Franklin had been doing the routine work in the printing house. Every night he constantly made self-criticism on what he had achieved and what he should have to acquire. If only I can follow some of Franklin’s thirteen virtues, I am definitely making great progress in my study overseas and in my future teaching career. Take the virtue order for example, it sounds so minor that we can easily neglect in our daily life, actually, searching for items for class every day is always time-consuming. If I can arrange everything in its place, I would study more efficiently and achieve much higher grades. Of course, the thirteen virtues are a good guide for me to follow. In fact, keeping track of how well I do in maintaining the virtues and having positive character traits, as Franklin did, is worth trying.

Wednesday, August 21, 2019

My opinion on private letter ruling from the IRS Essay Example for Free

My opinion on private letter ruling from the IRS Essay According to my opinion on the IRS private letter ruling, it is very essential for the organization to decide and look for ways on which they can request for the IRS private letter ruling. An IRS private letter ruling does not contain laws but it contains guideline to the taxpayer on tax issues. Therefore it can be defined as a disclosed statement that is issued to the tax payer by the Internal Revenue Service (IRS) in which some guidance are defined on how to deal with financial assessment that have prospective tax cost. Many of the organization have limited knowledge about the IRS private letter ruling and that is why they tend to run away from the IRS especially when they have to deal with issue regarding taxes. It is the responsibity of the organizational leaders to look upon the anticipated changes in the organization and compare the importance of the IRS private letter ruling to the company (IRS. gov 2010). The taxpayer is able to rely on what the private letter states regarding its measurement. IRS reduces risk when dealing with paying a large amount of tax; it gives the task payer a surety of safety that will occur when dealing with paying large amount of tax. On a contemplated transaction the private letter of ruling gives advancement to the taxpayer on the tax treatment expectation from the IRS. The IRS can become negative to companies. Therefore for the IRS private letter ruling to have a meaning the transactions are supposed to be completed accompanied by the tax returns. There after the IRS officials discuss and come to an agreement after they have evaluated the transactions and the tax returns.

The Tragedy Of Macbeth Two Faced Macbeth

The Tragedy Of Macbeth Two Faced Macbeth The Tragedy of Macbeth, a play by William Shakespeare is a tragedy of death and dishonesty surrounded by the noblemen of Scotland. The two main characters are Macbeth, the Thane of Glamis and his wife Lady Macbeth. The play focuses around the conflict in Scotland at the time between the King and rebellious Scotsmen. After hearing about his prophecy from the three witches, Macbeth stops at nothing to accomplish his goal. Macbeth eliminated anyone that is in his path, even his dear friends. Macbeth is facing obstacles in his public life as well as in his private life. In his public life, he is a brave and respected nobleman who has the trust from others as well as King Duncan. In his private life, he ultimately comes face to face with death because of his greed and desire. His private life differs from his public life in many ways; his private life consists of poor decisions as well as greed and guilt, this eventually leads to the downfall of Macbeth. Macbeth is an ambitious nobleman w ho has a tendency to self-doubt; however he is also a two faced, selfish murderer whose gone mad hungry for power. Macbeth demonstrates himself in public to have fair character at the start of the play in difference to his foul self later on in the play. Macbeth characterizes a character of loyalty and heroism that proves the fairness of his character. In the play Macbeth exhibits two different faces; he portrays a different personality in private and in public. Macbeths ambition is his true tragic flaw, it causes his downfall. Macbeth speaks to himself saying, à ¢Ã¢â€š ¬Ã‚ ¦On which I must fall down, or else oerleap, / For in my way it lies. Stars, hide your fires; / Let not light see my black and deep desiresà ¢Ã¢â€š ¬Ã‚ ¦ (1.4.50-56). Malcolm, the son of King Duncan, is proclaimed Prince of Cumberland this means he is also the heir to the throne of Scotland. Macbeth is willing to push all his principles aside. He knows that murdering King Duncan in order to become King of Scotland is wrong. This is why he says it is necessary to conceal his black and deep aspirations. Macbeth also citied tha t, à ¢Ã¢â€š ¬Ã‚ ¦To prick the sides of my intent, but only / Vaulting ambition, which oerleaps itself / And falls on th other (1.7.25-28). Macbeth confesses that the he only thing that is motivating him to kill King Duncan is his ambitions. Macbeths conscience bothers him throughout the story it is prohibiting him from forgetting all he knows about right and wrong. Here, ambition portrays as something ugly and dark. Macbeth quoted that, Away, and mock the time with fairest show/ False face must hide what the false heart doth know (1.7.81-82). Macbeth and Lady Macbeth are going over the plan to kill Duncan. Macbeth tells Lady Macbeth to go out there and entertain their guest and make them feel like their having a splendid time. They do not know that this is all part of their plot to kill King Duncan. Macbeth is concealing his true identity and his true intentions. His ambitions ultimately lead to his catastrophic downfall. In private, Macbeth exemplifies a sly and selfish person. Macbeths private self is influence by the three sisters prophecies and by Lady Macbeth in his purpose to kill. Lady Macbeth accuses Macbeth of being weak and not having the guts to kill King Duncan. Macbeth replies to her saying, I dare do all that may become a man; / Who dares do more, is none (1.7.47-48). Macbeth is saying that he can only do what is right for a man to do and if he dares to do anymore than he is not a man at all. He does not want to do anymore, but he is pressured by Lady Macbeth. She even questions his manhood. She thinks Macbeth is à ¢Ã¢â€š ¬Ã‚ ¦too full o the milk of human kindness (1.5.16). Macbeth is mentally weak; this is how Lady Macbeth easily influences him. Her strength encourages him at the start. Lady Macbeth insisted that Macbeth, Look like the innocent flower, / But be the serpent under it (1.5.67-68). Macbeth is acting innocent like a flower, but underneath that innocent flower be the serpent that is waiting to attack. To King Duncan, Macbeth is his innocent and loyal friend, when actually he is the enemy and a venomous man. This shows that looks can be deceiving. Macbeth is mentally a weak character that undertakes a drastic psychological change through the play. However, Macbeth then realizes what he has done and becomes guilty. He continues his murderous acts to persuade his dream of becoming King of Scotland. His guilty conscience causes him to hallucinate. Macbeth begins to think that he cannot sleep, Methought I heard a voice cry Sleep no more! Macbeth does murder sleep the innocent sleep, (2.2.33-34). Macbeth believes he cannot sleep because he has killed an innocent. Macbeths conscious sees Macbeth an evil person now and the evil Macbeth will only continue do evil actions. Macbeth believes that he still has the blood of King Duncan on his hands, Will all great Neptunes ocean wash this blood / Clean from my hand? (2.2.57-58). The blood on Macbeths hands symbolizes his guilt on him for murdering Duncan. Macbeth thinks that the whole ocean would not be able to wash away evidence of his guilt. His private life and doing causes him to feel guilty he quoted, I am in blood / Steeped in so far that, should I wade mo more, / Returning were as tedious as go oer (3.4.136-138). Macbeth is saying that the situation is already at a bad standpoint and he would like to get the situation over with because he is sick of waiting and living in guilt. He realizes that finding out other bad thing would not make the situation worse because he would still be standing in the same situation. He ends up with a blameworthy sense of right and wrong. His private life consists of poor decisions as well as greed and guilt; this eventually leads to his downfall. In The Tragedy of Macbeth, Macbeth ultimately faces obstacles in his public life as well as in his private life. At the end of the day he comes face to face with death because of his greed and desire. His private life differs from his public life in many ways; his public life consists of loyalty and honor in contrast with his private life that consists of poor decisions as well as greed and guilt, this eventually leads to the downfall of Macbeth. This shows that Macbeth, an ambitious nobleman can also be a two faced, selfish murderer who stops at nothing to become king and gain power.

