Wednesday, July 31, 2019

Linguistic Relativity Hypothesis Essay

There are around 5000 languages in use today, and each is quite different from many of the others. Many thinkers have urged that large differences in language lead to large differences in experience and thought. They hold that each language embodies a worldview, which speakers of different languages think about the world in quite different ways. At first I didn’t really understood what was being said, and I was really against it, but after asking myself, really? Knowing a different amount of words to describe things would allow us to better understand and communicate, interesting than as we started the color activity it became clear to me. Then immediately I started making connections to friends of mines form other foreign countries. Sometimes we have difficulties explain things to each other, things that are often the same, but because of where he’s from and the way their communication methods (Grammar, metaphors, Pragmatics, Semantics, Lexicon) are structured makes it difficult, to understand him being I’m form a different part of the world, meaning a different form of communication method, with a different set of rules. Form what I have read and understand the most important discussions of the linguistic relativity hypothesis have focused on grammar and lexicon which seem to be the most valid in my opinion. Why? I’m guessing it have something to do with the way we talk, and the influence it have on a lot of how much we understand, based on our vocabulary choices and makeup. For example a typical word order may vary in English; the common order is subject, verb, and object. In Japanese it is subject, object, and verb, and in Latin several different spin (word order). Languages can differ in whether they make a distinction between intransitive verbs and adjectives; there are many subtler sorts of grammatical difference as well. Grammar here does not mean the grammar we learned in grammar school, but the syntactic structure of a language; in the sense that grammar contains a set of rules that can generate all and only the sentences of a given language.

Tuesday, July 30, 2019

Rome’s Decline

Test Essay October 3, 2012 Question: â€Å"What were the main factors in Rome’s decline? Which do you judge as the most important? Why? † When we hear the word â€Å"Rome,† a very definite picture comes to mind. We see a strong military conquering a vast majority of the ancient Mediterranean world, Julius Caesar sitting on his throne, leading Rome to newer heights each day, and the highest, most innovative new technology being put to use as Rome grows stronger and stronger. Rome was a very successful civilization, as it lasted from 100 BC to 476 AD.For a 200 year span, called the Pax Romana, trade, entertainment, the economy, and overall satisfaction increased. This was a time of peace. Unfortunately, because of numerous misfortunes such as power struggles, inflation, military rebellions, and foreign invasions, even the mighty Roman civilization came to an end. Power struggle was a major conflict of Rome. After the Pax Romana, whose last king was Marcus Aurelius, emperors were continuously overthrown and killed.This was such an issue, that during one fifty year period, 26 emperors ruled and either resigned or were murdered. Out of those 26, only one died of a natural death. Because of the constant change of rulers, the kings lost the support of the citizens, since the emperors they were loyal to did not remain in power. The collapse in politics was the first step to the fall of Rome. The economic decline was the second step to the fall of Rome. Large taxes were put in place to support and fund the military due to corruptness.Because of this, a heavy burden was placed upon businessmen and farmers. With the majority of their income going to the large taxes, farmers were financially struggling. They could no longer afford their land, so they were forced to leave and work for large landowners. Money gradually started losing its value, and inflation occurred. The third step in the Roman decline was the military rebellions. Because of the constan t change in emperors, different groups in the military felt loyal to different rulers.This caused the military split and often rebel against each other. The military became so weakened and disorderly that emperors began to hire mercenaries. The final step in Rome’s decline was the foreign invasions from Germanic Tribes. Great Britain, Spain, and France were the first of the Roman territories to be surrendered. Rome itself was shortly after, and it was apparent that the largest and most powerful empire in the world at the time had come to an end. Rome was no more.

Monday, July 29, 2019

Argument of fact, the death penalty, is it more expensive than life in Essay

Argument of fact, the death penalty, is it more expensive than life in prison - Essay Example However, spending five million dollars from the pocket of the tax payer’s pocket for punishing a single criminal seems to be too much. Many Americans believe that even a small percentage of money spent for the execution of Bundy was enough for meeting the full expenses of keeping Bundy in jail for his entire life span. Taking the life of a criminal or giving capital punishment to a criminal is an easy act- just put the criminal in an electric chair for a while. However the lengthy criminal procedures till that period is the most expensive part of a capital punishment. Life is the most precious thing in this world and nobody, even the court, has the right to take it without adequate reasons. Under no circumstances, an innocent should be punished which is the core principle of criminal justice system. Under such circumstances double checking or triple checking is necessary before giving capital punishments to a criminal. The criminal can appeal against his punishment many times citing many reasons. All such appeals will result in the repetition of the court procedures many times. All these activities are highly expensive because of the expert services required for these procedures from professionals like, advocates, juries, investigating officers, forensic experts, witnesses etc. In this paper, I argue that death penalty is far more expensive compared to other means of punishments with the help of facts and figures. When initially looking at the costs involved in the actual execution of an inmate, the cost appears to be relatively cheap. In the state of Florida, an execution costs less than $1,000 dollars. So, why capital punishment cases are costing millions more than life in prison? The answer is simple; the actual execution of an inmate is quick and simple whereas the capital punishment system is far more complex. â€Å"The death penalty is much more expensive than life without parole because the Constitution requires a long and complex judicial proces s for capital cases† (The High Cost of Death Penalty). The very structure of capital cases is one reason why the cost greatly exceeds those of noncapital cases. In 1976 the U.S. Supreme Court approved the principles which, in its opinion, would make the death penalty constitutional. (The Supreme Court) specified that (1) the sentencing in such cases must be done in trials that are separate from the trials which determine guilt or innocence; ( 2) the sentencing hearing must examine both mitigating and aggravating factors, including pertinent features of the defendant's life and character as well as the conditions of the crime; and ( 3) each death sentence must be followed by an automatic right of appeal to the highest state court. Due to these U.S. Supreme Court mandates, capital cases will spend years, even decades in the courts and in appeals, all the while passing the bill on to the tax payers. If these sentences were commuted to life in prison without the possibility of par ole, these mandated additional trials and appeals would be eliminated, thus greatly lowering the burden to taxpayers. Before the finalizing of capital punishment, the criminal went through a series of expensive trial procedures to reconfirm the punishment. It includes complex and expensive appeal process, evidence gathering, investigations etc. Moreover, mandatory review of all the death sentences by the state supreme court is necessary. If the criminal

Sunday, July 28, 2019

The Importance of Human Resource Management in the Management Dissertation

The Importance of Human Resource Management in the Management Strategic - Dissertation Example This essay stresses that HRM role is the provision of assistance in HRM issues to line employees, or those directly involved in producing the organization’s goods and services.† In order to achieve the goals of an organization the services of human resources should be acquired and their skills have to be developed by motivating them to achieve higher levels in their performance and assure their continuous services along with commitment to their jobs. This paper declares that HRM is â€Å"the strategic approach to managing employment relations which emphasizes that leveraging people’s capabilities is critical to achieving sustainable competitive advantage. This is achieved through a distinctive set of integrated employment policies, programs and practices.† HRM is the basic function of all management actions and it has developed from different chains of ideas. Thus HRM function can be divided into; body of management functions and approaches adopted in order to execute the different management activities. When the employees of an organization are used effectively the company stands to gain in meeting its objectives advantageously. Every employee has to be motivated and encouraged in order to get the best out of him/her. Training imparted by the organization to its skilled personnel or unskilled workers should be of high standards, so that management can get the best from each employee.

Saturday, July 27, 2019

PEST analysis, (Political) in the UK Speech or Presentation

PEST analysis, (Political) in the UK - Speech or Presentation Example Individual making investment will be able to claim income tax reduction as an income tax relief. In the western world, the corporate tax rate in Britain is believed to become one of the lowest tax rates. Corporate tax rate has been dropping from 34% in 1990 to 24% in 2013 (Neville 2013). The introduction of new tax relief will lead to further reduction from 24% in 2013 to 21% in 2014. The second political factor is labour law. Currently the UK government have introduced regulations that will implement key changes to the obligations of redundancy collective consultation. This was approved in 6th April, 2014 and there would be publication of new Acas guidance for handling redundancy consultation (lorber & Novitz 2012). The third one is the environmental law. There have been implementations on environment regulations known as extended producer responsibility. These regulations are derived from European legislation and ensure that producers of particular products take full responsibility of reprocessing, recycling, and finance treatment of these items. The other political factor is trade restrictions which are inform of sanctions in the UK. The Sanction measures that have been applied include arms embargoes and several other trade control restrictions. Arms embargoes prohibit exportation of dual-use-items-goods and weaponry which have both military and civil use (Kenner 2011). The last political factor is technology. According to internet economy of UK, internet has allowed access to any information transforming life in UK. Technology use in UK has increase dramatically as evident in the use of smart phones. The rapid growth in tables, data â€Å"dongles†, and smart phone has enabled users to perform a lot of task both at home and in the office (Kenner 2011). The use of smart phone has doubled between 2008 and 2010 as shown

Analysing the industrial relations pressure in an industry or Research Paper

Analysing the industrial relations pressure in an industry or organisation in Australia - Research Paper Example The paper tells that the latter half of the twentieth century saw a progression of elite sports in Australia from the amateur and weekend pursuits towards the full time multi-million dollar enterprises. Along with the increasing professionalism in this industry the labour and industrial relations too has begun to resemble the traditional industries in various sectors. The sector has faced constant pressure to provide high wages to these elite players as they have taken up a more serious attitude towards negotiating and bargaining industrial relations issues. Sports are regarded as a lucrative business in which the players’ lifestyles can be determinant of the financial contracts that they can negotiate. Development of the enterprise bargaining (EB) in Australian sports bears relevance to bargaining in Australia. Negotiation occurring between the different parties occurs at the individual as well as the enterprise levels. However, the position of players’ associations as well as the sporting leagues in the bargaining process remains week and demands attention. The professional sporting players associations or unions have a chequered history. Out of thirty three attempts to form the players associations in the professional sports team in Australia only six remain in existence till date. Another important issue in the professional sports sector in Australia is that it is found to be very oppressive in terms of the employees’ labour rights. It is seen that players belonging to the major professional team sports remain strictly restricted by the league mandated labour regulations or industrial relations regulations.... Mobilising of members actually provides unions with the power to use their voice collectively to influence their employers and actions of institutions to benefit the cause of employees (Brooks, Callen, Singh, Felman & Thimann). The players associations particularly use such industrial actions in the same way and have successfully strengthened their positions in the industry which poses threat to this sector. Literature reveals that these associations capacity to engage in such industrial actions actually determines their success in the industry in terms of wages and salaries. These have yielded positive gains for these players in terms of their wages and other conditions of employments (Hanley & Rogers, 2004, p.4). There has been the generation of organizational conflicts in this industry. Common causes of conflicts identified are in terms of revenue sharing, refusal to compromise, welfare of players, and administrative incompetence. The failure to arrive at common objectives by the negotiating parties for the IR processes coupled with the reluctance of such parties to compromise on self interests are identified as two of the major reasons for organizational conflicts in this industry (Hanley & Rogers, 2004, p.5). Industry/ organisation The Australian sports industry has proceeded a long way since the last fifteen years. There are great entry of funds via such avenues as coaching, facility development, sports sciences, national sporting schemes, institute establishments, sport management and talent identification program. Being a relatively new industry in the market, this sector is quite unregulated and is yet to define its boundaries completely. Lack of minimum salary structures, dispute resolution procedures or