Tuesday, August 20, 2019

Obsession in Vladimir Nabokovs Lolita Essay -- Nabokov Lolita Essays

Obsession in Lolita      Ã‚  Ã‚   The relationship between Humbert Humbert and Lolita is no doubt a unique one. Many people who read the novel argue that it is based on "lust", but others say that Humbert really is in "love" with Lolita. However, there is some astounding evidence that Humbert has an obsessional-compulsive disorder with Lolita. The obsession is clearly illustrated when Humbert's actions and behavior are compared to the experts' definitions and descriptions of obsession. In many passages, Humbert displays obsessional tendencies through his descriptive word choice and his controlling personality. Many people are obsessive, so this is not an alien subject. We see it everyday in the entertainment industry as well as in everyday life. Comparing Humbert Humbert to clinical and other definitions, it seems as if Humbert is one person who is an obsessed person.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Obsession is a tricky topic because it is hard to come up with a concrete definition. Who decides what obsession is? Where does one draw the line between obsession and deep admiration? According to S. Jack Rachman, "an obsession is an intrusive, repetitive thought, image, or impulse that is unacceptable or unwanted and gives rise to subjective resistance" (2). In addition, Andrew Brink states that "...the popular meaning of the term obsession, including the new verb 'to May 2 obsess', which means to be persistently preoccupied about something, usually an unsatisfactory relationship" (195). Both of these definitions are fairly similar, so now it is important to look at Humbert's actions and analyze how he fits into these defined categories.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   First, Brink argues that most people, especially men, have an obsessiona... ...aracter, but he is not abnormal. We have many Humberts running around our world, regardless of if we realize it or not. Nabokov, a man not too distant from Humbert, found a way to rationalize his obsession through Lolita - indeed an artistic and creative move on his part.    WORKS CITED Beech, H. R. Obsessional States. London: Methuen & Co. LTD, 1974. Brink, Andrew. Obsession and Culture: A Study of Sexual Obsession in Modern Fiction. London: Associated University Presses, Inc., 1996. Nabokov, Vladamir. The Annotated Lolita. New York: Vintage Books, 1991. Ostling, Richard N. A Fatal Obsession with the Stars.à ¤ Time. 31 July 1989: 43-44. Rachman, S. Jack. Obsessive-Compulsive Disorder: Psychological and Pharmacological Treatment. New York: Plenum Press, 1985. Salzman, Leon. The Obsessive Personality. New York: Science House, 1968.