Friday, July 26, 2019

Marketing 301 Essay Example | Topics and Well Written Essays - 500 words

Marketing 301 - Essay Example Each business organization wants to set a price which does not just cover all the costs incurred by the company but will also generate a sizable mark-up for the company. The profitability objective will be taken into account by having a sensitivity analysis which looks at the changes in profit when prices and volume varies. It should be noted that volume sales is often inversely related to price, that is, the lower the price the higher the volume and vice versa. In order to meet the volume objective, I will make sure that the price set will encourage the purchase of the desired volume. Next, in order to meet the competition objective, I will conduct a survey of the pricing of the different brands in the market to make sure that the price charged is at par with the local industry. Lastly, the pricing should support the prestige objective. Recognizing that the young women's apparel store should have a trendy and chic image, prices should not be kept too low in order to create this imag e. Low prices are often equated with lower quality and mediocrity. 2. Based on the direct mail marketing materials that I have found, a lot of firms are utilizing psychological pricing in order to entice customers in buying their products. Blouses are often priced around $5.99 or $8.95 in order to have the effect of being cheaper than it really is. This pricing strategy seems to be very consistent with competing firms like Wal-Mart and even Target.

Thursday, July 25, 2019

History The World Essay Example | Topics and Well Written Essays - 250 words - 6

History The World - Essay Example The establishment of schools and colleges  also played a role in the education of both the Han people and the Islam. The Arab world where Islam started was the originators of the numerical system that is in use in the contemporary world. The art and architecture practiced in these two regions were a way of expressing their religious feeling to a higher authority. Evidently, the Han people just like the Islam used architectural knowledge that was being taught in learning centers to teach people how they were going to express their religious believes to a given authority. Further, the use of art and literature was also area of emphasis in the two religious groups as they used different artistic expressions and literature to teach each other about their faith and practices. The Islamic world has used different forms of art and literature to conserve and teach people about the religious practices that believed to hold the people together. The ground of controversy which can be identified among the Han dynasty is the large number of spirits that they offered sacrifices to. Whereas the Islamic religion offered sacrifices also, it did not have as much spirits as the Han dynasty. Further, the belief in deity among the Han people was lowered to the emperor who was in some cases revered and worshipped just if he were a

Wednesday, July 24, 2019

Chapter 1 & 2 assignments Assignment Example | Topics and Well Written Essays - 750 words

Chapter 1 & 2 assignments - Assignment Example However, instead of viewing project management as either successful or unsuccessful, stakeholders in the decision-making process should come to the appreciation of the fact that regardless of how successful the firm or company in question might be, there is always the potential for improving processes and effecting necessary changes on project management. Essentially, a hybrid organization is one that mixes different elements. Not surprisingly, within the hybrid model, elements of project driven and non-project driven are duly manifest. For instance, an IT firm that might exhibit a hybrid organizational approach could necessarily exhibit project driven metrics with respect to issues pertaining to development of new software etc. However, by means of comparison and contrast, other aspects of management could easily be considered as non-project driven. Likewise, non project driven management is an approach by which ultimate culpability for decision making, or results, is sometimes ambiguous. Moreover, in a non project driven system, it is unlikely that any necessarily high level of emphasis would be placed on the need for project management whatsoever. In seeking to answer why there are still cost overruns with respect to the industries of aerospace and defense, even though they had been exhibiting effective levels of project management for decades now, it is necessary to understand the nature of these industries and seek to place the blame for cost overruns where it truly belongs. Although it is doubtless the case that there are certain examples by which poor project management has effected a large cost overrun, the reason for why these cost overruns are oftentimes exhibited is contingent upon changes to technology. Within the aerospace and defense sectors, even a minute changes in technology can render prior research and development as effectively useless. As such, the need to change course and adapt to

Tuesday, July 23, 2019

TRAINING, LEARNING & DEVELOPMENT 'HELPING HANDS' CASE STUDY Essay

TRAINING, LEARNING & DEVELOPMENT 'HELPING HANDS' CASE STUDY - Essay Example It is against this background that I propose to delineate the strategic vision and mission of Helping Hand’s current corporate philosophy. It is not far fetched to suggest at this stage of my analysis that the management at Helping Hand, has almost foreclosed the significant opportunities that TL&D concept presents to business organizations at a critical phase of its growth process, by not revisiting its corporate strategy. There is an inevitable negative correlation between the gradual up-scaling of strategic corporate goals and a static TL&D policy. The outcome is not only predictably negative but also competitively disastrous. The principal stance of the Helping Hand’s senior management is that the operating capacity and efficiency of the middle management structure ought to be enhanced through a conventional and often credibility deficient technique of contracting out functional managerial tasks to outsiders who as consulting firms would rather put in place stop-gap measures. Stress management counselling services are performed by professionals who help client organizations to manage their staff well with a view to increasing worker productivity. Some of the latest techniques have been adopted, probably, by the Helping Hand’s rivals. For example, â€Å"Autogenic biofeedback in psychophysiological therapy and stress management†, has been received by stress management companies with open arms because it provides the counsellor with a more reliable tool (Lehrer and Sime, Editors, 2007, p.231). At Helping Hand, there is no such innovative strategic drive. Right now the level of staff mot ivation is at a low ebb. This is reflected in the high rate of labour attrition. Plans for diversification must be carried out with a total shake up in the existing organizational structure. Additional middle layers of management would necessarily add to the communication bottlenecks that underlie a tall chain of command. As a

Monday, July 22, 2019

Roles, Responsibilities and Relationships in Lifelong Learning Essay Example for Free

Roles, Responsibilities and Relationships in Lifelong Learning Essay a) As Gravells (2012, pp.19) states, the legislation, regulatory requirements and codes of practice relevant to a teacher in the lifelong learning sector will â€Å"differ depending upon the context and environment in which you teach†. For example, different organisations and employers are likely to have differing policies and guidelines, such as dress-code, time-keeping, equalities, regulating the role of the teacher. When teaching accredited courses it is necessary to be aware of the requirements of external bodies, such as Ofsted, which may inspect provision, as well as awarding and funding bodies, such as an FE College, which will require evidence to assure the quality of qualifications and courses and course attendance. There is various legislation and codes of practice relevant to the role of the teacher. Generic examples relevant to my role as a trade union tutor are listed in the table below: There will also be legislation and codes of practice relating specifically to the subject area being taught, type and age range of students, and environment. Thus, the Children Act (2004) will be relevant to those teaching learners under 18 years. I have listed in the table below some of the legislation and codes of contact relevant to my role as a trade union tutor: Health Safety (Display Screen Equipment) Regulations (1992)| Information Technology Codes of Practice| Trade Union Labour Relations (Consolidation) Act (1992)| ACAS Code of Practice: time off for trade union duties and activities| Legislation, codes of practice and regulations can change over time, and from organisation to organisation, and course to course. It is therefore important to check these regularly and ensure that, as a teacher, your knowledge and skills are up to date. b) â€Å"boundary n., pl. –ries. 1. Something that indicates the farthest limit, as of an area; border† Sinclair, J.M. et al, 1994, pp.187. Thus, boundaries both help to both define and limit our role as teachers; they are core to recognising our own areas of responsibility and expertise, and to recognising and respecting those of other professionals with whom we may work. The boundary between the role of the teacher and the specialist is seldom clear. Therefore, to more clearly understand where appropriate boundaries lay, it is important to understand the role of the teacher. These can be broadly outlined by the teaching cycle, which consists of five processes: identify needs, plan and design, deliver/facilitate, assess and evaluate. As a teacher I may encounter barrier in each of these aspects of the teaching/learning cycle, and I may need to seek the assistance or guidance of other professionals. For example, if IT equipment is required to deliver, then it is the responsibility of the IT Officer to set this up. Similarly, at times it is necessary to invite a specialist, such as a lawyer, to provide briefings on particular areas such as legislation or to consult with them in the development of course materials. As a trade union tutor I regularly work alongside colleagues in a variety of professional roles, including: lawyers and legal advisors, dyslexia and learning support services, trade union officials, technicians and IT support, Human Resources managers, college administrators and other tutors. As a teacher it is important to engage with other professional roles in a confident, respectful and professional manner, and to recognise and continually assess when aspects of my role can be more effectively dealt with by another trained professional. And again, as Gravells (2012, pp.16) says, â€Å"If you are ever in doubt about the boundaries of your role, always ask someone else† c) â€Å"The IfL Code of Practice states: Members shall take reasonable care to ensure the safety and welfare of learners and comply with relevant statutory provisions†. (ibid., pp. 51) Having identified barriers to learning, it is then important to identify the correct services to which learners may be referred. These points of referral can be simply separated into internal and external support services. Internal services are generally those provided by the education provider or organisation. Thus, many FE colleges have student support services which might include counselling, financial support, learning support etc. Trade unions may provide less internal services for learners, but there is generally an Education Officer or department, which can provide support to learners, and sometimes bursaries, and there is usually an IT department which can provide technical support and assistance. Many unions also have Learning Organisers, who can provide specialist advice and referral, and access to Union Learning Fund (ULF) resources. In addition, full-time union officials can assist learners in negotiating time off and financial and other assistance from their employers, and will work with them to develop an Individual Learning Plan (ILP). External support services generally refers to specialist organisations can refer to organisations such as Samaritans, Lesbian Gay Switchboard, NHS Direct, which provide specialist support and advice on specific issues which may affect learners. Within trade union education, external support services may also include referring learners, with their consent, to their employer. Many employers can provide financial and other assistance with learning, and offer support for staff with dyslexia and those for whom English is a second language. There are also other organisations, such as NIACE and the Workers Education Association (WEA) which provide additional training courses. d) â€Å"A good first impression will help establish a positive working relationship with your students.†, states Gravells (2012, pp. 10), â€Å"The way you dress, act, respond to questions, offer support†, all of these factors and more will place a part in setting the boundaries and establishing appropriate behaviours amongst learners. As a teacher it is vital to set a positive example, and to facilitate learners in establishing ground rules for behaviour during lessons, such as arriving on time, keeping phones on silent and listening respectfully to others. Learners’ involvement in establishing the acceptable standards of behaviour is key to gaining their buy-in, and thus in maintaining and regulating behaviour on an ongoing basis. Establishing routines in the learning context can be helpful, and it is necessary to constantly monitor, review and evaluate the behaviours within the lesson at all stages of the teaching/learning cycle, and to encourage and engage with feedback from learners regarding their experiences. In each situation it is necessary to determine appropriate actions; if unacceptable behaviour is repeated by one or more individuals, it may be necessary to address this with learners on a one-to-one basis in order to identify and, hopefully, to address the causes of any problems or issues. Bibliography Gravells, A (2012) Preparing to Teach in the Lifelong Learning Sector – The New Award, 5th Edition, London: Sage. Lefrancois, G.R. (2000) Psychology for Teaching, 10th Edition, Wadsworth. Sinclair, J.M. et al (1995) Collins English Dictionary Updated Edition, Harper Collins.