Monday, August 19, 2019

Dwight D Eisenhower :: essays research papers

Dwight D Eisenhower was our thirty-fourth president, serving from 1953 to 1961. He was born in Texas in 1890, and brought up in Abilene, Kansas. He was very good in sports in High school and recieved an appointment to West Point. He was stationed in Texas as second lieutenant where he met Mamie Geneva Doud, whom he married in 1916. He excelled at many staff assignments and served under the guidance of many great generals. After Pearl Harbor he was called to Washington for a war plans assignment. He commanded the allied forces landing in North Africa in November 1942. On D-Day, 1944, he was the supreme commander of the troops invading France. After the war he became President of Columbia University. In 1951 he took supreme command over the new NATO forces. Republican emmissaries to his headquarters near Paris persuaded him to run for President. On June 4, 1952 he announced his candidacy for the Republican Party nomination for Presidency. He was soon nominated at the Republican convent ion and elected on November 4, 1952. He was able to use the catchy slogan â€Å"I Like Ike† to help him win. He was able to serve two terms as President of the United States from January 20, 1953 to January 20, 1961. He saw the end of the Korean War, and promoted â€Å"Atoms for Peace† and dealt with several crisis in Lebanon, Suez, Berlin, and Hungary in Foreign affairs. He helped make Alaska and Hawaii become states. Throughout his presidency he was very concerned with civil rights issues and the interstate highway system in domestic affairs. Between his two terms he suffered a heart attack in September 1955 in Denver, Colorado. He left the hospital after seven weeks and was reelected for his second term in November. President Eisenhower was very concerned with promoting peace and equality. He began with the desegregation of schools, of which he had to send troops into Little Rock, Arkansas to assure the compliance with the Federal courts decision. He also ordered th e complete desegregation of the armed forces. He wrote â€Å" There must be no second class citizens in this country.† A program that eisenhower was quite proud of was his â€Å"Atoms for Peace† program which was the loan of American uranium to â€Å"have not† nations for peaceful purposes.

Sunday, August 18, 2019

Charles Dickens Great Expectations Essay -- Great Expectations Essays

Charles Dickens' Great Expectations In chapter eight Dickens begins with a detailed description of Satis House, we are given a vivid idea of what is in store for Pip right from the beginning. The language and phrases used emphasise the darkness and forbidding nature of the house. When Pip first enters the house he describes it as having, 'old bricks, and dismal, and had a great many iron bars to it. Some of the windows had been walled up; of those that remained, all the lower were rustily barred'. This adds to the atmosphere of darkness, because all the 'windows had been walled up'. In addition, there is a feeling of old age and this is portrayed when Dickens talks about the windows being 'rustily barred' and how the house was made from 'old bricks'. The mood is created by the portrayal of the dull, dusky and dispirited house. This is emphasised even more when Estella tells Pip about 'Satis House' meaning 'Enough House'. This could have two implications; one meaning is that the house is enough to satisfy anyone. Towards the end of the chapter, the reader will find that this is not the meaning that is being portrayed. The more sensible and relative meaning is everyone has had enough of the house and of life itself, this is more related to Miss Havisham. In addition, Pip has had enough of the house, because after being there for a little while he wants to go home. Inside the house, a feeling of death and darkness is revealed and we get the feeling that nothing is as it seems. This is shown by Pip's description of the house, for example Pip says, 'the cold wind seemed to be colder there, than outside the gate'. Satis House is also seen as a Prison through Pip's eyes because he talks about the windows... ...ip has to leave the room, because the surroundings are to daunting for him. This tells us that Jaggers has no remorse for those that have died and once again is heartless, but also brave for being able to live in such peculiar and unnatural atmospheres. To conclude everything, Dickens creates a sense of dirt and filth through out London; He does this by describing the surroundings in immense detail using effective language. However, the main reason why the image is portrayed very effectively is the change of setting, from the quiet countryside to the busy city streets. A lot is emphasised on the relationship between character and setting, so it should be no surprise when Pip encounters objects of punishment and Justice everywhere he looks at Jaggers' work. Overall, the images of death are conjured up to indicate Mr Jaggers has power over life and death.

Saturday, August 17, 2019

Routine Communication

What kinds of tasks fall into each quadrant? Therefore, what kinds of communications norms do we need? routine/autonomous To the extent team members are working autonomously on tasks which remain static, there is little need for a lot of cross-team communications. Communications should be: Minimalist. Local. Compliance oriented where necessary. Automated whenever possible. The danger for virtual teams is that the â€Å"disconnected† feeling of a distributed team sometimes leads to over-reporting as a strategy to give people the feeling of â€Å"knowing what's going on. Sometime team members generate a lot of reporting in order to make sure the team leader â€Å"knows† that they are working. This kind of communication creates sludge in the team's arteries. It is a common cause of information overload which can sometimes result in team members avoiding engaging in the communications which actually are important to the team. The team needs to agree on a strategy to defend itself against communication sludge! Be on the lookout for what can be eliminated. 2 of 5routine/interdependent. Team members need to provide enough information to each other about areas where their routine work is interdependent to enable them to coordinate. Communications should be: Standardized. Organized. Easy. â€Å"Pull† v. â€Å"Push† (You go get what you need when you need it rather than having it pushed at you automatically). The danger for virtual teams is that because we have technology which allows us to exchange and store large amounts of information, we do it because we can without really addressing whether doing it adds value. The team needs to agree on a strategy to manage and coordinate this communication. Choose a few, processes for exchanging critical information and make a commitment to sticking to agreements about when and what will be produced by each member of the team. emerging/autonomous When individuals (or sub groups) on the team notice changes emerging in the work they have been doing, it's critical to make this â€Å"intelligence† available to the team as a whole. Communications should be: Timely (it can't wait for the next face-to-face meeting). â€Å"Push† v. â€Å"Pull† (to make sure that nobody misses a key indicator). The danger for distributed teams is that a weak communications strategy results in missing signals where something new happening in one place is a bell weather for something that will sooner or later have an effect on other parts of the system. A team that doesn't share this kind of intelligence is less than the sum of its parts. The team needs a strategy for scanning, scouting the environment within which they are operating, noticing pattern changes to make sure that important things get up on the team's radar screen soon enough when something which has been static starts changing. But it's not enough to simply report the information, it's critical that the whole team have an opportunity to discuss its meaning.