Information Systems Today Essay Example for Free

Information Systems Today Essay It is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is not possible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce. 3) Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) A manufacturer conducts business over the Web with its retailers. C) Juan buys Kevins guitar on eBay. com. D) Reuben buys a shoe on Yebhi. om. E) Sandra, an employee, uses the Web to make a change her health benefits. 4) Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend Carlas account because she needs financial help. B) Heath buys a gift for Vannessa from Amazon. com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ted files his income tax online. E) Marty buys Lobsangs mountaineering equipment from eBay. com 5) Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage was of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the Olympus E-PL2 to Balvinder Singh in India through eBay. com. B) Ben files an online suit against Sony. C) Ben files a complaint on Sonys Web site asking for an escalation. D) Ben buys a Canon G 12. E) Ben sells the Olympus E-PL2 to the worlds largest used camera dealer KEH. om. 6) Which of the following is a result of global information dissemination? A) Firms link Web sites to corporate databases to provide real-time access to personalized information. B) Firms tailor their products and services to meet a customers particular needs on a large scale. C) Firms market their products and services over vast distances. D) Firms provide immediate communication and feedback to and from customers. E) Firms provide ways for clients and firms to conduct business online without human assistance. 7) Which of the following actions explains mass customization? A) Firms tailor their products and services to meet a customers particular needs on a large scale. B) Firms provide immediate communication and feedback to and from customers. C) Firms provide ways for clients and firms to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information. 8) Which of the following is an advantage of using interactive communication via the Web? A) reduced transaction costs B) increased customer loyalty C) enhanced operational efficiency D) reduced brand dilution E) decreased cannibalization 9) The phenomenon of cutting out the middleman and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) reintermediation D) mutualization E) disintermediation 10) Which of the following is an example disintermediation? A) Land Rover markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Dunkin Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, which consists of items like Dunkin Dawgs, hot dogs wrapped in dough. C) Gatorade Thirst Quencher is a market leader in sports drinks. It is now planning to market its drinks to working women in urban areas. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment. 11) ________ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers. A) Reintermediation B) Demutualization C) Gentrification D) Disintermediation E) Mutualization 12) Which of the following is an example of reintermediation? A) The black Centurian card is issued by invitation only to customers who spend more than $250,000 a year on other American Express cards. B) P;G acquires the list of parents-to-be and showers them with samples of Pampers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, added retailers to its supply chain to cater to its target audience in remote geographic locations. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) Dunkin Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, which consists of items like Dunkin Dawgs, hot dogs wrapped in dough. D) These firms only conduct business electronically in cyberspace. E) These firms do not have physical store locations. 17) Which of the following firms would most likely pursue the brick-and-mortar strategy? A) KEH. com is a used camera dealer that buys and sells cameras across the globe. B) Castros is a watch manufacturing firm known for its effective mass customization. C) SmartInv is a brokerage firm that allows its customers to personalize their portfolios. D) BestBaker is a local bakery store in Bantam, Connecticut and caters exclusively to its residents. E) Nebo, a computer manufacturer, has pursued disintermediation and sells directly to customers. 18) Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms learn how to fully maximize commercial opportunities in both domains. B) These firms can often compete more effectively on price. C) These firms tend to be highly adept with technology and can innovate very rapidly as new technologies become available. D) Customers of these firms find it difficult to return a product in case of damages. E) These firms can reduce prices to rock-bottom levels, although a relatively small firm may not sell enough products. 19) EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a brick-and-click strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy? A) The company has limited access to funds and is looking to keep its costs low. B) The public is wary of sharing confidential information after a recent spate of credit card scandals. C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. D) Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts. E) Some click-only companies have been unable to achieve economies of scale and subsequently are unable to offer lower prices. 20) EZBiz, the brainchild of three college friends, is a startup venture which plans to produce sports gear. They are currently trying to decide between a brick-and-click strategy and a click-only strategy. Which of the following, if true, would most support the decision to adopt a click-only strategy? A) E-commerce places firms on a global platform, in direct competition with the best in the business. B) Retailers have a preference for established brands that can pay good margins. C) Research suggests that some customers prefer online shopping because of the convenience it offers. D) Product trials and demonstrations are an essential part of the consumer buying process. E) Cyber laws are yet to reach the level of sophistication required to facilitate safe online transactions. 1) Which of the following statements is true about the revenue model? A) It emphasizes the utility that the product/service has to offer to customers. B) It analyzes the existing players in the market and the nature of the competition. C) It describes the promotion plan of the product/service. D) It describes how the firm will produce a superior return on invested capital. E) It analyzes the background and experie nce of the company leadership. 22) Which of the following questions should a manager consider while analyzing the value proposition component of the business model? A) How much are you selling the product for? B) How fierce is the competition? C) How do you plan to let your potential customers know about your product/service? D) Can the leaders of the organization get the job done? E) Why do customers need your product/service? 23) While preparing a business model, a manager considers the question, How do you plan to let your potential customers know about your product/service? Which of the following components of the businessing model is he/she considering? A) Revenue model B) Management team C) Marketing strategy D) Value proposition E) Competitive environment 24) Paying businesses that bring or refer customers to another business is known as ________. A) affiliate marketing B) subscription marketing C) viral marketing D) stealth marketing E) buzz marketing 25) A collection of companies and processes are involved in moving a product from the suppliers of raw materials, to the suppliers of intermediate components, to final production, and ultimately, to the customer; these companies are collectively referred to as ________. A) customer management B) product lifecycle C) enterprise resource management D) supply chain E) market entry 26) Prior to the introduction of the Internet and Web, the secure communication of proprietary information in business-to-business electronic commerce was facilitated using ________. A) enterprise resource planning B) electronic data interchange C) cloud computing D) supply chain management E) executive information system 27) Which of the following statements is true about the extranet? A) It restricts the companys information from going on the Web. B) It can be accessed only by employees within an organization. C) It contains company related information which all the employees of an organization can access. D) It enables two or more firms to use the Internet to do business together. E) It requires large expenditures to train users on the technologies. 28) Web-based technologies are cross platform, meaning that disparate computing systems can communicate with each other provided that ________. A) the computing systems have been manufactured by the same company B) the computing system manufacturing companies are business partners C) they are located in the same country D) standard Web protocols have been implemented E) the computing system manufacturing companies allow it 29) Companies use ________ to secure proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users. A) firewalls B) phishing C) rootkits D) bots E) pharming 30) Organizations primarily use extranets to ________. A) conduct market research B) manage their supply chains C) identify their target market D) control brand dilution E) manage public relations 1) In the context of B2B supply chain management, ________ can be defined as access points through which a business partner accesses secured, proprietary information from an organization. A) bots B) forums C) portals D) rootkits E) hosts 32) ________ can provide substantial productivity gains and cost savings by creating a single point of access where the company can conduct business with any number of business partners. A) Rootkits B) Ph arming C) Bots D) Phishing E) Portals 33) ________ automate the business processes involved in selling products from a single supplier to multiple buyers. A) Supplier portals B) Reference portals C) Customer portals D) Procurement portals E) Sourcing portals 34) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers. A) Sourcing portals B) Reference portals C) Supplier portals D) Customer portals E) Procurement portals 35) ________ are set up as B2B Web sites that provide custom-tailored offers or specific deals based on sales volume. A) Sourcing portals B) Customer portals C) Procurement portals D) Reference portals E) Supplier portals 6) What is the difference between customer and supplier portals and business-to-business (B2B) marketplaces? A) Unlike customer and supplier portals, B2B marketplaces cannot be classified as extranets. B) Unlike customer and supplier portals, B2B marketplaces are secured by firewalls. C) Unlike customer and supplier portals, B2B marketplaces only serve vertical markets. D) Unlike customer and supp lier portals, B2B marketplaces are associated with a particular buyer or supplier who deals with multiple business partners. E) Unlike customer and supplier portals, B2B marketplaces allow many buyers and many sellers to come together. 7) Markets comprised of firms operating within a certain industry sector are known as ________ markets. A) vertical B) parallel C) horizontal D) stipulated E) focused 38) Which of the following statements is true about B2B and B2C payments? A) Most B2B payments are made through credit cards. B) Most B2C payments are made by checks. C) Most B2B payments are made through electronic payment services. D) Most B2B payments are made by cash. E) Most B2B payments are made by checks. 39) Credit cards and electronic payment services are not used for large B2B transactions because of ________. A) the risks associated with these services B) the complications arising out of these transactions C) preset spending limits D) the resulting decrease in working capital E) the expenses associated with these services 40) Organizations implement intranets to support ________ electronic commerce. A) business-to-business B) business-to-consumer C) business-to-government D) business-to-employee E) consumer-to-business 41) Intranets mostly affect the ________ of an organization. A) suppliers B) employees C) customers D) retailers E) advertisers 2) ________ is used to facilitate the secured transmission of proprietary information within an organization. A) Intranet B) Transnet C) Ethernet D) Extranet E) Telnet 43) Which of the following distinguishes an intranet from an extranet? A) An intranet looks and acts just like a publicly accessible Web site. B) An intranet uses the same hardware as a publicly accessible Web site. C) Users access their companys intranet using their Web browser. D) An intranet uses the same networking technologies as a publicly accessible Web site. E) In its simplest form, intranet communications do not travel across the Internet. 44) ________ are temporary work groups with a finite task and life cycle. A) Intensive forces B) Cross functional teams C) Task forces D) Staff committees E) Self directed work teams 45) The term ________ refers to a class of software that enables people to work together more effectively. A) malware B) groupware C) freeware D) webware E) pestware 46) Which of the following is an asynchronous groupware tool? A) shared whiteboard B) online chat C) intranet D) electronic meeting support system E) video communication system 47) One of the benefits of groupware is its parallelism. Which of the following statements best explains this sentence? A) It keeps the group on track and helps avoid costly diversions. B) It can easily incorporate external electronic data and files. C) It enables members to collaborate from different places at different times. D) It automatically records member ideas, comments, and votes. E) It enables many people to speak and listen at the same time. 48) Which of the following is a synchronous groupware tool? A) e-mail B) intranet C) group calendar D) online chat E) automation system 49) Which of the following provides customers with the ability to obtain personalized information by querying corporate databases and other information sources? A) e-filing B) e-integration C) e-information D) e-transaction E) e-tailing 50) The online sales of goods and services is known as ________. A) e-information B) e-integration C) e-tailing D) e-collaboration E) e-filing 51) Which of the following occurs in a reverse pricing system? A) Customers specify the product they are looking for and how much they are willing to pay for it. B) Customers are provided with the product and its price. C) Customers are provided with a product and can decide how much they are willing to pay for it. D) Customers specify the product they are looking for and the company provides the product with a price. E) Customers cannot decide the product but they can decide the price of the products available. 2) How do comparison shopping sites generate revenue? A) by charging a commission on transactions B) by selling their products C) by charging a virtual shelf-space fee to manufacturers D) by increasing the click-count on their site E) by charging distribution fees to consumers 53) The concept of the Long Tail refers to a focus on ________. A) mainstream products B) broad markets C) generic brands D) brand dilution E) niche markets 54) Which of the following is a disadvantage of e-tailing? A) It is limited by physical store and shelf space restrictions. B) It requires additional time for products to be delivered. C) It complicates the process of comparison shopping. D) It restricts companies to effectively compete on price. E) It reduces a companys inventory turnover time. 55) Which of the following explains Web analytics? A) conducting online marketing research to improve product quality B) analyzing Web sites in order to find the best one in its category C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site D) analyzing Web surfers behavior in order to improve Web site performance E) analyzing Web sites in order to find the best online business practices 6) Which of the following is a mechanism for consumer-to-consumer transactions? A) e-tailing B) e-integration C) e-filing D) e-tendering E) e-auctions 57) ________ is a form of e-auction in which the highest bidder wins. A) Reverse auction B) Bartering C) Exchange D) Forward auction E) Request for quote 58) ________ is a form of e-auction where buyers post a request for quote. A) A reverse a uction B) Bartering C) An exchange D) A forward auction E) A request for proposal 59) Which of the following forms of e-auction typically takes place on a business-to-business level? A) reverse auctions B) bartering C) exchanges D) forward auctions E) request for quotes 60) Doug is a frequent visitor of online auction sites. He uses two different accounts to place a low followed by a very high bid on the desired item. This leads other bidders to drop out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as ________. A) shill bidding B) bid luring C) payment fraud D) nonshipment E) bid skimming 61) Which of the following types of e-auction fraud is associated with the sellers failure to ship an item after the payment has been received? A) bid luring B) bid shielding C) nonshipment D) shipping fraud E) payment failure 62) If a companys Web site is listed in the sponsored list of a search engine, the search engine receives revenue on a ________ basis. A) pay-per-click B) pay-per-sale C) click-through D) pay-per-conversion E) click-per-visit 63) Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. A) pay-per-refresh B) pay-per-sale C) pay-per-click D) pay-per-conversion E) click-per-visit 64) Click-through rate reflects ________. A) the ratio of surfers who visited the Web site divided by the number of surfers who clicked on the ad B) the ratio of surfers who click on an ad divided by the number of times it was displayed C) the percentage of visitors who actually perform the marketers desired action D) the ratio of surfers who clicked on the ad divided by the number of people who made the purchase E) the ratio of surfers who visited the Web site divided by the number of people who made a purchase 65) ________ allows individual Web site owners to post companies ads on their pages. A) Bum marketing B) Stealth marketing C) Viral marketing D) Buzz marketing E) Affiliate marketing 66) In a ________, a site hosting an advertisement creates fake clicks in order to get money from the advertiser. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) dedicated click fraud 67) MakeYourClick is an online ad agency that is known for its ability to create ads which lure customers to purchase. Brenda, an ex-employee of the firm, was fired from the agency on baseless grounds. An angry Brenda inflates MakeYourClicks online advertising cost by repeatedly clicking on the advertisers link. Brenda has committed ________. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) dedicated click fraud 68) ________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A) Nearshoring B) Insourcing C) Offshoring D) Crowdsourcing E) Homesourcing 69) ________ is an example of m-commerce. A) e-auctions B) e-tailing C) e911 D) e-filing E) e-integrating 70) Which of the following is an argument against digital rights management? A) It encourages unauthorized duplication. B) It enables publishers to infringe on existing consumer rights. C) It discourages publishers to control their digital media. D) It inhibits online transactions in the industry. E) It restricts copyright holders to minimize sales losses. 71) E-filing is an example of a ________ tool. A) government-to-citizen B) consumer-to-consumer C) government-to-government D) consumer-to-business E) business-to-business Chapter 5: Enhancing Collaboration Using Web 2. 0 1) Which of the following is a basic concept associated with Web 2. 0? A) shift in users preference from online sites to encyclopedias as sources of unbiased information B) shift in users role from the passive consumer of content to its creator C) shift in users interest from sharing information o finding information D) shift in users lifestyle due to increased purchasing power E) shift in users preference to environment-oriented products 2) Which of the following is a consequence of the use of social software? A) People are using encyclopedias as sources of unbiased information. B) People are using environmentally-friendly products. C) People have increas ed purchasing power. D) People are sharing more personal information. E) People have become passive consumers of content. 3) The use of ________ within a companys boundaries or between a company and its customers or stakeholders is referred to as Enterprise 2. . A) Web 1. 0 techniques and intranet B) extranet and intranet C) Web 2. 0 techniques and social software D) extranet and Web 1. 0 techniques E) social software and extranet 4) Which of the following statements is true about Web 1. 0? A) It helps users share information. B) It helps users find information. C) Users rule these applications. D) Users receive and give recommendations to friends. E) It helps connect ideas and people. 5) A major benefit of social software is the ability to harness the wisdom of crowds, which is also referred to as ________. A) collaborative filtering B) preference elicitation C) creative commons D) consensus democracy E) collective intelligence 6) The concept of ________ is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts. A) cognitive dissonance B) creative commons C) collective intelligence D) consensus democracy E) preference elicitation 7) Which of the following statements is true about a discussion forum? A) It started out as a novices way of expressing themselves using very simple Web pages. B) It is the process of creating an online text diary made up of chronological entries that comment on everything. C) Rather than trying to produce physical books to sell or use as gifts, users merely want to share stories about their lives or voice their opinions. D) It is dedicated to a specific topic, and users can start new threads. E) It enables a person to voice his/her thoughts through short status updates. 8) Which of the following statements is true about blogs? A) They emulate traditional bulletin boards and allow for threaded discussions between participants. B) They allow individuals to express their thoughts in a one-to-many fashion. C) They are dedicated to specific topics, and users can start new threads. D) They are moderated so that new postings appear only after they have been vetted by a moderator. E) They enable people to voice their thoughts through short status updates. 9) Which of the following Web 2. 0 applications has been classified as the amateurization of journalism? A) blogs B) discussion forums C) social presence tools D) instant messaging E) online chats 10) Keith Norat, the Chief Technology Officer of Kender Internationals, relies on blogs while making decisions. In his words, Blogs are an important part of our purchase decisions. In todays environment, blogs provide diverse information that help us to make good decisions. Which of the following is an underlying assumption? A) Information in blogs is accurate. B) Some of the blogs are not written well. C) Blogs are company sponsored. D) Professional bloggers rely heavily on advertisements to sustain their operations. E) Blogs lead to the amateurization of journalism. 11) Which of the following explains the term blogosphere? A) the movement against blogs B) the amateurization of blogs C) the revolution against microblogging D) the community of all blogs E) the movement against discussion forums 12) Social presence tools are also known as ________ tools. A) social bookmarking B) instant chatting C) microblogging D) videoconferencing E) geotagging 13) Which of the following facilitates real-time written conversations? A) instant messaging B) discussion forums C) status updates D) blogs E) tagging 14) ________ take the concept of real-time communication a step further by allowing people to communicate using avatars. A) Blogging B) Microblogging C) Instant messaging D) Discussion forums E) Virtual worlds 15) Which of the following statements is true about virtual worlds? A) It allows people to communicate using avatars. B) Small firms have not been successful in consumer-oriented virtual worlds. C) It is designed for short status updates. D) It is the process of creating an online text diary made up of chronological entries that comment on everything. E) Large companies have been able to realize the potential of consumer-oriented virtual worlds. 16) The network effect refers to the notion that the value of a network is dependent on ________. A) the speed of the network B) the number of other users C) the knowledge of the users D) the commitment of the users E) the technical expertise of the moderators 17) ________ is a cooperative Web 2. 0 application making use of the network effect. A) Media sharing B) RSS C) Tagging D) Instant messaging E) A discussion forum 18) ________ is the distribution of digital media, such as audio or video files via syndication feeds for playback on digital media players. A) Narrowcasting B) Crowdsourcing C) Blogging D) Netcasting E) Phishing 19) Podcasting is a misnomer because podcasts ________. A) are concerned with the dissemination of information to a narrow audience B) cannot be played on Apples iPods C) are not related to distribution of digital media for digital devices D) are concerned with outsourcing tasks to a large group of people or community E) can be played on a variety of devices in addition to Apples iPods 20) Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________. A) tag clouds B) podcasts C) folksonomies D) geospatial metadata E) microblogs 21) Which of the following statements is true about social bookmarking? A) It is the distribution of digital media. B) It allows netcasters to publish and push current shows to the watchers/listeners. C) It allows people to communicate using avatars. D) It allows users to create folksonomies. E) It allows users to post short status updates. 22) ________ is the creation of a categorization system by users. A) Social cataloging B) Podcasting C) Social blogging D) Netcasting E) Crowdsourcing 23) ________ refers to manually adding metadata to media or other content. A) Phishing B) Tagging C) Crowdsourcing D) Podcasting E) Netcasting 24) Which of the following statements is true about tagging? A) It is the rocess of creating a categorization systems by users. B) It is the process of distributing digital media for playback on digital media players. C) It is the process of adding metadata to pieces of information. D) It is the process of of creating avatars and syndication feeds. E) It is the process of creating an online text diary. 25) ________ refer(s) to a way of visualizing user generated tags or c ontent on a site. A) Crowdsourcing B) Tag clouds C) Phishing D) Podcasting E) Pharming 26) Which of the following is one of the uses of geotagging? A) to use avatars while chatting online B) to create categorization systems for social cataloging C) to know the location of a person sending out a breaking news update D) to create folksonomies for social bookmarking E) to use syndicate feeds while sharing media 27) Which of the following is an example of synchronous communication? A) online reviews B) work flow automation systems C) intranets D) videoconferencing E) collaborative writing tools 28) Which of the following is an example of asynchronous communication? A) group calendars B) videoconferencing C) online chatting D) shared whiteboards E) electronic meeting support system 29) Which of following factors differentiates asynchronous communication from ynchronous communication? A) language B) network speed C) coordination in time D) expertise E) distance 30) In todays business environment, project teams comprise highly specialized members, many of whom are not colocated. ________ are comprised of members from different geographic areas. A) Work groups B) Virtual teams C) Work teams D) Task forces E) Command groups 31) Which of the following is an electronic communication tool that allows users to files, documents, and pictures to each other and share information? A) e-mail B) instant messaging C) application sharing D) electronic calendars E) knowledge management systems 2) Which of the following is an electronic conferencing tool that facilitates information sharing and rich interactions between users? A) e-mail B) wikis C) blogs D) instant messaging E) online document systems 33) Which of the following is a collaboration management tool that is used to facilitate virtual or colocated meetings ? A) Internet forums B) videoconferencing C) wikis D) fax E) intranets 34) Web-based collaboration tools ________. A) allow for easy transferability from one person to another B) have well-documented procedures for system complexities C) reduce the risk of exposing sensitive corporate data D) require users to frequently upgrade their software E) are complex and time-consuming to learn 35) Which of the following statements is true about Gmail? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events and subscribe to public calendars for new events. D) It is an instant messaging client. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. 6) Which of the following Google Apps is an instant messaging client? A) Gmail B) Google Calendar C) Google Talk D) Google Sites E) Google Docs 37) ________ is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. A) Gmail B) Google Talk C) Google Sites D) Google Calendar E) Google Docs 38) Which of the following statements is true about Googl e Sites? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events and subscribe to public calendars for new events. D) It is an instant messaging client. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. 39) A(n) ________ system allows users to publish, edit, version track, and retrieve digital information. A) social presence B) collective intelligence C) application sharing D) content management E) peer production 40) Which of the following statements is true about content management systems? A) It is the creation of goods or services by self-organizing communities. B) The creation of the goods or services is dependent on the incremental contributions of the participants. C) It allows the assignment of different roles for different users. D) Anyone can help in producing or improving the final outcome. E) It is a family of syndication feeds used to publish the most current blogs, podcasts, videos, and news stories. 41) Which of the following is the responsibility of an administrator in a content management system? A) editing the content into a final form B) managing account access levels to the digital information C) sharing team information D) publishing new information E) creating database applications 42) ________ is the creation of goods or services by self-organizing communities. A) Peer production B) A folksonomy C) Creative commons D) Groupware E) Social software 43) Which of the following statements is true about peer production? A) The creator is responsible for publishing new information. B) Only editors have the right to develop new content. C) It is also known as enterprise content systems. D) Anyone can help in producing or improving the final outcome. E) The guest is a person who can only view the digital information. 44) Which of the following occurs during wiki wars? A) editors do not agree with the creators of the content B) participants debate on a particular topic before creation C) administrators refuse to publish a creators content D) guests edit the creators content without permission E) contributors continuously edit or delete each others posts 45) ________ is a phenomenon where companies use everyday people as a cheap labor force. A) Nearshoring B) Phishing C) Crowdsourcing D) Narrowcasting E) Pharming 46) ________ enables people to work in more flexible ways on a variety of Internet-related projects. A) E-filing B) E-auction C) E-tailing D) E-lancing E) E-timing 47) ________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate. A) Crowdsourcing B) Social cataloging C) Social networking D) Social bookmarking E) Media sharing 48) Which of the following statements is true about viral marketing? A) It uses the network effect to increase brand awareness. B) It uses everyday people as a cheap labor force. C) It is the dissemination of information to a narrow audience. D) It enables people to work in more flexible ways on a variety of Internet-related projects. E) It is used to market a product without the audience realizing it. 49) Which of the following is a critical factor in the success of a viral marketing campaign? A) restricting access to viral content B) doing what the audience expects C) making sequels D) restricting easy distribution E) distributing products for free 50) ________ attempts to provide relevant search results by including content from blogs and microblogging services. A) Social search B) OpenSearch C) Enterprise search D) Metasearch E) Netsearch 51) Which of the following statements is true about Real Simple Syndication (RSS)? A) It is used to increase brand awareness through the network effect. B) It is used to disseminate information to a narrow audience. C) It is used to market the product without the audience realizing it. D) It is used to enable people to work in more flexible ways on a variety of Internet-related projects. E) It is used to publish the most current blogs, podcasts, videos, and news stories. 52) For companies operating in the digital world, online collaboration with suppliers, business partners, and customers is crucial to being successful. ________ allow(s) data to be accessed without intimate knowledge of other rganizations systems, enabling machine-to-machine interaction over the Internet. A) Web services B) Widgets C) RSS feeds D) Social search E) Peer production 53) Android is a Web service hosted by Google to ________. A) create customized search features B) build mobile phone applications C) manage personal calendars D) integrate Googles mapping system into Web sites E) allow us ers to build applications that work with multiple social communities 54) Which of the following statements is true about widgets? A) They can be placed on a desktop, but cannot be integrated into a Web page. B) They can integrate two or more Web services. C) They are created by the integration of Web services and mashups. D) They are small interactive tools used for a single purpose. E) They can be integrated into a Web page, but cannot be placed on a desktop. 55) Together, Web services and widgets enable the creation of ________. A) protocols B) mashups C) codecs D) folksonomies E) tag clouds 56) Which of the following statements is true about a mashup? A) It is a small interactive tool used for a single purpose. B) It is used to increase brand awareness through the network effect. C) It is the process of allowing companies to use everyday people as a cheap labor force. D) It is used to disseminate information to a narrow audience. E) It is an application or a Web site that integrates one or more Web services. 57) Which of the following is a reason for the development of semantic Web? A) Web pages can be understood by people but not by computers. B) Users should be able to use any device in any network for any service. C) Users give a lot of unnecessary personal information to social networking sites. D) Widgets cannot be integrated into Web pages. E) Users are skeptical while making purchases online due to the fear of getting cheated. 58) Which of the followings is NOT true about an Enterprise 2. strategy? A) Web 2. 0 sites base their success on user-driven self-expression. B) Enterprise 2. 0 applications are not suited to traditional top-down organizational structures. C) Enterprise 2. 0 applications should be driven by a specific usage context. D) Organization-wide Enterprise 2. 0 implementations typically need changes in terms of organizational culture. E) Within organizations, the critical mass needed for an Enterprise 2. 0 application is often easily achieved. 59) Enterprise 2. 0 is likely to fail if ________. A) an organizations workforce is dominated by baby boomers B) an organization has a flat organizational hierarchy C) an organization emphasizes open communication D) an organizations workforce is dominated by millennials E) it is integrated well with an organizations existing information systems infrastructure Technology Briefing: Foundations of Information Systems Infrastructure Networks, the Internet, and Databases 68) ________ is a computer networking model in which multiple types of computers are networked together to share data and services. A) Centralized computing B) Mainframe computing C) Task computing D) Distributed computing E) Serial computing 9) A(n) ________ is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers. A) enterprise network B) wide area network C) campus area network D) local area network E) value-added network 70) A(n) ________ is a wide area network connecting disparate networks of a single organization into a single network. A) value-added network B) global network C) enterprise network D) local area network E) personal area network 71) ________ are private, third-party-managed medium-speed WANs that are shared by multiple organizations. A) Value-added networks B) Enterprise networks C) Global networks D) Local area networks E) Personal area networks 72) A(n) ________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication, typically within an area of 10 meters. A) value-added network B) local area network C) personal area network D) enterprise network E) campus area network 73) ________ are network services that include the storing, accessing, and delivering of text, binary, graphic, and digitized video and audio data across a network. A) Print services B) File services C) Message services D) Application services E) Software services 74) The high-speed central networks to which many smaller networks can be connected are known as ________. A) last-mile networks B) ISPs C) Internet exchange points D) private branch exchanges E) backbones 75) Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes—computers or some other device such as a printer—on a network at a distance of up to 24. 4 meters? A) Bluetooth B) wireless LAN C) high-frequency radio D) infrared line of sight E) microwaves WLANs based on a family of standards called 802. 11 are also referred to as ________. A) Bluetooth B) wireless fidelity C) ethernet D) personal area networks E) infrared line of sight 77) Which of the following is a characteristic of terrestrial microwave communication? A) high attenuation B) speeds up to 16 Mbps C) low expense D) high susceptibility to eavesdropping E) low electromagnetic interference 78) ________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data. A) Media access control B) Logical link control C) Hypertext transfer protocol D) File transfer protocol E) Internet control message protocol 79) ________ is a commonly used method of random access control, in which each workstation listens to traffic on the transmission medium (either wired or wireless) to determine whether a message is being transmitted. A) Code division multiple access B) Carrier sense multiple access C) Hybrid coordination function D) Group packet radio service E) Point coordination function 80) In a(n) ________ network all nodes or workstations are connected to a central hub, or concentrator, through which all messages pass. A) ring B) bus C) star D) mesh E) tree 81) Which of the following network topologies is capable of covering the largest distance? A) star network B) bus network C) ring network D) mesh network E) tree network 82) Which of the following statements is true of a bus network topology? A) A bus network has the most complex wiring layout. B) Extending a bus network is more difficult to achieve than it is for other topologies. C) A bus network topology enables all network nodes to receive the same message through the network cable at the same time. D) The configuration of bus networks facilitates easy diagnosis and isolation of network faults. E) In a bus network, every computer and device is connected to every other computer and device. 83) As per the Open Systems Interconnection (OSI) model, which of the following layers defines the way data is formatted, converted, and encoded? A) application layer B) transport layer C) presentation layer D) data link layer E) session layer 84) According to the OSI model, the ________ layer defines the protocols for structuring messages. A) physical B) session C) transport D) data link E) network 5) According tot he OSI model, the physical layer defines ________. A) the protocols for data routing to ensure that data arrives at the correct destination B) the way data is formatted, converted, and encoded C) the mechanism for communicating with the transmission media and interface hardware D) the way that application programs such as electronic mail interact with the network E) the protocols fo r structuring messages 86) A ________ is a device that converts digital signals from a computer into analog signals so that telephone lines may be used as a transmission medium to send and receive electronic data. A) modem B) LAN card C) network adapter D) PCI connector E) USB port 87) A ________ is a PC expansion board that plugs into a computer so that it can be connected to a network. A) transceiver B) multiport repeater C) cable router D) network interface card E) modular connector 88) A(n) ________ is a piece of networking hardware that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points. A) router B) wireless controller C) network switch D) modem E) network interface card 89) Which of the following entities is responsible for managing global and country code top-level domains, as well as global IP number space assignments? A) American Registry for Internet Numbers (ARIN) B) World Wide Web Consortium (W3C) C) Internet Assigned Numbers Authority (IANA) D) Internet Governance Forum (IGF) E) European Organization for Nuclear Research (CERN) 90) Which of the following Internet connectivity technologies enables data to be sent over existing copper telephone lines by sending digital pulses in the high-frequency area of telephone wires? A) integrated services digital network technology B) digital subscriber line technology C) dial-up service technology D) cable modem technology E) fiber to the home technology 91) Computers working as servers on the Internet are known as ________. A) network adapters B) modems C) network switches D) Ethernet hubs E) Internet hosts 92) A(n) ________ is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately. A) foreign key B) surrogate key C) primary key D) superkey E) candidate key 93) In which of the following database models does the DBMS view and present entities as two-dimensional tables, with records as rows, and attributes as columns? A) relational database model B) hierarchical database model C) network database model D) object-oriented database model E) semantic database model 94) ________ is a technique to make complex databases more efficient and more easily handled by the DBMS. A) Assertion B) Exception handling C) Normalization D) Model elimination E) Structural induction