Friday, August 16, 2019

Mending Wall Poetry Analysis Essay

The neighbour keeps resorting back to the same simple argument and point of his father’s saying, â€Å"Good fences make good neighbours. † The speaker continues to remain unconvinced and presses the neighbour’s old-fashioned stubborn claims to be overlooked despite his reluctance to be swayed. The piece remarkably is quite simplistic in the way that the vocabulary of the poem contains no real fancy words, most are short and the majority can be used in conversion in everyday life. There are no stanza breaks, obvious ending rhymes or overall rhyme scheme observed either. The repetition of whole lines is surveyed twice throughout the poem however. â€Å"Something there is that doesn’t love a wall,† is the opening line of the piece and is repeated on line thirty-six. This is a reoccurring idea that this wall should not be up standing in the first place as it is unnecessary. Frost says that there is a natural force that tears down these walls as they are unnatural. The repetition emphasises that it only separates us from being able to build last longing relationships from those who may be on the opposite side to that fence. The other replication noticed is of the motto of the neighbour’s father, â€Å"Good fences make good neighbours. † This phrase holds a very strong importance to the speaker’s neighbour. In no way, shape or form does the man over the wall want to change his sturdy built tradition of his father’s trusty and wise wisdom. Frost would rather the neighbour think for himself and for him to grasp the opportunity to do something different rather than continue to â€Å"move in darkness† and let go of the unneeded barrier between that lies between them. One interpretation is that Frost could be trying to convey is one of unnecessary barriers and dead-ends. Excuses not to alter their lives, not to form new friendships or develop and build even stronger ones. The title Mending Wall could mean anything but fixing the fence between the two blocks of land but refer instead to the broken relationship that exists between two human beings.

Thursday, August 15, 2019

Srs of Library Management

| |Software Requirements Specification | For A-Flex Automated Library Management System Version 1. 2 Prepared by A-FLEX Group |Jude Marlon B. Alegro |111694 |[email  protected] com | |Arnel G. Abagua |082198 |[email  protected] com | |Jun Jun G. Abanag |102206 |[email  protected] om | |Ronaldo R. Arbes |061491 |[email  protected] com | |Amado C. Tan |101078 |[email  protected] com | | | | | |Instructor: |Prescilla F.Catalan | |Course & Year: |BS in Information Technology 3 | |Schedule: |TTH 7:30 – 9:00 AM | |Date: |April 16, 2013 | | | | Table of Contents title pagei table of contentsii table of figuresiii Revisionsiv 1Introduction5 1. 1Document Purpose5 1. 2Product Scope5 1. Definitions, Acronyms and Abbreviations5 1. 4References6 1. 5Overview6 2Overall Description7 2. 1Product Perspective7 2. 2Product Functionality8 2. 3Users and Characteristics8 2. 4Operating Environment9 2. 5Design and Implementation Constraints9 2. 6User Documentation10 2. 7Assumptions and Depen dencies10 3Specific Requirements11 3. 1External Interface Requirements11 3. 1. 1User Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 2Hardware Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 3. 1. 3Software Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 4Communication Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2Functional Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 3. 2. 1Librarian Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 3. 2. 2Clerk Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 3. 2. 3Borrower Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 4Other Non-functional Requirements27 4. 1Performance Requirements27 4. 2Safety and Security Requirements27 4. 3Software Quality Attributes28 4. 3. 1Functionality†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 4. 3. Usability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 28 4. 3. 3Reliability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 4. 3. 4Supportability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 Appendix A – Data Dictionary. 30 Appendix B – Group Log. 31 InDEX. 33 Table of Figures Figure 1 Context diagram7 Figure 2 Operating environment9 Figure 3 Main interface11Figure 4 Logging station for Librarian12 Figure 5 Clerk station for connection13 Figure 6 Clerk station14 Librarian Use Cases15 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Search book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 18 Clerk Use Cases19 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 Search book †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Return book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Add book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 23 Borrower Use Cases24 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Borrow book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 24 Retu rn book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Revisions |Version |Primary Author(s) |Description of Version |Date Completed | |1. 2 |Jun Jun G. Abanag, Jude |The revision of this SRS was done by request. Error |04/16/13 | | |Marlon B. Alegro |corrections to some parts of the document were needed to fully| | | | |complete an accurate Software Requirements Specification.Some| | | | |specified features were removed because it was uncompleted due| | | | |to lack of time and preparation. Some small details in | | | | |chapters were also corrected and Content page was revised. | | | | |Finally, to finish the SRS, then Appendix B and Index were | | | | |added. | Introduction 1 Document Purpose This Software Requirements Specification will provide a c omplete description of all the functions and specifications of the project, A-Flex Automated Library Management System. It will explain the purpose and the features of the system, the interface of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. This document is intended for both of the stakeholders and the developers of the system and will be proposed to the College Library of Samar College. Product Scope The A-Flex Automated Library Management System will be designed for the librarian, the staff and clerks and especially for the students of SC Library to maximize their productivity by providing tools to assist in automating the: production and transaction; logging in; monitoring materials; borrowing and returning of books and other library materials; assessing the overdue; inventorying; and creation of statistics and reports, which otherwise have to be performed manually in an ordinary daily basis.M ore specifically, this system will allow a certain user to manage, organize and monitor the data and attendance of the clerks, the status of the books and other library properties and the library records of the registered students to the library. Nevertheless the access to these capabilities will depend on the user privilege of an account. It will automatically provide statistical reports based on the data stored in its associate database which is updated consistently. Therefore the software will give an ease to do these tasks that are vital in managing the library. Definitions, Acronyms and Abbreviations |Term |Definition | |Borrower |Any person who wishes to borrow books inside the school library. | |Clerk |Any person who assists the librarian in minor tasks needed performed inside the library. | |Database |A collection of all data produced by the system. | |Librarian |A person who is assigned responsible in generally managing the school library. |QR Code |Quick Response code, a type of bar code/encrypted code that will be used for the project in identification | | |purposes. | |Requirements |Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC |Abbreviation of the name of the school where the system will be proposed. The Samar College | |SRS |Software Requirements Specifications.A document that completely describes all of the functions of a proposed| | |system and the constraints under which it must operate. For example, this document. | |Stakeholder |Any person with an interest to the project but is not a developer. | |User |Any person who operates or interacts directly with the product. | |VB |Visual Basic, a building/programming software used in creating the system | |XAMPP |An application used to have a connection between the product and its database. 4 References IEEE. IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specifications. IEEE Computer Society, 1998. [IEEE] The applicabl e IEEE standards are published in â€Å"IEEE Standards Collection,† 2001 edition. [Bruade] The principal source of textbook material is â€Å"Software Engineering: An Object- Oriented Perspective† by Eric J. Bruade (Wiley 2001). [Reaves SPMP] â€Å"Software Project Management Plan Jacksonville State University Computing and Information Sciences Web Accessible Alumni Database. † Jacksonville State University, 2003. 5 OverviewThe next chapter, the Overall Description section, of this document gives an overview of the functionality of the product. It describes the informal requirements and is used to establish a context for the technical requirements specification in the next chapter. The third chapter, Requirements Specification section, of this document is written primarily for the developers and describes in technical terms the details of the functionality of the product. Both sections of the document describe the same software product in its entirety, but are i ntended for different audiences and thus use different language. Overall DescriptionThis section provides a more detailed overview of the system, including a description of the product’s functions and overarching constraints. 