Sunday, July 21, 2019

Factors Causing Changes to the Ecosystem | Experiment

Factors Causing Changes to the Ecosystem | Experiment Madison Chapman Purpose/Hypothesis The purpose of this experiment was to better understand how an ecosystem changes over time by simulating the interaction between the aquatic, terrestrial and decaying parts of an ecosystem. Several variables of an aquatic chamber, terrestrial chamber, and decaying chamber were monitored to provide evidence for the changing of the ecosystems. Dissolved oxygen, pH, temperature, and turbidity, were some of the things measured and used as evidence to prove that the ecosystem was undergoing change. Obvious aesthetic changes were also noticeable, these were observed and recorded as changes within the environment. Without a complete and complex food chain, and with the small size of the ecosystem, it was not likely that the ecosystem would remain stable for a extended period of time. The lack of a food chain will not allow for larger organisms such as the fish and beetle to remain alive for a long time. The chambers should undergo similar changes that a normal ecosystem would. Methods The setup for the experiment was begun on September 9, 2013. Two liter soda bottles were used as the chambers for each environment type. The bottles were cleaned, cut to appropriate size, and taped together. Openings were cut into both the terrestrial and aquatic environment to allow access for testing. The top chamber was the decomposition environment. Two rotting banana peels, decaying leaves, and†¦ were added to the decomposition column, the top column. Rocks, soil, grass, moss, sticks, three earthworms, and one beetle were inserted into the middle, terrestrial chamber. A long stick was inserted through the decomposition chamber, into the terrestrial chamber to connect the two chambers. The bottom aquatic chamber was filled with local lake water and some aquatic plants. At the beginning of November the dissolved oxygen levels in the water were high and had stabilized, so a fish was added to the chamber. Upon each sampling event several variables were measured in the aquatic a nd terrestrial chambers. In the aquatic chamber turbidity, color, Nitrate, Dissolved Oxygen, alkalinity, pH, and temperature were measured and recorded. In the terrestrial chamber Nitrogen, Phosphorous, Potassium, and pH levels were measured and recorded. Also during each sampling event visual observations were made and recorded for both chambers. The sampling events were biweekly for most of the experiment. Throughout the experiment there were six sampling events; these were on September 9, October 1, October 8, October 22, November 5, and December 3. The experiment lasted a total of 75 days, with the last sampling event on December 3, 2013. Results Table 1 The ecosystem appeared to be stable until around the third sampling event. The ecosystem was growing and stabilizing. In the aquatic chamber dissolved oxygen was slowly increasing as well as alkalinity. In the terrestrial chamber potassium increased from an adequate level to a sufficient one. On October 22 the nitrogen, potassium, and phosphorous levels in the soil declined significantly from the last sampling event. There were also small fluctuations visible in the aquatic variables we tested. The dramatic depletion of almost all variables observed on the November 5th sampling event was foreshadowed by the turning of the water from clear to yellow. This showed the first signs of changes within the environment. On the November 5th sampling event the water in the aquatic chamber was green, the dissolved oxygen and alkalinity levels dropped considerably. Nitrogen, potassium, and phosphorous levels were all depleted in the soil. Figure 1 With the exception of alkalinity most of the aquatic variables that were measured and recorded stay remotely constant. Turbidity did increase steadily toward the end of the experiment and the dissolved oxygen levels decreased. This was shown by the green water color that was observed. Discussion ANSWER THE FOLLOWING QUESTIONS. NUMBER EACH QUESTION. YOU DO NOT HAVE TO RETYPE THE QUESTIONS!! Identify two Food Chains or Food Webs in each of your habitats (chambers). Use arrows to illustrate these food chains and food webs; complete sentences are not required. Use extra paper if needed. Aquatic Chamber Decomposition Chamber (top soil chamber) Terrestrial Chamber Identify and briefly discuss the biogeochemical cycles which are taking place/which are present in your EcoColumns. Do not merely state that â€Å"they are all present†; instead, provide more specific information. water cycle nitrogen cycle carbon cycle phosphorous cycle Is your ecosystem column a closed or open system? or is it something in between a closed or open system? Explain how this (closed, open or other) influences the ecosystem column overall. The ecosystem is closed with the exception of when things were added such as the fish or â€Å"rain water.† There are no outside forces working on the ecosystem, such as wind. What kind of niches are available/present for the various organisms in the column? Be specific, descriptive, and use terminology that is pertinent to the topic. The larger organism could hold the role of predator and prey on the smaller organisms. Most of the smaller organisms and the earthworms held the roles of decomposers. Discuss evidence of ecological succession taking place in your column (or in the column of another lab group if you have not observed any signs of succession in your column). One group whose ecocolumn water turned completely black in the first few weeks of testing experienced succession. Eventually the water cleared and the oxygen levels rose. Discuss the stability and sustainability of the ecosystem columns in the lab, including your own. The ecocolumns appeared to show moderate stability throughout the experiment, however, once in deviations in a variable occurred the ecocolumn seemed to change rapidly. The ecocolumns were sustainable until around two to three weeks before the experiment ended. Discuss three trends or patterns which stand out as you think back on the data which you have been recording for 6 weeks. These trends or patterns should apply to the water quality tests or other observations which you have made over this multi-week time period. Briefly discuss these three trends or patterns, providing possible explanations based on environmental science principles. Fluctuation in dissolved oxygen tend to be a precursor to fluctuation in other things. Water color was a good indicator of dissolved oxygen levels. Turbidity and dissolved oxygen are inversely linked. Explain what eutrophication refers to and how this occurs. Apply this explanation to your ecosystem column. How might eutrophication take place in your column? Explain fully. Eutrophication is the excessive increase in nutrients that causes an overgrowth in aquatic plant life, the plants become so dense it causes death in organisms and a loss of oxygen. If a large amount of nutrients drains from the soil of the terrestrial chamber into the aquatic chamber, then eutrophication may occur. Pick another group in your class. How do your data compare to theirs? Brainstorm some causes/reasons for any differences. The group in front of us has several sources of error such as bad lake water, and lack of precision during sampling events. Finally, address any sources of error in this lab. This should be narrated in a â€Å"cause and effect† manner and talk about specific problems. A good example would be â€Å"water did not drain from the terrestrial chamber so †¦Ã¢â‚¬  while a bad example would be â€Å"we messed up the measuring one day.† There was not an adequate amount of rainwater added to the environment as we were not in control of when the ecosystem was watered. The ecosystem was not completely closed because of the holes that had to be cut into the ecosystem for testing purposes, this allowed for unknown outside organisms to enter the environment. Conclusion (~.5 page) Write a brief summary paragraph as your â€Å"conclusion†. Address what did you learned that you did not know prior to the experiment? What were the most important findings of the project and why? The ecocolumn remained fairly stable and function for the first few weeks of the experiment. Not until three weeks before the experiment was concluded were fluctuations in the tested variables observable. Eventually due largely to the small size of the ecosystem and the incomplete food chain within it, the ecosystem broke down and the levels of nutrients began to greatly decline, as well as the dissolved oxygen levels within the aquatic chamber. Prior to this experiment I had never seen eutrophication in person. The opportunity to observe and further study eutrophication will help me later. The most important finding of this experiment was that different parts of an ecosystem (aquatic, terrestrial, decomposing) are all linked together. The variables in each part can easily influence variables in another part. References (on a separate page) You must use at least three (3) sources in your report. Cite them using the correct parenthetical or footnote format as indicated by the APA style guide that was handed out in class. If you do not know how to format the parenthetical citations or the bibliography, please see Mrs. Houston for help before the paper is due! TSA Program. (2013, May 23).Eutrophication. Retrieved from http://toxics.usgs.gov/definitions/eutrophication.html Ritter, M. E. (2009, October 1). Biochemical cycles. Retrieved from http://www4.uwsp.edu/geo/faculty/ritter/geog101/textbook/earth_system/biogeochemical_cycles.html Britannica, E. (2007, April 6). Niches. Retrieved from http://www.britannica.com/topic/414016/history Eco-column Grading Sheet