1 Product Perspective A – Flex Automated Library Management System Figure 1 – Context diagram As shown in the Figure 1, A-Flex Automated Library Management System (A-Flex ALMS) is independent from other system and has three active actors and one database (where all information is stored and retrieved from). The Borrower, Clerk and the Librarian have a privilege to access the library system. However, the Librarian alone has the privilege to access the database, i. e. eleting, updating and/or adding such records and making reports. A-Flex ALMS uses Interaction Model, a Use Case Diagram, to make stakeholders easily view the system operation. 2 Product Functionality The product has the following major functionalities: †¢ Automated logging in of students into the library †¢ Automated borrowing and returning of books †¢ Enables to show the status of the books †¢ Enables the clerk to customize the due time of returning books for photocopying purpose †¢ Enables the user to search for a particular book using the system’s specialized built-in search engine †¢ QR code scanner functionality Database data storage 3 Users and Characteristics There are essentially three users for the system and are expected to be computer-literate: the borrower, as this project is being made so obviously the main client for this system who wishes to borrow materials in the library. The students of the school are not only the borrower, faculty and other employees of Samar College who are in the list of the school’s employees, for confirmation, may borrow books if they give envelop to librarian, this envelop will serve as their record of borrowing. The borrower may also be a student from other schools, that are required to register (P 50. 0) to school’s registrar to access a privilege and utilize the offered 8 hours services; the librarian, the main user of the system who manages the library and its database and responsible for activities such as adding book records, deleting book records, updating book status such as if book is issued and etc. ; the clerk, the assistant librarian and secondary user of the system who has a privilege to lend books, they are expected to have a different privilege as to librarian. 4 Operating Environment XAMPP Link from proposed system Figure 2 – Operating environmentThe system will be operated in the Samar College Library, as it was proposed to. When the user interacts into the system, the system will pass the user to the database, through XAMPP v. 3. 0. 12 which allows Windows program to transfer data to and from the database to record every interaction of the user. 5 Design and Implementation Constraints The current constraints on the pro ject are related to the provision of hardware resources to implement and test high-performance features. At present, an Intel Dual-core processor is needed, with a 2 GB RAM, serves as the server, with XAMPP running on top of the Windows 7 operating system.For better performance analysis, a number of dedicated workstations would be beneficial for the student workstation. The hardware that the project will be running on may constrain some design decisions pertaining to real-time and performance, as well as the scanner’s accuracy. Also, certain required hardware within the library imposes specific requirements on the project. The following is a list of constraints pertaining to the accuracy of the library system: †¢ The information of all the users must be stored in a database that is accessible by the system. The students must have logged in upon entering the library before they can borrow materials or books. †¢ The librarian only has the privilege and responsibility for the system’s security and privacy. †¢ Clerk and librarian have different privileges upon using the system. †¢ LAN is not implemented. †¢ BIOS of the system unit should be working to get the real-time in issuing of the books to the borrowers. 6 User Documentation The user can easily understand of the usage of the system with a user’s manual to be delivered with the system.The manual would be helpful with the some screen shoots within it. User can easily learn operation of the system by displaying corresponding shortcuts on controls for simple task. Contacts numbers of the developers will be given to the school librarian for further assistance when complex problems arise. 7 Assumptions and Dependencies A number of factors that may affect the requirements specified in the SRS include: †¢ The users have sufficient knowledge of computers. †¢ The users know the English language, as the user interface will be provided in English. Hardware and syst em specifications might not compatible. †¢ System might not supported by the operating system. †¢ It is assumed that librarian and/or clerk might forget their password for logging in. Specific Requirements 1 External Interface Requirements Below is a list of enumerated requirements that provides additional specifications for the behaviour and functionality of the system. 1 User Interfaces Using this system is fairly simple and intuitive. A user, who has a familiarity with basic logging in navigation, should be able to understand all functionality provided by the system.As Figure 3 shows, the user with different privileges can now select his workstation, with corresponding shortcuts for options, so that the system may give the user an access to these and may let the not be able to use those of privilege he usually should not have. [pic] Figure 3 – Main interface If the user selects the Open Librarian (Ctrl + L), system now then identify him as Librarian, a Server, an d Figure 4 will display with a pop-up form that lets the Librarian to have a three (3) attempts of logging in. If the user failed to log in successfully, system then will automatically shuts down. pic] Figure 4 – Logging station for Librarian If the user selects the Open Clerk (Click + C), system now then identify him as Clerk and Figure 5 then will display asking for an IP address sin order to have a connection to Librarian Workstation, server. [pic] Figure 5 – Clerk station for connection As the Clerk workstation has successfully connected to its server, then Figure 6 now will be displayed. Letting the Clerk to log in, as same of Librarian, if the Clerk failed to log in successfully it will automatically shuts down. [pic] Figure 6 – Clerk station 2 Hardware InterfacesSince the system will be installed in a Local Area Network (LAN) for collecting data from the users and also for updating the Library System and making reports, it is recommended by the developers , in order to have a maximum usage of the system, that the library should have the following: †¢ at least one camera for students’ easy logging in and scanning of books; †¢ printer for making reports; and †¢ computer unit(s) for the Clerk Workstation(s). The librarian then has to decide the number of units whether the library’s clerks would use. 3 Software InterfacesThe system will use only one external software, XAMPP v. 3. 0. 12, for the connection between the system and database. The system has a built in QR (Quick Response) Code Reader. 4 Communications Interfaces The system will be installed and run in a LAN of computer units. 2 Functional Requirements This section provides the detailed list of all product operation with their corresponding specific use case. 1 Librarian Use Cases 1 Use case: Log in Diagram: Brief Description The Librarian accesses the system, and can do various tasks. Initial Step-By-Step DescriptionBefore this use case can be init iated, the Librarian has already set up or prepared the units to be used. 1. The Librarian hits Ctrl + L, the option log in for a Librarian. 2. The system displays the pop-up login for the Librarian. 3. The Librarian selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Librarian is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Librarian selects the OK button. 4. The system records the info into the database. 