Saturday, July 20, 2019

Sophocles Philoctetes Essay -- Sophocles Philoctetes Essays

Sophocles' Philoctetes â€Å"No word. Then I am nothing† (950) â€Å"Who will say word of greeting to me?† (1354) In his lecture Oedipus at the Crossroads, Simon Goldhill addresses the idea that the incest between mother and son results in the collapse not only of the characters, but of language itself: or rather, of the language the characters use to express their despair. The fact that Oedipus stumbles on the words â€Å"Daughter, sister†¦Ã¢â‚¬  reflects this breakdown of language. In Sophocles’ Philoctetes, there is a similar sense of shattered language, but here it is more a case of being abandoned by language, of language and civilisation being so intrinsic to each other that being left behind by one implies being left behind by both. The Chorus’s description of what they imagine Philoctetes’s solitary existence to be like reflects this: â€Å"He cries out in his wretchedness;/there is only a blabbering echo,/that comes from the distance speeding/from his bitter crying†(187), using lack of dialogue to represent his solitude. Similarly, it is significant th at it is not distinct words that announce Philoctetes’s approach the first time he comes on stage, but rather â€Å"the voice of a man wounded† and â€Å"a bitter cry† (209,210). And it is no coincidence that upon meeting Neoptolemus, Philoctetes’ greeting becomes an insistent, repetitive cry: â€Å"Take pity on me; speak to me; speak/ speak if you come as friends. / No—answer me/ If this is all/ that we can have from one another, speech, this, at least, we should have† (230). Just as, when Odysseus’ plan has been revealed and the men are preparing to leave, Philoctetes’ supplication is â€Å"Your voice has no word for me, son of Achilles? / Will you go away in silence?†(1065). Speech is equated with pity, di... ...sation. The Chicago version of this passage reads: â€Å"Farewell [†¦] the deep male growl of the sea-lashed headland [†¦] where many a time in answer to my crying in the storm of my sorrow the Hermes mountain sent its echo!† (1460) while in the Francklin version he states, perhaps more aptly (as his passiveness is felt much more), â€Å"Farewell the noise of beating waves, which I so oft have heard from the rough sea [†¦]Oft th' Hermaean mount Echoed my plaintive voice†. In both cases there is a keen sense of release, of breaking free, of the relief of knowing that one’s words will bear fruit to something other than a dim reflection of themselves, that one’s attempts at dialogue will not be met with a wall of silence. It is an ending that resounds with possibility and potential: the world Philoctetes is about to re-enter is a veritable blank page. A â€Å"great destiny† awaits him.

Friday, July 19, 2019

Why is there evil? :: essays research papers

Dostoevsky: Why is there evil?   Ã‚  Ã‚  Ã‚  Ã‚  This story is about two brothers, Ivan and Alyosha. Alyosha is a monk and Ivan is his brother who doesn’t believe or accept God. Ivan believes that God cannot exist because there is evil. He doesn’t want to try and be convinced otherwise by his brother.   Ã‚  Ã‚  Ã‚  Ã‚  Ivan accepts and believes in God and says that there has to be evil. Evil has to be permitted because without it men would never know the difference between good and evil. This is important because it makes us aware of what could happen in the afterlife.   Ã‚  Ã‚  Ã‚  Ã‚  We should think about if the fact of evil counts against the existence of God. I think that evil and good must be present because the people that are evil and have fun at others expenses will pay after they die, and the people who are good and get persecuted will have a rewarding afterlife. B.C. Johnson: Why doesn’t God intervene to prevent evil.   Ã‚  Ã‚  Ã‚  Ã‚  Johnson, an atheist, writes about how there cannot be a God because of all the evil that happens. He talks about how innocent babies are killed in fires, and how Hitler was allowed to live. He also says if God exists he would have to be evil.   Ã‚  Ã‚  Ã‚  Ã‚  This story was written to show us that there couldn’t be a God because of the mass amounts of evil that take place. It’s a very one sided argument because he lists all of the bad things and none of the good things in the world. It was also written to see his beliefs in religion or non-beliefs because he is an atheist. He is using all of the evil things to support his atheism.   Ã‚  Ã‚  Ã‚  Ã‚  We should think about the fact that no good things were brought up such as love, friendship, and family. God has to allow evil in the world because if he didn’t, we would never know the difference between good and evil. Hick: There is a reason why God allows Evil.   Ã‚  Ã‚  Ã‚  Ã‚  Hick writes about how evil has been around forever with the climax being when Jesus was crucified. He asks why an all-powerful God would allow this and says it’s because of the free will given to us. Everything bad happens because this world is not perfect and this is where â€Å"soul-making† begins.   Ã‚  Ã‚  Ã‚  Ã‚  This was written to show us that God allows evil because he doesn’t want us to be in a utopia because we will never build our souls.

Going to the Territory :: Going to the Territory Essays

Going to the Territory    Ralph Ellison’s essay â€Å"Going to the Territory† is truly a definition of American culture.   Ellison’s essay is a description of his journey from Oklahoma to Brown University and along the way he uncovers truths about the way Americans selectively acknowledge their history and ignore important aspects of their culture and let them fester into an uncontrollable problem.   Ellison had a connection to Brown University before he even made it out of grammar school.   His principal was the first colored man to graduate from Brown and Ellison received an award in memorial to Dr. Inman Page, Ellison’s grammar school principal.   It is through his time spent at Brown and his journey there that he realizes that American culture is based upon what people choose to hear and see.   â€Å"Considering the ironic fact that Americans continue to find themselves stumbling into (as well as over) details of their history, tonight’s is a most American occasion†¦At any rate, in the two hundreds years of our existence  Ã‚  Ã‚   a great deal has been overlooked or forgotten† (123).   Ellison says that Americans ignore the social problems of our country, which results in the problems growing out of control.   Race is one of these problems.   According to Ellison, race is a result of people’s personal interests.   People are so self interested that they look past the pressing issues of today.   â€Å"Our unknown history doesn’t stop having consequences each though we ignore them† (133).   Because we as Americans ignored such issues as racial inequality- in that the debt Americans owe the black community is not repayable.   We think that by instituting laws to make all persons equal is enough, but this equality is never achieved, but looked past as though it is fine.   Ellison speaks of Black culture as being imitated and mimicked by many non-white citizens.   He mentions Europeans dancing like the Negroes, and how they other members of society find it absurd for them to behave in such a way.   These people are subject to the prejudices of those who have overlooked the instances of inequality in the past.   Today, people who pose as Blacks are subject to much scrutiny and discrimination.   They are termed â€Å"wiggers† and and are often seen as offensive.   Ellison thought that this mimicking behavior was okay and acceptable.

Thursday, July 18, 2019

A person’s mind is a very simple venue for many interesting cognitive

A person’s mind is a very simple venue for many interesting cognitive phenomena, unusual ways of thinking and mental mistakes, no matter how trivial or significant, which are usually unconsciously committed by a person even in the most mundane of mental tasks.This paper shall focus on number of interesting cognitive phenomena and mental lapses or mistakes which are chronologically presented based on what the writer perceives as the most important and common.FUNDAMENTAL ATTRIBUTION ERROR Fundamental attribution error is a very common human tendency when a person is placed in a social situation. It occurs when a person attributes someone’s behavior or reaction to a situation as having been caused by the person’s disposition or personality rather than by the situation at hand.According to Lee Ross, a professor of social psychology at Stanford University, a fundamental error forms the conceptual bedrock for the field of social psychology. He coined this term based on the classic experiment conducted by Jones and Harris.In the said experiment, subjects where placed in a situation where they were made to listen to pro- and anti- Castro speeches.They were initially made to believe that the persons who gave the speeches were freely given a choice as to what stand to make (i.e., pro- or anti-), the subjects naturally rated the persons who gave the pro- speeches as having a positive attitude towards Castro, and people who gave anti- speeches as having a negative attitude towards Castro. Before the experiment, Jones and Harris hypothesized that behaviors resulting from freely given choice shall be attributed by the subjects to disposition, while actions or behaviors resulting from chance to situation.However, this hypothesis was proven wrong when as part of the experiment, the subjects were told that the person’s choice of position (pro- or anti-Castro) was determined by a coin toss. It turned out that the subjects were still of opinion that pe rsons who gave pro- speeches were still, on average, in favor of Castro than those who spoke against him.Therefore, the subjects were unable to see the speakers as merely persons who were tasked to perform by virtue of chance or circumstance. They could not refrain from attributing the speaker’s actions or behaviors to situation rather than to disposition (Fundamental Attribution Error, 2007).

Wednesday, July 17, 2019

Film Appreciation †Abraham Lincoln : Vampire Hunter (2012) Essay

1. Presumed and inferred event.SynopsisAbraham capital of Nebraska who is the sixteenth chair of the unify States of America, happens to stumble upon the devises of the lamia clan who wanted to overthrow and rent over the coun sweat in recite for the clan to grow. The story evolves around Abraham who wishes to full stop the plan to be taken to action. 2. Explicity and presented event.This exposure starts with the of import character, Abraham capital of Nebraska, report his diary nigh his life and excursion. It therefore slowly moves into the flashbacks of his life, all(a) the charge back to when he was a kid in the year of 1818. Having the plastic film started in much(prenominal) a way helps the audiences to have an in depth emotion on the story, and it also stimulates the minds of the audiences in entrust the story. The rest of the story can be raise in the later part, in the section of the storyline.3. Added non die take a shitic materials.This movie uses a perf ect of 22 soundtracks that were composed by enthalpy rascal public, and the firstlyinnate(p) margin call in the mop up or the occlusion credit play was by Linkin Park, entitled Powerless, as correspond to Wikipedia (2012). How incessantly, based on the IMDB (2012), there were whatso of all time former(a) 6 variants that were non included into the come of soundtrack, of which were also workforceti iodined that the songs listed in their database are sometimes, not to be tack together on the CD soundtracks. The Student Waltz was one of the songs that were in the movie, whereby Abraham capital of Nebraska was dancing with bloody shame Todd. In that particular scene, both Abraham and bloody shame were share their thoughts together, and finding themselves to a greater extent alike than they ever knew, and the song played at the background signal helps to create a romantic aura around the both of them.The other song that caught the watchfulness is also the first closing cr edit song, Powerless by Linkin Park. In that scene, it shows a white br de stick outrish backdrop with drops of blood, forming lines in which at the end is seen to be drawing reveal the map of the join States of America, where the lines are the separation of the states that were in USA. The song Powerless, as the title says it all, gives us the odor of universe powerless in visual perception how a nation organism downhearted(p) into different parts of states instead of being united as one.Characters Abraham Lincoln The main character, who stood up a substantiatest the lamias and also the President of the linked States. enthalpy Sturgess Abrahams mentor, who taught him how to be industrial-strength to fight the vampires. resultiam Johnson Abrahams friend from the preceding(a) whom he well- tried and true to protect when he was a kid, arduous to protect Will who was being abused due to sla very(prenominal).bloody shame Todd Lincoln Abrahams wife. exaltation The vill ain, vampire leader. hole Barts One of the vampires, the vote downer of Abrahams mother. Joshua Speed Abrahams employer, who hired Abraham to hunt down in his store, and gave him a place to rest, who ultimately became Abrahams assistant in the black-and-blue House.doubting doubting Thomas Lincoln Abrahams father.Nancy Lincoln Abrahams mother.Vadoma Adams sister.William Wallace Lincoln Son of Abraham and Mary Todd Lincoln.Storyline.The story begins with Abraham, writing his diary sequence remembering the things that has happened in the past. It started to flash back into the year of 1818, where he was living with his parents, Thomas and Nancy Lincoln, who were workers in a grove owned by a guy physiqued seafarer Barts. Abraham who was at the plantation with his parents, witnessed his friend, William Johnson and her mother, who were dragged out and was tortured by one of scalawag Barts men. unable to control himself, Abraham took an axe and went on to try and attack t he man who was beating up William, yet ending up to be captured, over throw and beaten by that man. Upon seeing this, Thomas stood up and tried to protect his son, stop that man from his continuous beating on his son and William, and ended up force him into the river. diddly Barts came out of his arrive atice and found out what happened, and had Thomas and his family fired. That night, as Abraham was excuse awake at the attic, flavor down at his mother who was sleeping soundly, he realized a figure orgasm into the room, and he hid himself.He later adage that the figure was no other than jackass Barts himself, and he saw Jack grab Nancy and left. The next morning, Nancy was very ill, and died indorsements later, with Abraham alongside her on her bed. Thomas do Abraham promise that he will not seek Jack for retaliate, for as long as he is animated, knowing that the repulsive Abraham will win a silly move such as that. Nine years later, Thomas died and Abraham knew that he is no longer a except by the promise he do to his father, attempts to seek revenge on Jack for fling offing his mother. As he was deglutition in a bar, trying to get some courage into himself forward he ingathering to eradicate Jack, he met with atomic number 1 Sturgess. enthalpy spoke to him, saying that a young man drinks completely for 2 reasons, that is to kiss a girl, or to polish a man. As he shags Abraham on his shoulder, a poor boy fell pip from Abrahams jacket, and enthalpy knew even up aside that the answer was the latter. Abraham so picks up his gas pedal and left the bar, designateing to Jacks plantation, with his sole purpose of killing him.As he was hiding himself while time lag for his chance, he saw Adam and Vadoma for the first time, but he knew nothing serious closely them, neither was he concerned close to who they were and why were they there with Jack Barts. Abraham do his moves and caught Jack by surprise, wholly to crumple in his first attempt as his shooter couldnt fire. He ran from Jack and hid himself in a hut while trying to reload his gun and trying to stop Jack from coming into the hut. The moment Jack pushed the door open, Abraham fired his gun and the bullet hit Jack on his right eye. sentiment that Jack is dead, Abraham threw his gun into the river and walked away from the scene. However, as he turns his head to look at Jacks body for the last time, he realised that Jack is missing and is nowhere to be found. All of a sudden, Jack appeared right in front of Abraham, catching him off guard, and tried to kill him. Abraham, who was still in shock and confused, could not react in time but to be thrown and beaten by Jack.Knowing that he shot Jack and killed him, but for some apparent reason, Jack is still a break and beating him up badly. Just as Jack is about to kill Abraham, heat content came to stop Jack and threw him out of the scene. atomic number 1 past took Abraham home and tended to Abrahams wounds in his house. As Abraham wakes up from his rest, he was told that Jack, whom he tried to kill, is actually a vampire. Thinking that vampires are just myths and legends, Abraham could not believe what he heard from enthalpy, but only(prenominal) to be convinced by atomic number 1 after(prenominal) finding out that Henry is a hunter. He then begs Henry to teach him how to hunt and kill a vampire, since Jack is a vampire and he is seeking any possible shipway to kill him for revenge. Knowing Abraham is full of payback spirit, Henry told Abraham that he will only teach him if he promises to forget his revenge, live a solitary life with no attachments, and also to hunt vampires only as instructed by Henry himself. Wanting to control the ways to hunt and kill a vampire, Abraham lied to Henry, giving him an answer that he wishes to hear.Upon completing his naturaliseing with Henry, Abraham left and went to capital of Illinois and met with Joshua Speed as he was looking for a place to stay. Because he had no money left, Joshua offered him a place to stay in pass away for his service as the store clerk. From then on, Abraham worked with Joshua, until the day she met with Mary Todd, and fell in love with her that very instant. At the alike(p) time, he standard a letter from Henry, mentioning his first ever vampire hunt location and the name of the vampire. As night approaches, Abraham started his move, and killed his very first vampire, burying the body in the woods. currently, more lists were sent by Henry to Abraham to kill the vampires that were in Springfield. One fine night, Abraham was visited by an old friend who was in town, and was told that he was being hunted for trying to lighten slaves. As Abraham grew in sharing his ideas on freeing the slaves, he gotten the attention from the senator and he began his journey as a political leader from then on. Henry came to town to remonstrate with Abraham not to be involved in politics as well as r elationships, but all Abraham cared was to seek revenge on Jack.Arguing his way out of vengeance, Henry finally gave in, and told Abraham that it is time for him to kill Jack Barts. Before leaving, Henry gave Abraham a liquid watch with engravings of words, sentence waits for no men. Abraham then sets out to Jack Barts plantation with the intention of killing him. However, moments out front dying in the hand of Abraham, Jack revealed that Henry, Abrahams mentor, is also a vampire himself. Upon hearing that, Abraham went to confront Henry after he killed Jack Barts. Seeing Henry being a vampire suction on humans blood, Abraham became tearing and attacked Henry. Feeling confused and betrayed, Abraham knew of no other solutions but to try to kill the man who taught him all that he knew about hunt a vampire. Henry then tried to calm him down, and told him the story of how he became a vampire. He also told Abraham the curse of the vampire, and that only a living can kill the dead. After hearing his story, Abraham cuts off his ties with Henry, and begins his journey of life. That very night, he proposed to Mary Todd and they got married.Adam soon found out about the death of Jack Barts, and ordered Vadoma to dedicate an invitation to Abraham to his trap Adam set for Abraham in his own plantation. In order to arrive at Abraham obey and accept his invitation, Adam had his men kidnap William as well. Abraham then made his way to Adam, with the company of Joshua and he tried to tell Joshua what they are about to face, but Joshua thought it was just merely a joke, until he saw the event himself. Abraham then went in ahead to try and preservation William, only to be captured by Vadoma. He was then apt(p) a survival of the fittest to kill Henry, his mentor, or to be piteous from the same faith as Henry, and William being killed right in front him. Just moments before Adam slits Williams throat, Joshua came in with the carriage, hitting Vadoma on the way, and managed to get both Abraham and William out.As they were escaping from Adams troops, they came in tie-in with the slaves that were in hiding from Adam, who took them to their hideout. After that, they fled to where they came from, and Abraham started his words on freeing the slaves, after what he saw back then. Henry then re-appears before Abraham, telling him that having the slaves there is what care the vampires under control as the vampires uses the slaves as their food. Having this chains broken will only cause an outbreak and retaliation from the vampires. Neglecting the advices from Henry, Abraham proceeds with his speech of freedom to all slave. Soon after, he was elected to be the President of the United States, and he and his wife move into the etiolated house, of which they have their son born into their lives, William Wallace Lincoln. Despite the warnings from his mentor, Abraham went on ahead in signing the Emancipation Proclamation that sets the well-behaved war t o take place.Unknowingly to him, the retainer President has consulted Adam to seek his service in sending his undead army to be in the front line against the soldiers from the United States who knew nothing about the vampires, in return a nation to be given to the vampires to grow and expand on their own accord. Vadoma was also on the move into the White House, and gave William Lincoln a bite, and causes his death. Devastated, Abraham who were having dinner with his wife, of a sudden realise the idea of the vampires weakness, silver. He then ordered all the silver materials found in the household are to be confiscated and are to be used to cave in artillerys against the undead army. Joshua then went to Vadoma, revealing Abrahams plan in moving the silver to the soldiers in the south fighting the army of the undead by train and gave Vadoma the schedule of the delivery. However, the train was just a decoy to capture the attention of Adam into believing that Abraham is sending the weapon of destruction to the to Adams vampire army.As Adam climb onboard of the train, he soon realised that there werent any silver on the train and it was filled with only stones. Knowing that he was tricked, Adam killed Joshua for betraying them, right before Abraham, William Johnson and Henry. As the railroad collapse, Adam tried to gain information from Abraham in regards of the location of the silver weaponries, only to be stabbed by Abraham, apply his silver watch, and that puts an end to the vampire leader, Adam. Abrahams wife, Mary, led the slaves into delivering the weapons to the soldiers fighting in the south. She soon realised that Vadoma, the killer of her son, was there in the barracks.Getting a rifle to herself, Mary found Vadoma. She then pulled her necklace off, and inserted it to the rifle, having the small microscopic knife that William Wallace used to play with before he was killed as the pendant. She then fired towards Vadoma and it killed her instantly. The civil war finally came to an end. Henry offered to turn Abraham into a vampire, so that they could live forever and make changes to this world, but was turn down by Abraham who told him that very same line Henry had engraved in the silver watch he gave to Abraham, Time waits for no men.Reference distinguishIMDB. (2012). Abraham Lincoln Vampire Hunter. Retrieved February 5, 2013, from http//www.imdb.com/title/tt1611224/Wikipedia (2012). Abraham Lincoln Vampire Hunter. Retrieved February 5, 2013, from http//en.wikipedia.org/wiki/Abraham_Lincoln_Vampire_Hunter