5. The Librarian has logged out. 3 Use case: Search book Diagram: Brief Description The Librarian gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian selects the form fo r books, borrowers, etc. then chose the book. 2. The system displays the list of books and shows the different categories. 3.The Librarian selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 6. 4 Use case: Issue book Diagram: Brief Description The Librarian is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Librarian confirmed the borrower that he has a validated registration. 1. The system Librarian searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. a.If the book’s copy is more than one (1) and is available, the Librarian sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Librarian that the requested book(s) is not available and thus will automatically gives the re ason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirmation that the transaction is successful. 5 Use case: Update database Diagram: Brief Description The Librarian wanted to do some tasks the he/she needed the data be manipulated in the database.He or she also can update the database. Initial Step-By-Step Description Before this use case can be initiated, the system has verified that the Librarian is logged in. 1. The system displays categorized options of the entire data. 2. The Librarian selects the category. 3. The system gives other options of that selected category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched selected category. 2 Clerk Use Cases 1 Use case: Log in Diagram: Brief Description The Clerk accesses the system, and can do various tasks.Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already set up o r prepared the units to be used. 1. The Librarian hits Ctrl + C, the option log in for a Clerk. 2. The system displays the pop-up login for the Clerk. 3. The Clerk selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Clerk is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Clerk selects the OK button. 4. The system records the info into the database. 5. The Clerk has logged out. 3 Use case: Search book Diagram: Brief Description The Clerk gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk selects the form for books, borrowers, etc. then chose the book. 2. The system displays the list of book s and shows the different categories. 3.The Clerk selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 4 Use case: Issue book Diagram: Brief Description The Clerk is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Clerk confirmed the borrower that he has a validated registration. 1. The system Clerk searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. . If the book’s copy is more than one (1) and is available, the Clerk sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Clerk that the requested book(s) is not available and thus will automatically gives the reason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirma tion that the transaction is successful. 5 Use case: Return book Diagram: Brief Description The Clerk returns the book he/she has borrowed. Initial Step-By-Step DescriptionBefore this use case can be initiated, the Clerk, now as borrower, must return the book on time. 1. The Clerk himself may return the book he has borrowed. 2. The Clerk selects the Borrowed tab on the Borrowed form. 3. The system will display on the grid the borrowed books including his book. 4. The Clerk may scan the book with QR Code, or he may manually put the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the clerk wasn’t able to return the book on time. 6. The system records info into the database.Note: All Librarian assistants in the school’s library are working students, so therefore they may somehow be a â€Å"borrower†. 6 Use case: Add Diagram: Brief Description The Clerk adds some info, it might be addi ng books or borrowers to the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has given permission from the Librarian and thus he has already data to be stored in the database. And he has successfully logged in to the Clerk’s form. 1. As he logged in, the clerk clicks the â€Å"Add† tab on the Clerk’s workstation. 2.The system displays an option on whether what the clerk wants to add or store. 3. The clerk chooses an option. 4. The system displays needed data to be filled out whether it’s either a new book or new borrower. 5. The system then evaluates the input before storing to the database. a. If the required data is completed, the system displays a message box as notification of a new data. b. If some required data is missing, otherwise, a message box will be displayed to notify that some important data are not properly filled out. 7 Use case: Update database Diagram: Brief DescriptionThe Clerk modifies some d ata that are stored in the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk scanned some info, might in the book or borrower, and is incorrect. 1. The Clerk selects the â€Å"Update† tab on the Clerk’s workstation. 2. The system displays the pop-up options of the data to be updated to be edited. 3. The system displays the info that the Clerk wanted to update. 4. After the Clerk verified the correct records, the system then will display the updated data of a specified record. 3 Borrower Use Cases 1 Use case: Log inDiagram: Brief Description The Borrower, if student, logs in through the scanner by swapping their IDs with QR Code. Otherwise, if the scanner is not available he can manually input his student number. The faculty who wants to borrow has no record of logging in but they have to provide an envelope that the librarian refers to. Initial Step-By-Step Description Borrower enters the library. 1. The Borrower looks for the needed book(s) to borrow. He can ask the clerk to search the book(s) through the system. 2. The system displays the possible results for the input info. Use case: Borrow Diagram: Brief Description The Borrowers, either a student or faculty, borrows their needed book. Initial Step-By-Step Description Before the Borrower can have the needed book(s), he successfully logged in inside the library. 1. The Clerk selects the tab for borrowing within the Clerk’s workstation. 2. The system displays the required data to be filled out for the borrowing. 3. After the Clerk or Librarian hits the OK button, the system will evaluates the borrower if he or she has due book(s) that not yet been returned. 4.The system displays the notification and due date and time of the borrowed book(s) upon the request of the Clerk for borrowing the book then records it to the database. 3 Use case: Return Diagram: Brief Description The Borrower returns the book he or she has borrowed. Initial Step-By-Step De scription Before this use case can be initiated, the Clerk Borrower must log in inside the library. 1. The Borrower asks anyone among the Clerks for returning assistance. 2. The Clerk selects the â€Å"Borrowed† tab from the Borrowed form. 3. The system will display on the grid all the borrowed books including his book. 4.The Clerk may scan the book with QR code or he may manually input the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the Borrower wasn’t able to return the book on time. 6. The system records info into the database. Other Non-functional Requirements 1 Performance Requirements 1. Response Time – The Splash Page should be able to be load within seconds using a Windows 7 32-bit Operating System and at least 1 GB memory (RAM). The information is refreshed every two minutes. The access time for the computer unit should be less than a minute.The system shall respond to the member in not less than two seconds from the time of the request submittal. The system shall be allowed to take more time when doing large processing jobs. 2. Administrator/Librarian Response – The system shall take as less time as possible to provide service to the administrator or the librarian. 3. Throughput – The number of transactions is directly dependent on the number of users, the users may be the Librarian, employees of the Library and also the people who use the Library for checking-out books, returning books and checking library account. . Resource Utilization – The resources are modified according the user requirements and also according to the books requested by the users. 2 Safety and Security Requirements The server on which the Library System resides will have its own security to prevent unauthorized write/delete access. There is no restriction on read access. The use of email by an Author or Reviewer is on the client systems and thus is ext ernal to the system. The PC on which the Clerk resides will have its own security. Only the Editor will have physical access to the machine and the program on it.There is no special protection built into this system other than to provide the editor with write access to the Library System to publish reports. 3 Software Quality Attributes 1 Functionality Logon Capabilities The system shall provide the users with logon capabilities. Alerts The system can alert the Librarian or the administrator with notifications regarding the status of the books and in case of any problem. 4 Usability †¢ The system shall allow the users to access the system from a stand-alone client or its derivative technologies for public inquiries of the students.The system uses another computer unit for the client interface. †¢ The system is user friendly. 5 Reliability The system has to be very reliable due to the importance of data and the damages incorrect or incomplete data can do. Availability The s ystem is available 100% for the user. The system shall be operational 8 hours a day and 7 days a week. Accuracy The accuracy of the system is limited by the accuracy of the speed at which the employees of the library and users of the library use the system. Access Reliability The system shall provide 100% access reliability. 10 SupportabilityThe system designers shall take in to considerations the following supportability and technical limitations. Information Security Requirement The system shall support the information security requirements. Maintenance The maintenance of the system shall be done as per the maintenance contract. Standards The coding standards and naming conventions will be as per the American standards. Appendix A – Data Dictionary |Borrower – Any person who wishes to borrow books inside the school library. | |Clerk – Any person who assists the librarian in minor tasks needed performed inside the library. |Database – A collection of all data produced by the system. | |Librarian – A person who is assigned responsible in generally managing the school library. | |QR Code – Quick Response code, a type of bar code/encrypted code that will be used for the project in identification purposes. | |Requirements – Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC – Abbreviation of the name of the school where the system will be proposed, the Samar College | |SRS – Software Requirements Specifications.A document that completely describes all of the functions of a proposed system and the | |constraints under which it must operate. For example, this document. | |Stakeholder – Any person with an interest to the project but is not a developer. | |User – Any person who operates or interacts directly with the product. | |VB – Visual Basic, a building/programming software used in creating the system | |XAMPP – An applic ation used to have a connection between the product and its database. Appendix B – Group Log Notes Taken during our first meeting with Jun, Arnel & Marlon on January 23, 2013. †¢ Interview the librarian †¢ interview the library employees †¢ understand the flow of data in the library †¢ understand the processes used in transactions in the library †¢ new design †¢ lan network †¢ create a floor plan including 3 units for 3 stations of the whole system †¢ 3 stations: Admin station, Clerk Station, Log in Station †¢ provides photocopies of authentic documents from the library †¢ learn the penalty system of the library copy the list of books †¢ list the basic requirements †¢ Software Requirements Specification for Page 12 †¢ fix the QR scanner †¢ dry run the system †¢ Should we try this for different operating system environment? †¢ We might need licenses, ask if necessary. †¢ Given our budgets, th is is the best we can do. †¢ Set up servers. †¢ Began looking through test cases †¢ Will work on SRS †¢ Jun Abanag †¢ Created QR code samples for ID †¢ Will work on SRS. †¢ Marlon Alegro. †¢ Will work on SRS. †¢ Jun Abanag. †¢ Will work on SRS. †¢ Scrum Meeting 2/8/2013 †¢ Marlon Alegro Downloaded licensed software. †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Nicholas Cross †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Jun Abanag & Marlon Alegro †¢ Worked on SRS. †¢ Will wait on feedback from mentor to finalize SRS. Group activities †¢ Overnight sessions (starts at 10 in the evening up to 5 in the morning: 7 hours) Most of us have part time jobs during day time and we have different schedules for Software Engineering so we used our time to work during evening and midnight because of the busy schedule during day time.We spend seven hours during midnight to work on our system and the SRS. ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 †¢ Group meetings Since we have different schedules for Software Engineering, we try to meet up during free hours. And most of the times we are not complete because of the busy schedule. So what we do is two of our group mates meet up at certain time and the other one would discuss it to the other member when they meet.So in that way we can exchange ideas even though we don’t meet properly. Afterwards, the other few members will also catch up with updates from the recent group discussion. ? Samar College, twice a week. Every Monday, Wednesday and Friday ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 Index |A |Log out (use case), | |A –Flex ALMS, 5, 7, 8 | Clerk, 19 | |Add book (use case), 22 | Lib rarian, 16 | |Assumptions and Dependencies, 9 | | | |O | |B |Operating environment, 9 | |book, (use case) |Overall Description, 7 | | Borrow, 24 |Overview, Product, 6 | | Issue, 21, 1 7 | | | Search, 16, 20 |P | | Return, 21, 25 |Performance Requirements, 27 | |Borrower, 5, 7,8 |Product | | | Functionality, 8 | |C | Perspective, 7 | |Clerk, 5, 8 | | | use cases, 19 |Q | | station, 14 | QR (Quick Response), 5, 13 | |Context Diagram, 7 | | |Communication Interface, 15 |R | |References, 6 | |D |Reliability, 28 | |Delete (use case), 7 |Requirements | |Document purpose, 5 | External Interface, 11 | | | Functional, 15 | |E | Other Non-Requirements,27 | |External interface, 11 | Performance, 27 | | | Safety and Security, 27 | |F | Specific, 11 | |Functional Requirements, 15 |Return book (use case), 21, 25 | |Functionality, 8, 28 | | | |S | |I |Safety and Security Requirements, 27 | |Interfaces |SC, 6 | | Communication, 15 |Search book (use case), | | Hardware, 14 | Clerk, 20 | | Software, 14 | Librarian, 16 | | User, 14 |Software Interface, 14 |Issue, 17, 21 |Software Quality Attributes, 28 | | |Specific Requirement, 11 | |L |SRS, 6 | |Log in (use case) |Stakeholders, 6 | | Borrower, 24 |Supportability, 28 | | Clerk, 19 | | | Librarian, 15 | | | | | U | | |Use cases | | | Borrower, 24, 25 | | | Clerk, 19, 20, 21,22, 23 | | | Librarian, 15, 16, 17, 18 | | |User, 5, 6, 8 | | | characteristic, 8 | | | documents, 10 | | | interfaces, 9 | | | | |X | | |XAMPP, 6, 9, 14 | | ———————– Borrow books Librarian Clerk Search User System Database Librarian Update database Log in Article Borrower Issue book DATABASE Issue books Add Article Report Delete Article Update Librarian < include > < include > < include > < include > < include > Librarian Search book Log out Return books Log out Librarian Log in Librarian Log in